Search results for "SOFTWARE"

showing 10 items of 7396 documents

Inter-annotator agreement in spoken language annotation: Applying uα-family coefficients to discourse segmentation

2021

As databases make Corpus Linguistics a common tool for most linguists, corpus annotation becomes an increasingly important process. Corpus users do not need only raw data, but also annotated data, submitted to tagging or parsing processes through annotation protocols. One problem with corpus annotation lies in its reliability, that is, in the probability that its results can be replicable by independent researchers. Inter-annotation agreement (IAA) is the process which evaluates the probability that, applying the same protocol, different annotators reach similar results. To measure agreement, different statistical metrics are used. This study applies IAA for the first time to the Valencia E…

subactsLinguistics and LanguageComputer scienceProcess (engineering)media_common.quotation_subjectP1-1091computer.software_genreLanguage and LinguisticsSet (abstract data type)Annotationkripendorff’s α-coefficientsCorpus linguisticsConversationSegmentationval.es.co. modelPhilology. Linguisticsmedia_commoninter-annotator agreementParsingbusiness.industrycorpus annotationdiscourse segmentationArtificial intelligencebusinesscomputerNatural language processingSpoken languageRussian Journal of Linguistics
researchProduct

Attacking TrustZone on devices lacking memory protection

2021

AbstractARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware.

sulautettu tietotekniikkaComputational Theory and MathematicsHardware and ArchitectureComputer Science (miscellaneous)esineiden internetTrustZonesecuritytietoturvaverkkohyökkäyksetSoftwarehaavoittuvuus
researchProduct

Towards Automated Classification of Firmware Images and Identification of Embedded Devices

2017

Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…

sulautettu tietotekniikkaComputer scienceVendorvulnerability02 engineering and technologycomputer.software_genreSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]tietoturvadata securityhaavoittuvuusbusiness.industryFirmwareFingerprint (computing)020206 networking & telecommunicationsubiquitous computingRandom forestIdentification (information)koneoppiminenmachine learningEmbedded systemUser interfaceHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGbusinesscomputerPrivate network
researchProduct

Flat-band superconductivity in strained Dirac materials

2016

We consider superconducting properties of a two-dimensional Dirac material such as graphene under strain that produces a flat band spectrum in the normal state. We show that in the superconducting state, such a model results in a highly increased critical temperature compared to the case without the strain, inhomogenous order parameter with two-peak shaped local density of states and yet a large and almost uniform and isotropic supercurrent. This model could be realized in strained graphene or ultracold atom systems and could be responsible for unusually strong superconductivity observed in some graphite interfaces and certain IV-VI semiconductor heterostructures.

superconducting propertiesMaterials sciencesuprajohtavuusDirac (software)FOS: Physical sciences02 engineering and technology01 natural scienceslaw.inventionsuprajohteetSuperconductivity (cond-mat.supr-con)Condensed Matter::Materials SciencelawUltracold atompuolijohteetCondensed Matter::Superconductivity0103 physical sciencesgrafeeniGraphite010306 general physicsSuperconductivityLocal density of statesCondensed matter physicsta114Dirac materialsGrapheneCondensed Matter - SuperconductivityIsotropySupercurrent021001 nanoscience & nanotechnology0210 nano-technologyPhysical Review B
researchProduct

Automatic surrogate modelling technique selection based on features of optimization problems

2019

A typical scenario when solving industrial single or multiobjective optimization problems is that no explicit formulation of the problem is available. Instead, a dataset containing vectors of decision variables together with their objective function value(s) is given and a surrogate model (or metamodel) is build from the data and used for optimization and decision-making. This data-driven optimization process strongly depends on the ability of the surrogate model to predict the objective value of decision variables not present in the original dataset. Therefore, the choice of surrogate modelling technique is crucial. While many surrogate modelling techniques have been discussed in the liter…

surrogate modellingOptimization problemexploratory landscape analysisbusiness.industryComputer scienceautomatic algorithm selection0102 computer and information sciences02 engineering and technologyMachine learningcomputer.software_genre01 natural sciencesmonitavoiteoptimointiSurrogate modeloptimointi010201 computation theory & mathematicsalgoritmit0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencebusinessClassifier (UML)computer
researchProduct

Model selection using limiting distributions of second-order blind source separation algorithms

