The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modelers face multiple challenges in their work. In this paper, we focus on two of them. First, multiple modeling methods and tools are currently available. Modelers are sometimes limited by their tools or paradigms. Second, when multiple models are proposed for the same case, a decision maker needs criteria to decide which model to choose for his/her objective.
This paper presents a practical study of the Persian ontology matching. Ontology matching has a key role to develop the semantic web. Although many attempts are done to develop Persian ontologies, but the Persian ontology matching problem is still unresolved. This paper addresses the challenges of the Persian ontology matching. One of the most important prerequisites of design and develop efficient...
Data management applications deployed on IaaS cloud environments must simultaneously strive to minimize cost and provide good performance. Balancing these two goals requires complex decision-making across a number of axes: resource provisioning, query placement, and query scheduling. While previous works have addressed each axis in isolation for specific types of performance goals, this demonstration...
During the last five years, the amount of users of online social networks has increased exponentially. With the growing of users, social problems also arise. Due to the nature of these platforms, specifically Twitter, users can express their ideas in the way they prefer no matter if it is racist or not. As the Twitter CEO says, one of the most difficult things for them is to detect and ban people...
Current information systems provide transparent access to multiple, distributed, autonomous and potentially redundant data sources based on a mediation architecture. Their users may not know the sources they questioned, nor their description and content. Consequently, their queries reflect no more a need that must be satisfied but an intention that must be refined based on data sources available at...
In this paper we study the trustworthiness of the crowd for crowdsourced software development. Through the study of literature from various domains, we present the risks that impact the trustworthiness in an enterprise context. We survey known techniques to mitigate these risks. We also analyze key metrics from multiple years of empirical data of actual crowdsourced software development tasks from...
Refactoring is a popular procedure for improving the internal structure of software systems. Refactoring is widely practiced by developers, and considerable development effort has been invested in refactoring tooling support. The identification of refactoring opportunities usually is based on subjective perceptions. At best, identification of refactoring opportunities is based on observation of code...
In this paper we present the INESC Key Detection (IKD) system which incorporates a novel method for dynamically biasing key mode estimation using the spatial displacement of beat-synchronous Tonal Interval Vectors (TIVs). We evaluate the performance of the IKD system at finding the global key on three annotated audio datasets and using three key-defining profiles. Results demonstrate the effectiveness...
Suppose Alice and Bob share a secret key, of which Eve is initially oblivious. Clearly, Alice and Bob can use this key to ensure that any particular plain-message sent is both authentic and secure. This paper investigates how many plain-messages can be sent per bit of secret key, while still ensuring both secrecy and authentication. In particular the secrecy tolerance relates to the min-entropy of...
Software engineers primarily use two orthogonal means to reduce susceptibility to faults: software testing and static type checking. While many strategies exist to evaluate the effectiveness of a test suite in catching bugs, there are few that evaluate the effectiveness of type annotations in a program. This problem is most relevant in the context of gradual or optional typing, where programmers are...
Software project artifacts such as source code, requirements, and change logs represent a gold-mine of actionable information. As a result, software analytic solutions have been developed to mine repositories and answer questions such as "who is the expert?,'' "which classes are fault prone?,'' or even "who are the domain experts for these fault-prone classes?'' Analytics often require...
Several research tools and projects require groups of similar code changes asinput. Examples are recommendation and bug finding tools that can providevaluable information to developers based on such data. With the help ofsimilar code changes they can simplify the application of bug fixes and codechanges to multiple locations in a project. But despite their benefit, thepractical value of existing tools...
Security is still the main obstacle that is preventing businesses from moving towards the Cloud, which makes choosing the right Cloud service provider CSP a critical decision. We propose in this paper a methodology for evaluation and selection of Cloud security services based on a Multi-Criteria Analysis (MCA) process using a set of evaluation criteria and quantitative metrics. We then give a general...
Feature selection is essential to rule learning in the context of functional verification. In practice today, features are selected manually and the selection requires domain knowledge. In contrast, this work proposes using automatic feature extraction from design documents as a viable approach to support rule learning. To demonstrate its effectiveness, document-extracted features are employed to...
Assessing and comparing computer systems under changing contexts is becoming crucial due to the dynamic characteristics of modern computing environments. This is especially relevant for database management systems, as the behavior of the DBMS when immersed in today's volatile environments is determinant for the success of a multitude of commercial, industrial and scientific endeavors. This paper presents...
Extended Finite State Machines (EFSMs) are widely used to model the behavior of a system. Testing from EFSMs is expressed in terms of generating transition paths and then deriving test data to trigger these paths. However, a transition path may be infeasible, thus it is impossible to generate test data to execute it. In this paper, after generating a set of transition paths that satisfy the requirement-based...
Compressed Sensing (CS) is a recently emerged framework for simultaneous sampling and compression of signals that are sparse or compressible in some representation. Besides signal reconstruction, the CS framework is often adopted for compressive parameter estimation. Performance metrics commonly used in CS are well suited for performance evaluation in terms of recovery rates but provide little insight...
The aim of this paper is to trigger a conversation about the assessment, definition of metrics and testing procedures of software-defined GNSS receivers. While the evaluation of traditional (i.e., built on application–specific integrated circuit technology) GNSS receivers is now well–understood, and enjoys both a solid testing industry providing the required equipment and universally agreed figures...
Document writing can tend to be rather laborious and time-consuming. A good document requires substantial research to be performed on the subject of the document, followed by the additional task of aggregating the surveyed research into a comprehensive document with accurate and coherent content. In this paper, a dynamic content suggestion system is presented for document writing. The proposed system...
Sound source separation at low-latency requires that each incoming frame of audio data be processed at very low delay, and outputted as soon as possible. For practical purposes involving human listeners, a 20 ms algorithmic delay is the uppermost limit which is comfortable to the listener. In this paper, we propose a low-latency (algorithmic delay < 20 ms) deep neural network (DNN) based source...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.