353,371 results
Search Results
202. In this paper, the differences between the virtual laboratories and the bench laboratory were analyzed and the advantages and disadvantages of the virtual laboratory were established. Search was based on the three laboratory works were developed and carri
- Author
-
A.N. Kanatova, Technologies, Latvia, Jelgava, Z. Gavare, K.E. Nurgalieva, and A.S. Igenbayeva
- Subjects
Work (electrical) ,Multimedia ,Computer science ,Virtual Laboratory ,Ocean Engineering ,computer.software_genre ,computer ,Disadvantage ,Clearance - Abstract
In this paper, the differences between the virtual laboratories and the bench laboratory were analyzed and the advantages and disadvantages of the virtual laboratory were established. Search was based on the three laboratory works were developed and carried out through approbation. There were two focus groups of students for analyzing the level of students after their work with the bench and virtual laboratories. As the result the advantages and disadvantages of the virtual laboratory are cleared out. The disadvantage is in having not of opportunity of students to work by hand. Advantages: during work, if the student was unable to complete the work, he can finish it another time. With the help of a virtual program the work is done very quickly. This program does not consume much memory in the computer. Providing the сabinet with bench equipment is more expensive. And the testing shows that if a student additionally works with a virtual program, his level of education increases. Virtual laboratory work are very important and the level of knowledge of students has increased.
- Published
- 2019
203. A new baseline for retinal vessel segmentation: Numerical identification and correction of methodological inconsistencies affecting 100+ papers
- Author
-
Attila Fazekas and György Kovács
- Subjects
FOS: Computer and information sciences ,Computer Science - Machine Learning ,Computer science ,Computer Vision and Pattern Recognition (cs.CV) ,Computer Science - Computer Vision and Pattern Recognition ,Health Informatics ,computer.software_genre ,Machine Learning (cs.LG) ,Medical imaging ,Image Processing, Computer-Assisted ,FOS: Electrical engineering, electronic engineering, information engineering ,Humans ,Radiology, Nuclear Medicine and imaging ,Segmentation ,Radiological and Ultrasound Technology ,Image and Video Processing (eess.IV) ,Contrast (statistics) ,Retinal Vessels ,Benchmarking ,Electrical Engineering and Systems Science - Image and Video Processing ,Computer Graphics and Computer-Aided Design ,Data set ,Identification (information) ,Ranking ,Test set ,Computer Vision and Pattern Recognition ,Data mining ,computer ,Algorithms - Abstract
In the last 15 years, the segmentation of vessels in retinal images has become an intensively researched problem in medical imaging, with hundreds of algorithms published. One of the de facto benchmarking data sets of vessel segmentation techniques is the DRIVE data set. Since DRIVE contains a predefined split of training and test images, the published performance results of the various segmentation techniques should provide a reliable ranking of the algorithms. Including more than 100 papers in the study, we performed a detailed numerical analysis of the coherence of the published performance scores. We found inconsistencies in the reported scores related to the use of the field of view (FoV), which has a significant impact on the performance scores. We attempted to eliminate the biases using numerical techniques to provide a more realistic picture of the state of the art. Based on the results, we have formulated several findings, most notably: despite the well-defined test set of DRIVE, most rankings in published papers are based on non-comparable figures; in contrast to the near-perfect accuracy scores reported in the literature, the highest accuracy score achieved to date is 0.9582 in the FoV region, which is 1% higher than that of human annotators. The methods we have developed for identifying and eliminating the evaluation biases can be easily applied to other domains where similar problems may arise.
- Published
- 2021
- Full Text
- View/download PDF
204. Metric-Type Identification for Multi-Level Header Numerical Tables in Scientific Papers
- Author
-
Hidetaka Kamigaito, Manabu Okumura, Lya Hulliyyatus Suadaa, and Hiroya Takamura
- Subjects
FOS: Computer and information sciences ,Computer Science - Computation and Language ,Computer science ,Type (model theory) ,Table (information) ,computer.software_genre ,Task (computing) ,Information extraction ,Identification (information) ,Header ,Metric (mathematics) ,Data mining ,Joint (audio engineering) ,Computation and Language (cs.CL) ,computer - Abstract
Numerical tables are widely used to present experimental results in scientific papers. For table understanding, a metric-type is essential to discriminate numbers in the tables. We introduce a new information extraction task, metric-type identification from multi-level header numerical tables, and provide a dataset extracted from scientific papers consisting of header tables, captions, and metric-types. We then propose two joint-learning neural classification and generation schemes featuring pointer-generator-based and BERT-based models. Our results show that the joint models can handle both in-header and out-of-header metric-type identification problems., To appear at EACL 2021
- Published
- 2021
205. Scientific Credibility of Machine Translation Research: A Meta-Evaluation of 769 Papers
- Author
-
Atsushi Fujita, Benjamin Marie, and Raphael Rubino
- Subjects
FOS: Computer and information sciences ,Computer Science - Computation and Language ,Meta evaluation ,Machine translation ,business.industry ,Computer science ,computer.software_genre ,Credibility ,Artificial intelligence ,Metric (unit) ,business ,computer ,Computation and Language (cs.CL) ,Natural language processing ,Test data - Abstract
This paper presents the first large-scale meta-evaluation of machine translation (MT). We annotated MT evaluations conducted in 769 research papers published from 2010 to 2020. Our study shows that practices for automatic MT evaluation have dramatically changed during the past decade and follow concerning trends. An increasing number of MT evaluations exclusively rely on differences between BLEU scores to draw conclusions, without performing any kind of statistical significance testing nor human evaluation, while at least 108 metrics claiming to be better than BLEU have been proposed. MT evaluations in recent papers tend to copy and compare automatic metric scores from previous work to claim the superiority of a method or an algorithm without confirming neither exactly the same training, validating, and testing data have been used nor the metric scores are comparable. Furthermore, tools for reporting standardized metric scores are still far from being widely adopted by the MT community. After showing how the accumulation of these pitfalls leads to dubious evaluation, we propose a guideline to encourage better automatic MT evaluation along with a simple meta-evaluation scoring method to assess its credibility., Comment: Camera-ready for ACL2021
- Published
- 2021
- Full Text
- View/download PDF
206. Coreference Resolution in Research Papers from Multiple Domains
- Author
-
Ralph Ewerth, Daniel Uwe Müller, Anett Hoppe, and Arthur Brack
- Subjects
0301 basic medicine ,education.field_of_study ,Coreference ,Computer science ,business.industry ,Population ,02 engineering and technology ,Resolution (logic) ,computer.software_genre ,Task (project management) ,03 medical and health sciences ,Information extraction ,030104 developmental biology ,0202 electrical engineering, electronic engineering, information engineering ,Question answering ,020201 artificial intelligence & image processing ,Artificial intelligence ,education ,F1 score ,Transfer of learning ,business ,computer ,Natural language processing - Abstract
Coreference resolution is essential for automatic text understanding to facilitate high-level information retrieval tasks such as text summarisation or question answering. Previous work indicates that the performance of state-of-the-art approaches (e.g. based on BERT) noticeably declines when applied to scientific papers. In this paper, we investigate the task of coreference resolution in research papers and subsequent knowledge graph population. We present the following contributions: (1) We annotate a corpus for coreference resolution that comprises 10 different scientific disciplines from Science, Technology, and Medicine (STM); (2) We propose transfer learning for automatic coreference resolution in research papers; (3) We analyse the impact of coreference resolution on knowledge graph (KG) population; (4) We release a research KG that is automatically populated from 55,485 papers in 10 STM domains. Comprehensive experiments show the usefulness of the proposed approach. Our transfer learning approach considerably outperforms state-of-the-art baselines on our corpus with an F1 score of 61.4 (+11.0), while the evaluation against a gold standard KG shows that coreference resolution improves the quality of the populated KG significantly with an F1 score of 63.5 (+21.8).
