211 results
Search Results
2. A new exceptional book provides insights on conducting research and writing papers in Computer Science
- Subjects
Computer science ,Paper ,Business ,Business, international - Abstract
M2 PRESSWIRE-September 21, 2020-: A new exceptional book provides insights on conducting research and writing papers in Computer Science (C)1994-2020 M2 COMMUNICATIONS RDATE:18092020 Writing a research paper can be a [...]
- Published
- 2020
3. The Allen Institute of Artificial Intelligence (AI2) Adds Over 30 Million Biomedical Papers to Semantic Scholar to Help the Medical Community Fight Information Overload and Save Lives
- Subjects
Artificial intelligence ,Search engines ,Computer science ,Text search and retrieval software ,Internet search software ,Artificial intelligence ,Internet/Web search service ,Business ,Business, international - Abstract
AI2 introduces scientific knowledge graph linking biomedical terms, definitions, and current research papers SEATTLE -- The Allen Institute for Artificial Intelligence (AI2) today announced its AI-based academic search engine, Semantic [...]
- Published
- 2017
4. Paper on Detecting Spearphishing Wins Internet Defense Prize
- Subjects
Natural language processing ,Computer science ,Research institutes ,Education grants ,Phishing ,Banking, finance and accounting industries ,Business ,University of California, Berkeley ,Facebook (Online social network) - Abstract
BERKELEY, Calif., Aug 29, 2017 (GLOBE NEWSWIRE via COMTEX) -- The International Computer Science Institute (ICSI) today announced that the paper 'Detecting Credential Spearphishing Attacks in Enterprise Settings' won Facebook's [...]
- Published
- 2017
5. Findings in Data Structures Reported from National Research Institute for Mathematics and Computer Science [Code Specialization for Memory Efficient Hash Tries (Short Paper)]
- Subjects
Computer science ,Business ,Computers - Abstract
2015 JUL 30 (VerticalNews) -- By a News Reporter-Staff News Editor at Computer Technology Journal -- Data detailed on Data Structures have been presented. According to news reporting out of [...]
- Published
- 2015
6. NTT Research Distinguished Scientist Brent Waters & UCLA Professor Amit Sahai Win IACR Test-of-Time Award
- Subjects
Cryptography ,Computer science ,Scientists ,Time ,Identity ,Paper industry ,Business ,Business, international - Abstract
Paper Co-Authored in 2005 Introduced Groundbreaking Concept of Attribute-Based Encryption PALO ALTO, Calif. -- NTT Research, Inc., a division of NTT (TYO:9432), today announced that a paper co-authored in 2005 [...]
- Published
- 2020
7. An interdisciplinary approach to coalition formation
- Author
-
Berghammer, Rudolf, Rusinowska, Agnieszka, and De Swart, Harrie
- Subjects
Algebra ,Computer science ,Algorithms ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2008.02.011 Byline: Rudolf Berghammer (a), Agnieszka Rusinowska (b), Harrie de Swart (c) Keywords: Graph theory; RelView; Relational algebra; Dominance; Stable government Abstract: A stable government is by definition not dominated by any other government. However, it may happen that all governments are dominated. In graph-theoretic terms this means that the dominance graph does not possess a source. In this paper we are able to deal with this case by a clever combination of notions from different fields, such as relational algebra, graph theory and social choice theory, and by using the computer support system RelView for computing solutions and visualizing the results. Using relational algorithms, in such a case we break all cycles in each initial strongly connected component by removing the vertices in an appropriate minimum feedback vertex set. In this way we can choose a government that is as close as possible to being un-dominated. To achieve unique solutions, we additionally apply the majority ranking recently introduced by Balinski and Laraki. The main parts of our procedure can be executed using the RelView tool. Its sophisticated implementation of relations allows to deal with graph sizes that are sufficient for practical applications of coalition formation. Author Affiliation: (a) Institute of Computer Science, University of Kiel, Olshausenstra[sz]e 40, 24098 Kiel, Germany (b) GATE, CNRS, Universite Lumiere Lyon 2, 93 Chemin des Mouilles, B.P.167, 69131 Ecully Cedex, France (c) Department of Philosophy, Tilburg University, P.O. Box 90153, 5000 LE Tilburg, The Netherlands Article History: Received 4 December 2006; Accepted 12 February 2008 Article Note: (footnote) [star] Co-operation for this paper was supported by European COST Action 274 'Theory and Applications of Relational Structures as Knowledge Instruments' (TARSKI).
- Published
- 2009
- Full Text
- View/download PDF
8. Dynamic Web Service discovery architecture based on a novel peer based overlay network
- Author
-
Sioutas, S., Sakkopoulos, E., Makris, Ch., Vassiliadis, B., Tsakalidis, A., and Triantafillou, P.
- Subjects
Web services ,Computer science ,Web services ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.jss.2008.11.845 Byline: S. Sioutas (a), E. Sakkopoulos (b), Ch. Makris (b), B. Vassiliadis (c), A. Tsakalidis (b), P. Triantafillou (b) Keywords: Web Services Discovery; Peer to Peer overlay networks; Databases Abstract: Service Oriented Computing and its most famous implementation technology Web Services (WS) are becoming an important enabler of networked business models. Discovery mechanisms are a critical factor to the overall utility of Web Services. So far, discovery mechanisms based on the UDDI standard rely on many centralized and area-specific directories, which poses information stress problems such as performance bottlenecks and fault tolerance. In this context, decentralized approaches based on Peer to Peer overlay networks have been proposed by many researchers as a solution. In this paper, we propose a new structured P2P overlay network infrastructure designed for Web Services Discovery. We present theoretical analysis backed up by experimental results, showing that the proposed solution outperforms popular decentralized infrastructures for web discovery, Chord (and some of its successors), BATON (and it's successor) and Skip-Graphs. Author Affiliation: (a) Department of Informatics, Ionian University, 7 Tsirigoti Square, 49100 Corfu, Greece (b) Computer Engineering and Informatics Department, University of Patras, Greece (c) Computer Science, Hellenic Open University, Patras, Greece Article History: Received 18 June 2008; Revised 12 November 2008; Accepted 13 November 2008 Article Note: (footnote) [star] Preliminary version of this paper was presented in Proceedings of IEEE International Conference on Information Technology: Coding and Computing, Next - Generation Web and Grid Systems (IEEE/ITCC 2005), pp. 193-198.
- Published
- 2009
- Full Text
- View/download PDF
9. An anomaly prevention approach for real-time task scheduling
- Author
-
Chen, Ya-Shu, Chang, Li-Pin, Kuo, Tei-Wei, and Mok, Aloysius K.
