Search results for "computer.software_genre"

showing 10 items of 3858 documents

A Methodology for Graphical Modeling of Business Rules

2011

This work proposes a novel methodology based on the Business Process Modeling Notation (BPMN) standard capable of graphically modeling business rules. A set of new representation patterns allows business analysts to map processes described through BPMN into conditions and actions of business rules. Our approach exploits Domain Specific Language techniques in order to make the methodology independent from the programming language supported by the specific rule engine. Moreover, this work proposes a web graphical editor, instantiated on a specific sample scenario, where the selected rule engine is Drools, one of the most used open source products. The developed editor allows business analysts…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniProgramming languageComputer scienceBusiness ruleArtifact-centric business process modelBusiness processgraphical modelingbusiness ruleBPMNmethodologyweb graphical editorBusiness process modelingcomputer.software_genreBusiness domainrule engineBRMSBusiness rule management systemBusiness Process Model and NotationSemantics of Business Vocabulary and Business Rulescomputer
researchProduct

A Modular Framework for Versatile Conversational Agent Building

2011

This paper illustrates a web-based infrastructure of an architecture for conversational agents equipped with a modular knowledge base. This solution has the advantage to allow the building of specific modules that deal with particular features of a conversation (ranging from its topic to the manner of reasoning of the chatbot). This enhances the agent interaction capabilities. The approach simplifies the chatbot knowledge base design process: extending, generalizing or even restricting the chatbot knowledge base in order to suit it to manage specific dialoguing tasks as much as possible.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniProgramming languagebusiness.industryComputer sciencecomputer.internet_protocolmedia_common.quotation_subjectService-oriented architectureModular designcomputer.software_genreChatbotKnowledge-based systemsKnowledge baseHuman–computer interactionConversational Agents Modular KB Ontology reasoning Semantic SpacesDesign processConversationDialog systembusinesscomputermedia_common
researchProduct

QoS-Aware Fault Detection in Wireless Sensor Networks

2013

Wireless sensor networks (WSNs) are a fundamental building block of many pervasive applications. Nevertheless the use of such technology raises new challenges regarding the development of reliable and fault-tolerant systems. One of the most critical issues is the detection of corrupted readings amidst the huge amount of gathered sensory data. Indeed, such readings could significantly affect the quality of service (QoS) of the WSN, and thus it is highly desirable to automatically discard them. This issue is usually addressed through “fault detection” algorithms that classify readings by exploiting temporal and spatial correlations. Generally, these algorithms do not take into account QoS re…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniQA75Article SubjectComputer Networks and CommunicationsComputer scienceQuality of serviceReal-time computingGeneral EngineeringBayesian networkcomputer.software_genreMulti-objective optimizationFault detection and isolationlcsh:QA75.5-76.95Distributed algorithmData mininglcsh:Electronic computers. Computer scienceWireless Sensor NetworksWireless sensor networkcomputerBlock (data storage)International Journal of Distributed Sensor Networks
researchProduct

Vulnerability evaluation of distributed reputation management systems

2017

In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSecurity attackComputer sciencemedia_common.quotation_subjectVulnerability020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreSet (abstract data type)Parallel simulationTrustworthinessDistributed reputation management020204 information systemsVulnerability evaluation0202 electrical engineering electronic engineering information engineeringData miningCommunications protocolcomputerInstrumentationReputation managementEvaluation metricReputationmedia_common
researchProduct

Fast Training of Self Organizing Maps for the Visual Exploration of Molecular Compounds

2007

Visual exploration of scientific data in life science\ud area is a growing research field due to the large amount of\ud available data. The Kohonen’s Self Organizing Map (SOM) is\ud a widely used tool for visualization of multidimensional data.\ud In this paper we present a fast learning algorithm for SOMs\ud that uses a simulated annealing method to adapt the learning\ud parameters. The algorithm has been adopted in a data analysis\ud framework for the generation of similarity maps. Such maps\ud provide an effective tool for the visual exploration of large and\ud multi-dimensional input spaces. The approach has been applied\ud to data generated during the High Throughput Screening\ud of mo…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSelf-organizing mapSimilarity (geometry)Speedupbusiness.industryComputer scienceQSAR ANALYSISProcess (computing)computer.software_genreMachine learningField (computer science)VisualizationData visualizationSimulated annealingNEURAL-NETWORKSALGORITHMArtificial intelligenceData miningbusinesscomputer2007 International Joint Conference on Neural Networks
researchProduct

