The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we focus on the exception handling mechanism of CA-CCML (Context-aware Cooperative Composition Modeling Language). First, according to level of exception generation, we divide Web service exceptions into three broad categories by levels of exception generation, which are Service invocation level exception, Syntax level exception and Semantic level exception. Then we make detail classification...
Developers use many software applications to process large amounts of diverse information in their daily work. The information is usually meaningful beyond the context of an application that manages it. However, as different applications function independently, developers have to manually track, correlate and re-find cross-cutting information across separate applications. We refer to this difficulty...
Mining frequent patterns is a crucial task in data mining. Most of the existing frequent pattern mining methods find the complete set of frequent patterns from a given dataset. However, in real-life scenarios we often need to predict the future frequent patterns for different tasks such as business policy making, web page recommendation, stock-market behavior and road traffic analysis. Predicting...
In the cloud computing paradigm, Infrastructure-as-a-Service (IaaS) providers can provision virtualized hardware and resources to users, removing the need for users to own and operate these resources, which can lead to lower costs and improved performance. This paper gives a general description of most commonly used open source IaaS service platforms. It includes descriptions and comparisons of OpenNebula,...
The Fynbos Leaf Optical Recognition Application (FLORA) is a software program to automatically identify fynbos plants using leaf photographs. While it is easier to classify fynbos when they are flowering, most fynbos flower for only short periods therefore FLORA was designed to identify plants by leaves instead of flowers. This paper presents the innovation journey of FLORA, highlighting transitions...
Network Functions Virtualization (NFV) consists of implementing network functions as software applications that can run on general-purpose servers. This paper discusses the application of NFV to the Mobility Management Entity (MME), a control plane entity in the Evolved Packet Core (EPC). With the convergence of cloud computing and mobile networks, conventional architectures of network elements need...
It is known that face recognition rate is affected by the resolution of probe image. Therefore it is natural to expect improving the resolution via face hallucination would increase the recognition rate. However, it was concluded in the previous works that improvement in the visual quality does not necessarily lead to a better recognition rate, and performance of face hallucination for recognition...
Recently, a lot of sensors are deployed to monitor the context in heterogeneous environments. A sensor is an engineering point of view as a device that collect the phenomenon signal. The sensor middleware is to enable clients to view context data on Internet. In this paper, we propose an integration architecture based on service provider using multiple sensor middleware in heterogeneous large-scale...
The study suggests the method of calculating a risk level by analyzing connection and association among continual events for recognizing the approach to risk conditions related to continual events. It is determined if a risk level is changing through analyzing connectivity among related events. Weighting is performed rationally for considering a risk level and improving the accuracy of information.
This case study compares two different technologies - model-driven development (MDD) and aspect-oriented programming (AOP) - both trying to avoid redundant code, but with very different approaches. A real industrial software system, the OpenSOA platform, which had already applied a model-driven XML/XSL-T approach, is used as the basis for implementation and comparison. For evaluation purpose, we have...
Context: The pool of papers published in ESEM. Objective: To utilize citation analysis and automated topic analysis to characterize the SE research literature over the years focusing on those papers published in ESEM. Method: We collected data from Scopus database consisting of 513 ESEM papers. For thematic analysis, we used topic modeling to automatically generate the most probable topic distributions...
In this paper, we present a big data software architecture that uses an ontology, based on the Experience API specification, to semantically represent the data streams generated by the learners when they undertake the learning activities of a course, e.g., in a course. These data are stored in a RDF database to provide a high performance access so learning analytics services can process the large...
This article presents an ongoing investigation that uses mining tools to analyze a large volume of data from students of online courses in a LMS platform to discover Association Rules used to identifying dropout situations. These ARs are used along with several explicit (formalized) rules elicited from course operators and are intended to be used by a software agent to detect individuals within a...
In this study, life course theory was used to synthesize research on women's underrepresentation in computing across 4 stages of their academic trajectory: pre high-school, high-school, college recruitment, and college retention. The Association for Computing Machinery and IEEE Explore databases, as well as select journals that publish on women in computing, were searched for relevant work. The synthesis...
Though the issues of data quality trace back their origin to the early days of computing, the recent emergence of Big Data has added more dimensions. Furthermore, given the range of Big Data applications, potential consequences of bad data quality can be for more disastrous and widespread. This paper provides a perspective on data quality issues in the Big Data context. it also discusses data integration...
This paper examines network-centric warfare (NCW) penetration within the U.S. Army. NCW was intended to be an emerging theory of war for the information age. It was supposed to provide a conceptual framework that would prevent new technology enabled approaches to warfare from being constrained by outmoded ideas. A thematic analysis of the literature was performed using NVivo 10, a computer assisted...
Entity Linking (EL) search and labeling are important research topics with various web applications. The challenge is to find and link the important concepts from web text to online encyclopedia databases instead of simple personal and place names. This paper presents a new approach to link concrete concepts from English texts with Wiki entities. Using part-of-speech tagging to detect concrete concepts,...
The probabilistic ontology language PR-OWL (Probabilistic OWL) uses Multi-Entity Bayesian Networks (MEBN), an extension of Bayesian networks with first-order logic, to add the ability to deal with uncertainty to OWL, the main language of the Semantic Web. A second version, PR-OWL 2, was proposed to allow the construction of hybrid ontologies, containing deterministic and probabilistic parts. Existing...
In modern military operations the emphasis is on smaller teams and more ad hoc teamwork. This requires greater agility both in terms of capturing actionable intelligence as well as appropriate dissemination and fusion of that information to coalition team members based on their tasks and need to know. In previous research and development we have explored the potential for a controlled natural language...
3D Object recognition is one of the big problems in Computer Vision which has a direct impact in Robotics. There have been great advances in the last decade thanks to point cloud descriptors. These descriptors do very well at recognizing object instances in a wide variety of situations. Of great interest is also to know how descriptors perform in object classification tasks. With that idea in mind,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.