The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today internet has become easily accessible which allows the user to perform multiple tasks such as access information, do study, make friends, online shopping, search for anything they want and many more. Similarly people do use internet to know the better options and find out relevant alternatives of product, services, places like wise. But searching for better choices may become frustrating and...
In cybercrime, the evaluation results of the weight of digital evidence are directly influencing the cognizance of the relevant case, further influencing the judgment of the case. Now, it lacks a universally accepted standard to evaluate the weight of digital evidence. Furthermore, the result of the evaluation will be easily influenced by experts. A system, which is based on Naive Bayesian Classification,...
Since network analysis has been a formal topic in Operations Research as well as in Reliability, researchers may need to validate their models or theories with large scale feasible networks for test. This paper proposes an algorithm to generate a large scale capacitated/uncapacitated flow network for applications. Conventionally, NETGEN is employed for such purposes. But this program is about 30 years...
This paper discusses an optimal maintenance policy for a parallel system with periodic inspection. The system is composed of several units which have an independent and identical distribution. When the number of failed unit exceeds a threshold level, the system incurs a loss cost per unit of time from a failure to the next inspection. When the next inspection finds the failure, the system is overhauled,...
Even though trust plays a significant role during decision-making in open collaborative environments, still end-user trust mechanisms have not be deployed in the EGEE grid computing setting. In this paper, we conduct a preliminary investigation on the integration of the trust paradigm in that environment, with a special focus on achieving end-user trust in an intuitive and practical manner.
A common technique in coevolution aimed at improving reliability is the use of an archive. Recent research has shown that within coevolutionary problem domains, there is an implicit set of informative dimensions which structures the evaluation space for individuals. According to above research, in this paper we propose a novel archive algorithm, which adopts a simple and feasible dimension extracting...
The article discusses the problem of zero-failure data with Weibull distribution. Using the convex and concave property of the distribution functions. We give the relation about failure-probability Pi (i = 1, 2,...,m) in time ti. Basing on the relationship. We obtain Bayesian estimation about Pi in time ti and estimate the distribution's parameter. At last, we compute for actual data and analyze it.
The existing trust evaluation system do not provide adequate support to cope with quick change in users' behavior and falsification, so a new model based on time-frame is introduced. The model takes into account the impact of the time factor to the trust evaluation. There are four parameters in computing credibility: evaluation credibility, short-time-trust, long-time-trust, and cumulative-negative-trust...
This paper describes the critical (feared) scenarios derivation tool ESA_PetriNet (Extraction Scenarios Algorithm from Petri Net) available from : http://www.laas.fr/ESA. ESA_PetriNet allows to derive scenarios leading to critical (feared) situation in embedded systems. The system model is given by a Petri net. To derive critical scenarios and to avoid the state space explosion, the solution is to...
This paper proposes a new image based CAPTCHA test, activity recognition CAPTCHA. In this test the user is presented with a set of distorted images depicting a randomly chosen activity. The user has to recognize the common activity associated with the images and annotate it from a given list of activities to pass the test. The user studies indicate that this CAPTCHA can be solved with 99.04% average...
There is recent evidence that males and females view robots differently, from the way robots are conceptualized, to the way humans respond when they interact with them. In this paper, we further explore gender-based differences in human-robot interaction. Moreover, we provide the first available evidence for sex-related differences in reactions to gendered synthetic voices that are either disembodied...
This study focuses on users' satisfactions and behavioral intentions of using self-service technology (Kiosk). Both the constructs of technology readiness (TR) and computer self-efficacy (CSE) have been studied independently for the prediction power of technology usage; however, we still don't know which one has the stronger linkage with the behavioral intentions of use of self-service technology...
Automatic inference of affect relies on representative data. For viable applications of such technology the use of naturalistic over posed data has been increasingly emphasised. Creating a repository of naturalistic data is however a massively challenging task. We report results from a data collection exercise in one of the most significant application areas of affective computing, namely computer-based...
In order to solve the problem of trust in C2C e-commerce better, a history and future information based trust model is proposed in this paper. In this model the historical evaluation and future information are all considered. Thus, the entitiespsila historical behaviors are reflected in the trust value, and the starvation effect is prevented effectively. Based on the research achievements of trust...
As the Web application is world wide used, system' s performance, especially reliability, becomes more significant. Traditional performance testing tools such as QA Load and LoadRunner will generate the stress data with the fixed scale. But in the real time, network traffic is model-based. We focus on generating test data to simulate network traffic accurately for Web application reliability testing...
In order to conform to the real world systems such as distribution systems and supply chain management system, we assume the capacity of each arc in the quickest path problem is stochastic (multi-state). In this study, we propose a simple algorithm to evaluate the probability that d units of data can be sent from the source node to the sink node through the multi-state quickest path flow network within...
The consistency test between prior information and field information using parametric method is investigated. A method to compute fitting goodness is presented. The case when there are multi-source prior information is discussed. Based on the fitting goodness, a new method is provided to determine the weighting factor of each prior distribution. Corresponding analysis is performed, when the product...
Situation assessment becomes more and more popular accompanies the development of information fusion. Event is very important for situation assessment as a basic situation element. But the existing event detection technology can't satisfy the need of situation assessment. A framework of comprehending events from text for situation assessment is proposed. In this framework, events are not only extracted...
In this paper, we design a improved FTP search engine model which is introduced on the basis of customer feedback information and made server reliability, practical resources, customer neighboring degrees weighted standard in order to ensure that when the search results are too large, in front of the display is always excellent resources.
An ideal system should be usable and secure. However, increasing the security of a system often makes its use more cumbersome and less efficient. This tradeoff between usability and security poses major challenges for system designers. System security may be impaired when users override or ignore security features to facilitate the use of the system. Little empirical data are available on user behavior...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.