- Subjects
Computer science ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.jss.2008.07.038 Byline: Ya-Shu Chen (a), Li-Pin Chang (b), Tei-Wei Kuo (c), Aloysius K. Mok (d) Keywords: Scheduling anomaly; Real-time task scheduling; Process synchronization; Scheduler stability Abstract: This research responds to practical requirements in the porting of embedded software over platforms and the well-known multiprocessor anomaly. In particular, we consider the task scheduling problem when the system configuration changes. With mutual-exclusive resource accessing, we show that new violations of the timing constraints of tasks might occur even when a more powerful processor or device is adopted. The concept of scheduler stability and rules are then proposed to prevent scheduling anomaly from occurring in task executions that might be involved with task synchronization or I/O access. Finally, we explore policies for bounding the duration of scheduling anomalies. Author Affiliation: (a) Department of Electronic Engineering, National Taiwan University of Science and Technology, Taipei 106, Taiwan (b) Department of Computer Science, National Chiao-Tung University, Hsin-Chu 300, Taiwan (c) Department of Computer Science and Information Engineering, National Taiwan University, Taipei 106, Taiwan (d) Department of Computer Sciences, The University of Texas at Austin, Austin, TX 78712, USA Article History: Received 8 June 2006; Revised 2 July 2008; Accepted 21 July 2008 Article Note: (footnote) [star] This paper is an extended version of the paper that appeared in .
- Published
- 2009
- Full Text
- View/download PDF
10. Exploiting an abstract-machine-based framework in the design of a Java ILP processor
- Author
-
Wang, H.C. and Yuen, C.K.
- Subjects
Computer science ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.sysarc.2008.07.006 Byline: H.C. Wang, C.K. Yuen Keywords: Abstract machine; Java processor; Embedded processor; ILP; VLIW Abstract: Abstract machines bridge the gap between the high-level of programming languages and the low-level mechanisms of a real machine. The paper proposed a general abstract-machine-based framework (AMBF) to build instruction level parallelism processors using the instruction tagging technique. The constructed processor may accept code written in any (abstract or real) machine instruction set, and produce tagged machine code after data conflicts are resolved. This requires the construction of a tagging unit which emulates the sequential execution of the program using tags rather than actual values. The paper presents a Java ILP processor by using the proposed framework. The Java processor takes advantage of the tagging unit to dynamically translate Java bytecode instructions to RISC-like tag-based instructions to facilitate the use of a general-purpose RISC core and enable the exploitation of instruction level parallelism. We detailed the Java ILP processor architecture and the design issues. Benchmarking of the Java processor using SpecJVM98 and Linpack has shown the overall ILP speedup improvement between 78% and 173%. Author Affiliation: Department of Computer Science, School of Computing, National University of Singapore, 3 Science Drive 2, Singapore 117543, Singapore Article History: Received 16 June 2007; Revised 29 April 2008; Accepted 30 July 2008
- Published
- 2009
- Full Text
- View/download PDF
11. Combining evidence with a probabilistic framework for answer ranking and answer merging in question answering
- Author
-
Ko, Jeongwoo, Si, Luo, and Nyberg, Eric
- Subjects
Computer science ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ipm.2009.11.004 Byline: Jeongwoo Ko (a), Luo Si (b), Eric Nyberg (c) Keywords: Answer ranking; Answer merging; Question answering Abstract: Question answering (QA) aims at finding exact answers to a user's question from a large collection of documents. Most QA systems combine information retrieval with extraction techniques to identify a set of likely candidates and then utilize some ranking strategy to generate the final answers. This ranking process can be challenging, as it entails identifying the relevant answers amongst many irrelevant ones. This is more challenging in multi-strategy QA, in which multiple answering agents are used to extract answer candidates. As answer candidates come from different agents with different score distributions, how to merge answer candidates plays an important role in answer ranking. In this paper, we propose a unified probabilistic framework which combines multiple evidence to address challenges in answer ranking and answer merging. The hypotheses of the paper are that: (1) the framework effectively combines multiple evidence for identifying answer relevance and their correlation in answer ranking, (2) the framework supports answer merging on answer candidates returned by multiple extraction techniques, (3) the framework can support list questions as well as factoid questions, (4) the framework can be easily applied to a different QA system, and (5) the framework significantly improves performance of a QA system. An extensive set of experiments was done to support our hypotheses and demonstrate the effectiveness of the framework. All of the work substantially extends the preliminary research in . A probabilistic framework for answer selection in question answering. In: Proceedings of NAACL/HLT. Author Affiliation: (a) Search Quality Group, Google Inc., Mountain View, CA 94043, USA (b) Department of Computer Science, Purdue University, Lafayette, IN 47907, USA (c) School of Computer Science, Carnegie Mellon University, Pittsburgh, PA 15213, USA Article History: Received 21 February 2008; Revised 9 November 2009; Accepted 11 November 2009
- Published
- 2010
12. Efficient online index maintenance for contiguous inverted lists
- Author
-
Lester, Nicholas, Zobel, Justin, and Williams, Hugh
- Subjects
Algorithms ,Computer science ,Algorithm ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ipm.2005.09.005 Byline: Nicholas Lester (a), Justin Zobel (a), Hugh Williams (b) Keywords: Text indexing; Search engines; Index construction; Index update Abstract: Search engines and other text retrieval systems use high-performance inverted indexes to provide efficient text query evaluation. Algorithms for fast query evaluation and index construction are well-known, but relatively little has been published concerning update. In this paper, we experimentally evaluate the two main alternative strategies for index maintenance in the presence of insertions, with the constraint that inverted lists remain contiguous on disk for fast query evaluation. The in-place and re-merge strategies are benchmarked against the baseline of a complete re-build. Our experiments with large volumes of web data show that re-merge is the fastest approach if large buffers are available, but that even a simple implementation of in-place update is suitable when the rate of insertion is low or memory buffer size is limited. We also show that with careful design of aspects of implementation such as free-space management, in-place update can be improved by around an order of magnitude over a naA[macron]ve implementation. Author Affiliation: (a) School of Computer Science and Information Technology, RMIT University, Victoria 3001, Australia (b) MSN Search, Microsoft Corporation, One Microsoft Way, Redmond, WA 98052, United States Article History: Received 14 April 2005; Accepted 26 September 2005 Article Note: (footnote) [star] This paper incorporates and extends material from 'In-place versus re-build versus re-merge: Index maintenance strategies for text retrieval systems', N. Lester, J. Zobel, and H.E. Williams, Australasian Computer Science Conference, Dunedin, New Zealand, 2004.