- Published
- 2021
207. 'Garbage In, Garbage Out' Revisited: What Do Machine Learning Application Papers Report About Human-Labeled Training Data?
- Author
-
Jamie Ip, Aayush Shah, Marsha Lotosh, Jenny Weng, R. Stuart Geiger, Rebekah Tang, and Dominique Cope
- Subjects
Social and Information Networks (cs.SI) ,FOS: Computer and information sciences ,Ground truth ,Computer Science - Machine Learning ,Computer science ,business.industry ,media_common.quotation_subject ,Best practice ,Computer Science - Social and Information Networks ,General Medicine ,Machine learning ,computer.software_genre ,Variety (linguistics) ,Task (project management) ,Machine Learning (cs.LG) ,Annotation ,Computer Science - Computers and Society ,Garbage in, garbage out ,Computers and Society (cs.CY) ,Quality (business) ,Social media ,Artificial intelligence ,business ,computer ,media_common - Abstract
Supervised machine learning, in which models are automatically derived from labeled training data, is only as good as the quality of that data. This study builds on prior work that investigated to what extent “best practices” around labeling training data were followed in applied ML publications within a single domain (social media platforms). In this paper, we expand by studying publications that apply supervised ML in a far broader spectrum of disciplines, focusing on human-labeled data. We report to what extent a random sample of ML application papers across disciplines give specific details about whether best practices were followed, while acknowledging that a greater range of application fields necessarily produces greater diversity of labeling and annotation methods. Because much of machine learning research and education only focuses on what is done once a “ground truth” or “gold standard” of training data is available, it is especially relevant to discuss issues around the equally important aspect of whether such data is reliable in the first place. This determination becomes increasingly complex when applied to a variety of specialized fields, as labeling can range from a task requiring little-to-no background knowledge to one that must be performed by someone with career expertise.
- Published
- 2021
- Full Text
- View/download PDF
208. A novel characteristic optimization method based on combined statistical indicators and random forest for oil-paper insulation state diagnosis
- Author
-
Renwu Yan, Qingzhen Liu, Lei Wu, and Chao Cai
- Subjects
Computer science ,media_common.quotation_subject ,Feature vector ,State (functional analysis) ,Space (mathematics) ,computer.software_genre ,Adaptability ,Electronic, Optical and Magnetic Materials ,Random forest ,law.invention ,Set (abstract data type) ,Correlation ,General Energy ,law ,Data mining ,Electrical and Electronic Engineering ,Transformer ,computer ,media_common - Abstract
In order to effectively utilize the dielectric response characteristics of transformers to diagnose the insulation state, this paper proposes a two-level hybrid optimization method for analyzing time-domain dielectric response characteristics. The optimization algorithm is based on the combined statistical indicators (CSI) and random forest (RF) theory. The initial feature space set is formed with 23 time-domain characteristics. In the first-level stage, statistical indices correlation, distance, and information indicator are integrated to assess the synthesis score of the characteristics, while highly redundant and low-class discrimination characteristics are eliminated from the initial space set. In the second-level stage, Random Forest based outside bagging data theory is introduced to evaluate the least important characteristics, and the characteristics with low importance indices are excluded to obtain the final optimal feature space set. The proposed method is carried out on 82 sets of data from actual dielectric response tests on oil-paper insulation transformers. Finally, the final optimal feature space set, along with several other data sets, is tested via different diagnosis methods. The results show that the optimal feature space set obtained via the proposed method outperforms other feature space sets in terms of better adaptability and diagnosis accuracy.
- Published
- 2021
209. Exploiting Position and Contextual Word Embeddings for Keyphrase Extraction from Scientific Papers
- Author
-
Krutarth Patel and Cornelia Caragea
- Subjects
Exploit ,Computer science ,business.industry ,InformationSystems_INFORMATIONSTORAGEANDRETRIEVAL ,SIGNAL (programming language) ,computer.software_genre ,Task (project management) ,law.invention ,PageRank ,Position (vector) ,law ,Benchmark (computing) ,Graph (abstract data type) ,Artificial intelligence ,business ,computer ,Natural language processing ,Word (computer architecture) - Abstract
Keyphrases associated with research papers provide an effective way to find useful information in the large and growing scholarly digital collections. In this paper, we present KPRank, an unsupervised graph-based algorithm for keyphrase extraction that exploits both positional information and contextual word embeddings into a biased PageRank. Our experimental results on five benchmark datasets show that KPRank that uses contextual word embeddings with additional position signal outperforms previous approaches and strong baselines for this task.
- Published
- 2021
210. Canvas White Paper 2 – Cybersecurity and Law
- Author
-
Gloria Gonzzlez Fuster, David-Olivier Jaquet-Chiffelle, Serge Gutwirth, Eva Schlehahn, Lina Jasmontaite, Florent Wenger, Metajuridica, Faculty of Law and Criminology, Law Science Technology and Society, and Fundamental rights centre
- Subjects
Human rights ,media_common.quotation_subject ,Charter ,Fundamental rights ,Legislature ,cybersecurity ,law ,controversies ,Computer security ,computer.software_genre ,Cybercrime ,White paper ,Political science ,Law ,media_common.cataloged_instance ,Data Protection Act 1998 ,European union ,computer ,media_common - Abstract
This White Paper explores the legal dimensions of the European Union (EU)’s value-driven cybersecurity by investigating the notions of ‘value-driven’ and ‘cybersecurity’ from the perspective of EU law. It starts with a general overview of legal issues in current value-driven cybersecurity debates (Chapter 2), showing how values embedded within the framework of EU governing treaties have evolved during the integration process, and the important role they play in the cybersecurity regulation at EU level. Chapter 3 of the White Paper is devoted to the main critical challenges in this area: 1) the varied and sometimes unclear uses of the term ‘cybersecurity’, 2) the roles of stakeholders and the cooperation between them, and the 3) securitization of EU values and interests through cybersecurity rules. Chapter 4 points out and describes specific controversies concerning cybersecurity regulation in the EU. Ten disputed issues are given particular attention: 1) the functioning of human rights as drivers for EU regulation, 2) the regulation of risks to society through individual risk identification and proactive action, 3) the attribution of roles to different stakeholders, 4) how individuals are being awarded with more rights, 5) controllership of data, 6) copyright protection, 7) regulation of online content, 8) the use of encryption, 9) permissibility of massive and generalised surveillance of individuals and 10) counterterrorism measures. Chapter 5 summarises the main findings of the literature review. The White Paper recognises that legislative and policy measures within the cybersecurity domain challenge EU fundamental rights and principles, stemming from EU values. The White Paper concludes that with the constantly growing number of EU measures governing the cybersecurity domain, the embedment of EU values enshrined in the EU Charter within these measures take place both on an ex ante and an ex post basis.
