Search results for "UML"

showing 10 items of 407 documents

The Argument Dependency Model

2015

This chapter summarizes the architecture of the extended Argument Dependency Model (eADM), a model of language comprehension that aspires toward neurobiological plausibility. It combines design principles from neurobiology with insights on cross-linguistic diversity. Like other current models, the eADM posits that auditory language processing proceeds along two distinct streams in the brain emanating from auditory cortex: the antero-ventral and postero-dorsal streams. Both streams are organized hierarchically and information processing takes place in a cascaded fashion. Each stream has functionally unified computational properties congruent with its role in primate audition. While the dorsa…

Cognitive sciencehierarchical processingDependency (UML)business.industryComputer scienceInformation processingcross-linguistic diversityAuditory cortexcomputer.software_genreNoncommutative geometryComprehensionRange (mathematics)dorsal streamventral streamArtificial intelligenceArgument (linguistics)businesscomputerCommutative propertyNatural language processinglanguage comprehension
researchProduct

Pure Component Pricing in a Duopoly

2002

In this paper, we focus on price competition between several multiproduct firms which produce differentiated systems, each consisting of two complementary products. It is shown here that if firms are restricted to pure component pricing (bundling is not allowed) whenever components produced are compatible, pure strategy equilibrium may not exist. With the use of bundling strategies, pure strategy equilibrium always exists. For the pure component pricing case we provide a full characterization for the existence of a pure strategy equilibrium.

Competition (economics)Economics and EconometricsStrategyComponent (UML)EconomicsDuopolyMathematical economicsComplementary goodThe Manchester School
researchProduct

Predictive and Evolutive Cross-Referencing for Web Textual Sources

2017

International audience; One of the main challenges in the domain of competitive intelligence is to harness important volumes of information from the web, and extract the most valuable pieces of information. As the amount of information available on the web grows rapidly and is very heterogeneous, this process becomes overwhelming for experts. To leverage this challenge, this paper presents a vision for a novel process that performs cross-referencing at web scale. This process uses a focused crawler and a semantic-based classifier to cross-reference textual items without expert intervention, based on Big Data and Semantic Web technologies. The system is described thoroughly, and interests of…

Competitive intelligenceComputer science[SPI] Engineering Sciences [physics]Big data02 engineering and technologyReasonningFocused crawlerDiscovery[INFO] Computer Science [cs]World Wide WebKnowledge-based systems[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][SPI]Engineering Sciences [physics]020204 information systems0202 electrical engineering electronic engineering information engineeringLeverage (statistics)[INFO]Computer Science [cs]Semantic Web[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryOntologyFocused CrawlerWork in processClassificationAdaptive[SPI.TRON] Engineering Sciences [physics]/Electronics[SPI.TRON]Engineering Sciences [physics]/ElectronicsCross-ReferencingClasssification020201 artificial intelligence & image processingbusinessClassifier (UML)Model
researchProduct

On the Online Classification of Data Streams Using Weak Estimators

2016

In this paper, we propose a novel online classifier for complex data streams which are generated from non-stationary stochastic properties. Instead of using a single training model and counters to keep important data statistics, the introduced online classifier scheme provides a real-time self-adjusting learning model. The learning model utilizes the multiplication-based update algorithm of the Stochastic Learning Weak Estimator (SLWE) at each time instant as a new labeled instance arrives. In this way, the data statistics are updated every time a new element is inserted, without requiring that we have to rebuild its model when changes occur in the data distributions. Finally, and most impo…

Complex data typeTraining setLearning automataComputer sciencebusiness.industryData stream miningEstimator020206 networking & telecommunications02 engineering and technologycomputer.software_genreMachine learning0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingData miningArtificial intelligencebusinesscomputerClassifier (UML)Juncture
researchProduct

Computational Modelling of Public Policy: Reflections on Practice

2018

Computational models are increasingly being used to assist in developing, implementing and evaluating public policy. This paper reports on the experience of the authors in designing and using computational models of public policy (‘policy models’, for short). The paper considers the role of computational models in policy making, and some of the challenges that need to be overcome if policy models are to make an effective contribution. It suggests that policy models can have an important place in the policy process because they could allow policy makers to experiment in a virtual world, and have many advantages compared with randomised control trials and policy pilots. The paper then summari…

Computational modelCalibration and validationProcess (engineering)Computer science05 social sciencesControl (management)050401 social sciences methodsGeneral Social SciencesPublic policy02 engineering and technologyDomain (software engineering)0504 sociologyRisk analysis (engineering)020204 information systemsComponent (UML)0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)Abstraction (linguistics)
researchProduct

Dual-model approach for safety-critical embedded systems

2020

Abstract The paper presents the design of digital controllers based on two models: the Petri net model, and the UML state machine. These two approaches differ in many aspects of design flow, such as conceptual modelling, and analysis and synthesis. Each of these approaches can be used individually to design an efficient logic controller, and such solutions are well-known, but their interoperability can contribute to a much better understanding of logic controller design and validation. This is especially important in the case of safety- or life-critical embedded systems, and apart from this, a dual-model controller design can make up redundant system increasing its reliability.