- Published
- 2006
13. Best entry points for structured document retrieval -- Part I: Characteristics
- Author
-
Reid, Jane, Lalmas, Mounia, Finesilver, Karen, and Hertzum, Morten
- Subjects
Computer science ,Distance education ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ipm.2005.03.006 Byline: Jane Reid (a), Mounia Lalmas (a), Karen Finesilver (b), Morten Hertzum (c) Keywords: Structured document retrieval; Focussed retrieval; Best entry points; User studies Abstract: Structured document retrieval makes use of document components as the basis of the retrieval process, rather than complete documents. The inherent relationships between these components make it vital to support users' natural browsing behaviour in order to offer effective and efficient access to structured documents. This paper examines the concept of best entry points, which are document components from which the user can browse to obtain optimal access to relevant document components. In particular this paper investigates the basic characteristics of best entry points. Author Affiliation: (a) Computer Science, Queen Mary University of London, London E1 4NS, UK (b) Open and Distance Learning Unit, Queen Mary University of London, London E1 4NS, UK (c) Computer Science, Roskilde University, DK-4000, Denmark Article History: Received 27 September 2004; Accepted 3 March 2005
- Published
- 2006
14. Parallel machine scheduling with nested processing set restrictions
- Author
-
Huo, Yumei and Leung, Joseph Y.-T.
- Subjects
Algorithms ,Computer science ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2009.10.025 Byline: Yumei Huo (a), Joseph Y.-T. Leung (b) Keywords: Nested processing set restrictions; Nonpreemptive scheduling; Makespan; NP-hard; Approximation algorithm; Worst-case bound Abstract: We consider the problem of scheduling a set of n independent jobs on m parallel machines, where each job can only be scheduled on a subset of machines called its processing set. The machines are linearly ordered, and the processing set of job j is given by two machine indexes a.sub.j and b.sub.j; i.e., job j can only be scheduled on machines a.sub.j,a.sub.j+1,...,b.sub.j. Two distinct processing sets are either nested or disjoint. Preemption is not allowed. Our goal is to minimize the makespan. It is known that the problem is strongly NP-hard and that there is a list-type algorithm with a worst-case bound of 2-1/m. In this paper we give an improved algorithm with a worst-case bound of 7/4. For two and three machines, the algorithm gives a better worst-case bound of 5/4 and 3/2, respectively. Author Affiliation: (a) Department of Computer Science, CUNY at Staten Island, Staten Island, NY 10314, USA (b) Department of Computer Science, New Jersey Institute of Technology, Newark, NJ 07102, USA Article History: Received 9 November 2008; Accepted 26 October 2009
- Published
- 2010
15. Building AI Better: Software Engineering Institute Introduces Three Pillars of AI Engineering
- Subjects
Artificial intelligence ,Software engineering ,Computer science ,Software development/engineering ,Artificial intelligence ,Business ,News, opinion and commentary ,Carnegie Mellon University. Software Engineering Institute - Abstract
PITTSBURGH, June 30, 2021 /PRNewswire/ -- The SEI today announced the release of white papers outlining the challenges and opportunities of three initial pillars of artificial intelligence (AI) engineering: human [...]
- Published
- 2021
16. Adaptive automated construction of hybrid heuristics for exam timetabling and graph colouring problems
- Author
-
Qu, Rong, Burke, Edmund K., and McCollum, Barry
- Subjects
Computer science ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2008.10.001 Byline: Rong Qu (a), Edmund K. Burke (a), Barry McCollum (b) Keywords: Adaptive; Exam timetabling; Graph colouring; Graph colouring heuristics; Hybridisation; Hyper-heuristic Abstract: In this paper, we present a random iterative graph based hyper-heuristic to produce a collection of heuristic sequences to construct solutions of different quality. These heuristic sequences can be seen as dynamic hybridisations of different graph colouring heuristics that construct solutions step by step. Based on these sequences, we statistically analyse the way in which graph colouring heuristics are automatically hybridised. This, to our knowledge, represents a new direction in hyper-heuristic research. It is observed that spending the search effort on hybridising Largest Weighted Degree with Saturation Degree at the early stage of solution construction tends to generate high quality solutions. Based on these observations, an iterative hybrid approach is developed to adaptively hybridise these two graph colouring heuristics at different stages of solution construction. The overall aim here is to automate the heuristic design process, which draws upon an emerging research theme on developing computer methods to design and adapt heuristics automatically. Experimental results on benchmark exam timetabling and graph colouring problems demonstrate the effectiveness and generality of this adaptive hybrid approach compared with previous methods on automatically generating and adapting heuristics. Indeed, we also show that the approach is competitive with the state of the art human produced methods. Author Affiliation: (a) Automated Scheduling, Optimisation and Planning (ASAP) Group, School of Computer Science, University of Nottingham, Wollaton Road, Nottingham NG8 1BB, UK (b) School of Computer Science, Queens University, University Road, Belfast BT7 1NN, N. Ireland, UK Article History: Received 15 August 2006; Accepted 8 October 2008
- Published
- 2009
- Full Text
- View/download PDF
17. An improved multiobjective differential evolution based on Pareto-adaptive I[micro] -dominance and orthogonal design
- Author
-
Gong, Wenyin and Cai, Zhihua
- Subjects
Computer science ,Algorithms ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2008.09.022 Byline: Wenyin Gong, Zhihua Cai Keywords: Multiobjective optimization; Differential evolution algorithm; Pareto-adaptive I[micro] -dominance; Orthogonal design method Abstract: Evolutionary multiobjective optimization has become a very popular topic in the last few years. Since the 1980s, various evolutionary approaches that are capable of searching for multiple solutions simultaneously in a single run have been developed to solve multiobjective optimization problems (MOPs). However, to find a uniformly distributed, near-complete, and near-optimal Pareto front in a small number of fitness function evaluations (NFFEs) is a challenging task for any multiobjective optimization evolutionary algorithm (MOEA). In this paper, we present an improved differential evolution algorithm to MOPs that combines several features of previous evolutionary algorithms in a unique manner. It is characterized by (a) employing the orthogonal design method with quantization technique to generate the initial population, (b) adopting an archive to store the nondominated solutions and employing the new Pareto-adaptive I[micro]-dominance method to update the archive at each generation, (c) storing the extreme points and inserting them into the final archive in order to remedy one of the limitations of I[micro]-dominance: the loss of the extreme points in the final archive, and (d) using a hybrid selection mechanism in which a random selection and an elitist selection are alternated in order to allow using the archive solution to guide the search towards the Pareto-optimal front. Experiments have been conducted on a number of unconstrained real-valued artificial functions of two and three objectives. The results prove the efficiency of our approach with respect to the quality of the approximation of the Pareto-optimal front and the considerable reduction of NFFEs in these test problems. By examining the selected performance metrics, our approach is found to be statistically competitive with five state-of-the-art MOEAs in terms of keeping the diversity of the individuals along the tradeoff surface, finding a well-approximated Pareto-optimal front and reducing the computational effort. Author Affiliation: School of Computer Science, China University of Geosciences, Wuhan 430074, PR China Article History: Received 17 October 2007; Accepted 22 September 2008