- Published
- 2017
211. An Open Software Platform for the Automated Design of Paper-Based Microfluidic Devices
- Author
-
Nicholas S. DeChiara, Charles R. Mace, and Daniel J. Wilson
- Subjects
Multidisciplinary ,business.industry ,Computer science ,010401 analytical chemistry ,Microfluidics ,lcsh:R ,Process (computing) ,lcsh:Medicine ,02 engineering and technology ,Paper based ,021001 nanoscience & nanotechnology ,computer.software_genre ,01 natural sciences ,Article ,0104 chemical sciences ,Open software ,Software ,Code refactoring ,Software design ,lcsh:Q ,0210 nano-technology ,Software engineering ,business ,lcsh:Science ,computer - Abstract
Paper-based microfluidic devices have many applications in biomedical and environmental analysis. However, the process of prototyping device designs can be tedious, error-prone, and time-consuming. Here, we present a cross-platform, open-source software tool—AutoPAD—developed to quickly create and modify device designs and provide a free alternative to commercial design software. The capabilities that we designed to be inherent to AutoPAD (e.g., automatic zone alignment and design refactoring) highlight its potential use in nearly any paper-based microfluidic device application and for creating nearly any desired design, which we demonstrate through the recreation of numerous device designs from the literature.
- Published
- 2017
212. Catchem: A Browser Plugin for the Panama Papers Using Approximate String Matching
- Author
-
Miika Moilanen, Arttu Niemela, Panos Kostakos, and Mourad Oussalah
- Subjects
Matching (statistics) ,Panama ,Panama Papers ,Information retrieval ,string matching ,Computer science ,corruption ,organised crime ,String searching algorithm ,Work in process ,Approximate string matching ,computer.software_genre ,Memory management ,Index (publishing) ,Plug-in ,computer - Abstract
The Panama Papers is a collection of 11.5 million leaked records that contain information for more than 214,488 offshore entities. This collection is growing rapidly as more leaked records become available online. In this paper, we present a work in progress on a web browser plugin that detects company names from the Panama Papers and alerts the user by means of unobtrusive visual cues. We matched a random sample of company names from the Public Works and Government Services Canada registry against the Panama Papers using three different string matching techniques. Monge-Elkan is found to provide the best matching results but at increased computational cost. Levenshtein-based approach is found to provide the best tradeoff between matching and computational cost, while Jacquard index like approach is found to be less sensitive to slight textual change.
- Published
- 2017
213. Canvas White Paper 3 Attitudes and Opinions Regarding Cybersecurity
- Author
-
Endre Bangerter, Eva Schlehahn, Karsten Weber, Florent Wenger, Reto Inversini, Nadine Kleine, Gwenyth Morgan, Bert Gordijn, and David-Olivier Jaquet-Chiffelle
- Subjects
Empirical data ,National security ,Eurobarometer ,business.industry ,media_common.quotation_subject ,Computer security ,computer.software_genre ,White paper ,State (polity) ,Political science ,business ,computer ,media_common ,Cyber threats - Abstract
This White Paper summarises currently available empirical data about attitudes and opinions of citizens and state actors regarding cybersecurity. The data emerges from reports of EU projects, Eurobarometer surveys, policy documents of state actors and additional scientific papers. It describes what these stakeholders generally think, what they feel, and what they do about cyber threats and security (counter)measures. For citizens’ perspectives, three social spheres of particular interest are examined: 1) health, 2) business, 3) police and national security.
- Published
- 2017
214. HOW COMPUTER-BASED AND PAPER-BASED MODES OF LEARNING AFFECT STUDENT PERFORMANCE ON VOCABULARY TESTS IN THE TOEIC CLASSROOM
- Author
-
Chizuko Aiba, Reiko Yamashita, Jason Barrows, Yusuke Hayasaka, and Nicholas Stone
- Subjects
Vocabulary ,Multimedia ,Computer science ,media_common.quotation_subject ,Computer based ,Paper based ,computer.software_genre ,Affect (psychology) ,TOEIC ,Vocabulary tests ,Learning styles ,ComputingMilieux_COMPUTERSANDEDUCATION ,Mathematics education ,computer ,Cognitive load ,media_common - Abstract
The authors of this paper examined how paper-based vs. computer-based modes of learning affected student performance on TOEIC vocabulary tests for known and unknown words. Japanese university students were tested on two different TOEIC vocabulary registers to see how the mode of learning affected student performance on vocabulary tests. The results show all students, including higher ability students, perform better on paper-based over computer-based tests and this performance is carried through all levels of ability until students become familiar with the vocabulary, and their cognitive load is decreased. This indicates that all students when challenged by new and unknown data would initially perform better with paper-based modes of learning. This has important implications for the teaching of new TOEIC vocabulary both at the institutional and classroom level.
- Published
- 2017
215. Canvas White Paper 1 Cybersecurity and Ethics
- Author
-
Ibo van de Poel, Bert Gordijn, Nadia Kleine, Markus Christen, Michele Loi, Emad Yaghmaei, Gwenyth Morgan, and Karsten Weber
- Subjects
Value (ethics) ,National security ,ComputingMilieux_THECOMPUTINGPROFESSION ,business.industry ,Control (management) ,Subject (philosophy) ,Usability ,Scientific literature ,Computer security ,computer.software_genre ,White paper ,Political science ,business ,computer ,Theme (narrative) - Abstract
This White Paper outlines how the ethical discourse on cybersecurity has developed in the scientific literature, which ethical issues gained interest, which value conflicts are discussed, and where the “blind spots” in the current ethical discourse on cybersecurity are located. The White Paper is based on an extensive literature with a focus on three reference domains with unique types of value conflicts: health, business/finance and national security. For each domain, a systematic literature search has been performed and the identified papers have been analysed using qualitative and quantitative methods. An important observation is that the ethics of cybersecurity not an established subject. In all domains, cybersecurity is recognized as being an instrumental value, not an end in itself, which opens up the possibility of trade-offs with different values in different spheres. The most prominent common theme is the existence of trade-offs and even conflicts between reasonable goals, for example between usability and security, accessibility and security, privacy and convenience. Other prominent common themes are the importance of cybersecurity to sustain trust (in institutions), and the harmful effect of any loss of control over data.
- Published
- 2017
216. The self-blindable U-prove scheme from FC’14 is forgeable (short paper)
- Author
-
Verheul, Eric, Ringers, Sietse, Hoepman, Jaap Henk, Preneel, Bart, Grossklags, Jens, Grossklags, J., and Preneel, B.
- Subjects
Scheme (programming language) ,Theoretical computer science ,Computer science ,Self ,Short paper ,Lecture notes in computer science ,0102 computer and information sciences ,02 engineering and technology ,Construct (python library) ,01 natural sciences ,Credential ,Set (abstract data type) ,010201 computation theory & mathematics ,Issuer ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Point (geometry) ,Digital Security ,computer ,computer.programming_language - Abstract
Recently an unlinkable version of the U-Prove attribute-based credential scheme was proposed at Financial Crypto’14 [9]. Unfortunately, the new scheme is forgeable: if sufficiently many users work together then they can construct new credentials, containing any set of attributes of their choice, without any involvement of the issuer. In this note we show how they can achieve this and we point out the error in the unforgeability proof.
