The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes the step-wise re-design of a traditional introductory programming course into a blended learning course. By combining lectures with an online programming environment, short instructional videos, and Tutorial-worksheets, we intend to increase student learning and help students develop the ability to write software. To ensure a successful revision of the course, student learning...
Since 2011, we have developed and deployed a standalone Voice-Interactive Digital Signage System to provide useful university information to users at the Nagoya Institute of Technology. This system comprises MMDAgent, a software toolkit to realize voice interaction with 3-D character named "Mei". An important shortcoming is that this system's ability is limited because it lacks a network...
It is difficult to specify a system completely with formal methods. There are don't care situations which may not be so clearly defined, and behaviors of some special cases are hard to describe. Recently, it has been found that if the changes inside a design are local (limited within a set of sub-circuits), complete verification becomes feasible with small numbers of simulations. This gives us a way...
Many software projects adopt mailing lists for the communication of developers and users. Researchers have been mining the history of such lists to study communities' behavior, organization, and evolution. A potential threat of this kind of study is that users often use multiple email addresses to interact in a single mailing list. This can affect the results and tools, when, for example, extracting...
We consider the problem of online automatic tuning. In this setting, we execute the target program with some tuning parameters N times, where N is given, while optimizing the parameters to minimize some objective function such as the total execution time. Thus we have to choose the parameters for each execution by taking into account the trade-off between exploration and exploitation. The ATMathCoreLib...
Driven by the importance of relational aspects of data to decision-making, graph algorithms have been developed, based on simplified pairwise relationships, to solve a variety of problems. However, evidence has shown that hypergraphs—generalizations of graphs with (hyper)edges that connect any number of vertices—can better model complex, non-pairwise relationships in data and lead to better informed...
Autonomous ontology learning is a critical task to reduce the cost of ontology construction for knowledge based systems. This paper provides a cognitive model for ontology learning system, which aims to develop a novel model for knowledge structuring based on the interaction between the process of ontology construction and cognitive psychology. During cognitive process, we simulate human's cognitive...
La navegación de los modelos de software en las actuales herramientas CASE es realizada a través del uso de árboles de navegación, y el desplazamiento en los diagramas es realizado típicamente por barras de scroll laterales. Este mecanismo introduce una discontinuidad entre la información desplegada que puede causar cargas cognitivas y mecánicas para los usuarios. La solución propuesta para enfrentar...
A pre-condition for any verification technique based on simulation is the generation of a high-quality set of stimuli that effectively and efficiently cover the whole state space of the Design Under Verification (DUV), including hard-to-reach corner cases. To cope with this necessity, several approaches for the automatic generation of stimuli have been proposed for both embedded software and high-level...
Spreadsheet environments like MS Excel are the most widespread type of end-user software development tools and spreadsheet-based applications can be found almost everywhere in organizations. Since spreadsheets are prone to error, several approaches were proposed in the research literature to help users locate formula errors. However, the proposed methods were often designed based on assumptions about...
A method to define a best case behavioral or “golden inverter” software model has been developed, derived from either internal inverter readings (internal), high precision site based measurements or laboratory characterization and well defined conditions. The paper describes the method of the model development as well as the performance of the model for a selected use case.
The article deals with the use of a technique of a modified method of the planned experiment to modeling of physical processes in the klystron and electrodynamic systems, developed by the operational method of calculating the klystron cavities, based on the use of approximate models obtained on the basis of equations with refinement coefficients, found by the planned experiment. Application of the...
La preparación y almacenamiento de apresto catiónico y alumbre de la planta “Soluciones Máquinas” en la empresa Carvajal Pulpa y Papel Planta 1 ocasiona fluctuaciones en las concentraciones de los químicos, presentando en ocasiones una mala calidad del papel con pérdidas de hasta USD 400 por tonelada. Actualmente este proceso se realiza mediante un operador y en forma manual sin intervención de sistemas...
During system evolution, trace links among requirements and source code could get distorted due to vocabulary mismatch problem. Nevertheless, researchers have shown that those links can be recovered by code refactoring. Moreover, it is shown that refactoring methods like rename identifier has positive impact in supporting traceability. This leads to the question that will other refactoring methods...
Image composition is a basic process in digital image editing. Its objective is to enable convenient image object copy-and-paste to generate new images which look natural and realistic. Seamless image composition systems often require users to successively choose a rough region of the inserted object and the target location for automatic which is rather tedious for using 2D input devices like mouse...
A large amount of unstructured data are being continuously generated by mobile applications, e.g., Facebook, Twitter and Foursquare, due to the popularity of smart devices, e.g., iPad, iWatch and smartphone. These data are undoubtedly of great value but need to be first well stored and then analyzed. Nevertheless, traditional relational database management system (RDBMS) is not well qualified for...
Social media are primarily generated and transmitted over Internet from mobile based applications/tools, e.g., Flickr, YouTube, etc., for sharing and discussing information among people. Most of these applications are putting forward from desktop to mobile client side, since smart devices are growing by leaps and bounds, and they tend to take fully advantage of tunnels that telecom companies offer...
Agile Software Development (ASD) is increasingly common in globally distributed teams -- it is known as AGSD. However, while in ASD face-to-face interactions are preferred over document-based communications, in global software development document-based communication is preferred. These differences affect Architectural Knowledge Management. AGSD workers preferably convey architectural knowledge (AK)...
[Background] Software Engineering (SE) is predominantly a team effort that needs close cooperation among several people who may be geographically distributed. It has been recognized that appropriate tool support is a prerequisite to improve cooperation within SE teams. In an effort to contribute to this line of research, we have designed and developed an infrastructure, called ABC4GSD, based on the...
As a basic operation, image saliency detection has been widely used in various applications. Many approaches have been proposed to detect salient regions. In this study, we learn to detect salient curves of cartoon images based on composition rules. We formulate the detection problem as a binary labeling task where we separate salient curves from the whole curve structures extracted from the cartoon...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.