The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over the years, system calls (syscalls) have become an increasingly popular data source for host intrusion detection systems (HIDS). This is partly due to their strong security semantic implications. As syscalls conform to a program's control-flow graph, a deviation in a syscall sequence may imply a deviation in a program's control-flow graph. This is useful for detecting the control-flow hijacking...
Meeting the communication needs of individuals requires an understanding of the contexts where they use materials. Addressing this objective requires an understanding of the complex contexts in which patients use such materials. A modified version of script theory can address such situations.
Modern organizations are challenged to understand and put in action latest procedures and rules in order to constantly improve their service quality while coping with quickly changing contexts and decreasing resources. Such are defined by means of several kind of models that are in general quite interrelated. In this paper, we propose a Learning Architecture using Zachman Framework that allows us...
Recent advances in sample efficient reinforcement learning algorithms in quasi-deterministic environments highlight the requirement for computationally inexpensive visual representations. Here we investigate non-parametric dimensionality reduction techniques based on random linear transformations and we provide empirical evidence on the importance of high-variance projections using sparse random matrices...
The paper aims to identify the elements that make possible the appearance of emergent properties in organizations structured as social networks, considered as adaptive multi-agent complex systems. The dynamics of these communities (referring primarily to the increasing number of members who interact) was analyzed by the specific rules of scale-free networks growth and the specific principles of multi-agent...
Product Line (PL) configuration practices have been employed by industries as a mass customization process. However, due to the NP-hard nature of the process, performance concerns start to be an issue when facing large-scale configuration spaces. The aim of my doctoral research is therefore to propose an efficient collaborative-based recommender system that provides accurate and scalable solutions...
The contextual bandits can be viewed as a generalization of online classification models, where only the chosen class is observed. The selection of learning experts allows to find the best parametrization of an expert during its learning, within a set of predefined parameters, and reduces the bias of the hypothesis space, and hence improves the performances. As the contextual bandits learn, their...
Managing variability is a hard task for every technique that develops variability-rich systems, such as software product lines (SPL), especially in its evolution. Hence, to be effective a technique should provide stability and respect the Open-Closed principle. Among the techniques to develop SPLs, delta-oriented programming (DOP) seems to be promising given its flexibility. There are two strategies...
In High Performance Computing, heterogeneity is now the normwith specialized accelerators like GPUs providing efficientcomputational power. The added complexity has led to the developmentof task-based runtime systems, which allow complex computations to beexpressed as task graphs, and rely on scheduling algorithms to performload balancing between all resources of the platforms. Developing goodscheduling...
We present Nswap2L-FS, a fast, adaptable, and heterogeneous storage system for backing file data in clusters. Nswap2L-FS particularly targets backing temporary files, such as those created by data-intensive applications for storing intermediate results. Our work addresses the problem of how to efficiently and effectively make use of heterogeneous storage devices that are increasingly common in clusters...
Refactoring edits are very common during agile development. Due to their inherent complexity, refactorings are know to be error prone. In this sense, refactoring edits require validation to check whether no behavior change was introduced. A valid way for validating refactorings is the use of automatically generated regression test suites. However, although popular, it is not certain whether the tools...
This paper describes a program organized by the INCOSE Academic Council to determine future directions in systems engineering (SE) research. This program uses a framework coupling societal need to systems challenges, then to gaps in the capabilities of SE, which inform the direction of future SE research. The results of the first workshop are presented including a description of the grand challenges...
It is a valuable study for Location-based Social Network (LBSN) make a moreaccurate Points-of-Interest (POI) recommendation since that can improve users'experiences. There have been many methods of POIs recommendation that consider context, personal preference pattern, and/or matrix factorization. However, the continuouscontexts have not been thoroughly considered in these methods. This paper first...
A generalized sequential probability ratio test (GSPRT) is a classical algorithm for binary sequential hypothesis testing. Though it is well-studied in the literature, there has been no optimal design of this test due to the difficulty of choosing its thresholds. In this paper we formulate the binary sequential hypothesis testing as an optimization problem. The latter is non-convex, and finding a...
Recent MPEG video compression standards are still block-based: blocks of pixels are sequentially coded using spatial or temporal prediction schemes. For each block, a vector of coding parameters has to be selected. In order to limit the complexity of this decision, independence between blocks is assumed, and coding parameters are locally optimized to maximize the coding efficiency. Few studies have...
As part of an ongoing research into extracting mission-critical information from Search and Rescue speech communications, a corpus of unscripted, goal-oriented, two-party spoken conversations has been designed and collected. The Sheffield Search and Rescue (SSAR) corpus comprises about 12 hours of data from 96 conversations by 24 native speakers of British English with a southern accent. Each conversation...
We propose a technique based on symbolic execution for analyzing the algorithmic complexity of programs. The technique uses an efficient guided analysis to compute bounds on the worst-case complexity (for increasing input sizes) and to generate test values that trigger the worst-case behaviors. The resulting bounds are fitted to a function to obtain a prediction of the worst-case program behavior...
At the current time, there are several fundamental changes in the way computing systems are being developed, deployed and used. They are becoming increasingly large, heterogeneous, uncertain, dynamic and decentralised. These complexities lead to behaviours during run time that are difficult to understand or predict. One vision for how to rise to this challenge is to endow computing systems with increased...
This paper presents an investigation into the changing nature of user involvement in Information System Development (ISD) projects. This analysis shows the representative papers that have been published on user involvement in ISD projects and identifies areas requiring further investigation and research. Considering different project contexts the need for a new approach where an ISD project is steeped...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.