The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Generally utterances in natural language are highly ambiguous, and a unique interpretation can usually be determined only by taking into account the context in the utterance occurred. Automatically determining the correct sense of a polysemous word is a complicated problem especially in multilingual corpuses. This paper presents an application programming interface for several Semantic Relatedness/Similarity...
With the growing number of smartphone users, peer-to-peer ad hoc data forwarding is expected to occur more often. The forwarding performance improves when knowledge regarding the expected topology and the social context information of the networks. In this paper, we introduce a new metric for data forwarding based on social context information, in which node's social context information is used to...
The correlation of performance bottlenecks and their associated source code has become a cornerstone of performance analysis. It allows understanding why the efficiency of an application falls behind the computer's peak performance and enabling optimizations on the code ultimately. To this end, performance analysis tools collect the processor call-stack and then combine this information with measurements...
The correlation of performance bottlenecks and their associated source code has become a cornerstone of performance analysis. It allows understanding why the efficiency of an application falls behind the computer's peak performance and enabling optimizations on the code ultimately. To this end, performance analysis tools collect the processor call-stack and then combine this information with measurements...
For popular Open Source Software (OSS) projects there are always a large number of worldwide developers who have been glued to making code contributions, while most of these developers play the role of casual contributors due to their very limited code commits (for fixing defects and enhancing features, casually). The frequent turnover of such group of casual developers and the wide variations among...
In this paper, we firstly study the possible usability of two state-of-the-art no-reference image quality assessment (IQA) metrics (NIQE and BIQES) originally designed for natural image, in the context of medical ones. We also proposed a modified NIQE, called NIQE-K, inspired by some BIQES features and more adapted to medical images. This study, based on evaluating concurrently the three methods,...
In tag-word disambiguation, a word is assigned to a specific context chosen among the different ones to which it is related. Relatedness to a context is often defined based on the co-occurrence of the target word with other words (context words) in sentences of a specific corpus. The overall disambiguation process can be thought as a classification process, where the context words play the role of...
In this paper we provide modification of approaches for extraction of keyphrases from single textual document (without external information) based on the hierarchical concepts created upon the text of particular document. For the creation of hierarchical concepts method from area of Formal Concept Analysis (FCA) is used, which organizes objects into concept lattice (structure of hierarchically organized...
For organizations undergoing agile and lean transformation, it can be difficult to get meaningful, actionable insights into progress and impediments. Teams and organizations are best understood as complex adaptive human systems. Understanding what is happening in such systems requires approaches grounded in the complexity sciences and social sciences. This paper describes an approach using complexity...
Computer-mediated learning needs to be social too. Interactivity is a central construct for collaborative knowledge construction in online communities. We present an operationalized framework for measuring interactivity in online discussions, based on our view of interactivity as a socio-constructivist process. We hypothesize that the traditional design for online discussion platforms, with linear,...
This study examines the nature of issue-based Twitter response networks using the hashtag "#illridewithyou. This hashtag was a response of solidarity towards Muslims in Australia after a hostage incident that occurred in Sydney in December 2014. A network of 11293 users that used the hashtag #illridewithyou and their tweets were analyzed to examine the nature of engagement at network, ego, and...
Reputation management plays a key role in improving brand awareness and mastering the impact of harmful events. Aware of its importance, companies invest a lot in acquiring powerful social media monitoring tools (SMM). Several SMM tools are available today in the market, they help marketers and firms' managers follow relevant insights that inform them about what people think about their brand, who...
Trust and reputation are commonly considered critical concepts in open dynamic multi-agent systems, where agents must rely on their peers to achieve their goals. Several computational trust models have been proposed to manage trust in such situation. The diversity of those models makes user confused about which one to choose. Different testbeds were proposed to evaluate trust and reputation systems...
Vector-evaluated particle swarm optimization is a particle swarm optimization variant which employs multiple swarms to solve multi-objective optimization problems. Recently, three variants of particle swarm optimization which utilize co-operative principles were shown to improve performance in single-objective environments. This work proposes co-operative vector-evaluated particle swarm optimization...
In a multi-criteria decision making system it is required to analyze more than one attribute of the table. In this context no one would be interested on a point (tuples) which is dominated by any other point in the system, they are only interested on skyline points. A point is called a skyline point if and only if it is not dominated by any other point in the system. Therefore for the multi-criteria...
This paper presents a text-mining based approach to detect cross-site scripting (XSS) vulnerable code files in the web applications. It uses a tailored tokenizing process to extract text-features from the source code of web applications. In this process, each code file is transformed into a set of unique text-features with their associated frequencies. These features are used to build vulnerability...
This study investigated the problems of inefficiency that school technology coordinators (STCs) face in ICT integration instruction by examining their social networks of knowledge sharing. The authors conducted an ego-centric network survey of school technology coordinators' knowledge sharing to explore their brokerages work in exchanging knowledge with colleagues from different positions. The findings...
Regression testing of a large test pool consistently needs a prioritization technique that caters requirements changes. Conventional prioritization techniques cover only the methods to find the ideal ordering of test cases neglecting requirement changes. In this paper, we propose string dissimilarity-based priority assignment to test cases through the combination of classical and non-classical textual...
Dynamic metrics are known to assess the actual behavior of software systems as they are extracted from runtime data obtained during program execution. However, recent literature indicates that dealing with dynamic information remains a formidable challenge due to the huge size of execution data at hand, resulting in long processing delays. We present an efficient and scalable technique to extract...
Adaptive security can take dynamic trade-off decisions autonomously at runtime and is considered a key desirable attribute in the Internet of Things (IoT). However, there is no clear evidence that it can handle these trade-offs optimally to add value to such a complex and dynamic network. We present a scenario-based approach to recognize and evaluate typical security trade-off situations in the IoT...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.