The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper aims to identifying knowledge sharing criteria. For this purpose, the conditions under which knowledge sharing are likely to occur was studied from employee's viewpoints. The general result from this study is that employees assume privacy (personal intellectual property) for their personal knowledge (scientific knowledge, skills and experience). Therefore, they protect it out of other reach...
Many synthesis problems can be solved by formulating them as a quantified Boolean formula (QBF). For such problems, a mere true/false answer is often not enough. Instead, expressing the answer in terms of Skolem functions reflecting the quantifier dependencies of the variables is required. Several approaches have been presented to extract such functions from term-resolution proofs. However, not all...
Correctness of a program with respect to concurrency is often hard to achieve, but easy to specify: the concurrent program should produce the same results as a sequential reference version. We show how to automatically insert small atomic sections into a program to ensure correctness with respect to this implicit specification. Using techniques from bounded software model checking, we transform the...
In this paper, we propose an improved table-based white-box implementation of AES which is able to resist different types of attack, including the BGE attack and De Mulder et al.'s cryptanalysis, to protect information under “white-box attack context”. The notion of white-box attack context, introduced by Chow et al., describes a general setting in which cryptographic algorithms are executed in untrusted...
A comparative case study examined two teams for instances of Productive Disciplinary Engagement (PDE) as they completed a complex, virtual process development project. Discourse from team meetings was analyzed to interpret how engagement unfolds, specifically classifying engagement in two dimensions: School vs. Engineering World, and task co-production vs. knowledge co-construction. Teams were found...
Providing feedback on design projects to other students (peer feedback) helps students develop a better understanding of design and helps students practice providing feedback, which is an engineering professional skill. In this study, we analyzed first-year engineering students' feedback on sample student design work in order to understand the characteristics of the feedback students provide and highlight...
Learning of threshold concepts in courses such as statics has traditionally been a difficult and critical juncture for students in engineering. Research and other systematic efforts to improve the teaching of statics in recent years range widely, from development of courseware and assessment tools to experiential and other "hands-on" learning techniques. This paper reports a portion of the...
In the last decade several catalogues have been defined to characterize bad code smells, i.e., symptoms of poor design and implementation choices. On top of such catalogues, researchers have defined methods and tools to automatically detect and/or remove bad smells. Nevertheless, there is an ongoing debate regarding the extent to which developers perceive bad smells as serious design problems. Indeed,...
To explore the development and maintenance of human-robot interaction (HRI) in a real-world setting, we conducted a three-month long field study with the socially assistive robot PARO in a nursing home. We placed PARO a public area in the institution and observed naturally occurring interactions of nursing home residents, staff, and visitors with the robot. We collected both quantitative (on-site...
Mobile distributed systems involve specific aspects such as migration, communication and concurrency, usually under temporal constraints. In this paper, we deal with formal modelling of timed migrating and communicating processes, as provided by the TiMo calculus. In this framework, mobile processes can move between different locations and communicate when collocated, all this happening in the presence...
This paper considers the communication and storage costs of emulating atomic (linearizable) multi-writer multi-reader shared memory in distributed message-passing systems. The paper contains two main contributions: 1) We present an atomic shared-memory emulation algorithm that we call Coded Atomic Storage (CAS). This algorithm uses erasure coding methods. In a storage system with 'N' servers that...
This paper presents an effective feature representation method in the context of activity recognition. Efficient and effective feature representation plays a crucial role not only in activity recognition, but also in a wide range of applications such as motion analysis, tracking, 3D scene understanding etc. In the context of activity recognition, local features are increasingly popular for representing...
The statistical model of the bits to be encoded is crucial for the coding performance of distributed video coding (DVC). In this paper, a bit-level context-adaptive correlation model is proposed to exploit high-order statistical correlation for better channel coding performance, which consequently improves the video coding efficiency. In the proposed scheme, the wavelet domain DVC is considered and...
Large alphabet languages such as Chinese present different problems for language modelling compared to small alphabet languages such as English. In this paper, we describe adaptive models of Chinese text based on the Partial Predictive Match (PPM) text compression scheme that learns the language as the text is processed sequentially. We describe several character-based, word-based and part-of-speech...
This study verifies the validity of collaborative language learning between foreign language learners and native speakers in distance environment. In order to provide a high presence experience in remote video conferencing system, the environment used in our experiment is based on the Hyper Mirror (HM) video conferencing system in which students communicate with an experience of being somewhat similar...
Classical context modeling and binarization algorithms on multimedia do not fully exploit their spatial correlations under the sequential assumption. This paper proposes a novel entropy coding scheme incorporating regional context modeling (RCM) and dynamic Huffman binarization (DHB) for multimedia. RCM evaluates the context order with the line distance in Cartesian coordinate system, so that the...
In this paper, we propose an explicit signaling of RDPCM scheme for a lossy intra-coded block, and achieve a significant coding gain over the HEVC Range Extension reference software in the screen contents coding. We define three RDPCM modes, and transmit the side information so that the best RDPCM mode can be applied to residual signals after all available angular directional predictions. Contexts...
State-of-the-art in duplicate detection in semi-structured data obtains significant improvement by exploiting the schema-related knowledge. Such schema-bound duplicate detection approaches, however, have severe limitations when dealing with multi-sourced, heterogeneous, high-velocity data streams. In this paper, we propose a novel context-aware duplicate detection system which is workload- and complexity-aware,...
In this work a novel lossless coding approach for color images is considered. It is based on local-adaptive combination of inter- and intra-component prediction. New context modeling method based on decomposition to binary layers is used for prediction errors. Compression performance of proposed algorithm is proved by experimental results obtained for popular public benchmarks.
Current approaches to supporting awareness in computer-mediated collaboration appear to fall short in two ways — (1) they focus primarily on synchronous collaborations among individuals working on a shared task, and (2) they do not sufficiently take account of the situated and socially mediated nature of work practices. This paper explores an alternative approach to awareness support in computer-mediated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.