The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In some cases of software-distributed applications, a large data amount must be accessed by a large number of users (dispersed geographically). In these cases, the database replication process provides an efficient solution to increase the application performances. This paper presents two methods to implement a multi-master database replication process. A replication example between two Oracle databases...
Automated FAQ answering is a valuable complement to Web self-service: while the vast majority of site searches fail, our FAQ answering solution for restricted domains answers two thirds of the queries with accuracy over 90%. The paper is shaped as a best practice summary. The reader will find out how the shortcomings of site search are overcome by FAQ answering, what kind of techniques for FAQ retrieval...
With the development of electronic commerce, online shopping is becoming more and more popular. It is of great importance to enhance online shopping experience whether for the merchants or for the customers. Online shopping assistant based on multi BDI agent has been studied in this paper. The system architecture was proposed and the BDI agent class diagram was depicted. To study the communication...
Due to the increasingly widespread use of XML, many XML- related applications require the service of schema mediation, which is to find semantically similar elements from two or more schema sources. Current approaches to schema mediation require much improvement. First, they do not cope well with a large number of schemas since most involve repeating pairwise integration. Second, they do not provide...
This paper presents an approach to query term-related visual phrases extraction using mutual information for object-based news video retrieval. As visual words are useful for object representation, unstable visual words generally appear in the frame sequence of a shot. Using the appearance frequency of the visual words in a sliding window over the query term-related stories, the appearance pattern...
Using the cloud computing paradigm, a host of companies promise to make huge compute resources available to users on a pay-as-you-go basis. These resources can be configured on the fly to provide the hardware and operating system of choice to the customer on a large scale. While the current target market for these resources in the commercial space is Web development/hosting, this model has the lure...
Seamless service handover is an important factor for the success of new services in the integrated network environment. Most of the current solutions for the interworking of networks, which generally rely on the physical layer handover between different networks such as mobile cellular or broadcast networks, does not necessarily considers the application level issues such as service continuation or...
In recent years, much research has been devoted to the improvement of journaling file systems. Contrarily, few have studied the development of checksums. After years of structured research into expert systems, the analysis of lambda calculus is verified. Using the theory of extensible communication and symmetric encryption, the journaling file systems on virtual machines are improved and evaluated...
While the rapidly increasing number of users and applications running on desktop grid (DG) systems does demonstrate its inherent potential, current DG implementations follow the traditional master-worker paradigm and DG middlewares do not cooperate. To extend the DG architecture, we propose a novel system, called BonjourGrid, capable of 1) creating, for each user, a specific execution environment...
Recently biometric fingerprint mobile template protection has attracted research attentions. One major challenge is finding reliable biometric features that are robust against distortion and registration error. It is also desirable that raw fingerprints are not easily recovered once the template has been compromised. In this paper, we propose a new dual layer structure check (DLSC) fingerprint verification...
The volume of digital scientific data has increased considerably with advancing technologies of computing devices and scientific instruments. We are exploring the use of emerging Grid technologies for the management and manipulation of very large distributed scientific datasets. Taking as an example a terabyte-size scientific database with complex database schema, this paper focuses on the potential...
In distributed object-oriented databases(DOODB), objects are distributed in different sites on a communication network. A class fragmentation that divides a class into several fragments is needed for improving performance and for reducing repetition and duplication of data transmission. It is proposed the vertical class fragmentation to reflect the characteristics of object-oriented database such...
This paper discusses the method of converting XML DTD to Relational Schema of database. It provides an algorithm of analyzing XML DTD, accessing to elements, attributes, as well as the relationship of elements contained by XML DTD. It creates the DTD graph to express the elements, attributes and semantic constraints of XML DTD. It then optimizes the DTD graph, and finally converts DTD to relational...
Programming languages such as Java and C++ provide exception-handling constructs to handle exception conditions. Applications are expected to handle these exception conditions and take necessary recovery actions such as releasing opened database connections. However, exception-handling rules that describe these necessary recovery actions are often not available in practice. To address this issue,...
Dynamic programming-based algorithm such as Smith-Waterman algorithm, which produces the most optimal result, has been known as one of the most used algorithm for sequence alignment. Hirschberg algorithm is the space saving version of Smith-Waterman algorithm. However, both algorithms are still very computational intensive. The N-Gram-Hirschberg algorithm is introduced to further reduced the space...
By integrating various development and collaboration tools into one single platform, the Jazz environment offers several opportunities for software repository miners. In particular, Jazz offers full traceability from the initial requirements via work packages and work assignments to the final changes and tests; all these features can be easily accessed and leveraged for better prediction and recommendation...
Research in the fields of software quality, maintainability and evolution requires the analysis of large quantities of data, which often originate from open source software projects. Collecting and preprocessing data, calculating metrics, and synthesizing composite results from a large corpus of project artifacts is a tedious and error prone task lacking direct scientific value. The Alitheia Core...
The lifecycle of defects reports and enhancement requests collected in the Bugzilla database of the GNOME project provides valuable information on the evolution of the change request process and for the assessment of process quality in the GNOME sub projects. We present a quality model for the analysis of quality characteristics that is based on evaluating metrics on the Bugzilla database, and illustrate...
In this paper, we propose a new ant based clustering algorithm. The algorithm takes inspiration from the sound communication properties of real ants. Artificial ants communicate directly with each others in order to merge similar group of objects. The proposed algorithm was tested and evaluated. The obtained results are very encouraging in comparison with the famous k-means and some ant based clustering...
The common vulnerability scoring system (CVSS) provides an open, standardized method for rating vulnerabilities. CVSS provides base-level metrics for vulnerability classification that can be used with other strategies such as intrusion detection classification to form a complete diagnostic system. This emphasizes focus on defining and representing the various strategies that can be employed to provide...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.