This paper presents the design of a low-noise capacitively-coupled instrumentation amplifier with a sub-1V power supply, which is suitable for low-power sensor data acquisition systems. This amplifier is part of an An...
详细信息
Many new attacks targeting web applications have been showing up one after another. However, when implementing a new vulnerability detection technique, the existing vulnerability scanners impose a burdensome task of m...
详细信息
Many new attacks targeting web applications have been showing up one after another. However, when implementing a new vulnerability detection technique, the existing vulnerability scanners impose a burdensome task of modifying source code and installing many auxiliary functions. In this paper, we introduce the design of Amberate;a web vulnerability scanner that alleviates the burden of them and makes it easier to develop a new vulnerability detection technique.
Project size, as measured by the amount of investment required, is a relevant parameter to be used in project selection. The evaluation of a project portfolio must consider the variety of project sizes that may be met...
详细信息
ISBN:
(纸本)9781509002078
Project size, as measured by the amount of investment required, is a relevant parameter to be used in project selection. The evaluation of a project portfolio must consider the variety of project sizes that may be met, so that a proper model should be adopted to describe that variety, especially for its use in simulation. In this paper, a log-normal probability model is suggested to describe the dispersion of project sizes within a project portfolio. The model is obtained on the basis of two real datasets spanning over ten years of observations, and after comparison with competing Gamma and Pareto models. The parameters of the log-normal model are provided as resulting from the best-fit procedure, and indications are also given for the values to use in a simulation study.
During the COVID-19 pandemic, the use of a people tracking system could have been crucial, particularly in sensitive environments, such as hospitals. DPPL Hallway Tracker is a framework that uses security camera foota...
详细信息
We present a factor analysis method that accounts for possible temporal misalignment of the factor loadings across the population of samples. Our main hypothesis is that the data contains a subset of variables with si...
详细信息
In order for Semantic Web applications to be successful a key component should be their ability to take advantage of rich content descriptions in meaningful ways. Reasoning consists a key part in this process and it c...
详细信息
ISBN:
(纸本)9781424467013;9780769540191
In order for Semantic Web applications to be successful a key component should be their ability to take advantage of rich content descriptions in meaningful ways. Reasoning consists a key part in this process and it consequently appears at the core of the Semantic Web architecture stack. From a practical point of view however, it is not always clear how applications may take advantage of the knowledge discovery capabilities that reasoning can offer to the Semantic Web. In this paper we present and survey current methods that can be used to integrate inference-based services with such applications. We argue that an important decision is to have reasoning tasks logically and physically distributed. To this end, we discuss relevant protocols and languages such as DIG and SPARQL and give an overview of our Knowledge Discovery Interface. Further, we describe the lessons-learned from remotely invoking reasoning services through the OWL API.
Content providers are often accused of free riding by exploiting the network to distribute their content without sharing their revenues with the network providers. In order to assess the correctness of such an accusat...
详细信息
Content providers are often accused of free riding by exploiting the network to distribute their content without sharing their revenues with the network providers. In order to assess the correctness of such an accusation, we set up a game-theoretical model, where content providers releasing their contents for free and under the payment of a usage-based charge are both present. In this model, the network provider charges both content providers a usage-based charge (network charge) as well. The network provider and the paid content provider act as the players, using the respective retail prices as strategic leverages. Both the cases where network charges are set by the network provider and by a regulatory authority are examined. The Nash equilibrium is determined in a closed form. In a typical scenario, the solution represented by zero network charges maximizes both the network provider's revenues and the social welfare: free riding for content providers appears as the best choice under both the viewpoints of the selfish network provider and the regulatory authority.
There has been a surge in interest in developing accurate and efficient illness prediction models to help in early diagnosis and treatment planning in recent years. Despite innovations in deep learning techniques, the...
详细信息
In public vs. private solutions (i.e. Cloud vs. In-house, or leased vs. Owned) for storage, both alternatives have their pros and cons. Cloud storage can easily adapt to the company needs, but exhibits a higher unit c...
详细信息
In public vs. private solutions (i.e. Cloud vs. In-house, or leased vs. Owned) for storage, both alternatives have their pros and cons. Cloud storage can easily adapt to the company needs, but exhibits a higher unit cost than in-house solutions. On the other hand, if the company relies on its own storage equipment, it must periodically purchase it on the basis of forecasts, which may prove imprecise and lead to idle equipment. In this paper, we propose a comparative evaluation tool for the two procurement approaches, where the cloud can play the role of either exclusive storage medium or supplement to in-house equipment (in the case of underestimation of storage needs). The tool considers the impact of equipment acquisition intervals and forecast accuracy over a long time horizon, adopting a Geometric Brownian Motion model for the evolution of storage capacity needs, it can be employed as a decision support tool for procurement decisions.
In this work, we present a unified model that can handle both Keyword Spotting and Word Recognition with the same network architecture. The proposed network is comprised of a non-recurrent CTC branch and a Seq2Seq bra...
详细信息
暂无评论