Complex business networks such as supply chains, withcross-organizational workflows of even greater complexity,are becoming increasingly common. The problem of engineeringcross-organizational processes in a manner tha...
详细信息
Our ability to collect, manage and analyze vast amounts of data has led some to predict the demise of theory. This has important implications for research in agent systems. It can mean that specifications of agent int...
详细信息
A stress test methodology aimed at increasing chances of discovering faults related to network traffic in distributed systems is presented. The technique uses the UML 2.0 model of the distributed system under test, au...
详细信息
ISBN:
(纸本)1595933751
A stress test methodology aimed at increasing chances of discovering faults related to network traffic in distributed systems is presented. The technique uses the UML 2.0 model of the distributed system under test, augmented with timing information, and is based on an analysis of the control flow in sequence diagrams. It yields stress test requirements that are made of specific control flow paths along with time values indicating when to trigger them. Different variants of our stress testing technique already exist (they stress different aspects of a distributed system) and we focus here on one variant that is designed to identify and to stress test the system at the instant when data traffic on a network is maximal. Using a real-world distributed system specification, we design and implement a prototype distributed system and describe, for that particular system, how the stress test cases are derived and executed using our methodology. The stress test results indicate that the technique is significantly more effective at detecting network traffic-related faults when compared to test cases based on an operational profile. Copyright 2006 ACM.
We study the problem of approximating all-pair distances in a weighted undirected graph with differential privacy, introduced by Sealfon [Sea16]. Given a publicly known undirected graph, we treat the weights of edges ...
详细信息
This paper reports on the construction and validation of fault-proneness prediction models in the context of an object-oriented, evolving, legacy system. The goal is to help QA engineers focus their limited verificati...
详细信息
ISBN:
(纸本)1595932186
This paper reports on the construction and validation of fault-proneness prediction models in the context of an object-oriented, evolving, legacy system. The goal is to help QA engineers focus their limited verification resources on parts of the system likely to contain faults. A number of measures including code quality, class structure, changes in class structure, and the history of class-level changes and faults are included as candidate predictors of class fault-proneness. A cross-validated classification analysis shows that the obtained model has less than 20% of false positives and false negatives, respectively. However, as shown in this paper, statistics regarding the classification accuracy tend to inflate the potential usefulness of the fault-proneness prediction models. We thus propose a simple and pragmatic methodology for assessing the cost-effectiveness of the predictions to focus verification effort. On the basis of the cost-effectiveness analysis we show that change and fault data from previous releases is paramount to developing a practically useful prediction model. When our model is applied to predict faults in a new release, the estimated potential savings in verification effort is about 29%. In contrast, the estimated savings in verification effort drops to 0% when history data is not included. Copyright 2006 ACM.
Given two data matrices X and Y, Sparse canonical correlation analysis(SCCA) is to seek two sparse canonical vectors u and v to maximize the correlation between Xu and Yv. Classical and sparse Canonical correlation ...
详细信息
Given two data matrices X and Y, Sparse canonical correlation analysis(SCCA) is to seek two sparse canonical vectors u and v to maximize the correlation between Xu and Yv. Classical and sparse Canonical correlation analysis(CCA) models consider the contribution of all the samples of data matrices and thus cannot identify an underlying specific subset of samples. We propose a novel Sparse weighted canonical correlation analysis(SWCCA),where weights are used for regularizing different *** solve the L0-regularized SWCCA(L0-SWCCA) using an alternating iterative algorithm. We apply L0-SWCCA to synthetic data and real-world data to demonstrate its effectiveness and superiority compared to related methods. We consider also SWCCA with different penalties like Least absolute shrinkage and selection operator(LASSO)and Group LASSO, and extend it for integrating more than three data matrices.
A novel image deblurring method based on high-order non-local range Markov Random Field (NLR-MRF) prior is proposed in the paper. NLR-MRF provides an effective framework to model the statistical prior of natural image...
