The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By integrating various development and collaboration tools into one single platform, the Jazz environment offers several opportunities for software repository miners. In particular, Jazz offers full traceability from the initial requirements via work packages and work assignments to the final changes and tests; all these features can be easily accessed and leveraged for better prediction and recommendation...
In this paper, we perform an empirical analysis of email traffic logs obtained from a large university to better understand the development of social networks. We analyzed data containing records of emails sent over a period of 10 months - the largest dataset we are aware of. We study the long term evolution of social networks on real world data. The initial analysis of data is followed by an exploration...
A new particle swarm optimization method is put forward in this paper, the proposed approach improves the basic PSO in two aspects: 1) the exclusive gbest is replaced by the weighted center of the whole swarm, which is more stable and proved to be closer to the really optimum position in the searching space; 2) the particle can adjust speed adaptively according to the environment to fly slower in...
We propose a robust maximum a posteriori probability (MAP) blind bit-rate detector (BBRD) for a fixed frame-length multiple access system which employs variable-gain receiver power and repetition encoding. this detector considers the rate detection (RD) as a multihypothesis test and maximizes the likelihood functions (LF)s to find the true bit-rate. Assuming that we have no knowledge about the receiver...
By analyzing the structure of large amount sentences in Chinese, extracting paraphrase templates based on key items, which can used to paraphrase some sentences with special structure. Matching of paraphrase template with sentences is through calculating similarity of paraphrase sentence with paraphrase template. With fixing keywords and structure auxiliary words which reflect the structure of sentences...
This study describes the design and implementation of an online intellectual community that targeted only the School of Information Systems and Technology (SISAT) at CGU, and the steps taken to foster active participation amongst community members. The artifact developed was an online community for the purpose of improving the sense of community amongst students, faculty, and alumni of SISAT by allowing...
Developers of open source projects are distributed across the world. They rely on email, mailing lists, instant messaging, IRC channels and more recently IRC meetings to communicate. Most of the studies thus far focus on the use of mailing lists by OSS developers, however, an increasing number of open source projects are using IRC meetings to hold developer meetings. In this paper, we mine the #gtk-devel...
Key among the grand challenges in traceability are those that lead to achieving traceability as a by-product of the natural software development life cycle. This position paper profiles test-driven development (TDD), an emerging software development practice, in which automated tests and code satisfying them are developed in rapid succession over multiple iterations. Our position is that the nature...
In this work we present an approach to system development that bridges the complementary worlds of model checking and simulation. This approach, which we refer to as formal model simulation, uses the same formal model as model checking, but instead of using a total search of the state space, we use a guided random-walk based search to find errors. The guide we use is a heuristic that can be derived...
This position paper describes the challenges of semi-automatically recovering traceability information in specifications of the automotive domain using information retrieval techniques. Recovering traceability information itself is not an easy task and a combination of factors make this task even harder in the automotive domain. For example: There are huge specifications compared to specifications...
In this paper we propose an approach that utilizes visual features and conventional text-based pseudo-relevance feedback (PRF) to improve the results of semantic-theme-based video retrieval. Our visual reranking method is based on an Average Item Distance (AID) score. AID-based visual reranking is designed to improve the suitability of items at the top of the initial results list, i.e., those feedback...
Although the relations between affects and posture were the focus of several studies in Psychology, their consideration in multimodal corpora research remains scarce. In this paper we survey related studies and propose a framework for studying affective postures by integrating knowledge coming from multiple sources such as literature, video corpora, motion capture data, artistic design, and perception...
In a classification problem, when there are multiple feature views and unlabeled examples, Co-training can be used to train two separate classifiers, label the unlabeled data points iteratively and then combine the resulting classifiers. Especially when the number of labeled examples is small due to expense or difficulty of obtaining labels, Co-training can improve classifier performance. In this...
In literature, texts to be classified are generally represented in the large dimensional bag of words space in which every dimension equals to a word or ngram. In this study, firstly the words are placed in a semantic space. The word's coordinates in semantic spaces needs the similarity of the words according to their meanings. Harris states that two words' semantic similarity is related to the number...
In this paper, a graph-based method for video content analysis is proposed. The characteristics of the detected shots are investigated for news, commercial, animated cartoon, basketball and documentary videos and experimental studies are realized on these videos. The maximum clique on the weighted and undirected graph, which is constructed according to visual content, is tried being detected. It is...
This paper presents a preliminary study in the use of face recognition for unobtrusive activity-related biometrics systems. First the components of such a system are described. Several issues related to using the face modality are identified, including the need for an adaptive face localization scheme for robust authentication. A greedy algorithm is proposed to complement the Viola-Jones algorithm...
Recent years HOG algorithm has been used to recognize objects in images, with complex content, with a very high success rate. Hardware implementation of this algorithm is very important because of the fact that it can be used in many object recognition applications. In this work HOG algorithm is implemented on FPGA to recognize different geometrical figures with a very high success rate. Objects vertical...
A facial feature extraction method is proposed in this work, which uses location and texture information given a face image. Location and texture information can automatically be learnt by the system, from a training data. Best facial feature locations are found by maximizing the joint distribution of location and texture information of facial features. Performance of the method was found promising...
In this paper, we propose a method to estimate the fundamental matrix for hybrid cameras robustly. In our study a catadioptric omnidirectional camera and a perspective camera were used to obtain hybrid image pairs. For automatic feature point matching, we employed scale invariant feature transform (SIFT) and improved matching results with the proposed image preprocessing. We also performed matching...
Biometrics play an important role in modern access control systems to overcome the problems of forgotten, stolen or easily-guessed passwords. With the recent developments in cryptography, hashing and random number generation, biometrics and cryptography are combined in new generation cryptosystems. In this paper, it is aimed to produce a unique binary biometric identity code (bit string) by using...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.