- Published
- 2009
- Full Text
- View/download PDF
18. Complete local search with limited memory algorithm for no-wait job shops to minimize makespan
- Author
-
Zhu, Jie, Li, Xiaoping, and Wang, Qian
- Subjects
Computer science ,Algorithms ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2008.09.015 Byline: Jie Zhu, Xiaoping Li, Qian Wang Keywords: No-wait; Job shop; Timetabling; Sequencing Abstract: In this paper, no-wait job shop problems with makespan minimization are considered. It is well known that these problems are strongly NP-hard. The problem is decomposed into the sequencing and the timetabling components. Shift timetabling is developed for the timetabling component. An effective method, CLLM (complete local search with limited memory), is presented by integrating with shift timetabling for the sequencing component. Experimental results show that CLLM outperforms all the existing effective algorithms for the considered problem with a little more computation time. Author Affiliation: School of Computer Science and Engineering, Southeast University, 210096 Nanjing, PR China Key Laboratory of Computer Network and Information Integration (Southeast University), Ministry of Education, 210096 Nanjing, PR China Article History: Received 19 October 2007; Accepted 16 September 2008
- Published
- 2009
- Full Text
- View/download PDF
19. Determining factors that affect long-term evolution in scientific application software
- Author
-
Kelly, Diane
- Subjects
Architectural design ,Internet software ,Software ,Computer science ,Software quality ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.jss.2008.11.846 Byline: Diane Kelly Keywords: Scientific software; Characteristics of scientific software development; Long-term software evolution; Empirical study; Model of change Abstract: One of the characteristics of scientific application software is its long lifetime of active maintenance. There has been little software engineering research into the development characteristics of scientific software and into the factors that support its successful long evolution. The research described in this paper introduces a novel model to examine the nature of change that influenced an example of industrial scientific software over its lifetime. The research uses the model to provide an objective analysis of factors that contributed to long-term evolution of the software system. Conclusions suggest that the architectural design of the software and the characteristics of the software development group played a major role in the successful evolution of the software. The novel model of change and the research method developed for this study are independent of the type of software under study. Author Affiliation: Royal Military College of Canada, Department of Mathematics and Computer Science, Kingston, Ontario, Canada Article History: Received 2 June 2008; Revised 21 November 2008; Accepted 23 November 2008
- Published
- 2009
- Full Text
- View/download PDF
20. Efficient multicasting over large-scale WLANs through controlled association
- Author
-
Chen, Ai, Lee, Dongwook, and Sinha, Prasun
- Subjects
Wireless local area networks (Computer networks) -- Media coverage ,Television broadcasting -- Media coverage ,Computer science ,Algorithms ,Wireless LAN/WAN system ,Wireless network ,Algorithm ,Business ,Computers ,Telecommunications industry - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.comnet.2008.09.013 Byline: Ai Chen, Dongwook Lee, Prasun Sinha Keywords: Wireless LAN; Association control; Algorithm/protocol design; Algorithm/protocol analysis Abstract: Support for efficient multicasting in WLANs can enable new services such as streaming of TV channels, radio channels, and visitor's information. With increasing deployments of large-scale WLANs, such services can be made available to a large number of users. However, any new multicast based services must minimally impact the existing unicast services which are currently the core services offered by most WLANs. In this paper, we leverage the flexibility of associating with different access-points (APs), which occurs often due to overlapping coverage of APs, to optimize the network's objective. Motivated by different revenue functions and network scenarios, three different optimization objectives are considered which are: maximizing the number of admitted users (MNU), balancing the load among APs (BLA), and minimizing the load of APs (MLA). We show that these problems are NP-hard and present centralized approximation algorithms and distributed approaches to solve them. These algorithms compute which AP a user should be associated with. Using simulations we evaluate their performance and compare them to a naive approach in which users associate to the AP with the best RSSI (Received Signal Strength Indicator). Author Affiliation: Department of Computer Science and Engineering, The Ohio State University, 395 Dreese Laboratories, 2015 Neil Avenue, Columbus, OH 43210-1277, USA Article History: Received 15 January 2008; Revised 15 September 2008; Accepted 16 September 2008 Article Note: (miscellaneous) Responsible Editor A. Capone
- Published
- 2009
- Full Text
- View/download PDF
21. Improving energy efficiency for flash memory based embedded applications
- Author
-
Song, Hyungkeun, Choi, Sukwon, Cha, Hojung, and Ha, Rhan
- Subjects
Flash memory -- Energy use ,Energy management systems -- Energy use ,Energy consumption ,Computer science ,Energy efficiency ,Flash memory ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.sysarc.2008.07.004 Byline: Hyungkeun Song (a), Sukwon Choi (a), Hojung Cha (a), Rhan Ha (b) Keywords: Energy-aware embedded systems; Flash memory file system; JFFS2 Abstract: The JFFS2 file system for flash memory compresses files before actually writing them into flash memory. Because of this, multimedia files, for instance, which are already compressed in the application level go through an unnecessary and time-consuming compression stage and cause energy waste. Also, when reading such multimedia files, the default use of disk cache results in unnecessary main memory access, hence an energy waste, due to the low cache hit ratio. This paper presents two techniques to reduce the energy consumption of the JFFS2 flash file system for power-aware applications. One is to avoid data compression selectively when writing files, and the other is to bypass the page caching when reading sequential files. The modified file system is implemented on a PDA running Linux and the experiment results show that the proposed mechanism effectively reduces the overall energy consumption when accessing continuous and large files. Author Affiliation: (a) Department of Computer Science, Yonsei University, Seodaemun-gu, Shinchon-dong 134, Seoul 120-749, Republic of Korea (b) Department of Computer Engineering, Hongik University, Mapo-gu, Sangsoo-Dong 72-1, Seoul 121-791, Republic of Korea Article History: Received 30 June 2006; Revised 18 April 2008; Accepted 14 July 2008
- Published
- 2009
- Full Text
- View/download PDF
22. Tariff concessions in production sourcing
- Author
-
Guo, Yunsong, Li, Yanzhi, Lim, Andrew, and Rodrigues, Brian
- Subjects
