The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In these days, Social Networking Sites (SNS) are indispensable tools for communication in our life. However, it cannot be said that all of the dominant SNS have sufficient expressive ability. Insufficient expressions lead to misunderstanding and causes human-relation troubles. To solve this problem, we focus on "Fonts." Fonts have an important role in communication by texts. In this paper,...
In recent years the use of digital communication has increased. This also increased the chance to find privileged data in the digital evidence. Privileged data is protected by law from viewing by anyone other than the client. It is up to the digital investigator to handle this privileged data properly without being able to view the contents. Procedures on handling this information are available, but...
Slot machines are the most popular facility in casinos worldwide. With the advancement of computer technology, the operating reel spinning of the current slot machine is presented by computer software emulation instead of rotating mechanical iron reels. The reel strip table of a slot machine has many special pictures embedded for different attractive themes. Each slot machine achieves a hit rate based...
Human factors have been increasingly recognized as one of the major driving forces of requirement changes. We believe that the requirements elicitation (RE) process should largely embrace human-centered perspectives, and this paper focuses on changing human intentions and desires over time. To support software evolution due to requirement changes, Situ framework has been proposed to model and detect...
High-performance computing systems are currently used by many scientists and researchers with Job Management Systems (JMS) that are deployed over high-performance computing systems. To achieve high performance in high-performance computing, systems communication performance must be improved in the interconnect. JMS sometimes adopts the staging, witch is a method to transfer data used by an application...
IoT devices are software-rich and Java is sometimes chosen as the developing programming language. Although Java is highly productive in constructing large advanced programs, application or user-defined Java classes must be responsible for safety and security issues. In particular, two fundamental methods hashCode and equals play key roles in safety and security assurance. Some existing studies for...
Software-Defined Networks (SDN) are constantly evolving and so is their software. One of the key advantages of SDN over traditional networks is the ability to rapidly develop and deploy new features. However, updating them often requires restarting the SDN controller and causes network downtime. In addition to such planned updates, unforeseen, accidental downtime is also a risk for SDN networks. While...
There are many open challenges and current / future research directions for self-aware systems. We have shown that self-modeling systems address many of them, but we have not yet seen many replicable experiments that allow methods and results to be shared. In this paper, we describe an architecture for self-modeling systems, and how we expect to use it for experiments in self-awareness. These experiments...
Modern teaching methods, including the need to use information technology in teaching, are receiving increasingly more attention in higher education pedagogy. The purpose of this paper is to provide an overview of the technology mentoring programme that was launched in the University of Tartu and to categorise the reasons why 15 university teachers who specialise in the field of education decided...
Network Function Virtualization (NFV) architectures are emerging to increase networks flexibility. However, this renewed scenario poses new challenges, because virtualized networks, need to be carefully verified before being actually deployed in production environments in order to preserve network coherency (e.g., absence of forwarding loops, preservation of security on network traffic, etc.). Nowadays,...
Cross project defect prediction (CPDP) is a challenging task since the predictor built on the source projects can hardly generalize well to the target project. Previous studies have shown that both feature mapping and feature selection can alleviate the differences between the source and target projects. In this paper, we propose a novel method FeSCH (Feature Selection using Clusters of Hybrid-data)...
It is assumed that Japanese can analogize the meaning of original text if they read the original text according to the commonality of written expressions, such as the commonality of Kanji and Chinese characters in case of Chinese-Japanese translations. In this study, participants rewrote translated sentences while viewing simultaneously the original sentences written in Chinese and the translated...
Recent research trends in network science are shifting from the analysis of single-layer networks to the analysis of multilayer networks. In particular, the robustness of multilayer networks has been actively studied. There exist two popular multilayer network models: one is interdependent network, and the other is multiplex network. We aim to construct a methodology for effectively improving the...
A new generation of medical devices emerges to supportincreasingly more complex medical decisions and procedures.These Medical Devices (MD) combine data fromnovel sensors and existing modalities like scanners withelaborate software processing to assist caregivers in the sameway Flight Management Systems help a pilot flying planes.For instance, Blue Ortho’s MD allows performing TotalKnee Arthroplasty...
Combinatorial interaction testing (CIT) stands as one of the efficient testing techniques that have been used in different applications recently. The technique is useful when there is a need to take the interaction of input parameters into consideration for testing a system. The key insight the technique is that not every single parameter may contribute to the failure of the system and there could...
To avoid the lock-in problem in service-oriented software, existing interface-decoupling mechanisms focus on identifying high-level service mappings, which are not necessarily applicable on translating actual data. Based on the fundamental data-translation process, its successful outcome is guaranteed if mappings are low-level, i.e. they satisfy schema constraints. The problem is that if similar services...
El presente estudio corresponde a una primera aproximación de la tendencia de la fenología de la superficie para la Isla Grande de Tierra del Fuego, mediante el análisis de las métricas fenológicas. Inicio, duración y término de la temporada de crecimiento. Se utilizaron compuestos de 16 días correspondientes a índice de vegetación mejorado (EVI) para una serie temporal de 15 años. El análisis de...
With the popularity of the Internet, online news media are pouring numerous of news reports into the Internet every day. People get lost in the information explosion. Although the existing methods are able to extract news reports according to key words, and aggregate news reports into stories or events, they just list the related reports or events in order. Moreover, they are unable to provide the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.