Search results for "computer.software_genre"

showing 10 items of 3858 documents

EntityBot: Supporting Everyday Digital Tasks with Entity Recommendations

2021

Everyday digital tasks can highly benefit from systems that recommend the right information to use at the right time. However, existing solutions typically support only specific applications and tasks. In this demo, we showcase EntityBot, a system that captures context across application boundaries and recommends information entities related to the current task. The user’s digital activity is continuously monitored by capturing all content on the computer screen using optical character recognition. This includes all applications and services being used and specific to individuals’ computer usages such as instant messaging, emailing, web browsing, and word processing. A linear model is then …

Settore INF/01 - InformaticaComputer science05 social sciencesWord processingContext (computing)User satisfactionLinear model02 engineering and technologyOptical character recognitionRecommender systemcomputer.software_genreTask (project management)Human–computer interactionUser intent modeling020204 information systems0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesWeb navigationcomputerProactive information retrieval050107 human factorsReal-world tasks
researchProduct

Novel Combinatorial and Information-Theoretic Alignment-Free Distances for Biological Data Mining

2010

Among the plethora of alignment-free methods for comparing biological sequences, there are some that we have perceived as representative of the novel techniques that have been devised in the past few years and as being of a fundamental nature and of broad interest and applicability, ranging from combinatorics to information theory. In this chapter, we review these alignment free methods, by presenting both their mathematical definitions and the experiments in which they are involved in.

Settore INF/01 - InformaticaComputer scienceAlignment-free distances for biological sequenceBiological data miningData miningcomputer.software_genrecomputer
researchProduct

A Fuzzy One Class Classifier for Multi Layer Model

2009

The paper describes an application of a fuzzy one-class classifier (FOC ) for the identification of different signal patterns embedded in a noise structured background. The classification phase is applied after a preprocessing phase based on a Multi Layer Model (MLM ) that provides a preliminary signal segmentation in an interval feature space. The FOC has been tested on synthetic and real microarray data in the specific problem of DNA nucleosome and linker regions identification. Results have shown, in both cases, a good recognition rate.

Settore INF/01 - InformaticaComputer sciencebusiness.industryFeature vectorPattern recognitionHide markov modelcomputer.software_genreFuzzy logicComputingMethodologies_PATTERNRECOGNITIONMulti Layer Method Nucleosome Positioning BioinformaticsPreprocessorSegmentationData miningArtificial intelligencebusinesscomputerClassifier (UML)Multi layer
researchProduct

Algorithmic paradigms for stability-based cluster validity and model selection statistical methods, with applications to microarray data analysis

2012

AbstractThe advent of high throughput technologies, in particular microarrays, for biological research has revived interest in clustering, resulting in a plethora of new clustering algorithms. However, model selection, i.e., the identification of the correct number of clusters in a dataset, has received relatively little attention. Indeed, although central for statistics, its difficulty is also well known. Fortunately, a few novel techniques for model selection, representing a sharp departure from previous ones in statistics, have been proposed and gained prominence for microarray data analysis. Among those, the stability-based methods are the most robust and best performing in terms of pre…

Settore INF/01 - InformaticaGeneral Computer Sciencebusiness.industryComputer scienceBioinformaticsModel selectionGeneral statisticsMachine learningcomputer.software_genreTheoretical Computer ScienceComputational biologyAnalysis of massive datasetsMachine learningCluster (physics)Algorithms and data structures General statistics Analysis of massive datasets Machine learning Computational biology BioinformaticsAlgorithms and data structuresAlgorithm designArtificial intelligenceCluster analysisbusinessCompleteness (statistics)computerComputer Science(all)Theoretical Computer Science
researchProduct

M-VIF: A machine-vision based on information fusion

2002

The authors describe a new architecture for machine vision, which is based on information fusion approach. Its general design has been developed by using a formal computation model that integrates three main ingredients of the visual computation: the data, the models, and the algorithms. The hardware design and the software environment of M-VIF are also given. The simulation of M-VIF is under development on the HERMIA-machine.

Settore INF/01 - InformaticaMachine visionComputer sciencebusiness.industryComputationMachine learningcomputer.software_genreAbstract machineInformation fusionSoftwareComputer architectureactive vision machine vision image analysis parallel processing.Artificial intelligenceArchitecturebusinesscomputer
researchProduct

Searching the internet for learning materials through didactic indicators

2007

Internet offers a huge amount of didactic materials that can be used in creating new online courses. However, those materials need a deep analysis to understand their context and contents before their potential use. As a consequence, the search of didactic material in internet is often quite tedious and time consuming so the searcher usually limits his/her analysis to the first found web pages . To help users in finding efficiently and timely the most appropriate online materials, we have developed a system, called SAXEF (System for Automatic eXtraction of lEearning object Features), that is capable to automatically extract the didactic indicators (a sort of DNA) of any web page (or group o…

