The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Program invariant is formal description of properties that should hold at certain program location in every valid execution. It is very useful for program analysis and verification. In this paper, we introduce an abstraction interpretation approach for generating program invariant efficiently and precisely. A polynomial interval domain is proposed for representing abstract state and precise loop effect...
The deferred payment system, which is a traditional Japanese business practice whereby customers do not pay until goods are received, facilitates online fraud. After receiving goods, fraudulent clients simply disappear and the supplier does not receive the payment. However, since the traditional deferred payment system is expected by honest customers, online shopping sites cannot eliminate this payment...
Dental pulp stem cells (DPSCs) are stem cellspresent in the dental pulp and have same renewal anddifferentiating properties as bone marrow cells. Hence, DPSCs canbe used for future regenerative therapies of various diseases.Previous studies show that DPSCs would lose their differentiationcapability during long-term passage when they were cultured inmedium promoting differentiation. Researchers have...
We consider the case of spreadsheet based workgroup collaboration, in which users cooperate through spreadsheets. While spreadsheet exchange through email and shared directories is still the most common way to share data, spreadsheet sharing in the Cloud is rapidly spreading, leveraging the evolution of office tools toward delocalized system over the Cloud. In this paper we observe that spreadsheet...
In [1], we present a lightweight online failure prediction approach, called Seer, to predict the manifestation of failures at runtime, i.e., while the system is running and before the failures occur, so that preventive and/or protective measures can proactively be taken to improve software reliability. One way Seer differs from the other related approaches is that it collects information from inside...
Byzantine attacks are constant threats in many applications such as disaster management, and battlefield applications. In this paper, we introduce a monitoring scheme in the link state routing protocol to secure the packets' route against Byzantine attacks. The goal of our proposed scheme is to guarantee communication among connected benign nodes in the network. Specifically, each node monitors the...
One of the major diseases affecting the global population, depression has a strong emotional impact on its sufferers. In this design study, "Talis" is presented as a wearable device which uses emotion recognition as an interface between patient and machine to support psychotherapeutic treatment. We combine two therapy methods, "Cognitive Behavioral Therapy" and "Well-Being...
As the system is deployed in the dynamic environments, the need of self-adaptive system is increasing. In addition, by advancing the network technology, self-adaptive system interacts with other systems to achieve the complex goals, which are difficult to be achieved by single self-adaptive system. During the interaction, they may share security-critical information. As a result, security becomes...
As the complex workload scheduling and resource allocating mechanism in big data system, programmers' configuration error is one of the most typical root causes of unsuccessful termination of jobs, which can result in performance deterioration, availability degradation, resource inefficiency and user unsatisfactory. In this paper, we propose an approach called SD-Predictor, to predict misconfiguration-induced...
The idea of decomposition is becoming increasingly successful and popular in evolutionary multi-objective optimization. An efficient cone decomposition approach was further developed in the conical area evolutionary algorithm (CAEA). This approach improves the runtime efficiency and population diversity of decomposition-based algorithms effectively for bi-objective optimization in practice. In this...
The relationship between the use of Geogebra and Technological Pedagogical Content and Knowledge (TPACK) by teachers has not been fully investigated and understood. Therefore, the aim of this study was to integrate GeoGebra technology to develop the TPACK of secondary school pre-service mathematics teachers. The participants of this study were 60 Indian teachers. Data were collected through the administration...
This paper proposes an algorithm that is particularly concerned with generating all possible distinct spanning trees that are based on breadth-first-search directed graph traversal. The generated trees span all edges and vertices of the original directed graph. The algorithm starts by generating an initial tree, and then generates the rest of the trees using elementary transformations. It runs in...
In this paper, a modeling and simulation approach for the boiler coil pipe bending production line is proposed based on the eM-plant software. The aim of this paper is to analyze the real workshop of manufacturing resource and process data based on the object-oriented simulation modeling technology and give the arrange strategy for improving the continuity and reliability of the manufacturing process...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.