Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
A binary program can be represented as a string of operation codes by disassembling it and removing the instruction operands. Using this representation, the problem of detecting if two programs are similar can be reduced to computing the distance between two strings. The most common types of edit distance are fit for this task but unfortunately their running time is quadratic. A new type of edit distance...
Service-orientation is a modern approach in building software systems and it has been applied successfully to develop of many domains of software systems. The service-oriented design is the key phase, and assessing the quality at this level is very essential to reduce the cost and effort of the implementation phase and enhance the quality of software applications. In order to assess the quality of...
Evaluating researchers (individually or in groups) usually depends on qualifying their publications and influence. Here, we aid such crucial task by introducing two new metrics (C-Endo and Comb) that rely on the concept of endogamy for communities of authors who publish in conferences and journals, and produce patents. Endogamy here measures how tightly structured the groups of authors are within...
MT evaluation is a very important activity in MT system development. Evaluation of MT systems can help MT developers in understanding the short-comings of their systems and clear focus on the problem areas, so that systems performance can increase. In this paper we have discussed evaluation of some English-Hindi MT engines. For this, we have applied human as well as automatic evaluations of these...
Analysing cyber attack environments yield tremendous insight into adversory behavior, their strategy and capabilities. Designing cyber intensive games that promote offensive and defensive activities to capture or protect assets assist in the understanding of cyber situational awareness. There exists tangible metrics to characterizing games such as CTFs to resolve the intensity and aggresion of a cyber...
In this paper, we propose a novel pipeline for automated scribal attribution based on the Quill feature: 1) We compensate the Quill feature histogram for pen changes and page warping. 2) We add curvature as a third dimension in the feature histogram, to better separate characteristics like loops and lines. 3) We also investigate the use of several dissimilarity measures between the feature histograms...
Refactorings are behavior-preserving source code transformations. While tool support exists for (semi) automatically identifying refactoring solutions, applying or not a recommended refactoring is usually up to the software developers, who have to assess the impact that the transformation will have on their system. Evaluating the pros (e.g., the bad smell removal) and cons (e.g., side effects of the...
Arc detection is difficulty for the processing, assembly and testing of industrial production because of limitations of the detection method, algorithm and the instrument. The least-squares algorithm usually is used to fit data in circle detection. The application of the conventional least-squares algorithm is limited, its roundness error is bigger, and precision is lower. For detecting arc with data...
Author name disambiguation has been one of the hardest problems faced by digital libraries since their early days. Historically, supervised solutions have empirically outperformed those based on heuristics, but with the burden of having to rely on manually labelled training sets for the learning process. Moreover, most supervised solutions just apply some type of generic machine learning solution...
The degree distribution is an important characteristic in complex networks. In many applications, quantification of degree distribution in the form of a fixed-length feature vector is a necessary step. Additionally, we often need to compare the degree distribution of two given networks and extract the amount of similarity between the two distributions. In this paper, we propose a novel method for...
The performance requirements and amount of work of an I/O workload affect the number of storage devices and the run time needed by the workload, and should be included in the calculation of the cost or energy consumption of storage devices. This paper introduces models to calculate the cost and energy consumption of storage devices for running a variety of workloads, categorized by their dominant...
Trust plays a very important role in people's real lives. As online social networking becomes more and more popular nowadays, it is urgent to use trust in online communities, like Amazon.com, Epinions.com, Facebook, Twitter and so on. Unfortunately, trust links in online communities are sparse compared with the number of pairs of users. To address this problem, computer scientists are now using trust...
Modularity is widely used to effectively measure the strength of the disjoint community structure found by community detection algorithms. Although several overlapping extensions of modularity were proposed to measure the quality of overlapping community structure, there is lack of systematic comparison of different extensions. To fill this gap, we overview overlapping extensions of modularity to...
Trust is one source of information that has been widely adopted to personalize online services for users, such as in product recommendations. However, trust information is usually very sparse or unavailable for most online systems. To narrow this gap, we propose a principled approach that predicts implicit trust from users' interactions, by extending a well-known trust antecedents framework. Specifically,...
The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm. Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining. In this study, the most appropriate parameter setting for outbreak detection...
The Piezoelectric Actuator Drive (PAD) is a type of rotary motor that transforms the linear motion of piezoelectric stack actuators into a precise rotational motion. The very high stiffness of the actuators employed make this type of motor suited for open-loop control, but the inherent hysteresis exhibited by piezoelectric ceramics causes losses. Therefore, this paper presents a straightforward method...
Topic modeling is a popular research topic and is widely used in text mining based applications. Many researchers realize that the learned topics in the LDA model, each as a multinomial distribution on the word vocabulary space, are often not intuitive in term of human recognition and communication. Based on our observation, given a topic, the most frequent words in it are usually less important than...
Often new insights and advancements are made by a detailed study of the problem and the solution space. The area of community finding has had many algorithms proposed recently, but to our knowledge there have not been any detailed studies of the solution space. In this paper, we present two algorithms for enumerating and unranking the possible valid community assignments for a network. To demonstrate...
This paper proposes and subsequently delineates quantification of network security metrics using software defined networking approach in real time using a progressive testbed. This comprehensive testbed implements computation of trust values which lend sentient decision making qualities to the participant nodes in a network and fortify it against threats like blackhole and flooding attacks. AODV and...
The projection surface of a 3D line in a non-central camera is a ruled surface, containing the complete information of the 3D line. The resulting line-image is a curve which contains the 4 degrees of freedom of the 3D line. In this paper we investigate the properties of the line-image in conical catadioptric systems. This curve is a particular quartic that can be described by only six homogeneous...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.