Image inpainting or completion is a technique to restore a damaged image. Recently various approaches have been proposed. Wavelet transform has been used for various image analysis problems due to its nice multiresolu...
详细信息
This paper proposes an unsupervised approach to automatically interpret noun compounds using semantic similarity. Our proposed unsupervised method is based on obtaining a large amount of robust evidence for NC interpr...
详细信息
ISBN:
(纸本)9781424427802
This paper proposes an unsupervised approach to automatically interpret noun compounds using semantic similarity. Our proposed unsupervised method is based on obtaining a large amount of robust evidence for NC interpretation. In order to obtain evidence sentences for semantic relations (SRs), we first acquired sentences containing both a head noun and its modifier in the form of SR definitions. Then we determined the semantic relations represented in the sentences by looking at the nouns in the test instances (noun mapping) and verbs in the SR definitions (verb mapping). In the noun mapping, we measured the similarity between nouns in test instances and nouns in the collected sentences. In the verb mapping, we mapped the verbs ofsentences onto those in the SR definitions. Finally, we built a statistical classifier to interpret noun compounds and evaluated it over 17 SRs defined in [1].
software Requirements engineering addresses specific challenges which exist in the effort to gain an understanding of the nature of the engineering problem arising from user's real-world needs and desires. This re...
详细信息
ISBN:
(纸本)9788476531440
software Requirements engineering addresses specific challenges which exist in the effort to gain an understanding of the nature of the engineering problem arising from user's real-world needs and desires. This research is aimed at helping software analysts meet these challenges. The proposed methodology forms the basis of the automated process designed to capture the high-level system services and actors from the textual user requirements. This model is intended to serve as a basis for software Use-Case Model development, and can be used by analysts in their in-dept. study of requirements text. The approach is rooted in the syntactical analysis and formalization of text written in natural language, and it is enriched with domain-related information provided by the Expert Comparable Contextual (ECC) models that are extracted from reusable domain-specific data models. We illustrate the applicability of our methodology an order invoicing case study and demonstrate it with a prototype tool. The results of the validation of our methodology prove that such a tool for assisting the elicitation of use-case models from textual requirements is feasible.
The difficulty of writing, reading, and understanding formal specifications is one of the main obstacles in adopting formal verification techniques such as model checking and runtime verification. Introducing concepts...
详细信息
ISBN:
(纸本)9780769531441
The difficulty of writing, reading, and understanding formal specifications is one of the main obstacles in adopting formal verification techniques such as model checking and runtime verification. Introducing concepts in formal methods in an undergraduate program is essential for training a workforce that can develop and test high-assurance systems. This paper presents educational outcomes and outlines an instructive component that can be used in an undergraduate course to teach formal approaches and languages. The component uses a model checker and a specification tool to teach Linear Temporal Logic (LTL), a specification language that is widely used in a variety of verification tools. The paper also introduces a novel technique that analyzes LTL specifications by using the SPIN model checker to elucidate the behaviors accepted by the specifications.
software systems typically comprise multiple components which are developed using different technologies, thus the interoperability that enables the components to interact despite differences in programming languages ...
详细信息
software systems typically comprise multiple components which are developed using different technologies, thus the interoperability that enables the components to interact despite differences in programming languages and execution platforms is becoming a central issue. This paper describes how to use Object-Oriented design patterns to derive a cross-platform interoperability framework for bridging the different technology specific models (PSMs) within the Model Driven Architecture (MDA). In addition, we present a MDA based approach to applying the proposed PSM interoperability framework in an automatic fashion to generate a communication bridge between two PSMs in a multi-agent system.
Degradation in performance has been a common reason for limited use of security in Wireless LAN equipment such as PCs and embedded devices such as PDAs. However, performance has depended in part upon the technical cho...
详细信息
ISBN:
(纸本)9781605580890
Degradation in performance has been a common reason for limited use of security in Wireless LAN equipment such as PCs and embedded devices such as PDAs. However, performance has depended in part upon the technical chosen for encryption, authentication and re-keying. this paper describes the performance analysis and measurement of a range of security levels based variations of WEP, WPA and WPA2 in a variety of LAN architectures. The paper provides an analysis performance measured over a range of experiments run ontestbed and builds upon previous work on performance analysis of earlier wireless network security protocols. Copyright 2008 ACM.
The growth in the popularity of Internet services, increasing of mobile users together with a wide range of access and mobile-networked devices, demands and inter-working of these heterogeneous access . Sometimes refe...
详细信息
ISBN:
(纸本)9781605580890
The growth in the popularity of Internet services, increasing of mobile users together with a wide range of access and mobile-networked devices, demands and inter-working of these heterogeneous access . Sometimes referred to as 4th generation (4G) , the overall objective is to provide a managed Always Connected (ABC) service over underlying heterogonous and mobile platforms while maintaining negotiated and Quality of Service (QoS) in an open and nonproprietary . paper proposes a new model and its architecture which is upon Policy-based Management (PBM) and provides a for the centralised management of networks based on level policies. However, it extends the basic PBM ideas provide a "layered approach" which facilitates the negotiation management services over interconnected heterogonous platforms thus achieving an always best connected . Finally this paper describes a proof-of-concept testbed demonstrates the implementation of this model in practice. Copyright 2008 ACM.
WPANs (Wireless Personal Area Networks) fill an important role in local area network technology complementing traditional IEEE 802.11 Wireless LANs. Bluetooth, ZigBee and NFC (Near Field Communications) have emerged a...
详细信息
ISBN:
(纸本)9781605580890
WPANs (Wireless Personal Area Networks) fill an important role in local area network technology complementing traditional IEEE 802.11 Wireless LANs. Bluetooth, ZigBee and NFC (Near Field Communications) have emerged as the key WPAN technologies. They are however subject to the usual range of security vulnerabilities found in wireless LANs such as spoofing, snooping, man-in-the-middle, denial of service and other attacks. However security in WPANs is not as mature as it is in Wireless LANs and further work is needed in order to provide comparable protection. This paper examines a range of vulnerabilities and security attacks that can be performed on Bluetooth, ZigBee and NFC WPANs and proposes protection mechanisms that can mitigate such risks.
We present a reasoning procedure for ontologies with uncertainty described in Description Logic (DL) which include General TBoxes, i.e., include cycles and General Concept Inclusions (GCIs). For this, we consider the ...
详细信息
Rank order correlation has been used extensively when the data is non-parametric or when the relationship between two variables is nonlinear and monotonic. In such cases, linear correlation measures, such as the produ...
详细信息
ISBN:
(纸本)9781595939913
Rank order correlation has been used extensively when the data is non-parametric or when the relationship between two variables is nonlinear and monotonic. In such cases, linear correlation measures, such as the product-moment coefficient, are inadequate and fail to detect correlative relations. We present a polyhedral indexing technique for rank order correlation queries for time series data. We use an interesting geometry interpretation of rank order correlation which lends itself to indexing by spatial indexes such as R-trees. Our experimental results indicate one to two orders of magnitudes improvement over sequential scan - the only alternative solution.
暂无评论