- Published
- 2017
217. The Toilet Paper Automatic Exchanging System with Detecting Stock Function
- Author
-
Yuhki Kitazono and Takumi Saruhashi
- Subjects
Toilet ,Web server ,Web browser ,Database ,Computer science ,Spare part ,Toilet paper ,Color sensor ,computer.software_genre ,computer - Abstract
In this paper, we discuss the toilet paper automatic exchanging system that we have developed and improvement. This system can exchange toilet paper in automatically. The system measures color of the toilet paper and its core by using the color sensor. The system judges the toilet paper is already used up or not based on measured RGB value. If the system judged the toilet paper is already used up, the system exchanges toilet paper. This system also can stock some spare toilet paper in the back of the system. The system measures the number of spare toilet paper and sends its data to web server. The toilet administrator or cleaning company can check the rest of toilet spare toilet paper through web browser. Therefore, the administrator can provide toilet paper in efficiently. By using developed system, toilet administrator or cleaning company replenishes toilet paper only and user who uses the restroom doesn't need to exchange toilet paper.
- Published
- 2017
218. Computational Psychiatry Research Map (CPSYMAP): A New Database for Visualizing Research Papers
- Author
-
Ayaka Kato, Yoshihiko Kunisato, Kentaro Katahira, Tsukasa Okimura, and Yuichi Yamashita
- Subjects
Open science ,medicine.medical_specialty ,Computer science ,lcsh:RC435-571 ,RDoC = Research Domain Criteria ,computer.software_genre ,Field (computer science) ,DSM-5 ,Scientific evidence ,neuroscience ,03 medical and health sciences ,0302 clinical medicine ,Multidisciplinary approach ,lcsh:Psychiatry ,medicine ,Methods ,open-science ,Psychiatry ,database ,Computational neuroscience ,Database ,computational psychiatry ,030227 psychiatry ,Visualization ,Psychiatry and Mental health ,computer ,030217 neurology & neurosurgery - Abstract
The field of computational psychiatry is growing in prominence along with recent advances in computational neuroscience, machine learning, and the cumulative scientific understanding of psychiatric disorders. Computational approaches based on cutting-edge technologies and high-dimensional data are expected to provide an understanding of psychiatric disorders with integrating the notions of psychology and neuroscience, and to contribute to clinical practices. However, the multidisciplinary nature of this field seems to limit the development of computational psychiatry studies. Computational psychiatry combines knowledge from neuroscience, psychiatry, and computation; thus, there is an emerging need for a platform to integrate and coordinate these perspectives. In this study, we developed a new database for visualizing research papers as a two-dimensional “map” called the Computational Psychiatry Research Map (CPSYMAP). This map shows the distribution of papers along neuroscientific, psychiatric, and computational dimensions to enable anyone to find niche research and deepen their understanding ofthe field.
- Published
- 2020
219. Translation, from Pen-and-Paper to Computer-Assisted Tools (CAT Tools) and Machine Translation (MT)
- Author
-
Bianca Han
- Subjects
0209 industrial biotechnology ,Machine translation ,Computer science ,Process (engineering) ,Cloud computing ,applied linguistics ,lcsh:A ,02 engineering and technology ,Translation (geometry) ,computer.software_genre ,translation process ,01 natural sciences ,Bridge (nautical) ,CAT tools ,machine translation ,020901 industrial engineering & automation ,Human–computer interaction ,business.industry ,communication ,010401 analytical chemistry ,Novelty ,Applied linguistics ,0104 chemical sciences ,Variety (cybernetics) ,lcsh:General Works ,business ,computer - Abstract
This paper reflects the technology-induced novelty of translation, which is perceived as a bridge between languages and cultures. We debate the extent to which the translation process maintains its specificity in the light of the new technology-enhanced working methods ensured by a large variety of Computer-Assisted Translation (CAT) and Machine Translation (MT) tools that aim to enhance the process, which includes the translation itself, the translator, the translation project manager, the linguist, the terminologist, the reviewer, and the client. This paper also hints at the topic from the perspective of the translation teacher, who needs to provide students with transversal competencies that are suitable for the digital area, supported by the ability to tackle Cloud-based translation tools, in view of Industry 4.0 requirements.
- Published
- 2020
220. Conference paper
- Author
-
Michael Goldsmith, Mary K. Bispham, Ioannis Agrafiotis, Mori, P, Furnell, S, and Camp, O
- Subjects
Exploit ,Computer science ,05 social sciences ,Natural language understanding ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Dialogue management ,050105 experimental psychology ,Speech interface ,Adversarial system ,OODA loop ,0202 electrical engineering, electronic engineering, information engineering ,0501 psychology and cognitive sciences ,computer - Abstract
This paper presents an attack and defence modelling framework for conceptualising the security of the speech interface. The modelling framework is based on the Observe-Orient-Decide-Act (OODA) loop model, which has been used to analyse adversarial interactions in a number of other areas. We map the different types of attacks that may be executed via the speech interface to the modelling framework, and present a critical analysis of the currently available defences for countering such attacks, with reference to the modelling framework. The paper then presents proposals for the development of new defence mechanisms that are grounded in the critical analysis of current defences. These proposals envisage a defence capability that would enable voice-controlled systems to detect potential attacks as part of their dialogue management functionality. In accordance with this high-level defence concept, the paper presents two specific proposals for defence mechanisms to be implemented as part of dialogue management functionality to counter attacks that exploit unintended functionality in speech recognition functionality and natural language understanding functionality. These defence mechanisms are based on the novel application of two existing technologies for security purposes. The specific proposals include the results of two feasibility tests that investigate the effectiveness of the proposed mechanisms in defending against the relevant type of attack.
- Published
- 2020
221. Security and Privacy Dimensions in Next Generation DDDAS/Infosymbiotic Systems: A Position Paper
- Author
-
Li Xiong and Vaidy S. Sunderam
- Subjects
Computer science ,Dynamic data ,Scale (chemistry) ,Volume (computing) ,Wearable computer ,Context (language use) ,security ,privacy ,Computer security ,computer.software_genre ,dddas ,General Earth and Planetary Sciences ,Leverage (statistics) ,Position paper ,infosymbiotics ,computer ,General Environmental Science - Abstract
The omnipresent pervasiveness of personal devices will expand the applicability of the Dynamic Data Driven Application Systems (DDDAS) paradigm in innumerable ways. While every single smartphone or wearable device is potentially a sensor with powerful computing and data capabilities, privacy and security in the context of human participants must be addressed to leverage the infinite possibilities of dynamic data driven application systems. We propose a security and privacy preserving framework for next generation systems that harness the full power of the DDDAS paradigm while (1) ensuring provable privacy guarantees for sensitive data; (2) enabling field-level, intermediate, and central hierarchical feedback-driven analysis for both data volume mitigation and security; and (3) intrinsically addressing uncertainty caused either by measurement error or security-driven data perturbation. These thrusts will form the foundation for secure and private deployments of large scale hybrid participant-sensor DDDAS systems of the future.