Computer Networks and Communicationsbusiness.industryDual modelComputer scienceReliability (computer networking)020208 electrical & electronic engineeringInteroperabilityDesign flow02 engineering and technologyPetri net020202 computer hardware & architectureUML state machineArtificial IntelligenceHardware and ArchitectureControl theoryEmbedded system0202 electrical engineering electronic engineering information engineeringbusinessSoftwareMicroprocessors and Microsystems
researchProduct

Extension of luminance component based demosaicking algorithm to 4- and 5-band multispectral images

2021

Abstract Multispectral imaging systems are currently expanding with a variety of multispectral demosaicking algorithms. But these algorithms have limitations due to the remarkable presence of artifacts in the reconstructed image. In this paper, we propose a powerful multispectral image demosaicking method that focuses on the G band and luminance component. We've first identified a relevant 4-and 5-band multispectral filter array (MSFA) with the dominant G band and then proposed an algorithm that consistently estimates the missing G values and other missing components using a convolution operator and a weighted bilinear interpolation algorithm based on the luminance component. Using the cons…

Computer engineering. Computer hardwareDemosaicingDemosaicking algorithmComputer scienceMultispectral imageBilinear interpolationQA75.5-76.95General MedicineExtension (predicate logic)Filter (signal processing)Multispectral filter arrayLuminanceConvolutionTK7885-7895G bandElectronic computers. Computer scienceComponent (UML)Weighted bilinear interpolationLuminance componentAlgorithmArray
researchProduct

Hypervisor-assisted dynamic malware analysis

2021

AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…

Computer engineering. Computer hardwareSoftware_OPERATINGSYSTEMSvirtualisointiComputer Networks and CommunicationsComputer scienceContext (language use)Static program analysiscomputer.software_genreTK7885-7895Artificial IntelligenceComponent (UML)Overhead (computing)tietoturvaMalware analysiskyberturvallisuusbusiness.industryHypervisorQA75.5-76.95haittaohjelmatComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSTask (computing)Electronic computers. Computer scienceEmbedded systemMalwarebusinesscomputerSoftwareInformation SystemsCybersecurity
researchProduct

Machine Learning Techniques for Intrusion Detection: A Comparative Analysis

2016

International audience; With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework " s security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The techniq…

Computer scienceAnomaly-based intrusion detection system02 engineering and technologyIntrusion detection systemIDSMachine learningcomputer.software_genre[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Machine LearningResource (project management)Component (UML)0202 electrical engineering electronic engineering information engineeringROCSet (psychology)[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]False Positivebusiness.industryACM[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020206 networking & telecommunicationsPrecisionObject (computer science)True PositiveOutlier020201 artificial intelligence & image processingThe InternetArtificial intelligenceData miningbusinesscomputer
researchProduct

Towards a Hierarchical Multitask Classification Framework for Cultural Heritage

2018

Digital technologies such as 3D imaging, data analytics and computer vision opened the door to a large set of applications in cultural heritage. Digital acquisition of a cultural assets takes nowadays a couple of seconds thanks to the achievements in 2D and 3D acquisition technologies. However, enriching these cultural assets with labels and relevant metadata is still not fully automatized especially due to their nature and specificities. With the recent publication of several cultural heritage datasets, many researchers are tackling the challenge of effectively classifying and annotating digital heritage. The challenges that are often addressed are related to visual recognition and image c…

Computer scienceData field02 engineering and technology[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Multitask ClassificationCultural diversity0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Digital preservationComputingMilieux_MISCELLANEOUSContextual image classificationDigital heritagebusiness.industryDeep learningConvolutional Neural Networks[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020206 networking & telecommunicationsData scienceMetadataCultural heritageDigital preservationCultural heritage020201 artificial intelligence & image processingArtificial intelligencebusinessClassifier (UML)
researchProduct