11,009 results
Search Results
2. Screening Paper Formation Variations on Production Line.
- Author
-
Carbonell, Jaime G., Siekmann, Jörg, Okuno, Hiroshi G., Ali, Moonis, Ejnarsson, Marcus, Nilsson, Carl Magnus, and Verikas, Antanas
- Abstract
This paper is concerned with a multi-resolution tool for screening paper formation variations in various frequency regions on production line. A paper web is illuminated by two red diode lasers and the reflected light recorded as two time series of high resolution measurements constitute the input signal to the papermaking process monitoring system. The time series are divided into blocks and each block is analyzed separately. The task is treated as kernel based novelty detection applied to a multi-resolution time series representation obtained from the band-pass filtering of the Fourier power spectrum of the series. The frequency content of each frequency region is characterized by a feature vector, which is transformed using the canonical correlation analysis and then categorized into the inlier or outlier class by the novelty detector. The ratio of outlying data points, significantly exceeding the predetermined value, indicates abnormalities in the paper formation. The tools developed are used for online paper formation monitoring in a paper mill. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
3. Augmented Paper: Developing Relationships Between Digital Content and Paper.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Streitz, Norbert, Kameas, Achilles, Mavrommati, Irene, Luff, Paul, and Adams, Guy
- Abstract
Some of the most interesting developments within computer system design in recent years have emerged from an exploration of the ways everyday objects and artefacts can be augmented with computational resources. Often under the rubric of "ubiquitous computing", research programmes in Europe, North America and Japan have directed substantial funding towards these initiatives, and leading industrial and academic research laboratories have developed a diverse range of ubiquitous computing "solutions". These developments mark an important shift in system design, a shift that is having a corresponding impact on social science research. Surprisingly though, given the growing commitment to the ubiquitous and the tangible, there is a mundane, even humble artefact that pervades our ordinary lives that has received less attention than one might imagine. This artefact is paper. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
4. Paper Metaphor for Tabletop Interaction Design.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Jacko, Julie A., Besacier, Guillaume, Rey, Gaétan, Najm, Marianne, and Buisine, Stéphanie
- Abstract
The aim of this paper is to explore new metaphors for interaction design on tabletop system. Tabletop systems are shared horizontal surface for co-located collaboration, which leads to original problems when designing interactions. We propose two metaphors based on the paper: the peeling metaphor, and the slot metaphor, and then suggest a way of using them to design new interactions for solving some of the problems of tabletop systems: documents organization, documents transmission and documents duplication. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
5. Investigating Annotation in Electronic Paper-Prototypes.
- Author
-
Gilroy, Stephen W., Harrison, Michael D., Naghsh, Amir M., Dearden, Andy, and Özcan, Mehmet B.
- Abstract
Many design activities depend on communicative activities around collaboratively produced prototypes. A common communication practice in producing text documents is to add annotation in the form of comments. Previous research indicates that electronic paper-prototyping can be used to rapidly create simple prototypes of interactive systems, such as websites. Little is known, however, about how to provide and maintain variety of communication channels around such electronic paper-prototypes to enable end-users and other stakeholders to contribute to design dialogues. This paper presents Gabbeh, an electronic paper-prototyping tool, and reports on an evaluation using the tool in a simulated design exercise. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
6. A Green Paper on Usability Maturation.
- Author
-
Karat, John, Vanderdonckt, Jean, Abowd, Gregory, Calvary, Gaëlle, Carroll, John, Czerwinski, Mary, Feiner, Steve, Furtado, Elizabeth, Höök, Kristiana, Jacob, Robert, Jeffries, Robin, Johnson, Peter, Nakakoji, Kumiyo, Palanque, Philippe, Pastor, Oscar, Paternò, Fabio, Pribeanu, Costin, Salzman, Marilyn, Schmandt, Chris, and Stolze, Markus
- Abstract
Usability maturation manifests in terms of quality in software, in interaction, and in value, constituting the three parts of this volume. In this green paper, the three editors present a range of ideas drawn and synthesized from the fifteen preceding chapters. It is not just a review, but, more importantly, it is an invitation for interested individuals or organizations to contribute more views and information, providing answers to open questions, challenging existing opinions, raising new issues, and bridging the gaps. In the Introduction, a brief overview of the development of the field of HCI is presented. In each of the three following sections, the five chapters comprising the respective part are reviewed and attendant issues are discussed, leading to research agendas that can serve as a roadmap for the future work on usability. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
7. Augmented Classroom: A Paper-Centric Approach for Collaborative Learning System.
- Author
-
Murakami, Hitomi, Nakashima, Hideyuki, Tokuda, Hideyuki, Yasumura, Michiaki, Miura, Motoki, Kunifuji, Susumu, Shizuki, Buntarou, and Tanaka, Jiro
- Abstract
We developed AirTransNote, a computer-mediated classroom collaboration system. The system enables real-time note-sharing. AirTransNote manages notes written by students on paper and enables the teacher to browse through the notes or show them to the students. AirTransNote can analyze students' answers, helping the teacher better understand their problems. The system is not meant to provide an alternative to the conventional way of instruction; rather, it is designed to enhance class interaction. We conducted a preliminary study using questionnaires and found that this system can be feasible to apply for classroom environment. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
8. Formal Versus Rigorous Mathematics: How to Get Your Papers Published.
- Author
-
Rosenthal, Erik and Beckert, Bernhard
- Abstract
This talk will consider rigorous mathematics and the nature of proof. It begins with an historical perspective and follows the development of formal mathematics. The talk will conclude with examples demonstrating that understanding the relationship between formal mathematics and rigorous proof can assist with both the discovery and the quality of real proofs of real results. Keywords: rigor, formal mathematics, nature of proof. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
9. Learning-Based Assume-Guarantee Verification (Tool Paper).
- Author
-
Godefroid, Patrice, Giannakopoulou, Dimitra, and Păsăreanu, Corina S.
