The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Blind programmers typically use a screen reader when reading code whereas sighted programmers are able to skim the code with their eyes. This difference has the potential to impact the generalizability of software engineering studies and approaches. We present a summary of a paper which will soon be under review at TSE that investigates how code comprehension of blind programmers differs from that...
Reusing code segments via copying and pasting is quite common practice in the process of software development. The pasted segment may include minor differences from the original segment. As a result of copying and pasting, several code sections may be similar to each other. Such sections are referred to as code clones. This paper presents an approach for detection of these code clones. The reason...
Enhanced Course of Action (CoA) generation is a fundamental component of effective risk management and mitigation. This paper presents an extension of a system capable of integrating physics-based (hard) and people-generated (soft) data, for the purpose of achieving increased situational assessment and automatic CoA generation upon risk identification. The system's capabilities are enhanced through...
The high quality of computer vision (CV) software has a great impact on the usability of the overall CV systems in real world scenarios. As the usage of standardized quality assurance methods, metrics and tools can ease the work of any CV developer and quickly improve the overall process, we report here on the introduction of code coverage analysis in the field. Our initial motivations were both to...
In recent years, social media such as Twitter have encountered a significant growth because of the ceaseless increase in the volume of contents and the number of users. The level of influence among social media users is significantly different from one user to the other; and as such, it has become more vital to find the most influential users on social media. There are lots of mysteries about behaviours...
Floating Content (FC) has recently been proposed as an attractive application for mobile networks, such as VANETs, to operate opportunistic and distributed content sharing over a given geographic area, namely Anchor Zone (AZ). FC performances are tightly dependent on the AZ size, which in literature is classically chosen by the node that generates the floating message. In the present work, we propose...
The consideration of mobile web page and service access for optimization schemes requires a detailed interpretation that goes beyond the commonplace evaluations of HTTP-delivered objects. Evaluating mobile browser interactions with popular web sites, we note that a non-negligible amount of data is delivered with HTTPS and web site interactions could almost exclusively rely on HTTPS delivery of their...
This paper proposes a novel symbol-to-bit demapping algorithm for Gray-labeled phase shift keying (PSK) constellations. Unlike the Max-Log-MAP demapper, the proposed algorithm does not perform exhaustive search operations, but directly computes the soft information by exploiting the binary search and the symmetry of the Gray-labeled PSK constellations. Hence its complexity is remarkably reduced from...
Experience Sampling Method (ESM) is widely used in idiographic approaches to collect within-person patterns. Planning a suitable survey schedule while designing an ESM based experiment is challenging as it must balance between survey fatigue of users, and the timeliness and accuracy of the responses provided by users. Even with the proliferation of ESM experiments, survey scheduling typically remains...
With the emergence of Augmented Reality (AR) services in a broad range of application scenarios, the interplay of (compressed) content as delivered and quality as experienced by the user becomes increasingly important. While significant research efforts have uncovered interplays for traditional (opaque) media consumption scenarios, applications in augmented vision scenarios pose significant challenges...
This paper proposes a novel power optimization technique in which DRX cycle is activated based on the scheduling decision. DRX MAC Control Element (CE) command is issued to the UEs for which scheduling is not possible in DRX ON duration time. Simulation results show that, significant gain can be achieved in power saving using the proposed method under specific scheduler design parameter conditions...
Security is still the main obstacle that is preventing businesses from moving towards the Cloud, which makes choosing the right Cloud service provider CSP a critical decision. We propose in this paper a methodology for evaluation and selection of Cloud security services based on a Multi-Criteria Analysis (MCA) process using a set of evaluation criteria and quantitative metrics. We then give a general...
Given the high drop-out rates of students from colleges in USA, including STEM fields, there is a national imperative to address this issue with all possible means. Universities are pushed towards providing students with personalized attention and timely academic feedback. At the same time, intrinsic student motivation also plays an enormous role in success. It is important for educators to present...
One of the challenges in Long Term Evolution (LTE) and next generation cellular networks (5G) is the traffic overload and the network congestion caused by massive Machine Type Communication (MTC) devices accessing to an Evolved Node B (eNodeB) simultaneously. In this paper, a novel method is proposed, named Advanced Traffic Scattering for Group Paging (A-TSFGP), aiming to alleviate the system overload...
The estimation of blurred regions is an important stage in several computer vision applications. In this paper an efficient training-free detector of local blurriness based on edge features is presented. Due to the intrinsic sparsity of edges in natural images a blur map is creating by using an approach based on the heat diffusion principle. A 2D point discrete Poisson solver is concatenated with...
Recognizing offline handwritten Telugu characters from digitized document images is very challenging. In this paper, we propose a novel approach of hybrid feature extraction and hierarchical classification to recognize the glyphs of offline handwritten Telugu characters. In the proposed method, hybrid features are extracted from the glyphs and the glyphs are recognized using a hierarchical classification...
With the ever shrinking dimension of a chip on a die, it is evident that the channels of on-chip networks (NoCs) are often exposed to logic level manufacturing faults such as stuck-at faults. The faults coercively put the networks into miscellaneous system level failures like packet corruption, misrouting, and dropping. Thus, the reliability has become a special interest. Additionally, the performance...
The creation of social ties is driven by several factors which can arguably be related to individual preferences and to the common social environment of individuals. Effects of homophily and triadic closure mechanisms are claimed to be important in terms of initiating new social interactions and in turn to shape the global social structure. This way they eventually provide some potential to predict...
In order to generate effective results, it is essential for a recommender system to model the information about the user interests (user profiles). A profile usually contains preferences that reflect the recommendation technique, so collaborative systems represent a user with the ratings given to items, while content-based approaches assign a score to semantic/text-based features of the evaluated...
In the last years a new right-wing, populist and eurosceptic party emerged in Germany, the 'Alternative für Deutschland'. Topics that were used by the party to draw attention to their program included the Euro-crisis and the so-called 'refugee crisis'. We investigate some aspects of social media use of the AfD. Our goal is to relate the rise of this party to some quantitative measures of their social...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.