A combination of closed sequential pattern mining and closed itemset pattern mining was proposed to mine closed multidimensional sequential patterns. There are two ways for this combination; (1) mining closed itemset ...
详细信息
A combination of closed sequential pattern mining and closed itemset pattern mining was proposed to mine closed multidimensional sequential patterns. There are two ways for this combination; (1) mining closed itemset patterns from multidimensional information followed by mining closed sequential patterns from sequences associated with closed itemset patterns, and (2) mining closed sequential patterns from sequences followed by mining closed itemset patterns from multidimensional information associated with closed sequential patterns. In the first way the major cost is mining all sequences associated with closed itemset patterns. A similar problem occurs with the second way, the major cost is mining all multidimensional information associated with closed sequential patterns. Therefore, this paper proposes two new combinations that don't need to mine all sequences in the first combination, and all multidimensional information in the second combination. Both combinations can be effected by exploiting two concepts. In the first combination, any closed sequential patterns associated with a closed itemset patten I can be found from a set of closed sequential patterns associated with a closed itemset pattern I' if I sup I'. In the second combination, any closed itemset patterns associated with a closed sequential pattern s can be found from a set of closed sequential patterns associated with a closed itemset pattern s' if s sup s'.
Working Group 3 at ITiCSE 2007 continued the ongoing work of the Ontology of Computing project. The working group brought several new people into the project and addressed areas of the ontology of particular interest ...
详细信息
ISBN:
(纸本)9781450378420
Working Group 3 at ITiCSE 2007 continued the ongoing work of the Ontology of Computing project. The working group brought several new people into the project and addressed areas of the ontology of particular interest to these participants. In particular, the group worked on the Ontology sections related to History of Computing, Computing Security and Social and Ethical issues. With the intention of applying the ontology to the support of curriculum development in mind, the group also reviewed and discussed proposed means of presenting a visual representation of the ontology. There was also some work on the present structure of the ontology and future possibilities.
Bloom's taxonomy of the cognitive domain and the SOLO taxonomy are being increasingly widely used in the design and assessment of courses, but there are some drawbacks to their use in computer science. This paper ...
详细信息
ISBN:
(纸本)9781450378420
Bloom's taxonomy of the cognitive domain and the SOLO taxonomy are being increasingly widely used in the design and assessment of courses, but there are some drawbacks to their use in computer science. This paper reviews the literature on educational taxonomies and their use in computer science education, identifies some of the problems that arise, proposes a new taxonomy and discusses how this can be used in application-oriented courses such as programming.
Application of domain engineering approaches, which represents the basis for establishing product lines, normally subsumes a stable and well understood domain. This may prevent many projects from gaining a benefit of ...
详细信息
Application of domain engineering approaches, which represents the basis for establishing product lines, normally subsumes a stable and well understood domain. This may prevent many projects from gaining a benefit of the organized development for reuse enabled by domain engineering techniques. This article explores how to develop the architecture of a domain under a change. The approach is based on a thorough exploration of well-understood part of the domain by the means of feature and use case modeling. This is followed by a generalization of the use case view and interactive development of the subsystem and component view. The approach is illustrated by examples from the project on knowledge management whose development part is performed concurrently with the ongoing research activities.
In this paper, we address the issue of concept instantiation in feature modeling with respect to binding time. We explain the impact of such instantiation on applying constraints among features expressed in feature di...
详细信息
Feature modeling is an important approach to dealing with variability at an abstract level in a hierarchical manner extensively used in software product lines. For its use in conjunction with other UML models and MDA ...
详细信息
ISBN:
(纸本)9783885791829
Feature modeling is an important approach to dealing with variability at an abstract level in a hierarchical manner extensively used in software product lines. For its use in conjunction with other UML models and MDA approach, it is important to correctly integrate feature modeling into UML. In this paper, we present an approach to integrating feature modeling into UML that respects abstractness of feature modeling elements. This is achieved by deriving feature modeling elements from the deeper levels of the UML metamodel. We applied this approach to the essential elements of feature modeling in the cardinality-based Czarnecki-Eisenecker notation and selected elements specific to other notations. Since UML modeling tools do not support such modifications of the UML metatmodel, in order to facilitate experimentation with combining elements from different notations, we implemented this feature modeling extension as a UML profile (in Enterprise Architect and Omondo UML).
