Search results for "computer.software_genre"

showing 10 items of 3858 documents

Continuum: A spatiotemporal data model to represent and qualify filiation relationships

2013

International audience; This work introduces an ontology-based spatio-temporal data model to represent entities evolving in space and time. A dynamic phenomenon generates a complex relationship network between the entities involved in the process. At the abstract level, the relationships can be identity or topological filiations. The existence of an identity filiation depends on whether the object changes its identity or not. On the other hand, topological filiations are based exclusively on the spatial component, like in the case of growth, reduction, merging or splitting. When combining identity and topological filiations, six filiation relationships are obtained, forming a second abstrac…

spatial dynamicsTheoretical computer sciencefiliationintegrity constraintsSpatio-temporal modelingspatio-temporal evolutionComputer scienceOntology (information science)Object (computer science)computer.software_genreSemantic data modelConsistency (database systems)[ INFO.INFO-HC ] Computer Science [cs]/Human-Computer Interaction [cs.HC]Data modelData integrityI.2.4 [ARTIFICIAL INTELLIGENCE]: Knowledge Representation Formalisms and Methods - Semantic networks. I.2.3 [ARTIFICIAL INTELLIGENCE]: Deduction and Theorem Proving - Inference engines.Identity (object-oriented programming)semanticreasoningData mining[INFO.INFO-HC]Computer Science [cs]/Human-Computer Interaction [cs.HC][INFO.INFO-HC] Computer Science [cs]/Human-Computer Interaction [cs.HC]computerSemantic Web
researchProduct

Leveraging Users' Likes in a Video Streaming P2P Platform

2014

This paper investigates how a p2p television platform can take advantage of the presence of frequent channel viewers to grant them a more satisfying service than to less regular spectators. The idea we explore is to learn beforehand about the users' interests, in order to cluster them in groups that display different behaviors; then, the neighborhood creation strategy and video chunk scheduling algorithm of the overlay is altered, with the aim of serving frequent spectators in a privileged manner, providing them with a faster access to the selected channel without overly penalizing less habitual customers. An analytical model is developed, to capture the difference in startup delay that the…

startup delayWorld Wide WebMultimediaComputer scienceSettore ING-INF/03 - Telecomunicazionip2p streaming FCM clustering startup delayp2p streamingFCM clusteringVideo streamingcomputer.software_genrecomputerprivacy clustering p2p television platform
researchProduct

Inter-annotator agreement in spoken language annotation: Applying uα-family coefficients to discourse segmentation

2021

As databases make Corpus Linguistics a common tool for most linguists, corpus annotation becomes an increasingly important process. Corpus users do not need only raw data, but also annotated data, submitted to tagging or parsing processes through annotation protocols. One problem with corpus annotation lies in its reliability, that is, in the probability that its results can be replicable by independent researchers. Inter-annotation agreement (IAA) is the process which evaluates the probability that, applying the same protocol, different annotators reach similar results. To measure agreement, different statistical metrics are used. This study applies IAA for the first time to the Valencia E…

subactsLinguistics and LanguageComputer scienceProcess (engineering)media_common.quotation_subjectP1-1091computer.software_genreLanguage and LinguisticsSet (abstract data type)Annotationkripendorff’s α-coefficientsCorpus linguisticsConversationSegmentationval.es.co. modelPhilology. Linguisticsmedia_commoninter-annotator agreementParsingbusiness.industrycorpus annotationdiscourse segmentationArtificial intelligencebusinesscomputerNatural language processingSpoken languageRussian Journal of Linguistics
researchProduct

Towards Automated Classification of Firmware Images and Identification of Embedded Devices

2017

Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…

sulautettu tietotekniikkaComputer scienceVendorvulnerability02 engineering and technologycomputer.software_genreSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]tietoturvadata securityhaavoittuvuusbusiness.industryFirmwareFingerprint (computing)020206 networking & telecommunicationsubiquitous computingRandom forestIdentification (information)koneoppiminenmachine learningEmbedded systemUser interfaceHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGbusinesscomputerPrivate network
researchProduct

Automatic surrogate modelling technique selection based on features of optimization problems