- Abstract
Despite significant advances in the development of model checking, it remains a difficult task in the hands of experts to make it scale to the size of industrial systems. A key step in achieving scalability is to "divide-and-conquer", that is, to break up the veri.cation of a system into smaller tasks that involve the verification of its components. Assume-guarantee reasoning [9, 11] is a widespread "divide-and-conquer" approach that uses assumptions when checking individual components of a system. Assumptions essentially encode expectations that each component has from the rest the system in order to operate correctly. Coming up with the right assumptions is typically a non-trivial manual process, which limits the applicability of this type of reasoning in practice. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
10. Publish or perish, but do not forget your software artifacts.
- Author
-
Heumüller, Robert, Nielebock, Sebastian, Krüger, Jacob, and Ortmeier, Frank
- Subjects
COMPUTER science ,SOFTWARE engineering ,SCIENTIFIC community ,REPLICATION (Experimental design) ,COMMUNICATION - Abstract
Open-science initiatives have gained substantial momentum in computer science, and particularly in software-engineering research. A critical aspect of open-science is the public availability of artifacts (e.g., tools), which facilitates the replication, reproduction, extension, and verification of results. While we experienced that many artifacts are not publicly available, we are not aware of empirical evidence supporting this subjective claim. In this article, we report an empirical study on software artifact papers (SAPs) published at the International Conference on Software Engineering (ICSE), in which we investigated whether and how researchers have published their software artifacts, and whether this had scientific impact. Our dataset comprises 789 ICSE research track papers, including 604 SAPs (76.6 %), from the years 2007 to 2017. While showing a positive trend towards artifact availability, our results are still sobering. Even in 2017, only 58.5 % of the papers that stated to have developed a software artifact made that artifact publicly available. As we did find a small, but statistically significant, positive correlation between linking to artifacts in a paper and its scientific impact in terms of citations, we hope to motivate the research community to share more artifacts. With our insights, we aim to support the advancement of open science by discussing our results in the context of existing initiatives and guidelines. In particular, our findings advocate the need for clearly communicating artifacts and the use of non-commercial, persistent archives to provide replication packages. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
11. The web impact: A white paper.
- Author
-
Goos, G., Hartmanis, J., Leeuwen, J., Margaria, Tiziana, Steffen, Bernhard, Rückert, Roland, Posegga, Joachim, and Lardenois, Alain
- Published
- 1998
- Full Text
- View/download PDF
12. PaperCP: Exploring the Integration of Physical and Digital Affordances for Active Learning.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Baranauskas, Cécilia, Palanque, Philippe, Abascal, Julio, Barbosa, Simone Diniz Junqueira, and Liao, Chunyuan
- Abstract
Active Learning in the classroom domain presents an interesting case for integrating physical and digital affordances. Traditional physical handouts and transparencies are giving way to new digital slides and PCs, but the fully digital systems still lag behind the physical artifacts in many aspects such as readability and tangibility. To better understand the interplay between physical and digital affordances in this domain, we developed PaperCP, a paper-based interface for a Tablet PC-based classroom interaction system (Classroom Presenter), and deployed it in an actual university course. This paper reports on an exploratory experiment studying the use of the system in a real-world scenario. The experiment confirms the feasibility of the paper interface in supporting student-instructor communication for Active Learning. We also discuss the challenges associated with creating a physical interface such as print layout, the use of pen gestures, and logistical issues. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
13. Guest Editorial Special Issue "Recent Trends on Advanced Computing: The Converging Technologies".
- Author
-
Tchernykh, Andrei, Juárez Ramírez, Reyes, Mocskos, Esteban, and Nesmachnow, Sergio
- Subjects
HIGH performance computing ,COMPUTER vision ,COMPUTER software ,COMPUTER science ,COMPUTER programming ,SOFTWARE engineering ,SOFTWARE measurement - Abstract
This document is a guest editorial for a special issue of the journal "Programming & Computer Software" titled "Recent Trends on Advanced Computing: The Converging Technologies." The issue features research and practical implementation results from researchers and industry experts in computer science, engineering, and technology. The papers cover a range of topics including microservices, software quality, user engagement on social media, non-functional requirements, medical software architecture, fallacies in political speeches, intelligent learning environments, and more. The guest editors for this special issue are Prof. Dr. Andrei Tchernykh, Prof. Reyes Juárez Ramírez, Dr. Esteban Mocskos, and Prof. Sergio Nesmachnow. [Extracted from the article]
- Published
- 2023
- Full Text
- View/download PDF
14. "Merolyn the Phone": A Study of Bluetooth Naming Practices (Nominated for the Best Paper Award).
