this paper proposes a solution based on programming-by-demonstration supporting the definition of rules for configuring the behaviour of Virtual Reality environments by end users. the interface allows end users to rec...
详细信息
the proceedings contain 6 papers. the topics discussed include: layer activation mechanism for asynchronous executions in JavaScript;explicit tool support for implicit layer activation;modeling flexible monitoring sys...
ISBN:
(纸本)9781450399869
the proceedings contain 6 papers. the topics discussed include: layer activation mechanism for asynchronous executions in JavaScript;explicit tool support for implicit layer activation;modeling flexible monitoring systems with a role-based control loop;guard the cache: dispatch optimization in a contextual role-oriented language;generating virtual scenarios for cyber ranges from feature-based context-oriented models: a case study;and a step toward programming with versions in real-world functional languages.
A variety of colorful patterns can be found in life. they play an important role in housing decoration, landscape design, clothes design, etc. these simple elements make up the pattern. they are grouped together in a ...
详细信息
Most countries have come up with varied data privacy regulations. Some countries have stringent data storage and processing regulations, while others allow conditional data transfer across borders. For enterprises wit...
详细信息
ISBN:
(纸本)9781665460873
Most countries have come up with varied data privacy regulations. Some countries have stringent data storage and processing regulations, while others allow conditional data transfer across borders. For enterprises with geographically distributed data sources (users), it becomes challenging to select cloud data centers that meet data regulations and have minimal overall operational costs. In this work, we propose a joint optimization model for the selection of storage and processing services from multiple cloud service providers, taking into practical consideration of data regulations and tiered pricing, which has not been addressed in the prior art. To solve this hard multi-objective combinatorial optimization problem, we propose a greedy cost-reductionbased algorithm. the proposed algorithm gives multiple nondominating solutions, which are on average 2.5% away from the optimal solution. Further, we demonstrate the implications of data regulations and the benefits of joint optimization.
KSP is an imperative DSL in music production that enables realistic modelling of musical instruments in real-time using Kontakt as a runtime environment. Once a niche topic for hobbyists, the field has since professio...
详细信息
ISBN:
(纸本)9798400719950
KSP is an imperative DSL in music production that enables realistic modelling of musical instruments in real-time using Kontakt as a runtime environment. Once a niche topic for hobbyists, the field has since professionalized, with Kontakt becoming an industry standard. Its scripting language, however, has not evolved much, lacking modern functional and data abstractions while remaining closed-source. this paper proposes transformations that introduce modularity and basic abstraction principles to KSP. this entails functions with parameters and return values, recursive data types, and the implementation of lexical scope to replace the current global variable management. the transformations have been implemented in a preprocessing compiler framework--preceding the actual KSP interpreter--to an extend, that allows for the new syntax elements to be used in real-world KSP scripts.
the ability to autonomously detect a physical fall is one of the many enabling technologies towards better independent living. this work explores how genetic programming can be leveraged to develop machine learning pi...
详细信息
ISBN:
(纸本)9781450396318
the ability to autonomously detect a physical fall is one of the many enabling technologies towards better independent living. this work explores how genetic programming can be leveraged to develop machine learning pipelines for the classification of falls via EEG brainwave activity. Eleven physical activities (5 types of falls and 6 non-fall activities) are clustered into a binary classification problem of whether a fall has occurred or not. Wavelet features are extracted from the brainwaves before machine learning models are explored and tuned for better k-fold classification accuracy, precision, recall, and F1 score. Results show that solutions discovered through genetic programming can detect falls with a mean accuracy of 89.34%, precision of 0.883, recall of 0.908, and an F1-Score of 0.895 from EEG brainwave data alone. All three genetic programming solutions chose a further step of Principal Component Analysis for additional feature extraction from the computed wavelet features, each with iterated powers of 6, 3, and 7, and all with a randomised Singular Value Decomposition approach. the best model is finally analysed via the Receiver Operating Characteristic and Precision-Recall curves. Python code for each of the genetic programming pipelines are provided.
the paper concerns the development of the authoring application called AlgoPoint, which supports high school students in the process of learning programming. AlgoPoint is a block-based flowchart editor. It separates t...
详细信息
programming microcontrollers involves low level interfacing with hardware and peripherals that are concurrent and reactive. Such programs are typically written in a mixture of C and assembly using concurrent language ...
详细信息
ISBN:
(纸本)9781450386753
programming microcontrollers involves low level interfacing with hardware and peripherals that are concurrent and reactive. Such programs are typically written in a mixture of C and assembly using concurrent language extensions (like FreeRTOS tasks and semaphores), resulting in unsafe, callback-driven, error-prone and difficult-to-maintain code. We address this challenge by introducing SenseVM - a bytecode-interpreted virtual machine that provides a message passing based higher-order concurrency model, originally introduced by Reppy, for microcontroller programming. this model treats synchronous operations as first-class values (called Events) akin to the treatment of first-class functions in functional languages. this primarily allows the programmer to compose and tailor their own concurrency abstractions and, additionally, abstracts away unsafe memory operations, common in shared-memory concurrency models, thereby making microcontroller programs safer, composable and easier-to-maintain. Our VM is made portable via a low-level bridge interface, built atop the embedded OS - Zephyr. the bridge is implemented by all drivers and designed such that programming in response to a software message or a hardware interrupt remains uniform and indistinguishable. In this paper we demonstrate the features of our VM through an example, written in a Caml-like functional language, running on the nRF52840 and STM32F4 microcontrollers.
In recent years, Online Social Networks (OSN) have become popular content-sharing environments. Withthe emergence of smartphones with high-quality cameras, people like to share photos of their life moments on OSNs. T...
详细信息
ISBN:
(纸本)9781665460903
In recent years, Online Social Networks (OSN) have become popular content-sharing environments. Withthe emergence of smartphones with high-quality cameras, people like to share photos of their life moments on OSNs. the photos, however, often contain private information that people do not intend to share with others (e.g., their sensitive relationship). Solely relying on OSN users to manually process photos to protect their relationship can be tedious and error-prone. therefore, we designed a system to automatically discover sensitive relations in a photo to be shared online and preserve the relations by face blocking techniques. We first used the Decision Tree model to learn sensitive relations from the photos labeled private or public by OSN users. then we defined a face blocking problem and developed a linear programming model to optimize the tradeoff between preserving relationship privacy and maintaining the photo utility. In this paper, we generated synthetic data and used it to evaluate our system performance in terms of privacy protection and photo utility loss.
Impairment in pragmatic language is one of the most noticeable symptoms of autism spectrum disorders (ASD). Abnormal activity in the inferior frontal gyrus (IFG), a critical language area associated with pragmatic mea...
详细信息
暂无评论