Settore INF/01 - InformaticaMultimediabusiness.industryComputer scienceE-learning (theory)Context (language use)Object (computer science)computer.software_genreUser requirements documentWorld Wide WebSearch engineE-learning Learning Objects Didactic Indicators Metadata ExtractionWeb pagesortThe InternetbusinesscomputerProceedings of the 2007 international conference on Computer systems and technologies - CompSysTech '07
researchProduct

Graph Comparison and Artificial Models for Simulating Real Criminal Networks

2021

Network Science is an active research field, with numerous applications in areas like computer science, economics, or sociology. Criminal networks, in particular, possess specific topologies which allow them to exhibit strong resilience to disruption. Starting from a dataset related to meetings between members of a Mafia organization which operated in Sicily during 2000s, we here aim to create artificial models with similar properties. To this end, we use specific tools of Social Network Analysis, including network models (Barabási-Albert identified to be the most promising) and metrics which allow us to quantify the similarity between two networks. To the best of our knowledge, the DeltaCo…

Settore INF/01 - Informaticabusiness.industryComplex networksContext (language use)Network scienceGraph theoryComplex networkGraph comparisonMachine learningcomputer.software_genreNetwork topologyCriminal networksGraph similarityGraph theorySocial network analysisGraph (abstract data type)Graph matchingArtificial intelligencebusinessResilience (network)Social network analysiscomputer
researchProduct

Speeding up the Consensus Clustering methodology for microarray data analysis

2010

Abstract Background The inference of the number of clusters in a dataset, a fundamental problem in Statistics, Data Analysis and Classification, is usually addressed via internal validation measures. The stated problem is quite difficult, in particular for microarrays, since the inferred prediction must be sensible enough to capture the inherent biological structure in a dataset, e.g., functionally related genes. Despite the rich literature present in that area, the identification of an internal validation measure that is both fast and precise has proved to be elusive. In order to partially fill this gap, we propose a speed-up of Consensus (Consensus Clustering), a methodology whose purpose…

Settore INF/01 - Informaticalcsh:QH426-470Computer scienceResearchApplied MathematicsStability (learning theory)InferenceApproximation algorithmcomputer.software_genreNon-negative matrix factorizationIdentification (information)lcsh:GeneticsComputingMethodologies_PATTERNRECOGNITIONComputational Theory and Mathematicslcsh:Biology (General)Structural BiologyConsensus clusteringBenchmark (computing)Data mininginternal validation measures data mining microarray data NMFCluster analysiscomputerMolecular Biologylcsh:QH301-705.5Algorithms for Molecular Biology
researchProduct

MAC design on real 802.11 devices: From exponential to Moderated Backoff

2016

In this paper we describe how a novel backoff mechanism called Moderated Backoff (MB), recently proposed as a standard extension for 802.11 networks, has been prototyped and experimentally validated on a commercial 802.11 card before being ratified. Indeed, for performance reasons, the time critical operations of MAC protocols, such as the backoff mechanism, are implemented into the card hardware/firmware and cannot be arbitrarily changed by third parties or by manufacturers only for experimental reasons. Our validation has been possible thanks to the availability of the so called Wireless MAC Processor (WMP), a prototype of a novel wireless card architecture in which MAC protocols can be p…

Settore ING-INF/03 - Telecomunicazionibusiness.industryFirmwareWireless ad hoc networkComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences050801 communication & media studies020206 networking & telecommunicationsTime critical02 engineering and technologyDistributed coordination functioncomputer.software_genreExponential functionComputer Networks and Communication0508 media and communicationsFormal languageMedia Technology0202 electrical engineering electronic engineering information engineeringWirelessbusinesscomputerComputer network2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
researchProduct

Human-to-Human Interaction: The Killer Application of Ubiquitous Computing?

2017

Twenty-five years past the Weiser’s vision of Ubiquitous Computing, and there is not a clear understanding of what is or is not a pervasive system. Due to the loose boundaries of such paradigm, almost any kind of remotely ac-cessible networked system is classified as a pervasive system. We think that that is mainly due to the lack of killer applications that could make this vi-sion clearer. Actually, we think that the most promising killer application is already here, but we are so used to it that we do not see it, as a perfect fitting of the Weiser’s vision: the Human-to-Human Interaction mediated by com-puters.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazioni020203 distributed computingUbiquitous computingSettore INF/01 - InformaticaComputer scienceSocial Factor02 engineering and technologyComputer-Mediated Communicationcomputer.software_genreUbiquitous Computing; Social Factors; Computer-Mediated CommunicationUbiquitous ComputingHuman interactionHuman–computer interaction020204 information systems0202 electrical engineering electronic engineering information engineeringOperating systemcomputer
researchProduct