The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The hashtag recommendation problem addresses recommending (suggesting) one or more hashtags to explicitly tag a post made on a given social network platform, based upon the content and context of the post. In this work, we propose a novel methodology for hashtag recommendation for microblog posts, specifically Twitter. The methodology, EmTaggeR, is built upon a training-testing framework that builds...
We consider properties of edge-colored vertex-ordered graphs} – graphs with a totally ordered vertex set and a finite set of possible edge colors – showing that any hereditary property of such graphs is strongly testable, i.e., testable with a constant number of queries. We also explain how the proof can be adapted to show that any hereditary property of two-dimensional matrices...
We provide a combinatorial characterization of all testable properties of k-graphs (i.e. k-uniform hypergraphs). Here, a k-graph property P is testable if there is a randomized algorithm which makes a bounded number of edge queries and distinguishes with probability 2/3 between k-graphs that satisfy P and those that are far from satisfying P. For the 2-graph case, such a combinatorial characterization...
Spreadsheets serve as a basis for decision-making processes in many companies and bugs in spreadsheets can therefore represent a considerable risk to businesses. Systematic tests can help to locate such bugs, but providing test cases can be cumbersome and complex for large real-world spreadsheets. To make the specification of test cases easier, we propose to split spreadsheets into smaller logically...
Multi-objective optimization plays an important role when one has fitness functions that are somehow conflicting with each other. Also, parameter-dependent machine learning techniques can benefit from such optimization tools. In this paper, we propose a multi-objective-based strategy approach to build compact though representative training sets for Optimum-Path Forest (OPF) learning purposes. Although...
Massive Open Online Courses (MOOCs) focus on manifold subjects, ranging from social sciences over languages to technical skills, and use different means to train the respective skills. MOOCs that are teaching programming skills aim to incorporate practical exercises into the course corpus to give students the hands-on experience necessary for understanding and mastering programming. These exercises,...
Teach students how to program is the main goal of most introductory CS courses. In fact, programming is one of the basic skills a professional in CS should have. However, there are many difficulties students face when they are learning how to program and, consequently, it is common introductory programming courses have high dropout rates. The purpose of this paper is to identify and discuss the most...
Computer Science 2 is one of the core elements of any computer science program; however, there has been little progress towards the development of a concept inventory for this key introductory course for CS majors. Plans to address this gap using the Delphi method are presented. Instructors and researchers with knowledge and experience of CS2 are being recruited to help identify concepts from CS2...
The controller program is the core of a safety-critical control system. However, the testing of controller program has been facing challenges because of the oracle problem. Since Proportional-Integral-Derivative (PID) controller is the most commonly used controller in the industry, this paper proposes to apply Metamorphic Testing (MT) to test it. Our experimental results show that MT is effective...
The association of wireless clients based on the Received Signal Strength Indication (RSSI) does not necessarily result in better network performance. An Access Point (AP), even presenting high signal level to clients, can be so congested that a new association degrades network performance. By using the Software Defined Wireless Networking (SDWN) paradigm, this work presents a centralized solution...
We study regular expression membership testing: Given a regular expression of size m and a string of size n, decide whether the string is in the language described by the regular expression. Its classic O(nm) algorithm is one of the big success stories of the 70s, which allowed pattern matching to develop into the standard tool that it is today.Many special cases of pattern matching have been studied...
The component-based software development enables to construct applications from reusable components providing particular functionalities and simplifies application evolution. To ensure the correct functioning of a given component-based application and its preservation across evolution steps, it is necessary to test not only the functional properties of the individual components but also the correctness...
Mutation testing of object-oriented programs differs from that of standard (traditional) mutation operators in accordance to the number of generated mutants and ability of tests to kill mutants. Therefore, outcomes of cost reduction analysis cannot be directly transferred from a standard mutation to an object-oriented one. Mutant sampling is one of reduction methods of the number of generated and...
Ambient Assisted Living (AAL) pursues providing an autonomous and satisfactory life to people through technology, independently of their actual conditions. Its developments usually require testing protoypes with real users in Living Labs (LL). This makes projects expensive. Virtual LLs (VLLs) try to address theses issues by using simulations for requirements elicitation and the initial testing of...
Lattice-based cryptography has recently produced several time-efficient cryptosystems that are provably secure under assumptions that are not known to be more easily solvable by quantum computers. An interesting research direction is improving their storage complexity, as current solutions are far from practical with respect to this metric. In this paper we show that program obfuscators for point...
Despite significant research developing myoelectric prosthesis controllers, many amputees have difficulty controlling their devices due in part to reduced sensory feedback. Many attempts at providing supplemental sensory feedback have not significantly aided control. We hypothesize this is because the feedback provided contains redundant information already provided by vision. However, whereas vision...
Combinatorial testing is a widely used technique to detect failures caused by interactions of system under test (SUT) parameters. Faulty interaction localization (FIL) is a problem to locate parameter-value combinations that trigger failures from combinatorial test cases and their testing results. FIL is important for debugging, but is expensive for large test suites and SUTs since the number of candidates...
In this paper, the problem of robust minimax testing of binary composite hypothesis is considered, while the actual probability densities are located in neighborhoods characterized by the Itakura-Saito divergence. And then the existence of a saddle value condition is proved under Sion's minimax theorem. Moreover, we derive the least favorable distributions and the robust decision rule involved four...
Dempster-Shafer theory (DST) is an important theory for information fusion. However, in DST how to determinate the basic belief assignment (BBA) is still an open issue. The interval number based BBA determination method is simple and effective, where the features of different classes' samples are modeled using the interval numbers, i.e., an interval number model is constructed for each focal element...
Essentially, opinion reviews are a valuable and trustworthy source of information for the readers. However, regarding the business purposes, a huge number of deceptive opinions are intentionally posted on the Web. In order to keep opinion reviews as a precious and trusted resource, we propose a method which focuses on detecting positive and negative deceptive opinions. In this paper, we explore the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.