In real world, expert search is not just only name matching. Since each kind of people has their own features, we try two methods to judge whether the person we have found is more likely to be an expert. One method is...
详细信息
In real world, expert search is not just only name matching. Since each kind of people has their own features, we try two methods to judge whether the person we have found is more likely to be an expert. One method is to determine the role of a person by the context of the pages;the other is to judge the authority of a person by the forms of pages where he appears considering the structure of the Intranet. The evaluation results show these new methodologies have been helpful to improve the performance of the expert search on TREC 08 queries.
Unlinkability describes the inability of an observer to decide whether certain items of interest are related or not. Privacy aware protocol designers need a consistent and meaningful unlinkability measure to asses pro...
详细信息
ISBN:
(纸本)9781605582894
Unlinkability describes the inability of an observer to decide whether certain items of interest are related or not. Privacy aware protocol designers need a consistent and meaningful unlinkability measure to asses protocols in face of different attacks. In this paper we show that entropy measures are not sufficient for measuring unlinkability. We propose an alternative measure that estimates the error made by an attacker. We show by example that our expected distance provides a consistent measure that offers a better estimation of message-unlinkability. Copyright 2008 ACM.
The increasing test-data volumes needed for the testing of system-on-chip (SOC) lead to long test times and high memory requirements. We present an analysis to highlight the fact that the impact of a test-data compres...
详细信息
Microaggregation is an important technique to the k-anonymized datasets. However, most existing microaggregation algorithms to achieving k-anonymity have some defects on distance measurement for categorical and mixed ...
详细信息
This paper describes the motivation and learning subsystems of Arisco which is a mechatronic head with interactive capacity which includes high expressivity through gesturing, voice recognition, text to speech generat...
详细信息
ISBN:
(纸本)9781424420575
This paper describes the motivation and learning subsystems of Arisco which is a mechatronic head with interactive capacity which includes high expressivity through gesturing, voice recognition, text to speech generation, visual tracking, and internet information retrieval. The general architecture is first described in the paper. Then, the learning capacity of Arisen is addressed. It learns and performs associations between different stimulus responses through several dynamic neural networks, guided by motivational drives. A number of experiments are discussed, covering stimulus competition, habituation, classical and operant conditioning.
The tools for power system analysis should have at least a time-domain simulation program, a steady state analysis program, and data base system for those data. This paper introduces the process of development of thes...
详细信息
The interest to incorporate mobile devices into Grid systems has arisen with two main purposes. The first one is to enrich users of these devices while the other is that of enriching the own Grid infrastructure. Secur...
详细信息
ISBN:
(纸本)9789898111524
The interest to incorporate mobile devices into Grid systems has arisen with two main purposes. The first one is to enrich users of these devices while the other is that of enriching the own Grid infrastructure. Security of these systems, due to their distributed and open nature, is considered a topic of great interest. A formal approach to security in the software life cycle is essential to protect corporate resources. However, little attention has been paid to this aspect of software development. Due to its criticality, security should be integrated as a formal approach into the software life cycle. We are developing a methodology of development for secure mobile Grid computing based systems that helps to design and build secure Grid systems with support for mobile devices directed by use cases and security use cases and focused on service-oriented security architecture. In this paper, we will present one of the first steps of our methodology consisting of analyzing security requirements of mobile grid systems. This analysis will allow us to obtain a set of security requirements that our methodology must cover and implement.
This paper is about multiple-F0 tracking and the estimation of the number of harmonic source streams in music sound signals. A source stream is understood as generated from a note played by a musical instrument. A not...
详细信息
ISBN:
(纸本)9789512295173
This paper is about multiple-F0 tracking and the estimation of the number of harmonic source streams in music sound signals. A source stream is understood as generated from a note played by a musical instrument. A note is described by a hidden Markov model (HMM) having two states: the attack state and the sustain state. It is proposed to first perform the tracking of F0 candidates using a high-order hidden Markov model, based on a forward-backward dynamic programming scheme. The propagated weights are calculated in the forward tracking stage, followed by an iterative tracking of the most likely trajectories in the backward tracking stage. Then, the estimation of the underlying source streams is carried out by means of iteratively pruning the candidate trajectories in a maximum likelihood manner. The proposed system is evaluated by a specially constructed polyphonic music database. Compared with the frame-based estimation systems, the tracking mechanism improves significantly the accuracy rate.
The requirements elicitation process is that which is the most critical in software development. For this reason it is necessary to train professionals in the skills needed to confront this process. Traditionally this...
详细信息
In this work we evaluate the impact of interference caused by concurrent transmissions of neighboring stations on the performance of quickest detection schemes for detection of back-off misbehavior in the IEEE 802.11 ...
详细信息
暂无评论