Automatically analysing games is an important challenge for automated game design, general game playing, and cocreative game design tools. However, understanding the nature of an unseen game is extremely difficult due...
详细信息
ISBN:
(纸本)9781728118840
Automatically analysing games is an important challenge for automated game design, general game playing, and cocreative game design tools. However, understanding the nature of an unseen game is extremely difficult due to the lack of a priori design knowledge and heuristics. In this paper we formally define hyperstate space graphs, a compressed form of state space graphs which can be constructed without any prior design knowledge about a game. We show how hyperstate space graphs produce compact representations of games which closely relate to the heuristics designed by hand for search-based AI agents;we show how hyperstate space graphs also relate to modern ideas about game design;and we point towards future applications for hyperstates across game AI research.
This paper presents a model for the application of agile requirements engineering. The literature review made it possible to identify the requirements elicitation process based on standards such as capability maturity...
详细信息
Due to organic synthesis achievements, the amount of data and knowledge in organic chemistry grows exponentially. Despite the existence of diverse software and information products, there is a need for high-quality in...
详细信息
In the present information age, providing correct information to the query with a limited concept is a challenging task. The modern adaptive Information Retrieval (IR) system is needed to provide valid information. On...
详细信息
ISBN:
(数字)9781728152493
ISBN:
(纸本)9781728152509
In the present information age, providing correct information to the query with a limited concept is a challenging task. The modern adaptive Information Retrieval (IR) system is needed to provide valid information. Ontology-based on IR can provide a better solution. Ontology is a perception of shared conceptualization, represented by classes, properties, and objects. Ontology mapping offers a solution to integrate inter-domain knowledge. This paper presents a method for using ontologies to handle inter-domain query in information retrieval. Using ontology in IR for Query Expansion (QE) and document ranking seems to be the ultimate goal. The Multi-Domain Specific Ontology Mapping (MDOM) proposes the concepts derived from ontology for query expansion and information retrieval. The result shows the improvement in terms of better document ranking.
Machine learning improves the development of self-adaptive systems, i.e., to react to unforeseen situations. However, state-of-the-art smart home platforms lack the ability to integrate machine learning models directl...
详细信息
ISBN:
(纸本)9781728151250
Machine learning improves the development of self-adaptive systems, i.e., to react to unforeseen situations. However, state-of-the-art smart home platforms lack the ability to integrate machine learning models directly into their knowledge base. While there are machine learning approaches for smart home environments, they are usually not integrated nor represented in the middleware of smart environments. Instead, they rely on data obtained previously and use it in a form prepared for a single use case. To remedy this, our aim is to extend existing middleware platforms to integrate machine learning algorithms as first-class concepts of the knowledge base. To achieve this, we employ relational Reference Attribute Grammars to design and implement an integrated runtime model, where machine learning models can be represented and related to elements of the extended knowledge base, e.g., physical entities, location, users, and activities. Consequently, this enables using a state-of-the-art middleware to build a self-adaptive system, which integrates machine learning algorithms enabling both context-awareness and self-awareness. To showcase the feasibility of our approach, we implemented a small smart home scenario using openHAB as a middleware, in which the system learns the preferences of a user using neural networks.
Background: software architecture is a crucial while significantly challenging topic in the computer science curriculum. Although “learning by doing” is widely advocated to address this topic's abstract and fuzz...
详细信息
ISBN:
(数字)9781450371247
ISBN:
(纸本)9781728165257
Background: software architecture is a crucial while significantly challenging topic in the computer science curriculum. Although “learning by doing” is widely advocated to address this topic's abstract and fuzzy nature, educators are still facing various difficulties in practice, especially including students' vicious circle of inexperience and the mental model dilemma in experiential learning. Aims: To help break the aforementioned vicious circle and mental model dilemma, this work aims to investigate our educational strategy of using lightweight projects with public and free PaaS resources (1) to help students accumulate architectural experience from the early stage and (2) to facilitate strengthening students' fundamental architecture knowledge. Method: To collect more empirical evidence, we conducted action research on our educational strategy across three undergraduatecurriculum courses for two years. In particular, we employed the Technology Acceptance Model (TAM) to validate how well students received such an educational strategy. Results: The students involved in the relevant coursework generally gave positive feedback with respect to learning theoretical concepts and a set of architectural patterns. Meanwhile, we also observed diverse learning curves for utilizing PaaS resources. Conclusions: Although there still exist PaaS-related limits, our educational strategy can foster students' experiential learning and collaborative learning in fundamental architecture courses. We believe that there are also potentials to extend our work to broader and advanced courses of software architecture.