Ontologies change and evolve both on the level of schema and individuals in order to meet requirements of changing world. Changes involve adding, deleting and modifying elements in the ontology both on structural (sch...
详细信息
ISBN:
(纸本)1595934359
Ontologies change and evolve both on the level of schema and individuals in order to meet requirements of changing world. Changes involve adding, deleting and modifying elements in the ontology both on structural (schema related) and content (individuals related) levels. The changes can lead to incorrect conclusions and can cause malfunction of systems, which use ontology data. In this paper we describe a proposal of the method for automated detection of currentness of presented data, including meta-data, which are represented by an ontology. Method comes out from a detection of changes between different versions of the ontology. Besides identifying modifications in the ontology, the purpose of the method lies also in identifying equivalent elements, thanks to which we are able to track information sources over time. We describe possibilities of automated identification of changes between ontologies using heuristic methods and their realization as a software tool called OntoDiff for comparing ontologies.
Adaptive Web-based applications deal with an adaptation of information presentation (the content or navigation) employing goals and other characteristics of a user or context of the presentation. By increasing the num...
详细信息
Adaptive Web-based applications deal with an adaptation of information presentation (the content or navigation) employing goals and other characteristics of a user or context of the presentation. By increasing the number of existing adaptive applications the need for more effective creating and sharing the content among adaptive systems rises. In this paper, we present a method aimed at creating the content represented by ontology and exporting it into existing adaptive application. The ontology includes a domain model and domain dependent part of a user model. We evaluated the method using the domain ontology of teaching programming by examples. We claim that the content and structure of the adaptive application represented by the ontology is suitable for sharing and reusing when defining new applications
Recent years have seen a large number of proposals for anonymity mechanisms operating on the application layer. Given that anonymity is no stronger than its weakest link, such proposals are only meaningful if one can ...
详细信息
Recent years have seen a large number of proposals for anonymity mechanisms operating on the application layer. Given that anonymity is no stronger than its weakest link, such proposals are only meaningful if one can offer anonymity guarantees on the communication layer as well. ANODR - or anonymous on demand routing - is one of the leading proposals to deal with this issue. In this paper, we propose a novel technique to address the same problem, but at a lower cost. Our proposal, which we dub discount-ANODR, is built around the same set of techniques as ANODR is. Our proposal has the benefit of achieving substantially lower computation and communication complexities at the cost of a slight reduction of privacy guarantees. In particular, discount-ANODR achieves source anonymity and routing privacy. A route is "blindly generated" by the intermediaries on the path between an anonymous source and an identified destination. Route requests in discount-ANODR bear strong similarities to route requests in existing source routing protocols, with the limitation that intermediaries only know the destination of the request and the identity of the previous intermediary - but not whether the latter was the originator of the request. The response to a route request protects the compiled route by means of iterated symmetric encryption, drawing on how messages are prepared before being submitted to a typical synchronous mix network (or onion router). The communication of data subsequently uses such "route onions" to channel the packet to the intended destination. We do not use any key exchange, nor do we utilize public key operations at any time; consequently, we do not need to rely on any PKI, CRL or related constructions
Team projects play an important role in the education of engineers. This paper describes a team project module that is part of a postgraduate course in informatics. Its main objective is to give students a hands-on ex...
详细信息
Team projects play an important role in the education of engineers. This paper describes a team project module that is part of a postgraduate course in informatics. Its main objective is to give students a hands-on experience with different aspects of working in a team on a problem. We discuss several issues that should be considered in designing such module as a part of a curriculum: team formation, team communication, team assessment, problem statement and assignment, development process and team supervision. We outline several different alternatives, analyse their pros and cons and describe our approach and related experiences.
暂无评论