- Published
- 2015
222. Assessment of spatial abilities through paper-based and online tests
- Author
-
Andrea Kárpáti and Bernadett Babály
- Subjects
Psychiatry and Mental health ,business.industry ,Computer science ,Artificial intelligence ,Paper based ,business ,Machine learning ,computer.software_genre ,computer - Published
- 2015
223. Development of hydrophobic paper substrates using silane and sol–gel based processes and deriving the best coating technique using machine learning strategies
- Author
-
Kapil Manoharan, Mohd. Tahir Anwar, and Shantanu Bhattacharya
- Subjects
Materials science ,Fabrication ,Science ,02 engineering and technology ,Substrate (printing) ,engineering.material ,010402 general chemistry ,Machine learning ,computer.software_genre ,01 natural sciences ,Dip-coating ,Characterization and analytical techniques ,Article ,Contact angle ,chemistry.chemical_compound ,Coating ,Sol-gel ,Spin coating ,Multidisciplinary ,business.industry ,021001 nanoscience & nanotechnology ,Silane ,Surface chemistry ,Mechanical engineering ,0104 chemical sciences ,Design, synthesis and processing ,chemistry ,engineering ,Medicine ,Artificial intelligence ,0210 nano-technology ,business ,computer - Abstract
Low energy surface coatings have found wide range of applications for generating hydrophobic and superhydrophobic surfaces. Most of the studies have been related to use of a single coating material over a single substrate or using a single technique. The degree of hydrophobicity is highly dependent on fabrication processes as well as materials being coated and as such warrants a high-level study using experimental optimization leading to the evaluation of the parametric behavior of coatings and their application techniques. Also, a single platform or system which can predict the required set of parameters for generating hydrophobic surface of required nature for given substrate is of requirement. This work applies the powerful machine learning algorithms (Levenberg Marquardt using Gauss Newton and Gradient methods) to evaluate the various processes affecting the anti-wetting behavior of coated printable paper substrates with the capability to predict the most optimized method of coating and materials that may lead to a desirable surface contact angle. The major application techniques used for this study pertain to dip coating, spray coating, spin coating and inkjet printing and silane and sol–gel base coating materials.
- Published
- 2021
224. Why Don’t Developers Detect Improper Input Validation? '; DROP TABLE Papers;
- Author
-
Enrico Fregnan, Larissa Braz, Gul Calikli, and Alberto Bacchelli
- Subjects
Improper input validation ,Code review ,SQL injection ,business.industry ,Computer science ,Software development ,Table (database) ,Software system ,business ,computer.software_genre ,Computer security ,computer ,Vulnerability (computing) - Abstract
Improper Input Validation (IIV) is a software vulnerability that occurs when a system does not safely handle input data. Even though IIV is easy to detect and fix, it still commonly happens in practice. In this paper, we study to what extent developers can detect IIV and investigate underlying reasons. This knowledge is essential to better understand how to support developers in creating secure software systems. We conduct an online experiment with 146 participants, of which 105 report at least three years of professional software development experience. Our results show that the existence of a visible attack scenario facilitates the detection of IIV vulnerabilities and that a significant portion of developers who did not find the vulnerability initially could identify it when warned about its existence. Yet, a total of 60 participants could not detect the vulnerability even after the warning. Other factors, such as the frequency with which the participants perform code reviews, influence the detection of IIV. Preprint: https://arxiv.org/abs/2102.06251. Data and materials: https://doi.org/10.5281/zenodo.3996696.
- Published
- 2021
225. Demonstration Paper: Monitoring Machine Learning Contracts with QoA4ML
- Author
-
Minh-Tri Nguyen and Hong-Linh Truong
- Subjects
Service (business) ,business.industry ,Computer science ,Service contract ,02 engineering and technology ,Machine learning ,computer.software_genre ,System monitoring ,Set (abstract data type) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,computer - Abstract
Using machine learning (ML) services, both service customers and providers need to monitor complex contractual constraints of ML service that are strongly related to ML models and data. Therefore, establishing and monitoring comprehensive ML contracts are crucial in ML serving. This paper demonstrates a set of features and utilities of the QoA4ML framework for ML contracts.
- Published
- 2021
226. AutoKG - An Automotive Domain Knowledge Graph for Software Testing: A position paper
- Author
-
Vaibhav Kesri, Anmol Nayak, and Karthikeyan Ponnalagu
- Subjects
business.industry ,Computer science ,Ontology (information science) ,computer.software_genre ,Pipeline (software) ,Domain (software engineering) ,Software ,Systems development life cycle ,Graph (abstract data type) ,Domain knowledge ,Data mining ,Software system ,business ,computer - Abstract
—Industries have a significant amount of data in semi-structured and unstructured formats which are typically captured in text documents, spreadsheets, images, etc. This is especially the case with the software description documents used by domain experts in the automotive domain to perform tasks at various phases of the Software Development Life Cycle (SDLC). In this paper, we propose an end-to-end pipeline to extract an Automotive Knowledge Graph (AutoKG) from textual data using Natural Language Processing (NLP) techniques with the application of automatic test case generation. The proposed pipeline primarily consists of the following components: 1) AutoOntology, an ontology that has been derived by analyzing several industry scale automotive domain software systems, 2) AutoRE, a Relation Extraction (RE) model to extract triplets from various sentence types typically found in the automotive domain, and 3) AutoVec, a neural embedding based algorithm for triplet matching and context-based search. We demonstrate the pipeline with an application of automatic test case generation from requirements using AutoKG.
- Published
- 2021
- Full Text
- View/download PDF
227. Protocol paper Aging & Autism Geurts ea
- Author
-
van Rentergem Ja, van der Putten W, Groenman A, Geurts H, Torenvliet C, and Radhoe T
- Subjects
Computer science ,business.industry ,medicine ,Autism ,Artificial intelligence ,medicine.disease ,computer.software_genre ,business ,Protocol (object-oriented programming) ,computer ,Natural language processing - Abstract
Autism spectrum conditions (ASC) develop early in life and are thought to last a lifetime. However, ASC research has two major knowledge gaps that hinder progression in understanding the concept of ASC and in providing proper support for autistic adults: 1) the majority of knowledge about ASC mainly stems from childhood studies so little is known about older autistic adults; 2) while it is broadly recognized that ASC is a heterogeneous condition, we do not yet understand the differences in trajectories leading to their future outcome. We aim to fill both knowledge gaps.A multistage overlapping cohorts design assessing (cognitive) aging in ASC, is designed to obtain an accelerated longitudinal dataset. Data, including a multitude of questionnaires, diagnostics, and cognitive tests, are collected over four waves within a 10-year time frame. This will provide information regarding actual changes in quality of life, co-occurring health conditions, and cognition as well as the possibility to test external validity and temporal stability in newly formed behavioral subtypes. Participants consist of three groups of adults aged 20 to 90 years: 1) with a clinical diagnosis of ASC; 2) with a clinical diagnosis of ADHD, but no ASC; 3) no ASC/ADHD (i.e., comparison group; COM). The sample size differs between waves and instruments. Detailed analysis plans will be preregistered in AsPredicted or at the Open Science Framework. Ethical approval for this study was obtained from the ethical review board of the Department of Psychology of the University of Amsterdam (Wave 1 2011-PN-1952 and 2013-PN-2668, Wave 2 2015-BC-4270, Wave 3 and 4 2018-BC-9285). In line with the funding policies of the grant organization funding this study, future papers will be published open access.
