Search results for "computer.software_genre"

showing 10 items of 3858 documents

A probabilistic estimation and prediction technique for dynamic continuous social science models: The evolution of the attitude of the Basque Country…

2015

In this paper, a computational technique to deal with uncertainty in dynamic continuous models in Social Sciences is presented.Considering data from surveys,the method consists of determining the probability distribution of the survey output and this allows to sample data and fit the model to the sampled data using a goodness-of-fit criterion based the χ2-test. Taking the fitted parameters that were not rejected by the χ2-test, substituting them into the model and computing their outputs, 95% confidence intervals in each time instant capturing the uncertainty of the survey data (probabilistic estimation) is built. Using the same set of obtained model parameters, a prediction over …

FOS: Computer and information sciencesAttitude dynamicsProbabilistic predictionComputer sciencePopulationDivergence-from-randomness modelSample (statistics)computer.software_genreMachine Learning (cs.LG)Probabilistic estimationSocial scienceeducationProbabilistic relevance modeleducation.field_of_studyApplied MathematicsProbabilistic logicConfidence intervalComputer Science - LearningComputational MathematicsSocial dynamic modelsProbability distributionSurvey data collectionData miningMATEMATICA APLICADAcomputerApplied Mathematics and Computation
researchProduct

Extending the Tsetlin Machine With Integer-Weighted Clauses for Increased Interpretability

2020

Despite significant effort, building models that are both interpretable and accurate is an unresolved challenge for many pattern recognition problems. In general, rule-based and linear models lack accuracy, while deep learning interpretability is based on rough approximations of the underlying inference. Using a linear combination of conjunctive clauses in propositional logic, Tsetlin Machines (TMs) have shown competitive performance on diverse benchmarks. However, to do so, many clauses are needed, which impacts interpretability. Here, we address the accuracy-interpretability challenge in machine learning by equipping the TM clauses with integer weights. The resulting Integer Weighted TM (…

FOS: Computer and information sciencesBoosting (machine learning)Theoretical computer scienceinteger-weighted Tsetlin machineGeneral Computer ScienceComputer scienceComputer Science - Artificial Intelligence0206 medical engineeringNatural language understandingInference02 engineering and technologycomputer.software_genre0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceTsetlin machineVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550InterpretabilityArtificial neural networkLearning automatabusiness.industryDeep learningGeneral Engineeringinterpretable machine learningrule-based learninginterpretable AIPropositional calculusSupport vector machineArtificial Intelligence (cs.AI)TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESXAIPattern recognition (psychology)020201 artificial intelligence & image processinglcsh:Electrical engineering. Electronics. Nuclear engineeringArtificial intelligencebusinesslcsh:TK1-9971computer020602 bioinformaticsInteger (computer science)
researchProduct

Adaptive Task Assignment in Online Learning Environments

2016

With the increasing popularity of online learning, intelligent tutoring systems are regaining increased attention. In this paper, we introduce adaptive algorithms for personalized assignment of learning tasks to student so that to improve his performance in online learning environments. As main contribution of this paper, we propose a a novel Skill-Based Task Selector (SBTS) algorithm which is able to approximate a student's skill level based on his performance and consequently suggest adequate assignments. The SBTS is inspired by the class of multi-armed bandit algorithms. However, in contrast to standard multi-armed bandit approaches, the SBTS aims at acquiring two criteria related to stu…

FOS: Computer and information sciencesClass (computer programming)Computer sciencebusiness.industryComputer Science - Artificial IntelligenceNode (networking)05 social sciences050301 educationContrast (statistics)02 engineering and technologyMachine learningcomputer.software_genrePopularityIntelligent tutoring systemTask (project management)Artificial Intelligence (cs.AI)020204 information systems0202 electrical engineering electronic engineering information engineeringSelection (linguistics)ComputingMilieux_COMPUTERSANDEDUCATIONAdaptive learningArtificial intelligencebusiness0503 educationcomputer
researchProduct

The Personal Software Process, Experiences from Denmark

2003

Software process improvement (SPI) research and practice is transforming from the traditional large-scale assessment based improvement initiatives into smaller sized, tailored initiatives where the emphasis is set on the development personnel and their personal abilities. The personal software process (PSPSM) is a method for improving the personal capabilities of a single software engineer. This paper contributes to the body of knowledge within this area by reporting experiences from Denmark. The results indicate an improvement in the effort estimation skills and a significant increase in the resulting product quality in terms of reduced total defect density. The data shows that with relati…

FOS: Computer and information sciencesCode reviewProcess managementbusiness.industryComputer sciencemedia_common.quotation_subjectcomputer.software_genreBody of knowledgeSoftware development processSoftware Engineering (cs.SE)Computer Science - Software EngineeringSoftwarePersonal software processQuality (business)Product (category theory)Set (psychology)businesscomputermedia_common
researchProduct

A gap analysis of Internet-of-Things platforms

2016

We are experiencing an abundance of Internet-of-Things (IoT) middleware solutions that provide connectivity for sensors and actuators to the Internet. To gain a widespread adoption, these middleware solutions, referred to as platforms, have to meet the expectations of different players in the IoT ecosystem, including device providers, application developers, and end-users, among others. In this article, we evaluate a representative sample of these platforms, both proprietary and open-source, on the basis of their ability to meet the expectations of different IoT users. The evaluation is thus more focused on how ready and usable these platforms are for IoT ecosystem players, rather than on t…