Algorithms ,Tariffs ,Management science ,Computer science ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2007.03.004 Byline: Yunsong Guo (a), Yanzhi Li (b), Andrew Lim (c), Brian Rodrigues (d) Keywords: Production sourcing; Tariffs; Heuristics Abstract: In this paper, we study a multi-stage production sourcing problem where tariff concessions can be exploited at the firm level using free trade agreements between countries. To solve the problem, an algorithm which embeds a very large-scale neighborhood (VSLN) search into a simulated annealing framework is developed. A numerical study is conducted to verify the effectiveness of the solution approach. Author Affiliation: (a) Department of Computer Science, Cornell University, Ithaca, NY 14853, USA (b) Department of Management Sciences, City University of Hong Kong, Tat Chee Avenue, Kowloon, Hong Kong (c) Department of IELM, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong (d) Lee Kong Chian School of Business, Singapore Management University, 50 Stamford Road, Singapore 178899, Singapore Article History: Received 14 September 2005; Accepted 21 March 2007
- Published
- 2008
23. Applying relational algebra and RelView to coalition formation
- Author
-
Berghammer, Rudolf, Rusinowska, Agnieszka, and De Swart, Harrie
- Subjects
Game theory ,Computer science ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2006.01.022 Byline: Rudolf Berghammer (a), Agnieszka Rusinowska (b)(c), Harrie de Swart (d) Keywords: Game theory; RelView; Relational algebra; Coalition formation; Feasible government; Dominance; Stable government Abstract: We present an application of relational algebra to coalition formation. This leads to specifications, which can be executed with the help of the RelView tool after a simple translation into the tool's programming language. As an example we consider a simplification of the situation in Poland after the 2001 elections. Author Affiliation: (a) Institute of Computer Science, University of Kiel, OlshausenstraAe 40, 24098 Kiel, Germany (b) Nijmegen School of Management, Radboud University Nijmegen, P.O. Box 9108, 6500 HK Nijmegen, The Netherlands (c) Department of Mathematical Economics, Warsaw School of Economics, Al. Niepodleglosci 162, 02-554 Warsaw, Poland (d) Department of Philosophy, Tilburg University, P.O. Box 90153, 5000 LE Tilburg, The Netherlands Article History: Received 29 June 2005; Accepted 13 January 2006 Article Note: (footnote) [star] Co-operation for this paper was supported by European COST Action 274 'Theory and Applications of Relational Structures as Knowledge Instruments' (TARSKI). We are grateful to two anonymous referees for some useful suggestions.
- Published
- 2007
24. Second order symmetric duality in multiobjective programming involving generalized cone-invex functions
- Author
-
Mishra, S.K. and Lai, K.K.
- Subjects
Management science ,Computer science ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2005.11.024 Byline: S.K. Mishra (a), K.K. Lai (b) Keywords: Second order symmetric duality; Multiobjective programming; Cone-pseudo-invexity Abstract: In this paper, cone-second order pseudo-invex and strongly cone-second order pseudo-invex functions are defined. A pair of Mond-Weir type second order symmetric dual multiobjective programs is formulated over arbitrary cones. Weak, strong and converse duality theorems are established under aforesaid generalized invexity assumptions. A second self-duality theorem is also given by assuming the functions involved to be skew-symmetric. Author Affiliation: (a) Department of Mathematics, Statistics and Computer Science, College of Basic Sciences and Humanities, G.B. Pant University of Agriculture and Technology, Pantnagar 263 145, India (b) Department of Management Sciences, City University of Hong Kong, Tat Chee Avenue, Kowloon, Hong Kong and College of Business Administration, Hunan University, Changsha, China Article History: Received 24 September 2004; Accepted 23 November 2005 Article Note: (footnote) [star] The research of first author is supported by the Department of Science and Technology, Ministry of Science and Technology, New Delhi, Government of India under SERC Fast Track Scheme for Young Scientists 2001-2002 through grant No. SR/FTP/MS-22/2001.
- Published
- 2007
25. Searching for multiobjective preventive maintenance schedules: Combining preferences with evolutionary algorithms
- Author
-
Quan, Gang, Greenwood, Garrison W., Liu, Donglin, and Hu, Sharon
- Subjects
Algorithms ,Computer science ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2005.12.015 Byline: Gang Quan (a), Garrison W. Greenwood (b), Donglin Liu (c), Sharon Hu (c) Keywords: Evolutionary computations; Scheduling; Utility theory; Preventive maintenance; Multi-objective optimization Abstract: Heavy industry maintenance facilities at aircraft service centers or railroad yards must contend with scheduling preventive maintenance tasks to ensure critical equipment remains available. The workforce that performs these tasks are often high-paid, which means the task scheduling should minimize worker idle time. Idle time can always be minimized by reducing the workforce. However, all preventive maintenance tasks should be completed as quickly as possible to make equipment available. This means the completion time should be also minimized. Unfortunately, a small workforce cannot complete many maintenance tasks per hour. Hence, there is a tradeoff: should the workforce be small to reduce idle time or should it be large so more maintenance can be performed each hour? A cost effective schedule should strike some balance between a minimum schedule and a minimum size workforce. This paper uses evolutionary algorithms to solve this multiobjective problem. However, rather than conducting a conventional dominance-based Pareto search, we introduce a form of utility theory to find Pareto optimal solutions. The advantage of this method is the user can target specific subsets of the Pareto front by merely ranking a small set of initial solutions. A large example problem is used to demonstrate our method. Author Affiliation: (a) Department of Computer Science and Engineering, University of South Carolina, Columbia, SC 29208, USA (b) Department of Electrical and Computer Engineering, Portland State University, Portland, OR 97207, USA (c) Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, IN 46556, USA
- Published
- 2007
26. A graph-based hyper-heuristic for educational timetabling problems
- Author
-
Burke, Edmund K., McCollum, Barry, Meisels, Amnon, Petrovic, Sanja, and Qu, Rong
- Subjects
Computer science ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2005.08.012 Byline: Edmund K. Burke (a), Barry McCollum (b), Amnon Meisels (c), Sanja Petrovic (a), Rong Qu (a) Keywords: Heuristics; Graph heuristics; Hyper-heuristics; Tabu search; Timetabling Abstract: This paper presents an investigation of a simple generic hyper-heuristic approach upon a set of widely used constructive heuristics (graph coloring heuristics) in timetabling. Within the hyper-heuristic framework, a tabu search approach is employed to search for permutations of graph heuristics which are used for constructing timetables in exam and course timetabling problems. This underpins a multi-stage hyper-heuristic where the tabu search employs permutations upon a different number of graph heuristics in two stages. We study this graph-based hyper-heuristic approach within the context of exploring fundamental issues concerning the search space of the hyper-heuristic (the heuristic space) and the solution space. Such issues have not been addressed in other hyper-heuristic research. These approaches are tested on both exam and course benchmark timetabling problems and are compared with the fine-tuned bespoke state-of-the-art approaches. The results are within the range of the best results reported in the literature. The approach described here represents a significantly more generally applicable approach than the current state of the art in the literature. Future work will extend this hyper-heuristic framework by employing methodologies which are applicable on a wider range of timetabling and scheduling problems. Author Affiliation: (a) Automated Scheduling Optimization and Planning Group, School of CSiT, University of Nottingham, Nottingham NG8 1BB, UK (b) School of Computer Science, Queen's University Belfast, Belfast BT7 1NN, UK (c) Department of Computer Science, Ben-Gurion University, Beer-Sheva 84 105, Israel Article History: Received 21 September 2004; Accepted 18 August 2005
