Change detection of XML data has emerged as an important research issue in the last decade, however the majority of change detection algorithms focuses on XML documents rather than schemas. This is because documents t...
详细信息
ISBN:
(纸本)9781479914449
Change detection of XML data has emerged as an important research issue in the last decade, however the majority of change detection algorithms focuses on XML documents rather than schemas. This is because documents that contain data are deemed more significant than the schema itself. This paper looks at the problem from a different perspective by maintaining XML schema (XSD) changes and providing a more meaningful description of the detected changes. Our proposed algorithm XS-Diff uses the technique of storing XML Schema versions in a relational database where the detection and storage of delta changes are employed on relational tables. We demonstrate the correctness of the proposed algorithm through a set of synthetic data. Also, our experimental results show that XS-Diff, is a more meaningful method than other change detection methods for providing deltas that are optimal or near-optimal and semantically correct.
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ...
详细信息
The proper composition of activities is important for the efficient execution of a workflow process. In this paper, an approach is presented that utilizes the data-flow underlying a workflow process to determine the i...
详细信息
The development of personalized recommendation systems has been an interesting research topic after the rapid evolution in social networking sites. In this paper, we propose a recommendation system using Learning auto...
详细信息
The development of personalized recommendation systems has been an interesting research topic after the rapid evolution in social networking sites. In this paper, we propose a recommendation system using Learning automata (LA) and sentiment analysis. LA is used to optimize the recommendation score produced by the proposed system using sentiment analysis. The proposed Learning Automata-Based Sentiment Analysis System (LASA) recommends the places nearby the current location of the users by analyzing the feedback from the places and thus calculating the score based on it. Experiments performed by us indicate that by using LA, we can improve the performance of the proposed system, and, thus, help a user to find a specific location according to the need.
In this paper, we describe an optimization method based on differential evolution (DE). It shows good convergence properties with few parameters. However, the appropriate selection of the parameters is a difficult tas...
详细信息
ISBN:
(纸本)9781479909964
In this paper, we describe an optimization method based on differential evolution (DE). It shows good convergence properties with few parameters. However, the appropriate selection of the parameters is a difficult task. Hence, we here analyze the performance indexes of the DE algorithm to set the control parameters. Moreover, to identify the best parameter intervals, the DE approach is first compared to two different Particle Swarm Optimization (PSO) algorithms and then to a recent adaptive genetic algorithm (DABGA). The optimization of benchmark functions shows that the DE algorithm performs better than PSO and DABGA methods.
In this paper we will describe a modification of the matrix factorization (MF) algorithm which allows visualizing the user and item characteristics. When applying MF for collaborative filtering, we get a model that re...
详细信息
Human Mobility Models (HMMs) have become increasingly relevant in different application domains including networks designed for data dissemination protocols. Most existing HMMs consider the temporal and spatial featur...
详细信息
Human Mobility Models (HMMs) have become increasingly relevant in different application domains including networks designed for data dissemination protocols. Most existing HMMs consider the temporal and spatial features of human mobility. In addition, many recent HMMs based on social networks have begun to take into account social factors, which naturally influence the results of the HMMs. Unfortunately, these mobility models do not focus on the impact of several important social factors that can affect a person's actions, such as language, citizenship, and culture. This paper introduces a hybrid human mobility model that integrates social behavior, cultural and language factors into HMMs in order to measure their effect on human mobility, as well as temporal and spatial features. Results demonstrate the feasibility of the proposed model.
The software Assurance Metrics and Tool Evaluation (SAMATE) project at the National Institute of Standards and Technology (NIST) has organized four Static Analysis Tool Expositions (SATE). SATE is designed to advance ...
详细信息
ISBN:
(纸本)9781479929269
The software Assurance Metrics and Tool Evaluation (SAMATE) project at the National Institute of Standards and Technology (NIST) has organized four Static Analysis Tool Expositions (SATE). SATE is designed to advance research in static analysis tools that find security-relevant defects in source code. Briefly, participating tool makers run their tools on a set of programs. Researchers led by NIST analyze the tool outputs. The results and experiences are reported at a workshop. These expositions have accumulated large amounts of data. This collection allowed for the development and validation of practical metrics in regard to static analysis tool effectiveness and independence. In this paper, we discuss the role of the data in determining which metrics can be derived. Specifically, we detail the three characteristics test data should exhibit and explain why the data we use express each combination of two out of these three properties.
There are diverse factors involved in the transmission of live video over internet. These factors have direct impact on the quality of the transmitted video. The underlying protocol, encapsulation method and the choic...
详细信息
ISBN:
(纸本)9781467349901
There are diverse factors involved in the transmission of live video over internet. These factors have direct impact on the quality of the transmitted video. The underlying protocol, encapsulation method and the choice of video codec are the, key factors involved in the transmission of video over streaming network. Up to our knowledge various studies have been performed to analyze the impact of these factors individually on the quality of video transmission however their joint impact on video transmission is not yet done. In this paper we characterize the performance of live video streaming setup, while keeping in view the effect of stack-protocol, encapsulation method and the underlying video codec on delay as the key investigating parameter. The results obtained while considering diverse video streaming setups are provided in the results section of this paper. More specifically, it was observed that stack (http, mjpeg, mjpeg) performs best and stack (mms, asf, wmv1) perform worst.
When reusable software elements are defined in the requirements phase, this raises a number of issues for the measurement of their functional size, when a reusable element implements a business rule or a business sub ...
详细信息
When reusable software elements are defined in the requirements phase, this raises a number of issues for the measurement of their functional size, when a reusable element implements a business rule or a business sub process, for example. A case study is presented with project functional size measurement data to illustrate the impact of reuse on the resulting size and to determine criteria of reuse effectiveness and efficiency.
暂无评论