Search results for "Computer Networks"
showing 10 items of 860 documents
FCA-based knowledge representation and local generalized linear models to address relevance and diversity in diverse social images
2019
Abstract In social image retrieval, the main goal is to offer a relevant but also diverse result set of images to the user. To address relevance and diversity at the same time, we propose a multi-modal procedure. This approach deals with the diversification problem using a two-step procedure based on the application of Formal Concept Analysis (FCA) to organize the text content of the images, followed by a Hierarchical Agglomerative Clustering (HAC) step to find the topics addressed by the images. FCA detects the latent concepts covered by the images in the result set, organizing them according to these concepts. In the second step, clustering is carried out to group together the ones with a…
Young People's Translocal New Media Uses: A Multiperspective Analysis Of Language Choice And Heteroglossia
2009
The aim of this paper is to shed light on the particularities of the linguistic, social and cultural action of young Finns in translocal new media spaces, and the ways in which they themselves make sense of and account for their actions. We present findings from 4 case studies, each of which illustrates aspects of translocality in young Finns' new media uses. Theoretically and methodologically the case studies draw on sociolinguistics, discourse studies, and ethnography, making use of the concepts of language choice and linguistic and stylistic heteroglossia. Through the 4 cases in focus, the paper shows how young people's linguistically and textually sophisticated new media uses are geared…
Leader election and local identifiers for three‐dimensional programmable matter
2020
International audience; In this paper, we present two deterministic leader election algorithms for programmable matter on the face-centered cubic grid. The face-centered cubic grid is a 3-dimensional 12-regular infinite grid that represents an optimal way to pack spheres (i.e., spherical particles or modules in the context of the programmable matter) in the 3-dimensional space. While the first leader election algorithm requires a strong hypothesis about the initial configuration of the particles and no hypothesis on the system configurations that the particles are forming, the second one requires fewer hypothesis about the initial configuration of the particles but does not work for all pos…
Solving Two-Person Zero-Sum Stochastic Games With Incomplete Information Using Learning Automata With Artificial Barriers
2021
Learning automata (LA) with artificially absorbing barriers was a completely new horizon of research in the 1980s (Oommen, 1986). These new machines yielded properties that were previously unknown. More recently, absorbing barriers have been introduced in continuous estimator algorithms so that the proofs could follow a martingale property, as opposed to monotonicity (Zhang et al., 2014), (Zhang et al., 2015). However, the applications of LA with artificial barriers are almost nonexistent. In that regard, this article is pioneering in that it provides effective and accurate solutions to an extremely complex application domain, namely that of solving two-person zero-sum stochastic games that…
A nested virtualization tool for information technology practical education
2016
Background A common problem of some information technology courses is the difficulty of providing practical exercises. Although different approaches have been followed to solve this problem, it is still an open issue, specially in security and computer network courses. Results This paper proposes NETinVM, a tool based on nested virtualization that includes a fully functional lab, comprising several computers and networks, in a single virtual machine. It also analyzes and evaluates how it has been used in different teaching environments. Conclusions The results show that this tool makes it possible to perform demos, labs and practical exercises, greatly appreciated by the students, that woul…
A status report
1992
Abstract This article considers the financial and proprietary considerations applicable to computer crime, computer security and personal privacy. The failure to take proper precautions in these areas can lead to major operational problems and substantial loss of assets. Developments in the late 1980s, particulary the discovery by the public press of so-called ‘computer viruses’, indicates the need for counsel representing suppliers and users to understand the basic technology involved and the legal implications. Such a report by Robert Bigelow was first published in CLSR in March 1989. He has now updated and revised the text which will be featured in several parts. In the first parts the l…
El plagio cinematográfico de Letty Lynton (1932) y su impacto en la industria fílmica estadounidense: análisis del proceso judicial y de su cobertura…
2016
Este artículo presenta un exhaustivo análisis del proceso judicial relativo al film Letty Lynton (1932), que, pese a ser un emblema del periodo clásico de Hollywood, fue prohibido en 1936, tras la denuncia de dos dramaturgos que acusaron a Metro-Goldwyn-Mayer de haber plagiado una de sus obras. El pleito evidenció una complejidad en materia de infracción del copyright que la justicia estadounidense no había afrontado hasta el momento, entre otros motivos porque la cinta partía de unos hechos reales acontecidos durante el siglo XIX y la productora había adquirido los derechos de una novela que también los relataba. Los continuos recursos y resoluciones judiciales finalizaron, tras ochos años…
A LiDAR Prototype with Silicon Photomultiplier and MEMS Mirrors
2018
In this paper, we present a low cost prototype of a Time-Of-Flight (TOF) LiDAR system, employing a SiPM as photo detector and MEMS mirrors in order to steer the nanosecond pulsed optical beam with a scanning angle of +/-6°. Preliminary TOF measurements have been performed both indoor and outdoor to test the limits of the system.
Mapping wordnets from the perspective of inter-lingual equivalence
2017
Mapping wordnets from the perspective of inter-lingual equivalence This paper explores inter-lingual equivalence from the perspective of linking two large lexico-semantic databases, namely the Princeton WordNet of English and the plWordnet ( pl. Slowosiec ) of Polish. Wordnets are built as networks of lexico-semantic relations between words and their meanings, and constitute a type of monolingual dictionary cum thesaurus. The development of wordnets for different languages has given rise to many wordnet linking projects (e.g. EuroWordNet, Vossen, 2002). Regardless of a linking method used, these projects require defining rules for establishing equivalence links between wordnet building bloc…
MODULAR KNOWLEDGE REPRESENTATION IN ADVISOR AGENTS FOR SITUATION AWARENESS
2011
A modular knowledge representation framework for conversational agents is presented. The approach has been realized to suit the situation awareness paradigm. The modularity of the framework makes possible the composition of specific modules that deal with particular features, simplifying both the chatbot design process and its smartness. As a proof of concepts we have developed a modular, situation awareness oriented, KB for a conversational agent, which plays the role of an advisor aimed at helping a user to be in charge of a virtual town, inspired to the SimCity series game. The agent makes an extensive use of semantic computing techniques and is able to perceive, comprehend and project c…