Search results for "computer.software_genre"

showing 10 items of 3858 documents

A High Level Language for Pyramidal Architectures

1986

In the paper are described the syntax and some implementation features of a high level language for pyramidal architectures called Pyramid B Language (PCL). The language is an extension of the B and include data type, set of instructions and builtin functions oriented to the pyramidal architectures. Some notes on the implementation for the PAPIA machine are also given.

Set (abstract data type)Syntax (programming languages)Computer scienceProgramming languagePyramidComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONExtension (predicate logic)computer.software_genrecomputerData type
researchProduct

A Logical Explication of the Concepts of Incomplete and Uncertain Information

1994

Discovery of elementary knowledge and its constituents, i.e. information contained in objects of reality is realized through asking questions including certain aspects called attributes in this paper. We describe a fragment of a discovered reality as an information system (cf. Pawlak [1,3,4]), which consists of the universum U of all the objects of this reality we are concerned with, and of a set A of attributes understood as functions each of which assigns to every object of U 1) a value of given attribute belonging to A or 2) an interval of approximate values of this attribute, i.e. an established set of possible values of this attribute. From the point of view of the cognitive agent and …

Set (abstract data type)Theoretical computer scienceExplicationFragment (logic)Computer scienceInformation systemPoint (geometry)Interval (mathematics)Data miningcomputer.software_genreObject (computer science)computerValue (mathematics)
researchProduct

Construction and Implementation of LR(1) Parsers

1990

This chapter is devoted to the practical issues involved in the construction and use of deterministic LR(1) parsers. We shall show how the practical versions of LR (1) parsers, most notably the LALR (1) parsers, can be constructed efficiently, and we shall present methods for encoding LR(1) parsers as efficient RAM programs. Two versions of RAM program implementation are considered: in the first implementation the parsing program is table-driven, that is, the rules of the parser are encoded in a two-dimensional array which is simulated by a program body; in the other implementation the tabular information is further transformed into a set of program statements.

Set (abstract data type)TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESParsingLR parserComputer scienceProgramming languageEncoding (memory)computer.software_genreLALR parsercomputerCanonical LR parser
researchProduct

Semantic traffic applications based on DatexII

2009

In this work we demonstrate a particular use of ontologies based on the European specifications DATEXII. These specifications are designed and developed as a traffic and travel data exchange mechanism by a European task force to set up and standardise the interface between traffic control and information centres. It is the reference for applications that are developed and implemented in Europe.This language describes concepts and structures of data related to traffic, but the description is just syntactic, not semantic. Therefore the objective to be reached in this part of the research has been to develop a semantic description in order to carry out some applications like syndication and a …

Set (abstract data type)Web syndicationSemantic gridInformation retrievalInterface (Java)Computer scienceData exchangeSemantic computingSemantic analyticsSemantic Web StackData miningcomputer.software_genrecomputerProceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship
researchProduct

Deriving and comparing deduplication techniques using a model-based classification

2015

Data deduplication has been a hot research topic and a large number of systems have been developed. These systems are usually seen as an inherently linked set of characteristics. However, a detailed analysis shows independent concepts that can be used in other systems. In this work, we perform this analysis on the main representatives of deduplication systems. We embed the results in a model, which shows two yet unexplored combinations of characteristics. In addition, the model enables a comprehensive evaluation of the representatives and the two new systems. We perform this evaluation based on real world data sets.

Set (abstract data type)Work (electrical)Computer scienceData deduplicationData miningcomputer.software_genrecomputerReal world dataProceedings of the Tenth European Conference on Computer Systems
researchProduct

Mobile agents, globus and resource discovery

2004

Publisher Summary This chapter discusses grid technology and some related problem. The overview of grids, in terms of application fields and needed protocols is given. The common feature of all grid architectures is a coordinated and controlled resource sharing between the members of a dynamic multi-institutional virtual community. The members of such a community agree on which resources will be shared and which members of the community will be enabled to access these resources, thus defining a set of sharing rules and permissions. The Globus project is discussed, which is nowadays the de facto standard for grid environments, with emphasis on its resource discovery components. Finally, the …

Set (abstract data type)World Wide WebResource (project management)Grid computingComputer scienceScalabilitycomputer.software_genreGridcomputerVirtual communityShared resource
researchProduct

Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques

2013

Nowadays HTTP servers and applications are some of the most popular targets for network attacks. In this research, we consider an algorithm for HTTP intrusions detection based on simple clustering algorithms and advanced processing of HTTP requests which allows the analysis of all queries at once and does not separate them by resource. The method proposed allows detection of HTTP intrusions in case of continuously updated web-applications and does not require a set of HTTP requests free of attacks to build the normal user behaviour model. The algorithm is tested using logs acquired from a large real-life web service and, as a result, all attacks from these logs are detected, while the numbe…

Set (abstract data type)n-gramResource (project management)Computer scienceServerAnomaly detectionIntrusion detection systemData miningWeb serviceCluster analysiscomputer.software_genrecomputer
researchProduct

Geospatial modelling and map analysis allowed measuring regression of the upper limit of Posidonia oceanica seagrass meadows under human pressure

2018

Abstract Marine coastal ecosystems are facing structural and functional changes due to the increasing human footprint worldwide, and the assessment of their long-term changes becomes particularly challenging. Measures of change can be done by comparing the observed ecosystem status to a purposely defined reference condition. In this paper, a geospatial modelling approach based on 2D mapping and morphodynamic data was used to predict the natural position of the upper limit (i.e., the landward continuous front) of Posidonia oceanica seagrass meadows settled on soft bottom. This predictive model, formerly developed at the regional spatial scale, was here applied for the first time at the Medit…

Settore BIO/07 - Ecologia0106 biological sciencesMediterranean climateGeospatial analysis010504 meteorology & atmospheric sciencesMediterranean sea Morphodynamic sPosidonia oceanica Predictive modelling Reference conditions SeagrassAquatic ScienceOceanographycomputer.software_genre01 natural sciencesMorphodynamicZoologíaEcosystemSeagrasssPosidonia oceanica0105 earth and related environmental sciencesbiology010604 marine biology & hydrobiologySeagraPredictive modellingFragmentation (computing)Posidonia oceanicaReference conditionsbiology.organism_classificationSeagrass;Predictive modelling;Reference conditions;Morphodynamics;Posidonia oceanica;Mediterranean seaMorphodynamicsRegressionSeagrassPosidonia oceanicaSettore BIO/03 - Botanica Ambientale E ApplicataMediterranean seaSpatial ecologyEnvironmental scienceReference conditionPhysical geographycomputerEstuarine, Coastal and Shelf Science
researchProduct

Electronic Health Record in Italy and Personal Data Protection.

2016

The present article deals with the Italian Electronic Health Record (hereinafter ehr), recently introduced by Act 221/2012, with a specific focus on personal data protection. Privacy issues — e.g., informed consent, data processing, patients’ rights and minors’ will — are discussed within the framework of recent e-Health legislation, national Data Protection Code, the related Data Protection Authority pronouncements and eu law. The paper is aimed at discussing the problems arising from a complex, fragmentary and sometimes uncertain legal framework on e-Health.

Settore FIS/02 - Fisica Teorica Modelli E Metodi Matematicipersonal data protection lawElectronic health recordSettore IUS/07 - Diritto Del LavoroLegislationInformation privacy lawNational data protection authorityComputer securitycomputer.software_genreItalian Electronic Health Record (EHR) – privacy – data protection – patient-centred approach – minors – ItalyCode (semiotics)Settore FIS/03 - Fisica Della Materiacloud.Informed consentData Protection Act 1998MedicineElectronic Health RecordsHumansConfidentialityComputer SecurityData protectionInformed Consentbusiness.industryHealth PolicyItalian Electronic Health Record (EHR)MinorMinorsItalyPrivacyLawPatient-centred approachHealth lawbusinessLawcomputerConfidentialityEuropean journal of health law
researchProduct

Iteratively reweighted least squares in crystal structure refinements

2011

The use of robust techniques in crystal structure multipole refinements of small molecules as an alternative to the commonly adopted weighted least squares is presented and discussed. As is well known, the main disadvantage of least-squares fitting is its sensitivity to outliers. The elimination from the data set of the most aberrant reflections (due to both experimental errors and incompleteness of the model) is an effective practice that could yield satisfactory results, but it is often complicated in the presence of a great number of bad data points, whose one-by-one elimination could become unattainable. This problem can be circumvented by means of a robust least-squares regression that…

Settore GEO/06 - MineralogiaLeast trimmed squarescomputer.software_genreRegressionRobust regressionIteratively reweighted least squaresData setRobust regression outlier refinementData pointStructural BiologyOutlierSensitivity (control systems)Data miningcomputerAlgorithmMathematicsActa Crystallographica Section A Foundations of Crystallography
researchProduct