The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Attention mechanism advances the neural machine translation (NMT) by reducing the confusion introduced by irrelevant words in long sentences. However, the confusion caused by ambiguous words hasn't been handled yet and it may be a bottleneck for the NMT model. This paper validates the hypothesis and proposes a simple and flexible framework, which enables the NMT model to only focus on the relevant...
Hiring is one of the important challenges in the context of online labor marketplace. Unlike traditional hiring, where workers are hired either as a full time employee or as a contractor, hiring from online marketplaces are done for individual jobs of short duration. As these marketplaces are open for anyone, hiring becomes challenging due to the large number of freelancers applying for a posted job...
The past ten years has seen increasing calls to makesecurity research more "scientific".On the surface, most agree that this is desirable, given universal recognition of "science" as a positive force. However, we find that there is little clarity on what "scientific" means inthe context of computer security research, or consensus onwhat a "Science of Security"...
We propose a technique based on symbolic execution for analyzing the algorithmic complexity of programs. The technique uses an efficient guided analysis to compute bounds on the worst-case complexity (for increasing input sizes) and to generate test values that trigger the worst-case behaviors. The resulting bounds are fitted to a function to obtain a prediction of the worst-case program behavior...
Current studies on software development either focus on the change history of source code from version-control systems or on an analysis of simplistic in-IDE events without context information. Each of these approaches contains valuable information that is unavailable in the other case. Our work proposes enriched event streams, a solution that combines the best of both worlds and provides a holistic...
The release frequency of software projects has increased in recent years. Adopters of so-called rapid release cycles claim that they can deliver addressed issues (i.e., bugs, enhancements, and new features) to users more quickly. However, there is little empirical evidence to support these claims. In fact, in our prior work, we found that code integration phases may introduce delays in rapidly releasing...
Past research has proposed association rule mining as a means to uncover the evolutionary coupling from a system’s change history. These couplings have various applications, such as improving system decomposition and recommending related changes during development. The strength of the coupling can be characterized using a variety of interestingness measures. Existing recommendation engines typically...
The PPM (Prediction by Partial Matching) methods are applied before the lossless compression algorithms, as a preprocessing procedure for the text in order to use efficiently the redundancy. This paper presents 4 compression algorithms preceded by 3 different PPM methods. The compression ratio is studied in relation with the file size, its content, and the context order (the prediction degree). Some...
This paper proposes CPERS, a contextual and personalized event recommender system that exploits overall user preference and context influences to produce recommendations in event-based social networks (EBSNs). Diversely from items in traditional recommendation scenarios (e.g. movies, songs), events in EBSNs are only valid for a short period of time, having no explicit feedback. Therefore the event...
Use of computational methods for exploration and analysis of web archives sources is emerging in new disciplines such as digital humanities. This raises urgent questions about how such research projects process web archival material using computational methods to construct their findings. This paper aims to enable web archives scholars to document their practices systematically to improve the transparency...
It has been shown that automatic speech recognition (ASR) system quality can be improved by augmenting n-gram language models with contextual information [1][2]. In the voice search domain, there are a large number of useful contextual signals for a given query. Some of these signals are speaker location, speaker identity, time of the query, etc. Each of these signals comes with relevant contextual...
This article reviews the state of archival science where basic concepts have been subject to a long stream of criticisms without satisfactory resolution of the issues identified. It establishes a ground for progress by articulating criteria for evaluating archival concepts and proposes a path forward by enriching archival science with concepts and methods from systemic functional linguistics and graph...
Since sequential information plays an important role in modeling user behaviors, various sequential recommendation methods have been proposed. Methods based on Markov assumption are widely-used, but independently combine several most recent components. Recently, Recurrent Neural Networks (RNN) based methods have been successfully applied in several sequential modeling tasks. However, for real-world...
We consider the resolution of the structured stochastic convex program: min equation such that Ax+By = b. To exploit problem structure and allow for developing distributed schemes, we propose an inexact stochastic generalization in which the subproblems are solved inexactly via stochastic approximation schemes. Based on this framework, we prove the following: (i) when the inexactness sequence satisfies...
We are developing a Reading Skill Test (RST), which measures basic language skills relevant to reading (reading skills). In order to make the test maximally useful, we are developing it primarily as a tablet app. To examine the potential effects that tablet-based tests may have in comparison with paper-andpencil- based tests, we conducted an experiment in which 45 undergraduate students were divided...
Life is not necessarily easy, and certainly not predictable, for the inhabitants of the várzea. An analysis of the variables that determine their dynamic adaptation to the diversity implicit in the várzea´s aquatic and terrestrial ecosystems requires both an interdisciplinary and an historical approach. Four of the chapters in this section of the book look at external factors that challenge livelihood...
Nowadays, software developers often utilize existing third party libraries and make use of Application Programming Interface (API) to develop a software. However, it is not always obvious which library to use or whether the chosen library will play well with other libraries in the system. Furthermore, developers need to spend some time to understand the API to the point that they can freely use the...
While researchers develop many new exciting code recommender systems, such as method-call completion, code-snippet completion, or code search, an accurate evaluation of such systems is always a challenge. We analyzed the current literature and found that most of the current evaluations rely on artificial queries extracted from released code, which begs the question: Do such evaluations reflect real-life...
In recent years, social networks developed in terms of diversities, capabilities and users. Therefore, researchers in different fields have been attracted to these kind of networks. Trust management between users in these kind of networks is one of the most important research topics. In this article a new model for evaluating trust between users in social networks based on subjective logic is presented...
Context Integrity Measurement Architecture (CIMA) was inspired by risk assessments used by credit card companies. These assessments flag excursions from “normal” or “typical” behavior. If an excursion exceeds some threshold level, the card companies require additional proof of identity before allowing a transaction to proceed. CIMA generalizes this idea to measure excursions from physical and/or logical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.