Hosting over 10 million repositories, Github becomes the largest open source community in the world. Besides sharing code, Github is also a social network, in which developers can follow others or keep track of their ...
详细信息
A two dimensional graph is a powerful method for representing a set of objects that usually appears in many sources of literature. Numerous efforts have been made to discover image semantics based on contents of liter...
详细信息
the ability to create succinct programs is a central criterion for comparing programming and specification methods. Specifically, approaches to concurrent programming can often be thought of as idioms for the composit...
详细信息
the proceedings contain 16 papers. the special focus in this conference is on Formal methods, Machine learning, Cloud and passwords, Measurements and ontologies and Access control. the topics include: Formal verificat...
ISBN:
(纸本)9783319156170
the proceedings contain 16 papers. the special focus in this conference is on Formal methods, Machine learning, Cloud and passwords, Measurements and ontologies and Access control. the topics include: Formal verification of liferay RBAC;formal verification of privacy properties in electric vehicle charging;unwinding based model-checking and testing for non-interference on EFSMs;state-continuous transfer of state in protected-module architectures;are your training datasets yet relevant? an investigation into the importance of timeline in machine learning-based malware detection;learning how to prevent return-oriented programming efficiently;re-thinking kernelized MLS database architectures in the context of cloud-scale data stores;optimising multi-cloud deployments with security controls as constraints;towards an inverted cloud;faster password guessing using an ordered markov enumerator;the heavy tails of vulnerability exploitation;benchmarking indistinguishability obfuscation - a candidate implementation;a security ontology for security requirements elicitation;producing hook placements to enforce expected access control policies;improving reuse of attribute-based access control policies using policy templates and monitoring database access constraints with an RBAC metamodel.
Device-to-Device communication is discussed for future mobile communication systems. In this work, an upper bound capacity limit is determined for a mobile communication system consisting of Device-to-Device and cellu...
详细信息
ISBN:
(纸本)9783319269252;9783319269245
Device-to-Device communication is discussed for future mobile communication systems. In this work, an upper bound capacity limit is determined for a mobile communication system consisting of Device-to-Device and cellular users is determined. therefore, we formulate the problem as a linear program and solve it optimally. the potential of Device-to-Device communication is evaluated using a distance based mode selection scheme. It is shown that the amount of traditional cellular users is influencing the optimal distance for using Device-to-Device communication instead of traditional cellular transmission. the optimisation potential is then analysed for a different amount of users and cell sizes.
the proceedings contain 280 papers. the topics discussed include: comparing decoding performance between functionally defined neural populations;hybrid Fnirs-EEG based discrimination of 5 levels of memory load;sequent...
ISBN:
(纸本)9781467363891
the proceedings contain 280 papers. the topics discussed include: comparing decoding performance between functionally defined neural populations;hybrid Fnirs-EEG based discrimination of 5 levels of memory load;sequential power per area optimization of multichannel neural recording interface based on dual quadratic programming;towards improvement of MI-BCI performance of subjects with BCI deficiency;a collaborative brain-computer interface for improving group detection of visual targets in complex natural environments;movement related directional tuning from broadband electrocorticography in humans;influence of external cues on synchronized brain-computer interface based on movement related cortical potentials;a brain-to-SONAR electronic interface to bypass peripheral auditory system in RATS;an implantable, rechargeable neuromodulation research tool using a distributed interface and algorithm architecture;and event-related potentials induced by cuts in feature movies and their exploitation for understanding cut efficacy.
the proceedings contain 31 papers. the topics discussed include: towards web application mobilization via efficient web control extraction;a study on power side channels on mobile devices;a study on power side channel...
ISBN:
(纸本)9781450336413
the proceedings contain 31 papers. the topics discussed include: towards web application mobilization via efficient web control extraction;a study on power side channels on mobile devices;a study on power side channels on mobile devices;enhancing defect prediction with static defect analysis;towards a novel approach for defect localization based on part-of-speech and invocation;detecting buggy files based on bug reports: a random walk based approach;evaluating bug severity using crowd-based knowledge: an exploratory study;cross-project software defect prediction using feature-based transfer learning;exploring the use of @-mention to assist software development in Github;and GEMiner: mining social and programming behaviors to identify experts in Github.
this study aimed to present an application of Material Flow Cost Accounting (MFCA) to discover loss in the process and dynamic programming in decision making of improvement solutions. the research focused on internal ...
详细信息
the proceedings contain 25 papers. the special focus in this conference is on Biomedical Electronics and Devices. the topics include: A complex challenge turned into an important clinical tool;simple fabrication metho...
ISBN:
(纸本)9783319261287
the proceedings contain 25 papers. the special focus in this conference is on Biomedical Electronics and Devices. the topics include: A complex challenge turned into an important clinical tool;simple fabrication method of micro-fluidic devices withthick resist flow paths designed arbitrarily using versatile computer aided design tools;design of a wearable remote neonatal health monitoring device;novel wireless systems for telemedicine and body area networks applications;impact of threshold computation methods in hardware wavelet denoising implementations for neural signal processing;development of concurrent object-oriented logic programming platform for the intelligent monitoring of anomalous human activities;automatic extraction and selection of coherent regions in FDG-PET images;model based quantification of tissue structural properties using optical coherence tomography;formulation of homeostasis by realisability on linear temporal logic;interaction-based aggregation of mRNA and miRNA expression profiles to differentiate myelodysplastic syndrome;a computational pipeline to identify new potential regulatory motifs in melanoma progression;empirical study of domain adaptation algorithms on the task of splice site prediction;automatic extraction of highly predictive sequence features that incorporate contiguity and mutation;exploring expiratory flow dynamics to understand chronic obstructive pulmonary disease;velar movement assessment for speech interfaces;observer design for a nonlinear minimal model of glucose disappearance and insulin kinetics;comparison of angle measurements between integral-based and quaternion-based methods using inertial sensors for gait evaluation and using illumination changes to synchronize eye tracking in visual paradigms.
this paper investigates an inverse conductive-convective problem working on a hybrid differential evolution-nonlinear programming (DE-NLP) algorithm. thermophysical parameters such as the thermal conductivity and the ...
详细信息
ISBN:
(纸本)9781467380836
this paper investigates an inverse conductive-convective problem working on a hybrid differential evolution-nonlinear programming (DE-NLP) algorithm. thermophysical parameters such as the thermal conductivity and the heat transfer coefficient have been estimated for satisfying a given temperature distribution. the objective function to be minimized is represented by the least squares of error between the randomly-guessed and the exact temperature distributions. the estimations have been found to be in good agreement. Results show that DE-NLP algorithm successfully estimates various possible combinations of thermal conductivity and heat transfer coefficient which satisfy the given temperature distribution.
暂无评论