The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The operationalization of learning scenarios on learning management systems (LMS) is more than a technology-related question. Different research issues around instructional design are to be addressed in order to provide pedagogical expressiveness of the different elements within a learning scenario, while it respects sufficiently the structure to describe it. In this work, we examine existing pattern-based...
This paper presents a formal method to verify execution time bounds of programs at the source level, where timing constraints along with other functional requirements are specified in the routines' contracts and are verified in a modular manner. The approach works based on a countdown time budget mechanism to guarantee the termination of the input program, and incorporates the concepts of separation...
The lasting popularity of many social Q&A websites, such as Yahoo! Answers and ResearchGate, has become valuable knowledge repositories for people to search for answers to questions in various aspects in life. Finding the most relevant questions is often a non-trivial task, and a fine-grained classification system of questions will be an important aid. Existing work mainly focused on classifying...
In the face of development trend that a single XML document data volume is increasingly big, involved a core problem of XML data query technology is how to effectively solve result that meet certain query semantic, and label used by corresponding document tree based on XML document is the key factor of affecting the query efficiency. This paper, all experimental processing is completed through MapReduce...
The concept of the cloud is no longer limited to providing remote hardware or platform support with the development of cloud computing technology. Instead, it encapsulates all aspects of the content in computer field into service invoked by others. As an important part of software, data resource has become core services to the cloud platform in areas such as collaborative manufacturing and collaborative...
The style of clothing is complex and changeable, there are many kinds of clothing styles, different styles have different emotional expression, but the current description of clothing emotions is mostly qualitative characterization, and the words to express which have no systemic analysis until now. To establish the clothing semantic emotions space is the important prerequisite for computer recognition...
Geovideo is a sort of video data with spatial reference, an organism composed of video data and geographic space. It covers different kinds of information, such like images, sounds, positions and space-time information, which are all in the united georeferenced. This kind of video data can be obtained from monitoring system and other video with georeference. Obviously, Geovideo is applicable to public...
Temporal alignment aligns two temporal sequences and is quite challenging due to drastic differences among temporal sequences and source data from different views. Canonical time warping (CTW) has shown great potential in temporal alignment tasks because it can reduce data redundancy by transforming high-dimensional data to a lower-dimensional subspace via canonical correlation analysis (CCA). However,...
Sometimes calligraphy lovers want to generate a calligraphic plaque in style of some famous calligraphers, but some characters hadn't been written or were damaged in the long history of Chinese calligraphy. It will be a significant thing to use computer-aided synthesis technology to create calligraphic characters in the particular style. Though such kinds of research work have been done, the synthesized...
Probabilistic problems in AI planning are called probabilistic planning. Recently, a new language is proposed to model these problems. It is the Relational Dynamic Influence Diagram Language (RDDL). There are only a few domains, which are described in RDDL until now. Those domains are supposed to have semantic models as dynamic Bayes networks. However, these semantic models are propositional. Therefore,...
Present systems for computer sign language translation are considered in the article, their advantages and disadvantages are identified. The general case of translation (from sounding Russian into Russian sign language) is discussed. A new method for constructing a semantic unit for computer sign language interpretation is proposed. Lexical meanings of words are defined to match the correspondence...
The video recorded tactics that a player applied in a sport competition are encoded to understandable semantics scripts for both human beings and computers. Such information is then embedded back into the sport video file. Thus, users can retrieve the contents of competition for purposes such as video analysis and tactics statistical analysis.
This paper is concerned with the adaptation to multi-feature preferences on personalized search. In the existing work, the personalized search mainly leverages semantic features extracted from user history and ignores other non-semantic latent features, lets alone adapt to preference distribution on non-semantic features. To tackle this problem, we propose an adaptive model for multi-feature preferences,...
Retweeting is an important mechanism for information diffusion, popular event prediction, and so on. Due to the increasing requirements, in recent years, the task has attracted extensive attentions. In this paper, we propose a novel framework using probabilistic matrix factorization technique to predict retweeting behavior. Our study consists of three components. First, we convert retweeting behavior...
This paper presents an approach for Web service (WS) composition that enables the automatic adjustment of the composition at run-time to deal with WS execution flaws, e.g., WS unavailability, failure to execute properly or to produce desired results. The WS composition problem is converted into a nondeterministic planning problem which, by its turn, is mapped to SAT. Afterwards, a SAT solver obtains...
Word Sense Disambiguation (WSD) is the task of automatically choosing the correct meaning of a word in a context. Due to the importance of this task, it is considered as one of the most important and challenging problems in the field of computational linguistics and plays a crucial role in various natural language processing (NLP) applications. In this paper, we present an improved version of a recent...
Aspect oriented programming is a technique that separates the core and cross-cutting concerns thereby increasing the modularity of the software. One of the important problem faced in AOP is the possibility for occurrence of interference between modeled artifacts. Interference occurs when the logic of one artifact interfere with the logic of another artifacts. Detecting and removing interferences in...
To verify embedded systems early in the design stages, we need formal ways to requirements specification which can be as close as possible to natural language interpretation, away from the lower ESL/RTL levels. This paper proposes to contribute to the FSL (Formal Specification Level) by specifying natural language requirements graphically in the form of temporal patterns. Standard modeling artifacts...
In the model driven system engineering, architecture plays an important role in the quality of the developed complex system. In some extend, the quality of the architecture determines the developed system's quality. The system's architecture is usually described from different views, including static views and dynamic views, like DoDAF (Department of Defense Architecture). Then how to ensure the consistency...
Nowadays, large volumes of data and measurements are being continuously generated by computer and telecommunication networks, but such volumes make it difficult to extract meaningful knowledge from them. This paper presents SaFe-NeC, an innovative methodology for analyzing network traffic by exploiting data mining techniques, i.e. clustering and classification algorithms, focusing on self-learning...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.