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Krumm, John, Abowd, Gregory D., Seneviratne, Aruna, Strang, Thomas, and Kindberg, Tim
- Abstract
This paper reports the results of an in-depth study of Bluetooth naming practices which took place in the UK in August 2006. There is a significant culture of giving Bluetooth names to mobile phones in the UK, and this paper's main contribution is to provide an account of those Bluetooth naming practices, putting them in their social, physical and intentional context. The paper also uncovers how users have appropriated the ways in which Bluetooth, with its relatively short range of about 10-100m, operates between their mobile phones as a partially embodied medium, making it a distinctive paradigm of socially and physically embedded communication. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
15. Effectiveness of Content Preparation in Information Technology Operations: Synopsis of a Working Paper.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Jacko, Julie A., Savoy, A., and Salvendy, G.
- Abstract
Content preparation is essential for web design [25]. The objective of this paper is to establish a theoretical foundation for the development of methods to evaluate the effectiveness of content preparation in information technology operations. Past studies identify information as the dominant concern of users, and delivery mechanism as a secondary concern [20]. The best presentation of the wrong information results in a design with major usability problems and does not aid the user in accomplishing his task. This paper shifts the focus of existing usability evaluation methods. It attempts to fill the void in usability literaoture by addressing the information aspect of usability evaluation. Combining the strengths of content preparation and usability evaluation yields major implications for a broad range of IT uses. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
16. Document Management and Information Organizing Method Using RFID Tags.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Jacko, Julie A., Kojima, Hiroyuki, Iwata, Ken, and Nishimura, Naoki
- Abstract
Due to the progress of Internet technology and the increase of distributed information on networks, the present knowledge management has been based more and more on the performance of various experienced users. In addition to the increase of electronic documents, the use of paper documents has not been reduced because of their convenience. This paper describes a method of tracking paper document locations and contents using radio frequency identification (RFID) technology. This research also focused on the expression of a task process and the seamless structuring of related electronic and paper documents as a result of task knowledge formalization using information organizing. A system is proposed here that implements information organization for both Web documents and paper documents with the task model description and RFID technology. Examples of a prototype system are also presented. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
17. Validity and Cross-Validity in HCI Publications.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Doherty, Gavin, Blandford, Ann, and Thimbleby, Harold
- Abstract
Papers in HCI play different roles, whether to inspire, solve industrial problems or further the science of HCI. There is a potential conflict between the different views, and a danger that different forms of validity are assumed by author and reader — deliberately or accidentally. This paper reviews some of the issues in this complex area and makes practical recommendations. In particular, the paper introduces the term "cross-validity" to help make explicit the issues, problems and means to tackle them. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
18. The Management and Integration of Biomedical Knowledge: Application in the Health-e-Child Project (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Jimenez-Ruiz, E., Berlanga, R., Sanz, I., McClatchey, R., Danger, R., Manset, D., Paraire, J., and Rios, A.
- Abstract
The Health-e-Child project aims to develop an integrated healthcare platform for European paediatrics. In order to achieve a comprehensive view of children's health, a complex integration of biomedical data, information, and knowledge is necessary. Ontologies will be used to formally define this domain knowledge and will form the basis for the medical knowledge management system. This paper introduces an innovative methodology for the vertical integration of biomedical knowledge. This approach will be largely clinician-centered and will enable the definition of ontology fragments, connections between them (semantic bridges) and enriched ontology fragments (views). The strategy for the specification and capture of fragments, bridges and views is outlined with preliminary examples demonstrated in the collection of biomedical information from hospital databases, biomedical ontologies, and biomedical public databases. Keywords: Vertical Knowledge Integration, Approximate Queries, Ontology Views, Semantic Bridges. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
19. Analysis of co-authorship graphs of CORE-ranked software conferences.
- Author
-
Cánovas Izquierdo, Javier, Cosentino, Valerio, and Cabot, Jordi
- Abstract
In most areas of computer science (CS), and in the software domain in particular, international conferences are as important as journals as a venue to disseminate research results. This has resulted in the creation of rankings to provide quality assessment of conferences (specially used for academic promotion purposes) like the well-known CORE ranking created by the Computing Research and Education Association of Australasia. In this paper we analyze 102 CORE-ranked conferences in the software area (covering all aspects of software engineering, programming languages, software architectures and the like) included in the DBLP dataset, an online reference for computers science bibliographic information. We define a suite of metrics focusing on the analysis of the co-authorship graph of the conferences, where authors are represented as nodes and co-authorship relationships as edges. Our aim is to first characterize the patterns and structure of the community of researchers in software conferences. We then try to see if these values depend on the quality rank of the conference justifying this way the existence of the different classifications in the CORE-ranking system. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
20. Visual Tagging Through Social Collaboration: A Concept Paper.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Baranauskas, Cécilia, Palanque, Philippe, Abascal, Julio, Barbosa, Simone Diniz Junqueira, and Bellucci, Andrea
- Abstract
Collaborative tagging has grown on the Internet as a new paradigm for web information discovering, filtering and retrieval. In the physical world, we use visual tags: labels readable by smartphones with cameras. While visual tags are usually related to a web site address, collaborative tagging, instead, provides updated, recommended information contributed and shared by users. In this paper we investigate the combination of collaborative tagging systems with visual tags. We present a prototype of a semiautomatic system generating visual tags which gather information from collaborative tagging. The user can interact with a list of relevant tags (built by clustering closely related tags) that can be further encoded in a visual tag, according to user's preferences. The user experience is enriched by retrieving multimedia content linked to the selected tags, present on the web. We finally show a case study illustrating our approach. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
