The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The concept of the cloud is no longer limited to providing remote hardware or platform support with the development of cloud computing technology. Instead, it encapsulates all aspects of the content in computer field into service invoked by others. As an important part of software, data resource has become core services to the cloud platform in areas such as collaborative manufacturing and collaborative...
The paper does study on event extraction from news on the internet by the method of semantic role analysis. We annotate the sentence in the news from argument annotator, extract the argument structure of the head verb, convert the arguments to specific semantic roles of the verb, and then match the semantic roles to the event elements. This paper puts forward and studies on how to use VerbNet and...
Program anomaly detection models legitimate behaviors of complex software and detects deviations during execution. Behavior deviations may be caused by malicious exploits, design flaws, or operational errors. Probabilistic detection computes the likelihood of occurrences of observed call sequences. However, maintaining context sensitivity in detection incurs high modeling complexity and runtime overhead...
The design and development of distributed and collaborative architectures for network intrusion detection systems is an ongoing yet challenging research field. The decentralizing of the intrusion detection functionalities became a promising approach to keep up with the steadily increase of the network communications' capacity and the attack's signatures data bases. So far, several communication models...
In this paper, a text similarity computation method named VSM-Cilin which is based on semantic vector space model is proposed in the background of radio station. VSM-Cilin improved the traditional VSM in the following areas. First, consider the semantic relations between words. Second, use semantic resources to reduce dimension. Third, use inverted index to filter out candidate document set. Forth,...
With the advent of social networking sites and the development of interactive tools that allow users to share information and opinions, the way people socialize in terms of both teaching and learning is also changing. Nowadays, educators have considered using this technology as an e-learning platform: a stage where interaction between instructors and learners takes place. This promotes participation...
Software developers need to cope with the complexity of Application Programming Interfaces (APIs) of external libraries or frameworks. Typical APIs provide thousands of methods to their client programs, and these methods are not used independently of each other. Much existing work has provided different techniques to mine API usage patterns based on client programs in order to help developers understanding...
This work tackles two simultaneous challenges faced by autotuners: the ease ofdescribing a complex, multidimensional search space, and the speed ofevaluating that space, while applying a multitude of pruning constraints. Thisarticle presents a declarative notation for describing a search space and atranslation system for conversion to a standard C code for fast andmultithreaded, as necessary, evaluation...
Reasoning skills form the basis for the proving of mathematical statements and relations themed in higher school grades in different contexts. It is important that students acquire or expand their reasoning skills as part of their teacher training in order to provide age appropriate reasoning skills to their pupils. The vision is to develop an open source e-proof system that supports learners in understanding...
The rapid growth of digital data storage of medical or health, social media, education and many more in the world has amplified the demand for big data storage, which requires trillion of files having exabytes of data. This growth in data has put up the key question of how we can effectively manage and find the data in the emergent ocean of information. The upcoming demand for data storage in petabytes...
Early programs for GPU (Graphics Processing Units) acceleration were based on a flat, bulk parallel programming model, in which programs had to perform a sequence of kernel launches from the host CPU. In the latest releases of these devices, dynamic (or nested) parallelism is supported, making possible to launch kernels from threads running on the device, without host intervention. Unfortunately,...
The sparse matrix is a key data structure in various domains such as high-performance computing, machine learning, and graph analytics. To maximize performance of sparse matrix operations, it is especially important to optimize across the operations and not just within individual operations. While a straightforward per-operation mapping to library routines misses optimization opportunities, manually...
This work explores the Internet of Cultural Things (IoCT) and applications in the context of smart cities and learning cities. Ambient culture is advanced as an emergent form of the IoCT and applications in the context of 21st century everyday interactions in urban spaces. The constructs of awareness, learning, openness, and engagement enable formulation and operationalization of a framework for ambient...
With millions of users worldwide, online dating platforms strive to assert themselves as powerful tools to find dates and form romantic relationships. However, significant differences exist in male and female use of this mate-matching technology with respect to motivation, preferences, self-presentation, interaction and outcomes. While existing research has routinely reported on gender differences...
One of the problems in the computer security system is port scanning attack. There are several detection systems have been developed to find out the occurrence of port scanning attack, one of them is anomaly detection method. A mechanism on how to implement the detection process in a more simple and effective way is a real serious challenge. In this paper, we design a simple implementation of anomaly...
Recommender system has been demonstrated as one of the most useful tools to assist users' decision makings. Several recommendation algorithms have been developed and implemented by both commercial and open-source recommendation libraries. Context-aware recommender system (CARS) emerged as a novel research direction during the past decade and many contextual recommendation algorithms have been proposed...
Recent evolutions that identify the people's genders automatically and smartly are significantly developing. In many applications of video monitoring, control systems and smart communication systems need to identify people's gender. Identification based on the walking pattern in the video images has been interesting for scientists. This topic can be categorized in two general groups: appearance based...
The U.S. Department of Education (DoE) asserts that one way to improve student achievement is to consider competency-based learning. The DoE describes competency-based learning as “a structure that creates flexibility, allows students to progress as they demonstrate mastery of academic content, regardless of time, place, or pace of learning.” Competency-based learning focuses on outcomes and skill-sets...
Students frequently spend too little time understanding the problem in their design projects and jump to solutions without considering alternatives. This leads to inefficient use of time and suboptimal results in the final design. Instead of re-inventing the wheel, students need to explore and understand the work of others applied to similar situations, using strong information gathering, application,...
The number of networked “smart devices” available in everyday environments is rapidly increasing; however, most adopt mutually incompatible networks, protocols, and application programming interfaces. In previous work, we introduced a variety of adaptive middleware techniques that enables a user's commodity mobile device (e.g., a smartphone) to serve as an adaptive gateway between mutually incompatible...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.