2015

Signals, recorded over time, are often observed as mixtures of multiple source signals. To extract relevant information from such measurements one needs to determine the mixing coefficients. In case of weakly stationary time series with uncorrelated source signals, this separation can be achieved by jointly diagonalizing sample autocovariances at different lags, and several algorithms address this task. Often the mixing estimates contain close-to-zero entries and one wants to decide whether the corresponding source signals have a relevant impact on the observations or not. To address this question of model selection we consider the recently published second-order blind identification proced…

ta112Series (mathematics)Estimation theoryModel selectionasymptotic normalitypattern identificationAsymptotic distributionInformation Criteriaoint diagonalization SOBI AsympBlind signal separationMatrix (mathematics)Control and Systems EngineeringSOBISignal Processingjoint diagonalizationComputer Vision and Pattern RecognitionElectrical and Electronic EngineeringAlgorithmSoftwareMixing (physics)MathematicsSignal Processing
researchProduct

Surrogate-assisted evolutionary multiobjective shape optimization of an air intake ventilation system

2017

We tackle three different challenges in solving a real-world industrial problem: formulating the optimization problem, connecting different simulation tools and dealing with computationally expensive objective functions. The problem to be optimized is an air intake ventilation system of a tractor and consists of three computationally expensive objective functions. We describe the modeling of the system and its numerical evaluation with a commercial software. To obtain solutions in few function evaluations, a recently proposed surrogate-assisted evolutionary algorithm K-RVEA is applied. The diameters of four different outlets of the ventilation system are considered as decision variables. Fr…

ta1130209 industrial biotechnologyMathematical optimizationnumerical modelsOptimization problemlineaarinen optimointiLinear programmingComputer sciencesoftwarehydraulijärjestelmätventilationEvolutionary algorithmlinear programming02 engineering and technologyFunction (mathematics)Set (abstract data type)resistance020901 industrial engineering & automationhydraulic systemsilmanvaihto0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingShape optimizationoptimization
researchProduct

Generalizability and Simplicity as Criteria in Feature Selection: Application to Mood Classification in Music

2011

Classification of musical audio signals according to expressed mood or emotion has evident applications to content-based music retrieval in large databases. Wrapper selection is a dimension reduction method that has been proposed for improving classification performance. However, the technique is prone to lead to overfitting of the training data, which decreases the generalizability of the obtained results. We claim that previous attempts to apply wrapper selection in the field of music information retrieval (MIR) have led to disputable conclusions about the used methods due to inadequate analysis frameworks, indicative of overfitting, and biased results. This paper presents a framework bas…

ta113Acoustics and UltrasonicsComputer sciencebusiness.industryDimensionality reductionEmotion classificationFeature selectionOverfittingMachine learningcomputer.software_genreNaive Bayes classifierFeature (machine learning)Music information retrievalGeneralizability theoryArtificial intelligenceElectrical and Electronic EngineeringbusinesscomputerIEEE Transactions on Audio, Speech, and Language Processing
researchProduct

Seeking Technical Debt in Critical Software Development Projects : An Exploratory Field Study

2016

In recent years, the metaphor of technical debt has received considerable attention, especially from the agile community. Still, despite the fact that agile practices are increasingly used in critical domains, to the best of our knowledge, there are no studies investigating the occurrence of technical debt in critical software development projects. The results of an exploratory field study conducted across several projects reveal that a variety of business and environmental factors cause the occurrence of technical debt in critical domains. Using Grounded Theory method, these factors are categorized as ambiguity of requirement, diversity of projects, inadequate knowledge management, and res…

ta113Agile usability engineeringKnowledge managementbusiness.industryEmpirical process (process control model)Agile Unified Process020207 software engineering02 engineering and technologySoftware peer reviewcomputer.software_genreExtreme programming practicestechnical debtTechnical debt020204 information systemssoftware development0202 electrical engineering electronic engineering information engineeringLean software developmentbusinessohjelmistokehityscomputerAgile software development
researchProduct

Supporting Agile Development by Facilitating Natural User Interaction with Executable Formal Specifications

2011

Agile development benefits from fast feedback from various stakeholders. If implemented in a suitable way, formal methods can enhance the agile development process. With an executable formal specification, it is possible to analyse and simulate the behaviour of the target system before it is being built. However, for the users' and developers' natural participation in the development process, it is necessary to use a real end-user interface and bind it to the execution environment being used in the simulations and animations. This requires, though, that the execution model used to simulate the specification is appropriately changed to facilitate the use of these user interfaces. The authors…

ta113Agile usability engineeringbusiness.industryComputer scienceProgramming languageAgile Unified ProcessGeneral Medicinecomputer.file_formatFormal methodscomputer.software_genreFormal specificationExecutableUser interfacebusinessSoftware engineeringcomputerExecution modelAgile software developmentACM SIGSOFT Software Engineering Notes
researchProduct