21. Fencing the Open Fields: Empirical Concerns on Electronic Institutions (Invited Paper).
- Author
-
Boissier, Olivier, Padget, Julian, Dignum, Virginia, Lindemann, Gabriela, Matson, Eric, Ossowski, Sascha, Sichman, Jaime Simão, Vázquez-Salceda, Javier, and Noriega, Pablo
- Abstract
The regulation of multiagent systems may be approached from different stand-points. In this paper I will take the perspective of using a certain type of devices, electronic institutions, to regulate agent interactions. Furthermore, in this paper I am concerned with the tasks of design and construction of actual electronic institutions and I will explore some of the empirical aspects that one may encounter in such activities. More specifically, I will focus on those empirical aspects that are characteristic of electronic institutions rather than those that may be typical of multi-agent systems development in general or other types of software engineering. I use three examples of actual electronic institutions that show different and complementary features in order to motivate a number of distinctions that may be used to treat empirical features in a systematic way. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
22. A Quantitative Assessment of Requirements Engineering Publications - 1963-2006.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Sawyer, Pete, Paech, Barbara, Heymans, Patrick, Davis, Alan, and Hickey, Ann
- Abstract
Requirements engineering research has been conducted for over 40 years. It is important to recognize the plethora of results accumulated to date to: (a) improve researchers' understanding of the historical roots of our field in the real-world and the problems that they are trying to solve, (b) expose researchers to the breadth and depth of solutions that have been proposed, (c) provide a synergistic basis for improving those solutions or building new ones to solve real-world problems facing the industry today, and d) increase practitioner awareness of available solutions. A detailed meta-analysis of the requirements engineering literature will provide an objective overview of the advances and current state of the discipline. This paper represents the first step in a planned multi-year analysis. It presents the results of a demographic analysis by date, type, outlet, author, and author affiliation for an existing database of over 4,000 requirements engineering publications. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
23. REFSQ 2007 International Working Conference on Requirements Engineering: Foundation for Software Quality.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Sawyer, Pete, Paech, Barbara, and Heymans, Patrick
- Abstract
The 13th Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ'07) will take place in the beautiful city of Trondheim, Norway on the 11th and 12th June 2007. As with most previous years, REFSQ'07 is affiliated with CAiSE. However, REFSQ'07 is significantly larger than in previous years, both in terms of the number of submissions and the size of the programme. 27 papers will be presented, plus a keynote address by Klaus Pohl, and parallel sessions will be necessary to make the programme possible within two days. However, the essential highly interactive and participatory nature of the REFSQ 'brand' will be retained. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
24. A Transfusion Ontology for Remote Assistance in Emergency Health Care (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Ceravolo, Paolo, Damiani, Ernesto, and Fugazza, Cristiano
- Abstract
Transfusion Ontology is a simple task-based ontology developed in the emergency health care domain. Taking the assumption that ontologies are instruments for supporting exchange of information among parties, the principles governing the design of this ontology was mainly based on the identification of the interactions of messages to be exchanged among parties. This paper shows how this simple design principle is able to guide a whole ontology construction. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
25. Competency Model in a Semantic Context: Meaningful Competencies (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Christiaens, Stijn, Bo, Jan, and Verlinden, Ruben
- Abstract
In this paper, we will propose our ideas for a semantically ready competency model. The model will allow semantic enrichment on different levels, creating truly meaningful competencies. The aim of this model is to provide a flexible approach for (re)use, matching, interpretation, exchange and storage for competencies. Our competency model is based on the DOGMA ontology framework and the proposed IEEE standards RCD and SCRM. We will focus on the model itself and how semantics can be applied to it as these elements form the basis for any kind of processing on them. Keywords: competence, competency, RCD, semantics, DOGMA, e-HRM, HRM, occupation, ontology, Semantic Web. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
26. Requirements Elicitation and Elaboration in Task-Based Design Needs More Than Task Modelling: A Case Study.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Coninx, Karin, Luyten, Kris, Schneider, Kevin A., Dittmar, Anke, and Gellendin, Andreas
- Abstract
In this paper, a small case study is presented to illustrate our conceptual understanding of a task-based requirements process. We argue that sub-models as known in model-based design (e.g. task models, dialog models) support the reflection about an existing work situation at a conceptual level and allow a formal specification of requirements. However, it is also shown that the integration of complementary analysis approaches facilitates a richer consideration of social as well as technical aspects. An intertwined creation of models differing in their focus and in the degree of abstraction and formality supports a more effective requirements elicitation and elaboration. In addition, the paper discusses some crucial issues in task- and model-based design such as the ‘myth' of generalised task models, the different roles of task and dialog models, or the influence of intentions on models of current situations. We hope to contribute to a further clarification of the problem space. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