2019

A typical scenario when solving industrial single or multiobjective optimization problems is that no explicit formulation of the problem is available. Instead, a dataset containing vectors of decision variables together with their objective function value(s) is given and a surrogate model (or metamodel) is build from the data and used for optimization and decision-making. This data-driven optimization process strongly depends on the ability of the surrogate model to predict the objective value of decision variables not present in the original dataset. Therefore, the choice of surrogate modelling technique is crucial. While many surrogate modelling techniques have been discussed in the liter…

surrogate modellingOptimization problemexploratory landscape analysisbusiness.industryComputer scienceautomatic algorithm selection0102 computer and information sciences02 engineering and technologyMachine learningcomputer.software_genre01 natural sciencesmonitavoiteoptimointiSurrogate modeloptimointi010201 computation theory & mathematicsalgoritmit0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencebusinessClassifier (UML)computer
researchProduct

Generalizability and Simplicity as Criteria in Feature Selection: Application to Mood Classification in Music

2011

Classification of musical audio signals according to expressed mood or emotion has evident applications to content-based music retrieval in large databases. Wrapper selection is a dimension reduction method that has been proposed for improving classification performance. However, the technique is prone to lead to overfitting of the training data, which decreases the generalizability of the obtained results. We claim that previous attempts to apply wrapper selection in the field of music information retrieval (MIR) have led to disputable conclusions about the used methods due to inadequate analysis frameworks, indicative of overfitting, and biased results. This paper presents a framework bas…

ta113Acoustics and UltrasonicsComputer sciencebusiness.industryDimensionality reductionEmotion classificationFeature selectionOverfittingMachine learningcomputer.software_genreNaive Bayes classifierFeature (machine learning)Music information retrievalGeneralizability theoryArtificial intelligenceElectrical and Electronic EngineeringbusinesscomputerIEEE Transactions on Audio, Speech, and Language Processing
researchProduct

Seeking Technical Debt in Critical Software Development Projects : An Exploratory Field Study

2016

In recent years, the metaphor of technical debt has received considerable attention, especially from the agile community. Still, despite the fact that agile practices are increasingly used in critical domains, to the best of our knowledge, there are no studies investigating the occurrence of technical debt in critical software development projects. The results of an exploratory field study conducted across several projects reveal that a variety of business and environmental factors cause the occurrence of technical debt in critical domains. Using Grounded Theory method, these factors are categorized as ambiguity of requirement, diversity of projects, inadequate knowledge management, and res…

ta113Agile usability engineeringKnowledge managementbusiness.industryEmpirical process (process control model)Agile Unified Process020207 software engineering02 engineering and technologySoftware peer reviewcomputer.software_genreExtreme programming practicestechnical debtTechnical debt020204 information systemssoftware development0202 electrical engineering electronic engineering information engineeringLean software developmentbusinessohjelmistokehityscomputerAgile software development
researchProduct

Supporting Agile Development by Facilitating Natural User Interaction with Executable Formal Specifications

2011

Agile development benefits from fast feedback from various stakeholders. If implemented in a suitable way, formal methods can enhance the agile development process. With an executable formal specification, it is possible to analyse and simulate the behaviour of the target system before it is being built. However, for the users' and developers' natural participation in the development process, it is necessary to use a real end-user interface and bind it to the execution environment being used in the simulations and animations. This requires, though, that the execution model used to simulate the specification is appropriately changed to facilitate the use of these user interfaces. The authors…

ta113Agile usability engineeringbusiness.industryComputer scienceProgramming languageAgile Unified ProcessGeneral Medicinecomputer.file_formatFormal methodscomputer.software_genreFormal specificationExecutableUser interfacebusinessSoftware engineeringcomputerExecution modelAgile software developmentACM SIGSOFT Software Engineering Notes
researchProduct

Remote Attestation of Software and Execution-Environment in Modern Machines

2015

The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…

ta113AuthenticationMulti-core processorNetwork securitybusiness.industryComputer sciencesoftwaremedia_common.quotation_subjectDistributed computingTrusted ComputingCertaintyComputer securitycomputer.software_genreVirtualizationVariety (cybernetics)remote attestationSoftwarenetwork securitybusinesscomputermedia_commonexecution-environment
researchProduct

Anomaly detection approach to keystroke dynamics based user authentication

2017

Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…

ta113AuthenticationpääsynvalvontaComputer scienceaccess control02 engineering and technologycomputer.software_genreKeystroke dynamicstodentaminen020204 information systems0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Unsupervised learningauthentication020201 artificial intelligence & image processingAnomaly detectionData miningtietoturvadata securitycomputer
researchProduct