- Published
- 2007
27. Obligation rules for minimum cost spanning tree situations and their monotonicity properties
- Author
-
Tijs, Stef, Branzei, Rodica, Moretti, Stefano, and Norde, Henk
- Subjects
Cancer -- Research ,Algorithms ,Universities and colleges ,Management science ,Computer science ,Oncology, Experimental ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2005.04.036 Byline: Stef Tijs (a), Rodica Branzei (b), Stefano Moretti (c), Henk Norde (d) Keywords: Cost allocation; Minimum cost spanning tree situations; Cost monotonicity; Population monotonic allocation schemes Abstract: We consider the class of Obligation rules for minimum cost spanning tree situations. The main result of this paper is that such rules are cost monotonic and induce also population monotonic allocation schemes. Another characteristic of Obligation rules is that they assign to a minimum cost spanning tree situation a vector of cost contributions which can be obtained as product of a double stochastic matrix with the cost vector of edges in the optimal tree provided by the Kruskal algorithm. It turns out that the Potters value (P-value) is an element of this class. Author Affiliation: (a) Department of Mathematics, University of Genoa, Italy and CentER and Department of Econometrics and Operations Research, Tilburg University, P.O. Box 90153, 5000 LE Tilburg, The Netherlands (b) Faculty of Computer Science, 'Alexandru Ioan Cuza' University, Carol I Bd., 11, 6600 Iasi, Romania (c) Unit of Molecular Epidemiology, National Cancer Research Institute of Genoa and Department of Mathematics, University of Genoa, Via Dodecaneso, 35, 16146 Genoa, Italy (d) CentER and Department of Econometrics and Operations Research, Tilburg University, P.O. Box 90153, 5000 LE Tilburg, The Netherlands Article History: Received 28 July 2004; Accepted 11 April 2005 Article Note: (footnote) [star] The authors thank two anonymous referees for their careful and valuable comments.
- Published
- 2006
28. Mathematical programming models and algorithms for a class-faculty assignment problem
- Author
-
Al-Yakoob, Salem M. and Sherali, Hanif D.
- Subjects
Algorithms ,Universities and colleges ,Computer science ,Algorithm ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2005.01.052 Byline: Salem M. Al-Yakoob (a), Hanif D. Sherali (b) Keywords: Timetabling; Class scheduling; Mixed-integer programming; Employee scheduling; Gender policies Abstract: This paper presents mathematical programming models for assigning faculty members to classes including, among typical academic class scheduling issues, certain specialized central policies at Kuwait University. The time-slots for classes are initially assumed to be given and an integer programming model (CFAM) is constructed to solve the resulting problem, which aims to minimize the individual and collective dissatisfaction of faculty members in a fair fashion, where dissatisfaction is measured by a function of the assignment of faculty members to time-slots and specific classes. In order to enhance the quality of results obtained in practice, the model is modified (ECFAM) so that the time-slots for the classes can be changed, however, with restrictions related to efficient facility utilization and permitting an administratively regulated maximum number of changes. Gender-based modeling considerations are also introduced in order to maintain desirable class offering patterns. Computational results are presented based on solving the models directly by the CPLEX-MIP (version 7.5) package and also using a specialized LP-based heuristic. The faculty schedules generated via the proposed approach based on a number of case studies related to the Department of Mathematics and Computer Science at Kuwait University reveal that this approach yields improved schedules in terms of fairness and enhanced satisfaction levels among faculty members. Author Affiliation: (a) Department of Mathematics and Computer Science, College of Science, Kuwait University, P.O. Box 5969, Safat 13060, Kuwait (b) Grado Department of Industrial and Systems Engineering (0118), Virginia Polytechnic Institute and State University, Blacksburg, VA 24061, United States Article History: Received 11 May 2004; Accepted 28 January 2005
- Published
- 2006
29. Optimality and duality for a multi-objective programming problem involving generalized d-type-I and related n-set functions
- Author
-
Mishra, S.K., Wang, S.Y., and Lai, K.K.
- Subjects
Management science ,Computer science ,Business ,Business, general ,Business, international - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ejor.2005.02.062 Byline: S.K. Mishra (a), S.Y. Wang (b)(d), K.K. Lai (c)(d) Keywords: Multi-objective programming; n-set functions; Optimality; Duality; Generalized convexity Abstract: In this paper, we introduce several generalized convexity for a real-valued set function and establish optimality and duality results for a multi-objective programming problem involving generalized d-type-I and related n-set functions. Author Affiliation: (a) Department of Mathematics, Statistics and Computer Science, College of Basic Sciences and Humanities, Govind Ballabh Pant University of Agriculture and Technology, Pantnagar 263 145, India (b) Institute of Systems Science, Academy of Mathematics and Systems Sciences, Chinese Academy of Sciences, Beijing 100080, China (c) Department of Management Sciences, City University of Hong Kong, Tat Chee Avenue, Kowloon, Hong Kong (d) College of Business Administration, Hunan University, Changsha, China Article History: Received 3 November 2003; Accepted 21 February 2005 Article Note: (footnote) [star] The research was supported by the Department of Science and Technology, Ministry of Science and Technology, Government of India under SERC Fast Track Scheme for Young Scientists 2001-2002 through grant No. SR/FTP/MS-22/2001 and The National Natural Science Foundation of China.
- Published
- 2006
30. The communication requirements of efficient allocations and supporting prices
- Author
-
Nisan, Noam and Segal, Ilya
- Subjects
Computer science ,Company pricing policy ,Business ,Economics - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.jet.2004.10.007 Byline: Noam Nisan (a), Ilya Segal (b) Abstract: We show that any communication finding a value-maximizing allocation in a private-information economy must also discover supporting prices (in general personalized and nonlinear). In particular, to allocate L indivisible items between two agents, a price must be revealed for each of the 2.sup.L-1 bundles. We prove that all monotonic prices for an agent must be used, hence exponential communication in L is needed. Furthermore, exponential communication is needed just to ensure a higher share of surplus than that realized by auctioning all items as a bundle, or even a higher expected surplus (for some probability distribution over valuations). When the utilities are submodular, efficiency still requires exponential communication (and fully polynomial approximation is impossible). When the items are identical, arbitrarily good approximation is obtained with exponentially less communication than exact efficiency. Author Affiliation: (a) Institute of Computer Science, Hebrew University, Jerusalem, Israel (b) Department of Economics, Stanford University, Stanford, CA 94305, USA Article History: Received 10 February 2004; Revised 12 October 2004 Article Note: (footnote) [star] An earlier version of this paper was circulated under the title 'The Communication Complexity of Efficient Allocation Problems.'