27. Special issue on advances in data, information and knowledge engineering in data science era.
- Author
-
Bellatreche, Ladjel and Tjoa, A Min
- Subjects
DATA science ,LINKED data (Semantic Web) ,DATA mining ,COMPUTER science ,SOFTWARE engineering - Abstract
In recent years, Data Science emerged as a new and important discipline. SOFSEM provides an interesting forum for having and reinforcing the prerequisites of Data Science, coving topics related to Fundamental Computer Science, Data and Knowledge Management, and Software Engineering. [Extracted from the article]
- Published
- 2022
- Full Text
- View/download PDF
28. At the Flick of a Switch: Detecting and Classifying Unique Electrical Events on the Residential Power Line (Nominated for the Best Paper Award).
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Krumm, John, Seneviratne, Aruna, Strang, Thomas, Patel, Shwetak N., and Robertson, Thomas
- Abstract
Activity sensing in the home has a variety of important applications, including healthcare, entertainment, home automation, energy monitoring and post-occupancy research studies. Many existing systems for detecting occupant activity require large numbers of sensors, invasive vision systems, or extensive installation procedures. We present an approach that uses a single plug-in sensor to detect a variety of electrical events throughout the home. This sensor detects the electrical noise on residential power lines created by the abrupt switching of electrical devices and the noise created by certain devices while in operation. We use machine learning techniques to recognize electrically noisy events such as turning on or off a particular light switch, a television set, or an electric stove. We tested our system in one home for several weeks and in five homes for one week each to evaluate the system performance over time and in different types of houses. Results indicate that we can learn and classify various electrical events with accuracies ranging from 85-90%. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
29. QoS-Predictions Service: Infrastructural Support for Proactive QoS- and Context-Aware Mobile Services (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Wac, Katarzyna, Halteren, Aart, and Konstantas, Dimitri
- Abstract
Today's mobile data applications aspire to deliver services to a user anywhere - anytime while fulfilling his Quality of Service (QoS) requirements. However, the success of the service delivery heavily relies on the QoS offered by the underlying networks. As the services operate in a heterogeneous networking environment, we argue that the generic information about the networks' offered-QoS may enable an anyhow mobile service delivery based on an intelligent (proactive) selection of ‘any' network available in the user's context (location and time). Towards this direction, we develop a QoS-predictions service provider, which includes functionality for the acquisition of generic offered-QoS information and which, via a multidimensional processing and history-based reasoning, will provide predictions of the expected offered-QoS in a reliable and timely manner. We acquire the generic QoS-information from distributed mobile services' components quantitatively (actively and passively) measuring the applicationlevel QoS, while the reasoning is based on statistical data mining and pattern recognition techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
30. Empirical Paradigm: Position Paper.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Basili, Victor R., Rombach, Dieter, Schneider, Kurt, Kitchenham, Barbara, and Pfahl, Dietmar
- Abstract
The distinction between "exploratory" and "confirmatory" work is crucial but is too often blurred in current literature. The term "exploratory" refers to empirical work that has as a goal the discovery of new and unforeseen insight. "Confirmatory" research, on the other hand, normally begins with some type of hypothesis or proposition (that has some type of support in previous literature), the confirmation of which is the aim of the study. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
31. Preface.
- Author
-
Wu, En-Hua and Sheng, Bin
- Subjects
COMPUTER graphics ,COMPUTATIONAL mathematics ,SOFTWARE engineering ,COMPUTER engineering ,COMPUTER science ,COMPUTER-generated imagery - Abstract
The text is a preface to the Journal of Computer Science & Technology, specifically a special section on the Computer Graphics International (CGI) conference. The CGI conference is a prestigious international academic conference in the field of computer graphics and virtual reality. It aims to foster collaboration between different disciplines and showcase advancements in computer graphics technology. The CGI 2023 conference was held in Shanghai, China, and featured discussions on various topics including computer graphics, virtual reality, geometric design, animation, and healthcare. The special section in the journal includes five selected papers that cover a range of topics and provide an overview of the latest trends in computer graphics and virtual reality. The preface expresses gratitude to the authors and reviewers and encourages readers to explore the special section to stay updated on the developments in these fields. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
32. Guest editorial for the special section on SEFM 2020 and 2021.
- Author
-
de Boer, Frank S. and Cerone, Antonio
- Subjects
- *
COMPUTER science , *SOFTWARE compatibility , *SOFTWARE verification , *STOCHASTIC learning models , *SOFTWARE engineering , *SOFTWARE frameworks - Abstract
This document is a guest editorial for the special section on SEFM 2020 and 2021 in the journal Software & Systems Modeling. The International Conference on Software Engineering and Formal Methods (SEFM) aims to bring together practitioners and researchers to advance the state of the art in formal methods and their application in the software industry. This special section includes selected papers from SEFM 2020 and 2021, which were held virtually during the COVID pandemic. Each article in this section has undergone rigorous peer review and has been revised and extended compared to its conference version. The selected papers cover topics such as embedded software portability and verification, nontermination inference, quantitative modeling and analysis of BDI agents, lazy model checking for recursive state machines, P-stable abstractions of hybrid systems, fairness and guarantees for extended bounded response LTL+P synthesis, counterexample classification, analyzing the impact of human errors on interactive service robotic scenarios, and active model learning of stochastic reactive systems. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
