Search results for "Electronic mail"

showing 10 items of 61 documents

Some remarks on unconditionally convergent multipliers

2017

We present some results concerning the representation of unconditionally convergent multipliers, including a reformulation of a conjecture of Balazs and Stoeva.

Conjecture010102 general mathematicsHilbert spaceData_CODINGANDINFORMATIONTHEORY01 natural sciencesElectronic mail010101 applied mathematicssymbols.namesakeConvergence (routing)symbolsCalculusApplied mathematicsHardware_ARITHMETICANDLOGICSTRUCTURES0101 mathematicsRepresentation (mathematics)Mathematics2017 International Conference on Sampling Theory and Applications (SampTA)
researchProduct

The indexing of persons in news sequences using audio-visual data

2004

We describe a video indexing system that automatically searches for a specific person in a news sequence. The proposed approach combines audio and video confidence values extracted from speaker and face recognition analysis. The system also incorporates a shot selection module that seeks for anchors, where the person on the scene is likely speaking. The system has been extensively tested on several news sequences with very good recognition rates.

Contextual image classificationComputer scienceSpeech recognitionSearch engine indexingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONSelection (linguistics)Speaker recognitionAudio signal processingcomputer.software_genrecomputerFacial recognition systemElectronic mail2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03).
researchProduct

Taking on the “Dark Side”–Coping With Technostress

2020

Technostress is stress that individuals experience due to their use of information technology. It is associated with critical workplace consequences including reduced productivity. While the negative consequences are well known, what is less understood is how individuals can cope with technostress to alleviate them. We report on two studies that explain how organizational IT users can cope with technostress. The first is a qualitative study conducted in the U.K., by interviewing thirty executives/knowledge workers. Here, we identified seven coping behaviors that individuals engage in, in response to technostress. The second is a survey of 846 U.S. employees who use IT in their workplace. He…

Coping (psychology)InterviewApplied psychologyBehavioural sciences02 engineering and technology113 Computer and information sciencesElectronic mailComputer Science ApplicationsGreat RiftHardware and Architecture020204 information systemsTechnostress0202 electrical engineering electronic engineering information engineeringTask analysisPsychologySoftwareQualitative research
researchProduct

On the Existence of 1-Bounded Bi-ideals with the WELLDOC Property

2015

A combinatorial condition called well distributedoccurrences, or WELLDOC for short, has been introducedrecently. The proofs that WELLDOC property holds for thefamily of Sturmian words, and more generally, for Arnoux-Rauzy words are given in two papers by Balkova et al. The WELLDOC property for bounded bi-ideals is analysed inthis paper. The existence of a 1-bounded bi-ideal over thefinite alphabet that satisfies the WELLDOC property has beenproved by the authors.

Discrete mathematicsAlgebraProperty (philosophy)Computer scienceBounded functionAlphabetComputer-aided software engineeringMathematical proofElectronic mail2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)
researchProduct

Computing the Probability for Data Loss in Two-Dimensional Parity RAIDs

2017

Parity RAIDs are used to protect storage systems against disk failures. The idea is to add redundancy to the system by storing the parity of subsets of disks on extra parity disks. A simple two-dimensional scheme is the one in which the data disks are arranged in a rectangular grid, and every row and column is extended by one disk which stores the parity of it.In this paper we describe several two-dimensional parity RAIDs and analyse, for each of them, the probability for dataloss given that f random disks fail. This probability can be used to determine the overall probability using the model of Hafner and Rao. We reduce subsets of the forest counting problem to the different cases and show…

Discrete mathematicsHardware_MEMORYSTRUCTURESRAIDComputer science020206 networking & telecommunications02 engineering and technologyData lossGridElectronic mail020202 computer hardware & architecturelaw.inventionExact algorithmCounting problemlawData_FILES0202 electrical engineering electronic engineering information engineeringTutte polynomialParity (mathematics)2017 13th European Dependable Computing Conference (EDCC)
researchProduct

On another approach to the definition of an L-fuzzy valued integral

2011

We continue to develop a construction of an L-fuzzy valued measure extending a crisp measure defined on a σ-algebra of crisp sets to an L-fuzzy valued measure defined on a T M -tribe. We describe two equivalent approaches to define an L-fuzzy valued integral of non-negative measurable functions.