- Published
- 2006
31. Labor force could be key to Amazon HQ2 bid
- Subjects
Amazon.com Inc. -- Planning -- Training ,Computer science ,Online information services -- Planning -- Training ,Company business planning ,Online information service ,Business ,Business, regional - Abstract
Byline: Dustin Walsh, Chad Livengood and Kirk Pinho On paper, Amazon Inc.'s quest for a second headquarters in North America employing 50,000 people in the next 15 years looks like [...]
- Published
- 2017
32. Music search engines: Specifications and challenges
- Author
-
Nanopoulos, Alexandros, Rafailidis, Dimitrios, Ruxanda, Maria M., and Manolopoulos, Yannis
- Subjects
Internet/Web search services ,Computer science ,Information storage and retrieval ,Internet search software ,Internet/Web search service ,Text search and retrieval software ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ipm.2009.02.002 Byline: Alexandros Nanopoulos (a), Dimitrios Rafailidis (b), Maria M. Ruxanda (c), Yannis Manolopoulos (b) Keywords: Multimedia information retrieval; Audio input/output; Sound and music computing; Web search Abstract: Nowadays we have a proliferation of music data available over the Web. One of the imperative challenges is how to search these vast, global-scale musical resources to find preferred music. Recent research has envisaged the notion of music search engines (MSEs) that allow for searching preferred music over the Web. In this paper, we examine the growing research topic of MSEs, and provide potential specifications to follow and challenges to face. Author Affiliation: (a) Hildesheim University, Institute of Computer Science, Germany (b) Department of Informatics, Aristotle University of Thessaloniki, Greece (c) Department of Computer Science, Aalborg University, Denmark Article History: Received 8 April 2008; Revised 2 February 2009; Accepted 3 February 2009
- Published
- 2009
33. An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
- Author
-
Yang, Jen-Ho and Chang, Chin-Chen
- Subjects
Computer science ,Mobile devices ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.cose.2008.11.008 Byline: Jen-Ho Yang (a), Chin-Chen Chang (a)(b) Abstract: Recently, remote user authentication schemes are implemented on elliptic curve cryptosystem (ECC) to reduce the computation loads for mobile devices. However, most remote user authentication schemes on ECC are based on public-key cryptosystem, in which the public key in the system requires the associated certificate to prove its validity. Thus, the user needs to perform additional computations to verify the certificate in these schemes. In addition, we find these schemes do not provide mutual authentication or a session key agreement between the user and the remote server. Therefore, we propose an ID-based remote mutual authentication with key agreement scheme on ECC in this paper. Based upon the ID-based concept, the proposed scheme does not require public keys for users such that the additional computations for certificates can be reduced. Moreover, the proposed scheme not only provides mutual authentication but also supports a session key agreement between the user and the server. Compared with the related works, the proposed scheme is more efficient and practical for mobile devices. Author Affiliation: (a) Department of Computer Science and Information Engineering, National Chung Cheng University, 160 San-Hsing, Ming-Hsiung, Chiayi 621, Taiwan, ROC (b) Department of Information Engineering and Computer Science, Feng Chia University, 100 Wenhwa Rd., Seatwen, Taichung 40724, Taiwan, ROC Article History: Received 21 August 2008; Accepted 26 November 2008
- Published
- 2009
- Full Text
- View/download PDF
34. Sony Researcher Wins the Klein-Vogelbach Prize
- Subjects
Teaching methods ,Musicians ,Public relations executives ,Dystonia ,Computer science ,Business ,Business, international - Abstract
M2 PRESSWIRE-January 27, 2020-: Sony Researcher Wins the Klein-Vogelbach Prize (C)1994-2020 M2 COMMUNICATIONS RDATE:27012020 Paper on pathophysiology of musicians' dystonia becomes first Japanese winner Tokyo, Japan - Sony Computer Science [...]
- Published
- 2020
35. A risk minimization framework for information retrieval
- Author
-
Zhai, ChengXiang and Lafferty, John
- Subjects
Computer science ,Information storage and retrieval ,Business ,Computers and office automation industries - Abstract
To link to full-text access for this article, visit this link: http://dx.doi.org/10.1016/j.ipm.2004.11.003 Byline: ChengXiang Zhai (a), John Lafferty (b) Keywords: Retrieval models; Risk minimization; Statistical language models; Bayesian decision theory Abstract: This paper presents a probabilistic information retrieval framework in which the retrieval problem is formally treated as a statistical decision problem. In this framework, queries and documents are modeled using statistical language models, user preferences are modeled through loss functions, and retrieval is cast as a risk minimization problem. We discuss how this framework can unify existing retrieval models and accommodate systematic development of new retrieval models. As an example of using the framework to model non-traditional retrieval problems, we derive retrieval models for subtopic retrieval, which is concerned with retrieving documents to cover many different subtopics of a general query topic. These new models differ from traditional retrieval models in that they relax the traditional assumption of independent relevance of documents. Author Affiliation: (a) Department of Computer Science, University of Illinois at Urbana-Champaign, Illinois, United States (b) School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, United States Article History: Accepted 12 November 2004
- Published
- 2006
36. The Benefits of Using Rigorously Tested Routines from Numerical Libraries
- Author
-
Meyer, Rob
- Subjects
Numerical Algorithms Group Ltd. ,Computer software industry ,Software ,Internet software ,Computer science ,Libraries ,Software quality ,Business ,Computers and office automation industries ,Computers - Abstract
This white paper - 'The Benefits of Using Rigorously Tested Routines from Numerical Libraries--Computer Science Edition' speaks to matters affecting computationally-intensive application development. To the extent that software engineers and [...]
- Published
- 2011
37. STEM Leaders to Release Computer Science Education Roadmap
- Subjects
Sciences education ,Computer science ,Business ,News, opinion and commentary - Abstract
Live Town Hall, White Paper and Microsite to Unveil Education Blue Print WASHINGTON and MUMBAI, India, Dec. 10, 2013 /PRNewswire/ -- Tata Consultancy Services (TCS), (BSE: 532540, NSE: TCS) a [...]