33. Search. Review. Repeat? An empirical study of threats to replicating SLR searches.
- Author
-
Krüger, Jacob, Lausberger, Christian, von Nostitz-Wallwitz, Ivonne, Saake, Gunter, and Leich, Thomas
- Subjects
EMPIRICAL research ,LITERATURE reviews ,COMPUTER science ,DIGITAL libraries ,THEORY of knowledge - Abstract
A systematic literature review (SLR) is an empirical method used to provide an overview of existing knowledge and to aggregate evidence within a domain. For computer science, several threats to the completeness of such reviews have been identified, leading to recommendations and guidelines on how to improve their quality. However, few studies address to what extent researchers can replicate an SLR. To conduct a replication, researchers have to first understand how the set of primary studies has been identified in the original study, and can ideally retrieve the same set when following the reported protocol. In this article, we focus on this initial step of a replication and report a two-fold empirical study: Initially, we performed a tertiary study using a sample of SLRs in computer science and identified what information that is needed to replicate the searches is reported. Based on the results, we conducted a descriptive, multi-case study on digital libraries to investigate to what extent these allow replications. The results reveal two threats to replications of SLRs: First, while researchers have improved the quality of their reports, relevant details are still missing—we refer to a reporting threat. Second, we found that some digital libraries are inconsistent in their query results—we refer to a searching threat. While researchers conducting a review can only overcome the first threat and the second may not be an issue for all kinds of replications, researchers should be aware of both threats when conducting, reviewing, and building on SLRs. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
34. A Usability Test of Exchanging Context in a Conference Room Via Mobile Device Interactions.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Jacko, Julie A., Kim, Doyoon, Shin, Seungchul, Cheong, Cheolho, and Han, Tack-Don
- Abstract
In a community such as conferences, numerous service providers and service users exist, and people interact using contexts. With the improvements in context-awareness computing and mobile computing technologies, human-computer interactions for exchanging contexts started increasing. In this paper, we introduce some interaction techniques such as tag interaction and service discovery interaction using a mobile device to provide an efficient user interface to exchange contexts in a conference room. We identified typical situations in which these interactions can be used in a paper, poster session, and for providing individual information among the attendees. We analyzed the two interaction techniques to be suitable to improve the interactions for exchanging contexts in a conference. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
35. Energy-Efficient Fixed-Priority Scheduling for Periodic Real-Time Tasks with Multi-priority Subtasks.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Yann-Hang Lee, Heung-Nam Kim, Jong Kim, Yongwan Park, and Yang, Laurence T.
- Abstract
With the rapid development of embedded systems, battery life becomes a critical restriction factor. Dynamic voltage scaling (DVS) has been proven to be an effective method for reducing energy consumption of processors. This paper proposes an energy-saving algorithm under a task model (the MSPR model) where a task consists of multiple subtasks with different fixed priorities. This algorithm includes two parts. The first part is a static algorithm, which exploits the relationship among tasks to set the slowdown factors of subtasks. The second part is an algorithm that dynamically reclaims and reuses the slack time of precedent subtasks during the execution of tasks. To the best of our knowledge, this is the first work for energy-efficient scheduling under the complex periodic real-time task model where a task consists of multiple subtasks with different fixed priorities. Experimental results show this method can reduce energy consumption by 20%-80%, while guaranteeing the real-time requirements of systems. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
36. Software Process Improvement - EuroSPI 2007 Conference.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Baddoo, Nathan, Margaria, Tiziana, Abrahamsson, Pekka, Tiziana, Margaria, and Messnarz, Richard
- Abstract
This book constitutes the refereed research proceeding of the 14th European Software Process Improvement Conference, EuroSPI 2007, held in Potsdam, Germany in September 2007. The 18 revised full papers presented were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on agile methods, software process improvement studies, improvement methods, engineering and development, and quality and knowledge concepts. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
37. Critical Systems Development Using Modeling Languages - CSDUML 2006 Workshop Report.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Kühne, Thomas, Georg, Geri, Houmb, Siv Hilde, France, Robert, and Zschaler, Steffen
- Abstract
The CSDUML 2006 workshop is a continuation of the series regarding development of critical systems using modeling languages. The report summarizes papers presented and discussion at the workshop. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
38. Software Process Improvement - EuroSPI 2006 Conference.
- Author
-
Richardson, Ita, Runeson, Per, Messnarz, Richard, Messnarz, R., Richardson, I., and Runeson, P.