Discrete mathematicsMeasurable functionMathematics::General MathematicsFuzzy setMeasure (physics)Algebra over a fieldFuzzy logicElectronic mailMathematics2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011)
researchProduct

On a Non-periodic Shrinking Generator

2011

We present a new non-periodic random number generator based on the shrinking generator. The A-sequence is still generated using a LFSR, but the S-sequence is replaced by a finitely generated bi-ideal - a non-periodic sequence. The resulting pseudo-random sequence performs well in statistical tests. We show a method for the construction of an infinite number of finitely generated bi-ideals from a given A-sequence, such that the resulting sequence of the shrinking generator is nonperiodic. Further we prove the existence of what we call universal finitely generated bi-ideals that produce non-periodic words when used as the S-sequence of a shrinking generator for all non-trivial periodic A-sequ…

Discrete mathematicsPseudorandom number generatorSequenceRandom number generationSelf-shrinking generatorAutomata theoryTopologyElectronic mailStatistical hypothesis testingMathematicsShrinking generator2011 13th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing
researchProduct

Partial Finitely Generated Bi-Ideals

2016

Partial words have been studied by Blanchet-Sadri et al., but bi-ideals or reccurrent words have been studied for centuries by many researchers. This paper gives a solution for some problems for partial reccurrent words. This paper gives an algorithm for a given finitely generated bi-ideal, how to construct a new basis of ultimately finitely generated bi-ideal, which generates the same given bi-ideal. The paper states that it is always possible to find a basis for a given finitely generated bi-ideal. The main results of this paper are presented in third section. At first, we show that if two irreduciable bi-ideals are different, they will differ in infinitely many places. This led to the st…

Discrete mathematicsStatement (computer science)Mathematics::Commutative Algebra020207 software engineering0102 computer and information sciences02 engineering and technologyBasis (universal algebra)01 natural sciencesElectronic mailSection (category theory)Stallings theorem about ends of groups010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringFinitely-generated abelian groupFinite setCounterexampleMathematics2016 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)
researchProduct

Eliciting Information on the Vulnerability Black Market from Interviews

2010

Threats to computing prompted by software vulnerabilities are abundant and costly for those affected. Adding to this problem is the emerging vulnerability black markets (VBMs), since they become places to trade malware and exploits. VBMs are discussed based on information derived from interviews with security researchers. The effort is enriched by further examination of documents surrounding the disclosure of four selected vulnerabilities cases. The result suggests that the VBMs is bifurcated into two distinct parts; the skilled-hacker and the script-kiddie VBMs with a possible link between them, where the latter become places to sell malware or exploit kits after the zero day vulnerability…

ExploitComputer sciencebusiness.industryInternet privacycomputer.software_genreComputer securitySoftware qualityElectronic mailComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSMalwareBlack marketbusinesscomputerZero-day attackVulnerability (computing)2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
researchProduct

Graphical THD minimization procedure for single phase five-level converters

2017

This paper proposes two graphycal procedure to mitigate h harmonics and to minimize the total harmonic distortion (THD), respectively. The paper considers a five-level inverter and fundamental frequency modulation: it computes the two switching angles able to reduce low order harmonics and able to minimize the THD. Simulation results are obtained and, in order to validate the proposed procedure, an experimental prototype is built and experimental results are carried out. The comparison between simulation and experimental results confirms the accuracy of the proposed graphycal procedure. It is shown that the switching angles to mitigate the third-fifth and the third-fifth-seventh harmonics e…

Graphycal Procedure; Grid Codes; Harmonics Mitigation; Multilevel Inverters; Total Harmonic Distortion (THD); Electrical and Electronic Engineering; Control and Systems EngineeringGraphycal ProcedureTotal harmonic distortionEngineeringbusiness.industryTotal Harmonic Distortion (THD)020208 electrical & electronic engineeringModulation indexGrid Codes02 engineering and technologyFundamental frequencyElectronic mailHarmonic analysisHarmonics MitigationMultilevel InvertersControl and Systems EngineeringControl theoryHarmonics0202 electrical engineering electronic engineering information engineeringHarmonicElectronic engineeringInverterElectrical and Electronic Engineeringbusiness2017 IEEE 26th International Symposium on Industrial Electronics (ISIE)
researchProduct