The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A fundamental challenge in controlling the leakage of sensitive information by computer systems is the possibility of correlations between different secrets, with the result that leaking information about one secret may also leak information about a different secret. We explore such leakage, here called Dalenius leakage, within the context of the g-leakage family of leakage measures. We prove a fundamental...
To provide the elderly with appropriate and timely caregiving in activities of daily life (ADL), it is desired for robots to have the capability of intention awareness (IA). Different from existing context-specific intention awareness (CSIA) approaches which are based on a limited and passive knowledge database, our approach, named ‘WebIA’, adopts a novel web query approach to establish a vast and...
This paper proposes a data model for the management of information exchanged during trust negotiation. The information exchanged during trust negotiation has been considered to be structured or may be converted to a structured format Uncertainty associated with such information transfer has been modeled as probabilistic data Updating of message has been explained using a particular application domain...
Lack of text data is one of the main issues encountered by Malay speech researchers. Currently, there are few established Malay text corpora to aid in their research. Text corpora are essential due to its ability to provide empirical data for researchers in the field of linguistics and are useful to construct word lists for speech intelligibility test, speech analysis across genders and automatic...
Owing to the opportunistic nature of its operation principle, the performance of Dynamic Spectrum Access/Cognitive Radio (DSA/CR) systems depends on the spectrum occupancy pattern of primary systems. DSA/CR systems can monitor periodically the occupancy state of licensed channels in order to gain statistical information on their occupancy patterns, and exploit this information in decision-making processes...
During dyadic interactions, participants adjust their behavior and give feedback continuously in response to the behavior of their interlocutors and the interaction context. In this paper, we study how a participant in a dyadic interaction adapts his/her body language to the behavior of the interlocutor, given the interaction goals and context. We apply a variety of psychology-inspired body language...
This paper describes an HMM-based speech synthesis that allows dimensional description of emotion as inputs. A spontaneous dialogue speech corpus that was designed for studying paralinguistic phenomena in expressive social interactions was used to train the models, utilizing its emotional state description as additional contextual factors. In the perceptual experiment, a very high correlation was...
The cyber threat landscape is evolving at a much faster rate than corporate cyber defenses are. Malicious actors have become more audacious in their exploit attempts during the past two years as evidenced by the growing number of publicly acknowledged breaches in the commercial and industrial sectors. Motivations range the gamut from “hacktivism” to corporate espionage. This paper will discuss one...
This paper presents empirical studies of test effectiveness for Java database applications. We primarily address two research questions: (1) What is the relationship between test set size, coverage criteria, and test effectiveness for Java/JDBC programs? (2) Which adequacy criterion is more suitable for testing Java database applications, statement coverage, branch coverage, or command form coverage?...
The purpose of an authentication system is to identify and verify incoming authentication requests comparing with some form of (stored) user identity. This stored user profile is at risk of being hacked and exploited by the attackers. The Negative Filtering or Negative Authentication (NA) approach utilizes a form of complement profiles which resembles the censoring and maturation process of T-cells...
Mining actor correlations from TV series enables semantic level video understanding and facilitates users to conduct correlation-based query. In this paper, we introduce a graph-based actor correlations mining framework, which serves as the first attempt for effective actor association presentation and concurrence search. We leverage face detection and tracking to locate actors with 2D-PCA detector...
This paper highlights on different neural networks approaches to solve breast cancer problem. Initially, we introduces problem with physician fatigue and severity of problem across world of taking decision of cancer cell is benign or malignant one. Next, introduces worldwide failure cases of breast cancer with need of neural network to diagnose the problem. Number of researchers did variety of research...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.