- Abstract
This book constitutes the refereed research proceeding of the 13th European Software Process Improvement Conference, EuroSPI 2006, held in Joensuu, Finland in October 2006. The 18 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on SPI (Software Process Improvement) processes, SPI and risk management, measurement, process modelling, human factors, and implementation of SPI. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
39. Dealing with Adaptive Multi-agent Organizations in the Gaia Methodology.
- Author
-
Müller, Jörg P., Cernuzzi, Luca, and Zambonelli, Franco
- Abstract
Changes and adaptations are always necessary after the deployment of a multiagent system (MAS), as well as of any other type of software systems. Some of these changes may be simply perfective and have local impact only. However, adaptive changes to meet changed situations in the operational environment of the MAS may have global impact on the overall design. In this paper, we analyze the issue of continuous design change/adaptation in a MAS organization, and the specific problem of how to properly model/design a MAS so as to make it ready to adaptation. Following, the paper focuses on the Gaia methodology and analyzes - also with the help of an illustrative example - its suitability in supporting and facilitating adaptive changes in MASs organizations, and its advantages and limitations with this regard over a number of different agent-oriented methodologies. Keywords: Agent Oriented Methodologies, Design for Change, Adaptive Organizations, Methodologies Evaluation. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
40. Looking Beyond Computer Applications: Investigating Rich Structures.
- Author
-
Wiil, Uffe Kock, Atzenbeck, Claus, and Nürnberg, Peter J.
- Abstract
Spatial structure supporting applications offer an abstract level of what can be found in the real world. However, in many systems, objects are aligned straight, rotation is not possible, they can be resized easily and can hold more text than is visible on the screen. Paper and structures created with paper seem to be more limited: Straight alignment is not possible without spending much time; paper can hardly be resized without damaging it; and piles may fall down if they become too tall. However, a closer look shows that paper structures offer much more attributes and dependencies than any current spatial structure supporting application. In this article, we compare paper structures to a selection of computer applications. We argue that the observed small additions with paper carry information which improves finding and organizing. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
41. Some Empirical Results on a Multimedia Work Support System.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Jacko, Julie A., Makkonen, Jarmo, and Visa, Ari
- Abstract
This paper describes some results of a project that studied how multimedia can help the worker in an assembly task. The test case was a deep-cut assembly of a grid-anode for a cathodic protection system. A multimedia tool was implemented and compared with the conventional support method for the same task. The tool helps the worker by providing training and background information. During the task the tool acts as a guide and a set of well-defined instructions. The comparison of the methods was done by means of a field experiment. The results show that the use of the implemented tool helps to produce a slight increase to the quality of the work. However, the execution time of the work was not better when using the multimedia tool. According to a user questionnaire done in the test situation, the multimedia tool was more useful and easier to use, and gave the users more confidence than the conventional support method. It can be said that the use of multimedia support helps the worker to produce better quality in the task. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
42. Number of Processors with Partitioning Strategy and EDF-Schedulability Test: Upper and Lower Bounds with Comparison.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Stojmenovic, Ivan, Thulasiram, Ruppa K., Yang, Laurence T., Jia, Weijia, and Guo, Minyi
- Abstract
In this paper, we study the problem of scheduling a set of n periodic preemptive independent hard real-time tasks on the minimum number of processors. We assume that the partitioning strategy is used to allocate the tasks to the processors and the EDF method is used to schedule the tasks on each processor. It is known that this scenario is NP-hard; thus, it is unlikely to find a polynomial time algorithm to schedule the tasks on the minimum number of processors. In this work, we derive a lower and an upper bound for the number of processors required to satisfy the constraints of our problem. We also compare a number of heuristic algorithms with each other and with the bounds derived in this paper. Numerical results demonstrate that our lower bound is very tight and it is very close to the optimal solution. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
43. Recognition of Shipping Container Identifiers Using ART2-Based Quantization and a Refined RBF Network.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Beliczynski, Bartlomiej, Dzielinski, Andrzej, Iwanowski, Marcin, Ribeiro, Bernardete, and Kim, Kwang-Baek
- Abstract
Generally, it is difficult to find constant patterns on identifiers in a container image, since the identifiers are not normalized in color, size, and position, etc. and their shapes are damaged by external environmental factors. This paper distinguishes identifier areas from background noises and removes noises by using an ART2-based quantization method and general morphological information on the identifiers such as color, size, ratio of height to width, and a distance from other identifiers. Individual identifier is extracted by applying the 8-directional contour tracking method to each identifier area. This paper proposes a refined ART2-based RBF network and applies it to the recognition of identifiers. Through experiments with 300 container images, the proposed algorithm showed more improved accuracy of recognizing container identifiers than the others proposed previously, in spite of using shorter training time. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