With the development of information-based and intelligent system of Chinese highway, traffic accident prevention is an important application of road traffic safety research. To solve the safety hazard caused by freque...
详细信息
software application is heavily being used by today's business operations. However as of the fact, it is no software application in the market can guarantee that it has no software defect escaped during the releas...
详细信息
ISBN:
(纸本)9783030303297;9783030303280
software application is heavily being used by today's business operations. However as of the fact, it is no software application in the market can guarantee that it has no software defect escaped during the release. Whenever software application error arises, it can be the cause happened either within the software application layer or any other factor outside the software application layer. The root cause analysis activity becomes more complex in such situation as the analysis activity involves multiple layers. Time consuming is increased to identify the valid error. It leads to the entire analysis duration which can be easily prolonged. This arises the problem statement that, the duration of root cause analysis on software application error carries crucial impact to the service restoration. The objective is to create a logic model to conduct decision making process. This process includes the identification of the root cause in a more accurate manner, and shorten the duration of root cause analysis activity. The design of Analytic Hierarchy Process (AHP) hierarchy will depend on the software application errors and other involved errors found from different layers. These errors become the participants. The participants can be grouped further based on the error categories. Once the hierarchy is constructed, the participants analyze it through a series of pairwise comparisons that derive numerical scales of measurement for the nodes. Then, the priorities are associated with the nodes, and the nodes carry weights of the criteria or alternatives. based on the priority, the valid error and the preferred resolution can be decided. Many past researches in AHP had been conducted, however there is a knowledge gap of AHP in software application error analysis. Therefore, a Prescriptive Analytical Logic Model (PAL) incorporates with AHP into the proposed algorithm is suggested. This logic model would contribute a new knowledge in the area of log file analysis to shorten the tot
After a developer submits code, corresponding test cases arise to ensure the quality of software delivery. Test failures would occur during this period, such as crash, error, and timeout. Since it takes time for devel...
详细信息
ISBN:
(数字)9781728177359
ISBN:
(纸本)9781728177366
After a developer submits code, corresponding test cases arise to ensure the quality of software delivery. Test failures would occur during this period, such as crash, error, and timeout. Since it takes time for developers to resolve them, many duplicate failures will happen during this period. In the delivery practice of SAP HANA, crash triaging is considered as the most timeconsuming task. If duplicate crash failures can be automatically identified, the degree of automation will be significantly enhanced. To find such duplicates, we propose a training-based mathematical model that utilizes component information of SAP HANA to achieve better crash similarity comparison. We implement our approach in a tool named K-Detector (knowledge-based Detector), which is verified by 11,208 samples and performs 0.986 in AUC (Area Under ROC Curve). Furthermore, we apply KDetector to the production environment, and it can save 97% human efforts in crash triage as statistics.
The preventive approach of software security is the basis of what is referred to as secure by design. The principle is to avoid vulnerabilities as soon as the system is designed. Several research work are aimed to thi...
详细信息
ISBN:
(纸本)9781728145389
The preventive approach of software security is the basis of what is referred to as secure by design. The principle is to avoid vulnerabilities as soon as the system is designed. Several research work are aimed to this objective. Most of them rely on empirical studies which need a realistic corpus. This corpus holds applications with different vulnerabilities and others without any known vulnerability. To the best of our knowledge, such a security corpus does not exist. In this paper, we present a novel approach based on an automatic annotation process to build a security corpus for real Java applications. Our approach takes advantage of several existing code scanners in order to annotate the corpus. We applied our process of vulnerability annotation on a well-known corpus, namely Qualitas Corpus, from the softwareengineering research community. We provide the resulting security corpus, namely SecureQualitas, to the research community. The experiments we conducted demonstrate that our approach gives better results than the scanners taken alone.
暂无评论