详细信息
A novel image deblurring method based on high-order non-local range Markov Random Field (NLR-MRF) prior is proposed in the paper. NLR-MRF provides an effective framework to model the statistical prior of natural images and leads to excellent performance in the application of image denoising and inpainting. Moreover, the framework will be extended to image deblurring in our work. Instead of commonly used maximum a-posteriori (MAP) estimation, which has several shortcomings, the high-order NLR-MRF prior is integrated into Bayesian minimum mean squared error (MMSE) estimation framework. Then, an efficient Gibbs sampling algorithm is adopted to compute MMSE estimation. The proposed method frees the user from determining regularization parameter beforehand, which relies on unknown noise level. We perform experiments on synthetic and real-world data to demonstrate the effectiveness of our method. Both quantitatively and qualitatively evaluations show superior or comparable results to the state-of-art deblurring methods.
Pen-based user interfaces which leverage the affordances of the pen provide userswith more flexibility and natural interaction. However, it is difficult to construct usable pen-baseduser interfaces because of the lack...
详细信息
Pen-based user interfaces which leverage the affordances of the pen provide userswith more flexibility and natural interaction. However, it is difficult to construct usable pen-baseduser interfaces because of the lack of support for their development. Toolkit-level support has beenexploited to solve this problem, but this approach makes it hard to gain platform independence,easy maintenance and easy extension. In this paper a context-aware infrastructure is created,called WEAVER, to provide pen interaction services for both novel pen-based applications andlegacy GUI-based applications. WEAVER aims to support the pen as another standard interactivedevice along with the keyboard and mouse and present a high-level access interface to pen *** employs application context to tailor its service to different applications. By modeling theapplication context and registering the relevant action adapters, WEAVER can offer services,such as gesture recognition, continuous handwriting and other fundamental ink manipulations, toappropriate applications. One of the distinct features of WEAVER is that off-the-shelf GUI-basedsoftware packages can be easily enhanced with pen interaction without modifying the existing *** this paper, the architecture and components of WEAVER are described. In addition, examplesand feedbacks of its use are presented.
Analysis and design by contract allows the definition of a formal agreement between a class and its clients, expressing each party's rights and obligations. Contracts written in the Object Constraint Language (OCL...
详细信息
In the field of image-based drug discovery, capturing the phenotypic response of cells to various drug treatments and perturbations is a crucial step. This process involves transforming high-throughput cellular images...
详细信息
In the field of image-based drug discovery, capturing the phenotypic response of cells to various drug treatments and perturbations is a crucial step. This process involves transforming high-throughput cellular images into quantitative representations for downstream analysis. However, existing methods require computationally extensive and complex multi-step procedures, which can introduce inefficiencies, limit generalizability, and increase potential errors. To address these challenges, we present PhenoProfiler, an innovative model designed to efficiently and effectively extract morphological representations, enabling the elucidation of phenotypic changes induced by treatments. PhenoProfiler is designed as an end-to-end tool that processes whole-slide multi-channel images directly into low-dimensional quantitative representations, eliminating the extensive computational steps required by existing methods. It also includes a multi-objective learning module to enhance robustness, accuracy, and generalization in morphological representation learning. PhenoProfiler is rigorously evaluated on large-scale publicly available datasets, including over 230,000 whole-slide multi-channel images in end-to-end scenarios and more than 8.42 million single-cell images in non-end-to-end settings. Across these benchmarks, PhenoProfiler consistently outperforms state-of-the-art methods by up to 20%, demonstrating substantial improvements in both accuracy and robustness. Furthermore, PhenoProfiler uses a tailored phenotype correction strategy to emphasize relative phenotypic changes under treatments, facilitating the detection of biologically meaningful signals. UMAP visualizations of treatment profiles demonstrate PhenoProfiler’s ability to effectively cluster treatments with similar biological annotations, thereby enhancing interpretability. These findings establish PhenoProfiler as a scalable, generalizable, and robust tool for phenotypic learning, offering transformative advancement
暂无评论