44. Software Engineering Track Chair's Message.
- Author
-
Chakraborty, Goutam and Gupta, Gopal
- Abstract
The Software Engineering track received 63 papers from which 7 papers were selected after an intensive reviewing and selection process. Many good papers could not be selected due to lack of space in the program. The selected papers cover a diverse range of topics within software engineering: from software reliability prediction to middle-ware for component management to runtime validation and code generation. The paper by Roychoudhury, Negi and Mitra analyzes programs loops for estimating program execution time. They use constraint propagation techniques to detect infeasible paths followed by timing analysis that employ memoization techniques. The paper by Sengupta and Cleaveland presents the operational semantics of timed message sequence charts to help detect errors and inconsistencies in specifications. Tripathi and Mall present a method for making predictions about reliability of software during the software development process itself when the failure data from the field cannot be available. The paper by Wang presents a logic programming framework for integrating architecture description languages (ADLs) which allows tools developed for one ADL to be used even though the architectural specification is written in another ADL. In a similar vain, the paper by Stevenson, Fu and Dong presents a framework for automated and validated realization of software architecture designs. The paper by Bhattarcharjee and Shyamsundar presents a method for validated code generation for activity diagrams which are useful in model driven design of software. Finally, the paper by Mousavi et al presents techniques that exploit symmetry for tackling the state-space explosion problem that arises in model checking. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
45. In-Network Event Processing in a Peer to Peer Broker Network for the Internet of Things.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Meersman, Robert, Tari, Zahir, Herrero, Pilar, and Ziekow, Holger
- Abstract
With the rise of RFID technology, the so called internet of things for managing supply chain events has gained increasing attention. This paper proposes a peer to peer broker network on top of existing specifications for this infrastructure. With the broker network, event based communication is enabled for the internet of things. However, the main contribution of this paper is a mechanism to optimize event queries for in-network processing of supply chain events. Here, models of supply chain processes are exploited for optimizing event queries and enabling improved mapping of query operators to the broker network. Experiments are presented which show that the proposed mechanism reduces network load compared to existing approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
46. An Approach for Managing Ambiguities in Multimodal Interaction.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Meersman, Robert, Tari, Zahir, Herrero, Pilar, Caschera, Maria Chiara, and Ferri, Fernando
- Abstract
Multimodal systems support people with different needs and different features during the interaction process making it more easy and natural. However naturalness can usually produce ambiguous interpretation. This paper discusses ambiguities in multimodal interaction proposing in particular two different examples of ambiguities: a) multimodal ambiguities produced combining un-ambiguous modal information containing contrasting concepts in multimodal dialogue, b) ambiguities arising by the propagation at multimodal level of a modal input ambiguity. Moreover, the paper proposes a formal representation of multimodal inputs using the hybrid approach that combines the attribute multi-set grammar with the linear logic. This paper starts from discussing the main features of a multimodal system and the classes of cooperation between modalities. The attribute multi-set grammar combined with the linear logic enables to highlight the multidimensionality of multimodality and allows to formally describe ambiguities that can occur. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
47. Model-Based Testing of Optimizing Compilers.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Petrenko, Alexandre, Veanes, Margus, Tretmans, Jan, Grieskamp, Wolfgang, and Zelenov, Sergey
- Abstract
We describe a test development method, named OTK, that is aimed at optimizing compiler testing. The OTK method is based on constructing a model of optimizer's input data. The method allows developing tests targeted to testing a chosen optimizer. A formal data model is constructed on the basis of an abstract informal description of an algorithm of the optimizer under test. In the paper, we consider in detail the process of analyzing an optimization algorithm and building a formal model. We also consider in outline the other part of the method, test selection and test running. The OTK method has been successfully applied in several case studies, including test development for several different optimizing compilers for modern architectures. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
48. Multiple Viewed Search Engine for an e-Journal - A Case Study on Zoological Science.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Jacko, Julie A., Seki, Takahiro, Wada, Taiki, Yamada, Yasuhiro, and Ytow, Nozomi
- Abstract
The multiple viewed search engine presented here retrieves documents of an indicated search area and displays a matrix of the distribution of the clustering from two aspects of the retrieval result. The search engine provides a visual and semantic bird's-eye view of the entire retrieval result. In addition, the characteristic words of each cluster are displayed in the matrix, and supports narrowing of the search. Furthermore, it is possible to immediately change the analysis criteria or the number of clusters and to use a zooming function. Thus, various retrieval conditions for a query can be attempted immediately and continuously. As a case study, this paper performs several analyses on the electronic journal Zoological Science using a multiple viewed search engine. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
49. A Framework for Titled Document Categorization with Modified Multinomial Naivebayes Classifier.
- Author
-
Carbonell, Jaime G., Siekmann, Jörg, Alhajj, Reda, Hong Gao, Xue Li, Jianzhong Li, Zaïane, Osmar R., Hang Guo, and Lizhu Zhou
- Abstract
Titled Documents (TD) are short text documents that are segmented into two parts: Heading Part and Excerpt Part. With the development of the Internet, TDs are widely used as papers, news, messages, etc. In this paper we discuss the problem of automatic TDs categorization. Unlike traditional text documents, TDs have short headings which have less useless words comparing to their excerpts. Though headings are usually short, their words are more important than other words. Based on this observation we propose a titled document classification framework using the widely used MNB classifier. This framework puts higher weight on the heading words at the cost of some excerpt words. By this means heading words play more important roles in classification than the traditional method. According to our experiments on four datasets that cover three types of documents, the performance of the classifier is improved by our approach. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
50. Mizar's Soft Type System.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Schneider, Klaus, Brandt, Jens, and Wiedijk, Freek
- Abstract
In Mizar, unlike in most other proof assistants, the types are not part of the foundations of the system. Mizar is based on untyped set theory, which means that in Mizar expressions are typed but the values of those expressions are not. In this paper we present the Mizar type system as a collection of type inference rules. We will interpret Mizar types as soft types, by translating Mizar's type judgments into sequents of untyped first order predicate logic. We will then prove that the Mizar type system is correct with respect to this translation in the sense that each derivable type judgment translates to a provable sequent. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.