- Published
- 2021
228. Automated Patch Backporting in Linux (Experience Paper)
- Author
-
Xiang Gao, Gregory J. Duck, Abhik Roychoudhury, Julia Lawall, Shin Hwei Tan, Ridwan Shariffdeen, National University of Singapore (NUS), Southern University of Science and Technology of China (SUSTech), Well Honed Infrastructure Software for Programming Environments and Runtimes ( Whisper), Inria de Paris, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-LIP6, Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), This research is partially supported by the National Research FoundationSingapore (National Satellite of Excellence in Trustworthy SoftwareSystems), and the National Natural Science Foundation of China(Grant No.61902170)., Southern University of Science and Technology (SUSTech), Well Honed Infrastructure Software for Programming Environments and Runtimes (Whisper), and Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)
- Subjects
Computer science ,Program transformation ,020207 software engineering ,Rule-based system ,Linux kernel ,02 engineering and technology ,Software maintenance ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,computer.software_genre ,Patch Backporting ,Tree (data structure) ,Program Transformation ,Linux Kernel ,020204 information systems ,Kernel (statistics) ,0202 electrical engineering, electronic engineering, information engineering ,Operating system ,Backporting ,Precision and recall ,computer - Abstract
International audience; Whenever a bug or vulnerability is detected in the Linux kernel, the kernel developers will endeavour to fix it by introducing a patch into the mainline version of the Linux kernel source tree. However, many users run older "stable" versions of Linux, meaning that the patch should also be "backported" to one or more of these older kernel versions. This process is error-prone and there is usually a long delay in publishing the backported patch. Based on an empirical study, we show that around 8% of all commits submitted to Linux mainline are backported to older versions, but often more than one month elapses before the backport is available. Hence, we propose a patch backporting technique that can automatically transfer patches from the mainline version of Linux into older stable versions. Our approach first synthesizes a partial transformation rule based on a Linux mainline patch. This rule can then be generalized by analysing the alignment between the mainline and target versions. The generalized rule is then applied to the target version to produce a backported patch. We have implemented our transformation technique in a tool called FixMorph and evaluated it on 350 Linux mainline patches. FixMorph correctly backports 75.1% of them. Compared to existing techniques, FixMorph improves both the precision and recall in backporting patches. Apart from automation of software maintenance tasks, patch backporting helps in reducing the exposure to known security vulnerabilities in stable versions of the Linux kernel.
- Published
- 2021
229. Physics driven behavioural clustering of free-falling paper shapes
- Author
-
Fumiya Iida, Toby Howison, Josie Hughes, Fabio Giardina, Howison, Toby [0000-0001-8548-5550], Iida, Fumiya [0000-0001-9246-7190], and Apollo - University of Cambridge Repository
- Subjects
Inertia ,Physiology ,Physical system ,Social Sciences ,computer.software_genre ,Systems Science ,01 natural sciences ,010305 fluids & plasmas ,Physical Phenomena ,Physical phenomena ,Medicine and Health Sciences ,Psychology ,Cluster Analysis ,Moment of Inertia ,Multidisciplinary ,Applied Mathematics ,Simulation and Modeling ,theoretical model ,article ,Classical Mechanics ,Dynamical Systems ,Variety (cybernetics) ,Free falling ,machine learning ,Physical Sciences ,Medicine ,physics ,Algorithms ,Research Article ,Paper ,Computer and Information Sciences ,Reynolds Number ,Science ,Fluid Mechanics ,Research and Analysis Methods ,Machine learning ,Continuum Mechanics ,Motion ,Machine Learning Algorithms ,Artificial Intelligence ,0103 physical sciences ,010306 general physics ,Set (psychology) ,Cluster analysis ,Behavior ,Biological Locomotion ,business.industry ,Biology and Life Sciences ,Fluid Dynamics ,Models, Theoretical ,Nonlinear Dynamics ,Artificial intelligence ,business ,computer ,Mathematics - Abstract
Many complex physical systems exhibit a rich variety of discrete behavioural modes. Often, the system complexity limits the applicability of standard modelling tools. Hence, understanding the underlying physics of different behaviours and distinguishing between them is challenging. Although traditional machine learning techniques could predict and classify behaviour well, typically they do not provide any meaningful insight into the underlying physics of the system. In this paper we present a novel method for extracting physically meaningful clusters of discrete behaviour from limited experimental observations. This method obtains a set of physically plausible functions that both facilitate behavioural clustering and aid in system understanding. We demonstrate the approach on the V-shaped falling paper system, a new falling paper type system that exhibits four distinct behavioural modes depending on a few morphological parameters. Using just 49 experimental observations, the method discovered a set of candidate functions that distinguish behaviours with an error of 2.04%, while also aiding insight into the physical phenomena driving each behaviour. © 2019 Howison et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- Published
- 2019
230. Michitake Aso. Rubber and the Making of Vietnam. An Ecological History, 1897–1975. [Flows, Migrations, and Exchanges.] University of North Carolina Press, Chapel Hill (NC)2018. xvii, 405 pp. Ill. Maps. $90.00. (Paper: $32.95; E-book: $23.99.)
- Author
-
Robert Keenan
- Subjects
History ,Chapel ,computer ,Archaeology ,Making-of ,Social Sciences (miscellaneous) ,computer.programming_language - Published
- 2020
231. Introduction to the Special Issue on Logic Rules and Reasoning: Selected Papers from the 2nd International Joint Conference on Rules and Reasoning (RuleML+RR 2018)
- Author
-
Christoph Benzmüller, Xavier Parent, and Francesco Ricca
- Subjects
RuleML ,Computational Theory and Mathematics ,Artificial Intelligence ,Hardware and Architecture ,Computer science ,Programming language ,Joint (building) ,Rule of inference ,computer.software_genre ,computer ,Software ,Theoretical Computer Science - Published
- 2020
232. Bringing the Best Actionable Insights on Cybersecurity: A Call for Papers
- Author
-
Dave Chatterjee
- Subjects
Computational Theory and Mathematics ,Publishing ,business.industry ,Political science ,Computer security ,computer.software_genre ,business ,computer ,Computer Science Applications ,Information Systems - Abstract
Dear Prospective Authors: I am delighted to inform you that this game-changing publishing initiative for bringing the best actionable insights on cybersecurity is entering its third year. The revie...
- Published
- 2020
233. A Paper Recommendation System with ReaderBench: The Graphical Visualization of Semantically Related Papers and Concepts
- Author
-
Mihai Dascalu, Ionut Cristian Paraschiv, Stefan Trausan-Matu, Philippe Dessus, Danielle S. McNamara, 'Politehnica' Université de Bucarest, Roumanie, Romanian Academy of Sciences, Laboratoire de Recherche sur les Apprentissages en Contexte (LaRAC), Université Grenoble Alpes [2016-2019] (UGA [2016-2019]), Arizona State University [Tempe] (ASU), NSF grants 1417997 and 1418378 to Arizona State University, Y. Li, M. Chang, M. Kravcik, E. Popescu, R. Huang, Kinshuk, N.-S. Chen, European Project: 212578,EC:FP7:ICT,FP7-ICT-2007-1,LTFLL(2008), European Project: 159/1.5/S/134398,POSDRU, Dessus, Philippe, Language Technology for Lifelong Learning - LTFLL - - EC:FP7:ICT2008-03-01 - 2011-02-28 - 212578 - VALID, and POSDRU/159/1.5/S/134398 - POSDRU - 159/1.5/S/134398 - INCOMING
- Subjects
semantic similarity ,Computer science ,Discourse analysis ,[SHS.EDU]Humanities and Social Sciences/Education ,[SHS.EDU] Humanities and Social Sciences/Education ,02 engineering and technology ,Recommender system ,computer.software_genre ,paper recommendation system ,scientometrics ,050105 experimental psychology ,Semantic similarity ,0202 electrical engineering, electronic engineering, information engineering ,0501 psychology and cognitive sciences ,discourse analysis ,Information retrieval ,business.industry ,05 social sciences ,Science Citation Index ,Information technology ,Scientometrics ,Visualization ,Metadata ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,computer ,Natural language processing - Abstract
International audience; The task of tagging papers with semantic metadata in order to analyze their relatedness represents a good foundation for a paper recommender system. The analysis from this paper extends from previous research in order to create a graph of papers from a specific domain with the purpose of determining each article's importance within the considered corpus of papers. Moreover, as non-latent representations are powerful when used in conjunction with latent ones, our system retrieves semantically close words, not present in the paper, in order to improve the retrieval of papers. Our previous analyses used the semantic representation of papers in different semantic models with the purpose of creating visual graphs based on the semantic relatedness links between the abstracts. The current analysis takes a step forward by proposing a model that can suggest which papers are of the highest relevance, share similar concepts, and are semantically related with the initial query. Our study is performed using paper abstracts in the field of information technology extracted from the Web of Science citation index. The research includes a use case and its corresponding results by using interactive and exploratory network graph representations.