FOS: Computer and information sciencesComputer Networks and CommunicationsComputer science02 engineering and technologyGap analysiscomputer.software_genreWorld Wide WebComputer Science - Computers and SocietyOrder (exchange)Computers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringesineiden internetIoT ecosystemIoT marketplaceta113internet of Thingsbusiness.industry020206 networking & telecommunicationsIoT platformsData sharingMiddleware (distributed applications)Middleware020201 artificial intelligence & image processingThe InternetbusinessInternet of Thingsgap analysiscomputerComputer Communications
researchProduct

Polysemy in Controlled Natural Language Texts

2015

Computational semantics and logic-based controlled natural languages (CNL) do not address systematically the word sense disambiguation problem of content words, i.e., they tend to interpret only some functional words that are crucial for construction of discourse representation structures. We show that micro-ontologies and multi-word units allow integration of the rich and polysemous multi-domain background knowledge into CNL thus providing interpretation for the content words. The proposed approach is demonstrated by extending the Attempto Controlled English (ACE) with polysemous and procedural constructs resulting in a more natural CNL named PAO covering narrative multi-domain texts.

FOS: Computer and information sciencesComputer Science - Computation and LanguageInterpretation (logic)Computer sciencebusiness.industryRepresentation (arts)Content wordcomputer.software_genrelanguage.human_languageControlled natural languageComputational semanticslanguageAttempto Controlled EnglishArtificial intelligencePolysemybusinessComputation and Language (cs.CL)computerNatural languageNatural language processing
researchProduct

Towards the evaluation of automatic simultaneous speech translation from a communicative perspective

2021

In recent years, automatic speech-to-speech and speech-to-text translation has gained momentum thanks to advances in artificial intelligence, especially in the domains of speech recognition and machine translation. The quality of such applications is commonly tested with automatic metrics, such as BLEU, primarily with the goal of assessing improvements of releases or in the context of evaluation campaigns. However, little is known about how the output of such systems is perceived by end users or how they compare to human performances in similar communicative tasks. In this paper, we present the results of an experiment aimed at evaluating the quality of a real-time speech translation engine…

FOS: Computer and information sciencesComputer Science - Computation and LanguageMachine translationEnd userComputer sciencebusiness.industrymedia_common.quotation_subjectSample (statistics)Context (language use)Intelligibility (communication)computer.software_genreSpeech translationQuality (business)Artificial intelligencebusinessComputation and Language (cs.CL)computerInterpreterNatural language processingmedia_commonProceedings of the 18th International Conference on Spoken Language Translation (IWSLT 2021)
researchProduct

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

2017

International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer scienceWireless ad hoc networklocation privacy02 engineering and technologysecurityPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineeringpseudonym changing0202 electrical engineering electronic engineering information engineeringVANETsElectrical and Electronic EngineeringAuthenticationVehicular ad hoc networksAuthenticationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringRoadsSoftware deploymentPrivacyInitial phaseComputingMilieux_COMPUTERSANDSOCIETYSafetycomputerCryptography and Security (cs.CR)
researchProduct

Constrained Role Mining

2013

Role Based Access Control (RBAC) is a very popular access control model, for long time investigated and widely deployed in the security architecture of different enterprises. To implement RBAC, roles have to be firstly identified within the considered organization. Usually the process of (automatically) defining the roles in a bottom up way, starting from the permissions assigned to each user, is called {\it role mining}. In literature, the role mining problem has been formally analyzed and several techniques have been proposed in order to obtain a set of valid roles. Recently, the problem of defining different kind of constraints on the number and the size of the roles included in the resu…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityProcess (engineering)business.industryComputer scienceDistributed computingVertex coverAccess controlTop-down and bottom-up designEnterprise information security architecturecomputer.software_genreSet (abstract data type)Order (exchange)Role-based access controlData miningbusinessCryptography and Security (cs.CR)computer
researchProduct

Sequentializing Parameterized Programs

2012

We exhibit assertion-preserving (reachability preserving) transformations from parameterized concurrent shared-memory programs, under a k-round scheduling of processes, to sequential programs. The salient feature of the sequential program is that it tracks the local variables of only one thread at any point, and uses only O(k) copies of shared variables (it does not use extra counters, not even one counter to keep track of the number of threads). Sequentialization is achieved using the concept of a linear interface that captures the effect an unbounded block of processes have on the shared state in a k-round schedule. Our transformation utilizes linear interfaces to sequentialize the progra…

FOS: Computer and information sciencesComputer Science - Logic in Computer ScienceScheduleComputer scienceD.2.4;F.3.1Interface (computing)Parameterized complexitymodel-checking02 engineering and technologyThread (computing)computer.software_genrelcsh:QA75.5-76.95parameterized programsComputer Science - Software Engineeringsoftware verification0202 electrical engineering electronic engineering information engineeringBlock (data storage)Programming languagelcsh:MathematicsD.2.4Local variable020207 software engineeringlcsh:QA1-939Logic in Computer Science (cs.LO)Software Engineering (cs.SE)Transformation (function)model-checking; software verification; parameterized programs020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceState (computer science)F.3.1computerElectronic Proceedings in Theoretical Computer Science
researchProduct