Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Differential privacy is becoming a gold standard notion of privacy, it offers a guaranteed bound on loss of privacy due to release of query results, even under worst-case assumptions. The theory of differential privacy is an active research area, and there are now differentially private algorithms for a wide range of problems. However, the question of when differential privacy works in practice has...
Analysis and design of simulation scenario, design and application of scenario system are problems needed to be solved in the development and performance verification of simulation system. Consequently, a standardized development method for developing scenario based on a kind of combat information simulation system is proposed in this paper. Firstly, according to the requirements for generation of...
Recent developments of modern technologies such as cloud computing, wearable sensor devices and big data have significantly impacted people's daily lives, and offer real potential for an Internet-wide, people-centric ecosystem. These advances in technology will considerably extend human capabilities in acquiring, consuming and sharing personal health information. A future in which we are all equipped...
Understanding and keeping track of business processes is one of the most important tasks in development of business software. However, any documentation other than source code cannot be completely reliable. On the other hand, source code is rather unreadable by non-developers and can be challenging to determine business processes distributed among many files and layers. This paper introduces a methodology...
Focusing on the users is more interested in the sequential patterns that accord with the well completion business process habit overall in the web access mode of well completion mobile platform. This paper proposed a weighted sequential pattern mining algorithm based on the well completion business process. With analyzing the business process models and web access log of well completion, confirm the...
In-memory database systems are among the technological drivers of big data processing. In this paper we apply analytical modeling to enable efficient sizing of in-memory databases. We present novel response time approximations under online analytical processing workloads to model thread-level fork-join and per-class memory occupation.We combine these approximations with a non-linear optimization program...
While OLAP (On-Line Analytical Processing) is now a mature, efficient technology, very little attention has been paid to the effectiveness of the analysis and the user-friendliness of a technology often considered tedious of use. This work summarizes various contributions to developing user-centric OLAP, focusing on the use of former queries to enhance subsequent analyses. We first introduce a logical...
The United States Military uses simulations extensively in order to conduct detailed cost benefit analysis, facilitate the procurement, development and testing of systems, and to train and educate service members. The models that the military uses are only beneficial as long as they accurately mirror reality based on known data. As combat evolves, simulations must improve at a matched rate in order...
Consumer-initiated sporadic operations on cloud applications, such as deployment, upgrade and reconfiguration, may fail because of the inherent uncertainty of operating in a cloud environment. For example, if a VM is not able to start, operations dependent on that VM will fail. In this paper we propose an approach for analyzing sporadic operations on cloud applications to facilitate recovery. We do...
Software as a Service(SaaS) is increasingly becoming an important application development and delivery model. Among different implementation architectures, multi-tenant architecture(MTA) has received most attentions. Not only because it is easier to be maintained, but also increases the resource utilization. However, sharing the same instance will have impact on the availability of each tenant. Availability...
Software cost estimation is the process of predicting effort required to develop a software system. This effort may be in terms of number of hours of work or number of workers. Precise effort estimation with a high grade of reliability is an indispensable part of effectively software management. Software project costs include the cost incurred in all the expenses, i.e. the cost of project from initiation,...
Today the term big data draws a lot of attention. Big data is the new technology that enables an organization to take advantage of the natural resource of big data. Organizations store up huge amounts of information, they can mine those databases to discover subtle patterns, correlations, or relationships that human brains can't perceive on their own because the scales involved are beyond our ability...
Many applications need methods for handling missing or insufficient data. This paper applies a correlation technique to improve the fallback methods previously used to handle the paucity of keystroke data from the infrequently used keys in a keystroke biometric system. The proposed statistical fallback model uses a correlation based fallback table based on the linear correlation between pairs of keys...
Multimedia database can be define as a collection of storage and retrieval systems, in which large amount of media objects are created, modified, searched and retrieved, where as Multimedia is the combination of text, image, graphics, animations, audio and video. The extension of database application to handle multimedia objects requires synchronization of multiple media data streams. Multimedia data...
During the last years, the development of maturity models for business process management (BPM) has increased significantly. However, tools which support comprehensively BPM maturity models and, therefore, reduce the effort and the costs of a maturity level analysis do not exist at the moment. We want to close this gap by developing an Intelligent Maturity Model-Tool which uses already available data...
We present an approach to accurately simulate the temporal behavior of binary embedded software based on timing data generated using static analysis. As the timing of an instruction sequence is significantly influenced by the mi-croarchitecture state prior to its execution, which highly depends on the preceding control flow, a sequence must be separately considered for different control flow paths...
Fingerprint segmentation is one of the most important preprocessing steps in an automatic fingerprint identification system (AFIS). It is used to separate a fingerprint area (foreground) from the image background. Accurate segmentation of a fingerprint will greatly reduce the computation time of the following processing steps, and discard many spurious minutiae. In this paper, a new segmentation algorithm...
Network theory has been used for modeling biological data as well as social networks, transportation logistics, business transcripts, and many other types of data sets. Identifying important features/parts of these networks for a multitude of applications is becoming increasingly significant as the need for big data analysis techniques grows. When analyzing a network of protein-protein interactions...
In this paper, we propose a new model of community cloud (ComC) interaction that is based on the demand of tenants and propose an intrusion detection mechanism for the proposed model. ComC is a solution that is more secure than the public cloud, and less costly than the private cloud. We argue that our proposed model of the ComC will be more beneficial to consumers as well as providers. Our evaluation...
This paper presents the importance of application and integration of learning styles in adaptive educational hypermedia systems — AEHS. The main goal of the paper is a comparative analysis of the data obtained from the initial questionnaire based on Felder-Silverman learning style model and the data from the user model and domain model of our AEHS system TeleEDUCOS. Results of the analysis indicate...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.