- Published
- 2013
38. Genius Group Appoints Alan Turing AI as Chief AI Officer
- Subjects
Computer science ,Banking, finance and accounting industries ,Business - Abstract
SINGAPORE, April 24, 2024 (GLOBE NEWSWIRE) -- https://www.globenewswire.com/Tracker?data=u9eZoVm3bPT06mplN_O6OwuwfEdHhjcBAeHfov9jgq0AIHoDreKGFxwysMZMdosSUHCq4eQv7vBpo6RfFTIP--TEaPygFEwFNg9qlI6C5SQ= (NYSE American: GNS) ('Genius Group' or the 'Company'), a leading AI-powered education group, today announced the appointment of a purpose built and [...]
- Published
- 2024
39. NTT Research Funds New Program with Harvard Center for Brain Science
- Subjects
Brain ,Computer science ,Business ,Business, international ,Harvard University - Abstract
CBS-NTT Fellowship Program Supports Research in Emerging Field of Physics of Intelligence News Highlights: * NTT Research Foundation funds Fellowship Program in new field of Physics of Intelligence. * Field [...]
- Published
- 2024
40. AVI WIGDERSON RECEIVES ACM A.M. TURING AWARD FOR GROUNDBREAKING INSIGHTS ON RANDOMNESS
- Subjects
Defined contribution plans ,Scientists -- Achievements and awards ,Computer science ,Algorithms ,Algorithm ,Business ,News, opinion and commentary - Abstract
Leading Theoretical Computer Scientist Cited for Field-Defining Contributions NEW YORK, April 10, 2024 /PRNewswire/ -- ACM, the Association for Computing Machinery, today named Avi Wigderson as recipient of the 2023 [...]
- Published
- 2024
41. A smart glove to guide your hands: The wearable device can send tactile feedback to teach users new skills, make robots more dexterous, and help train surgeons and pilots
- Author
-
Shipps, Alex
- Subjects
Robotics industry ,Career development ,Robots ,Machine learning ,Surgeons ,Computer science ,Robotics industry ,Robot ,Business ,Computers and office automation industries ,High technology industry - Abstract
Tactile instruction is crucial to learning certain tasks, but unlike video and audio, touch is difficult to record and transfer. Now researchers from MIT's Computer Science and Artificial Intelligence Laboratory [...]
- Published
- 2024
42. School of Computer Science and Mathematics Researcher Targets Electronics (A Light-Field Video Dataset of Scenes with Moving Objects Captured with a Plenoptic Video Camera)
- Subjects
Computer science ,Arts and entertainment industries ,Business - Abstract
2024 JUN 28 (VerticalNews) -- By a News Reporter-Staff News Editor at Entertainment Newsweekly -- Investigators publish new report on electronics. According to news reporting from the School of Computer [...]
- Published
- 2024
43. Local universities prep for burgeoning AI landscape
- Subjects
Educational technology ,Artificial intelligence ,Natural language interfaces ,Computational linguistics ,Language processing ,Machine learning ,Universities and colleges ,Computer science ,Artificial intelligence ,Technology in education ,Business ,Business, regional ,Tulane University - Abstract
Byline: admin Main photo courtesy DepositPhotos. Artificial Intelligence has made its way into college catalogs across the country, and New Orleans-area universities are making their own investments in AI or [...]
- Published
- 2023
44. Xiao-I Welcomes World-Renowned Scientist Professor Fangzhen Lin as Chief Scientific Advisor
- Subjects
Artificial intelligence ,Natural language interfaces ,Computational linguistics ,Language processing ,Scientists ,Computer science ,Artificial intelligence ,Business ,News, opinion and commentary - Abstract
SHANGHAI, Oct. 25, 2023 /PRNewswire/ -- Xiao-I Corporation (Nasdaq: AIXI) ('Xiao-I' or the 'Company'), a leading cognitive artificial intelligence ('AI') enterprise in China, is pleased to announce the appointment of [...]
- Published
- 2023
45. Microsoft's CEO shares his fear about Artificial Intelligence (AI)
- Subjects
Microsoft Corp. ,Computer software industry ,Artificial intelligence ,Computer science ,Artificial intelligence ,Business - Abstract
To access, purchase, authenticate, or subscribe to the full-text of this article, please visit this link: https://www.thestreet.com/technology/microsofts-ceo-nadella-shares-fear-about-artificial-intelligence-ai Microsoft has been a leader in artificial intelligence (AI) taking it from something [...]
- Published
- 2023
46. MAKING AI WORK: To build lasting AI capability in your organization, take a layered approach
- Author
-
Krishnan, T.S. and Gupta, Damini
- Subjects
College faculty ,Artificial intelligence ,Natural language processing ,Computer science ,Business logistics ,Big data ,Artificial intelligence ,Business, general ,Business - Abstract
'The rise of AI presents an opportunity for executives in every industry to differentiate and defend their businesses. But implementing a company-wide AI strategy is challenging, especially for legacy enterprises.' [...]
- Published
- 2020
47. Laureates of the 2023 WLA Prize Announced
- Subjects
Societies ,Scientists ,Computer science ,Associations, institutions, etc. ,Banking, finance and accounting industries ,Business - Abstract
Shanghai, Sep 14, 2023 (GLOBE NEWSWIRE via COMTEX) -- Shanghai, Sept. 14, 2023 (GLOBE NEWSWIRE) -- The World Laureates Association Prize (WLA Prize) unveils its 2023 laureates on Thursday, at [...]
- Published
- 2023
48. Allen Institute for Artificial Intelligence (AI2) Announces New CEO
- Subjects
Microsoft Corp. -- Management ,Artificial intelligence ,Chief executive officers ,Computer science ,Research institutes ,Company business management ,Artificial intelligence ,Banking, finance and accounting industries ,Business - Abstract
SEATTLE, June 20, 2023 (GLOBE NEWSWIRE) -- The Allen Institute for Artificial Intelligence (AI2) today announced Ali Farhadi will become its new Chief Executive Officer, effective July 31. Founded in [...]
- Published
- 2023
49. Congratulations to the 2019 AAAI Award Winners!
- Subjects
Computer science ,Natural language processing -- Achievements and awards ,Teaching methods ,Artificial intelligence ,Reasoning ,Artificial intelligence ,Business ,University of California, Berkeley ,Association for the Advancement of Artificial Intelligence ,American Association for Artificial Intelligence - Abstract
Yolanda Gil, AAAI President, Rao Kambhampati, AAAI Past President and Awards Committee Chair, and Bart Selman, AAAI President-Elect, presented the AAAI Awards in January at AAAI-19 in Honolulu. 2019 Feigenbaum [...]
- Published
- 2019
50. Electronic Design Tool 'Morphs' Interactive Objects
- Subjects
Sensors ,Computer science ,Business ,Computers and office automation industries ,Engineering and manufacturing industries ,Business, international - Abstract
We've come a long way since the first 3-D-printed item came to us by way of an eye wash cup, to now being able to rapidly fabricate things like car [...]
- Published
- 2020
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.