- Published
- 2016
234. A New Segmentation Method for Integrated ICS (Short Paper)
- Author
-
Nora Cuppens, David Espes, Khaoula Es-Salhi, Département Systèmes Réseaux, Cybersécurité et Droit du numérique (IMT Atlantique - SRCD), IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT), École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), Département Logique des Usages, Sciences sociales et Sciences de l'Information (IMT Atlantique - LUSSI), Institut Mines-Télécom [Paris] (IMT)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), and Institut Mines-Télécom [Paris] (IMT)-École Nationale d'Ingénieurs de Brest (ENIB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)
- Subjects
Computer science ,Short paper ,Industrial control system ,Integrated circuit ,computer.software_genre ,law.invention ,03 medical and health sciences ,Identification (information) ,0302 clinical medicine ,030502 gerontology ,law ,[INFO.INFO-SY]Computer Science [cs]/Systems and Control [cs.SY] ,Segmentation ,Data mining ,0305 other medical science ,computer ,030217 neurology & neurosurgery - Abstract
International audience; The paper presents a new segmentation method for Integrated ICS (Industrial Control Systems) with Corporate system. This new method aims at simplifying security zones identification by focusing only on the system's aspects that are really relevant for segmentation taking into account the system's constraints. Multiple research works have studied IICS (Inte-grated ICS) segmentation but their solutions are unfortunately not generic enough and do not sufficiently take into account all of the Integrated ICS specificity. Our new method tries to address the problem more efficiently by providing realistic and pragmatic answers to the issue while remaining sufficiently generic to be applied to different types of Integrated ICS.
- Published
- 2017
235. READING ON PAPER AND DIGITAL SCREENING IN STUDENTS OF JOURNALISM AND FOREIGN LANGUAGES OF UNIVERSITIES OF MANIZALES, COLOMBIA AND KHARKIV, UKRAINE
- Author
-
L.M. Ramírez and L.V. Konstantinova
- Subjects
reading on paper ,digital reading ,computer ,universities - Abstract
The main objective of the current research was to evaluate aspects of the process of reading of printed text and of computerized text by considering students of Communication and Journalism of the University of Manizales, Colombia and students of Foreign Languages Department of Skovoroda Kharkiv National Pedagogical University, Ukraine. Statistically significant differences were found in the number of weekly hours of computer use by students according to the participating universities (p = 0.00). The analysis also determined significant differences between the grades received by those who used paper (p = 0.000) and digital (p = 0.000), with the results being higher in both cases for the students of Foreign Languages Department of Skovoroda Kharkiv National Pedagogical University- NPUK (Statistician U of Mann- Whitney).
- Published
- 2017
- Full Text
- View/download PDF
236. Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers
- Author
-
Mohammad Mannan and Nayanamana Samarasinghe
- Subjects
Web server ,computer.internet_protocol ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Short paper ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,IPv4 ,Networking hardware ,Preliminary analysis ,SCADA ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Search interface ,Internet of Things ,business ,computer - Abstract
Recently, high-speed IPv4 scanners, such as ZMap, have enabled rapid and timely collection of TLS certificates and other security-sensitive parameters. Such large datasets led to the development of the Censys search interface, facilitating comprehensive analysis of TLS deployments in the wild. Several recent studies analyzed TLS certificates as deployed in web servers. Beyond public web servers, TLS is deployed in many other Internet-connected devices, at home and enterprise environments, and at network backbones. In this paper, we report the results of a preliminary analysis using Censys on TLS deployments in such devices (e.g., routers, modems, NAS, printers, SCADA, and IoT devices in general). We compare certificates and TLS connection parameters from a security perspective, as found in common devices with Alexa 1M sites. Our results highlight significant weaknesses, and may serve as a catalyst to improve TLS security for these devices.
- Published
- 2017
237. Towards Inverse Uncertainty Quantification in Software Development (Short Paper)
- Author
-
Carlo Bellettini, Patrizia Scandurra, Angelo Gargantini, and Matteo Camilli
- Subjects
Online model ,021103 operations research ,Computer science ,business.industry ,Calibration (statistics) ,Short paper ,0211 other engineering and technologies ,Software development ,Inverse ,020207 software engineering ,02 engineering and technology ,computer.software_genre ,Bayesian inference ,Formal specification ,0202 electrical engineering, electronic engineering, information engineering ,Data mining ,Uncertainty quantification ,business ,computer - Abstract
With the purpose of delivering more robust systems, this paper revisits the problem of Inverse Uncertainty Quantification that is related to the discrepancy between the measured data at runtime (while the system executes) and the formal specification (i.e., a mathematical model) of the system under consideration, and the value calibration of unknown parameters in the model. We foster an approach to quantify and mitigate system uncertainty during the development cycle by combining Bayesian reasoning and online Model-based testing.
- Published
- 2017
238. Best Paper from the Twelfth ITU Kaleidoscope Academic Conference
- Author
-
Kai Jakobs, Mostafa Hashem Sherif, Christoph Dosch, Alessia Magliarditi, and Yoshitoshi Murata
- Subjects
Engineering ,Network architecture ,Computer Networks and Communications ,business.industry ,Kaleidoscope ,Management of Technology and Innovation ,Special section ,International telecommunication ,Safety, Risk, Reliability and Quality ,business ,Telecommunications ,Law ,computer ,computer.programming_language - Abstract
This special section presents an updated version of the paper that won the first prize award in the ITU (International Telecommunication Union) Kaleidoscope conference (K-2020).