Sentence Induced Transformations in Conceptual Spaces

2008

The proposed work illustrates how "primitive concepts" can be automatically induced from a text corpus. The primitive concepts are identified by the orthonormal axis of a "conceptual" space induced by a methodology inspired to the latent semantic analysis approach. The methodology represents a natural language sentence by means of a set of rotations of an orthonormal basis in the "conceptual"space. The rotations, triggered by the sequence of words composing the sentence and realized by means of geometric algebra rotors, allow to highlight "conceptual" relations that can arise among the primitive concepts.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSequenceComputer sciencebusiness.industryLatent semantic analysisChatbots conceptual spaces LSA semantic computingWord processingData_MISCELLANEOUScomputer.software_genreGeometric algebraSemantic role labelingOrthonormal basisArtificial intelligencebusinesscomputerNatural languageNatural language processingSentence
researchProduct

A data association approach to detect and organize people in personal photo collections

2011

In this paper we present a method to automatically segment a photo sequence in groups containing the same persons. Many methods in literature accom- plish to this task by adopting clustering techniques. We model the problem as the search for probable associations between faces detected in subsequent photos con- sidering the mutual exclusivity constraint: a person can not be in a photo two times, nor two faces in the same photo can be assigned to the same group. Associations have been found considering face and clothing descriptions. In particular, a two level architecture has been adopted: at the first level, associations are computed within meaningful temporal windows (situations); at the …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSequenceDigital library Personal photo album Data association Re-identificationInformation retrievalComputer Networks and CommunicationsComputer scienceDigital librarycomputer.software_genreTask (project management)Constraint (information theory)Hardware and ArchitectureData associationFace (geometry)Media TechnologyData miningCluster analysiscomputerSoftware
researchProduct

An extended JADE-S based framework for developing secure Multi-Agent Systems

2009

Agent communities are self-organized virtual spaces consisting of a large number of agents and their dynamic environments. Within a community, agents group together offering special e-services for effective, reliable, and mutual benefits. Usually, an agent community is composed of specialized agents performing one or more tasks in a single domain/sub-domain, or in highly intersecting domains. However, secure Multi- Agent Systems require severe mechanisms in order to prevent malicious attacks. Several limits affect exiting secure agents platform, such as the lack of a strong authentication system, the lack of a flexible distributed mechanism for access control and the lack of a system for st…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniService (systems architecture)AuthenticationPublic key certificateComputer sciencebusiness.industryMulti-agent systemmedia_common.quotation_subjectJADE (programming language)Access controlMulti-Agent Systems Security Biometric Authentication SystemsComputer securitycomputer.software_genreHardware and ArchitectureStrong authenticationbusinessLawcomputerSoftwareComputer networkReputationmedia_commoncomputer.programming_languageComputer Standards & Interfaces
researchProduct

Reputation Management for Distributed Service-Oriented Architectures

2010

Nowadays, several network applications require that consumer nodes acquire distributed services from unknown service providers on the Internet. The main goal of consumer nodes is the selection of the best services among the huge multitude provided by the network. As basic criteria for this choice, service cost and Quality-of-Service (QoS) can be considered, provided that the underlying Service-Oriented Architecture (SOA) be augmented in order to support the declaration of this information. The correct behavior of such new SOA platforms, however, will depend on the presence of some mechanisms that allow consumer nodes to evaluate trustworthiness of service providers. This work proposes a new…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniService (systems architecture)Distributed SOAbusiness.industryComputer sciencecomputer.internet_protocolQuality of servicemedia_common.quotation_subjectMobile QoSService-oriented architectureService providercomputer.software_genreComputer securityQoS-based Service SelectionThe InternetReputation ManagementWeb servicebusinesscomputerComputer networkReputationmedia_common2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop
researchProduct

Medical image registration: Interpolations, similarities and optimizations strategies

2010

This paper presents a study conducted for evaluating different interpolation schemes, similarity metrics and optimization algorithms for the purpose of volumetric medical image registration. Each technique has been implemented to be plugged in a modular system. Rotation, translation and scale error has been measured to obtain a performance evaluation for all of the combinations of the considered techniques. Several experimental tests were conducted for validation both on synthetic and real datasets providing an exhaustive overview of the various strategies used.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSimilarity (geometry)business.industryComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage registrationTranslation (geometry)computer.software_genreHigh-definition videoMedical imagingMeasurement uncertaintyComputer visionMedical Image RegistrationArtificial intelligenceData miningbusinesscomputerRotation (mathematics)Interpolation2010 IEEE 23rd International Symposium on Computer-Based Medical Systems (CBMS)
researchProduct