- Published
- 2021
239. A Review Paper Implementation of Indonesian Text-to-Speech using Java
- Author
-
Rifki Wijaya and Tito Waluyo Purboyo
- Subjects
Java ,Computer science ,business.industry ,General Engineering ,Speech synthesis ,computer.software_genre ,language.human_language ,Indonesian ,language ,Artificial intelligence ,business ,computer ,Natural language processing ,computer.programming_language - Published
- 2019
240. IMPLEMENTATION OF DIGITAL SIGNATURE FOR RESEARCH PAPER LEGALIZATION, AUTHENTICATION AND RATIFICATION CASE STUDY: TRAINING CENTER FOR NATIONAL CYBER AND CRYPTO AGENCY
- Author
-
Budi Siswanto and Dian Surgawiwaha
- Subjects
Training center ,Digital signature ,Computer science ,Agency (sociology) ,Computer security ,computer.software_genre ,Ratification ,computer ,Authentication (law) ,Legalization - Published
- 2019
241. What is an education paper?
- Author
-
Shriram Krishnamurthi
- Subjects
PEARL (programming language) ,Computer science ,ComputingMilieux_COMPUTERSANDEDUCATION ,Track (rail transport) ,computer ,Software ,computer.programming_language ,Visual arts - Abstract
We recently renamed our “education” track’s papers from Education Pearl to Education Matters. This would be a good time to explain our vision for the track as a whole, as well as this specific renaming.
- Published
- 2021
242. Touring the MetaCoq Project (Invited Paper)
- Author
-
Matthieu Sozeau, Sozeau, Matthieu, Gallinette : vers une nouvelle génération d'assistant à la preuve (LS2N - équipe GALLINETTE), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire des Sciences du Numérique de Nantes (LS2N), Université de Nantes - UFR des Sciences et des Techniques (UN UFR ST), Université de Nantes (UN)-Université de Nantes (UN)-École Centrale de Nantes (ECN)-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Nantes - UFR des Sciences et des Techniques (UN UFR ST), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), Laboratoire des Sciences du Numérique de Nantes (LS2N), Gallinette : vers une nouvelle génération d'assistant à la preuve (GALLINETTE), IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Université de Nantes (UN)-Université de Nantes (UN)-École Centrale de Nantes (ECN)-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), and Université de Nantes (UN)-Université de Nantes (UN)-École Centrale de Nantes (ECN)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
FOS: Computer and information sciences ,Computer Science - Logic in Computer Science ,Computer science ,0102 computer and information sciences ,02 engineering and technology ,computer.software_genre ,01 natural sciences ,Dependent type ,Metatheory ,0202 electrical engineering, electronic engineering, information engineering ,Implementation ,ComputingMilieux_MISCELLANEOUS ,Computer Science - Programming Languages ,[INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL] ,Syntax (programming languages) ,Programming language ,Proof assistant ,020207 software engineering ,Construct (python library) ,Monad (functional programming) ,Logic in Computer Science (cs.LO) ,[INFO.INFO-PL] Computer Science [cs]/Programming Languages [cs.PL] ,Type theory ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,010201 computation theory & mathematics ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,computer ,Programming Languages (cs.PL) - Abstract
Proof assistants are getting more widespread use in research and industry to provide certified and independently checkable guarantees about theories, designs, systems and implementations. However, proof assistant implementations themselves are seldom verified, although they take a major share of the trusted code base in any such certification effort. In this area, proof assistants based on Higher-Order Logic enjoy stronger guarantees, as self-certified implementations have been available for some years. One cause of this difference is the inherent complexity of dependent type theories together with their extensions with inductive types, universe polymorphism and complex sort systems, and the gap between theory on paper and practical implementations in efficient programming languages. MetaCoq is a collaborative project that aims to tackle these difficulties to provide the first fully-certified realistic implementation of a type checker for the full calculus underlying the Coq proof assistant. To achieve this, we refined the sometimes blurry, if not incorrect, specification and implementation of the system. We show how theoretical tools from this community such as bidirectional type-checking, Tait-Martin-L\"of/Takahashi's confluence proof technique and monadic and dependently-typed programming can help construct the following artefacts: a specification of Coq's syntax and type theory, the Polymorphic Cumulative Calculus of (Co)-Inductive Constructions (PCUIC); a monad for the manipulation of raw syntax and interaction with the Coq system; a verification of PCUIC's metatheory, whose main results are the confluence of reduction, type preservation and principality of typing; a realistic, correct and complete type-checker for PCUIC; a sound type and proof erasure procedure from PCUIC to untyped lambda-calculus, i.e., the core of the extraction mechanism of Coq., Comment: In Proceedings LFMTP 2021, arXiv:2107.07376
- Published
- 2021
243. Metadata Extraction based on Deep Learning from Academic Paper in PDF
- Author
-
Sung-Pil Choi, Seon-yeong Ji, Hee-Seok Jeong, Hwa-Mook Yoon, and Seon-Wu Kim
- Subjects
Metadata ,Information extraction ,Information retrieval ,Text mining ,Computer science ,business.industry ,Deep learning ,Extraction (chemistry) ,Artificial intelligence ,computer.software_genre ,business ,computer - Published
- 2019
244. Survey Paper on PAPR Reduction for MIMO-OFDM Systems using Different PTS Scheme
- Author
-
Munna Lal Jatav and Pooja Gautam
- Subjects
Scheme (programming language) ,Reduction (complexity) ,Computer science ,Electronic engineering ,MIMO-OFDM ,computer ,computer.programming_language - Published
- 2019
245. Intrusion Detection System Classification Using Different Machine Learning Algorithms on KDD-99 and NSL-KDD Datasets - A Review Paper
- Author
-
Munther Abualkibash and Ravipati Rama Devi
- Subjects
Computer science ,business.industry ,020206 networking & telecommunications ,02 engineering and technology ,Intrusion detection system ,Machine learning ,computer.software_genre ,Term (time) ,Constant false alarm rate ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Anomaly detection ,Artificial intelligence ,False alarm ,Detection rate ,business ,Algorithm ,computer - Abstract
Intrusion Detection System (IDS) has been an effective way to achieve higher security in detecting malicious activities for the past couple of years. Anomaly detection is an intrusion detection system. Current anomaly detection is often associated with high false alarm rates and only moderate accuracy and detection rates because it’s unable to detect all types of attacks correctly. An experiment is carried out to evaluate the performance of the different machine learning algorithms using KDD-99 Cup and NSL-KDD datasets. Results show which approach has performed better in term of accuracy, detection rate with reasonable false alarm rate.
- Published
- 2019
246. MODALITY MARKERS IN TEXT SEMANTICS OF THE RESEARCH PAPER ABSTRACT
- Author
-
Tetiana A. Mironchuk and Natalia A. Odarchuk
- Subjects
Modality (human–computer interaction) ,Computer science ,business.industry ,Artificial intelligence ,Semantics ,computer.software_genre ,business ,computer ,Natural language processing - Published
- 2019
247. A Visualization Approach of Air Quality Index using R Review Paper
- Author
-
Martand Pratap Singh
- Subjects
Computer science ,Data mining ,computer.software_genre ,Air quality index ,computer ,Visualization - Published
- 2019
248. Fuel Theft Detection and Location Tracing using Internet of Things: A Review paper
- Author
-
Ashwini Patil
- Subjects
Computer science ,business.industry ,Tracing ,Computer security ,computer.software_genre ,Internet of Things ,business ,computer - Published
- 2019
249. A Survey Paper on Blockchain Technology
- Author
-
Deepa Mahajan
- Subjects
Blockchain ,Computer science ,Computer security ,computer.software_genre ,computer - Published
- 2019
250. Review Paper on Data Integrity for Cloud
- Author
-
Pankaj Pratap Singh, Shivani Kaushik, Anirudh Tripathi, and Amit Kishor
- Subjects
Computer science ,business.industry ,Data integrity ,Cloud computing ,Computer security ,computer.software_genre ,business ,computer - Published
- 2019
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.