Filters








4,701 Hits in 19.7 sec

Supporting human memory in personal information management

David Elsweiler
2008 SIGIR Forum  
The organisation of documents helps the recovery from this type of memory failure because the organisation captures the context of the documents' use, and can therefore cue improved recollection.  ...  The latter form of tools are by far the most ubiquitous and therefore most of the research relating to personal information management behaviour relates to this type of tool.  ...  Supporting Memory in Email re-finding that the participants may have used their existing strategies was that they did not have the practice time necessary to learn the most effective way to use the MemoMail  ... 
doi:10.1145/1394251.1394270 fatcat:lizo3nyesfamfduwtsmatrufu4

Computational Air Traffic Management

Marc Anthony Azzopardi, James F. Whidborne
2011 2011 IEEE/AIAA 30th Digital Avionics Systems Conference  
This work advances the field of ATM as well as the fields of Computational Intelligence and Dynamic Optimisation of High Dimensionality Non-Convex Search Spaces. iii DEDICATIONS To my brother Carl, my  ...  The system offers unique advantages in terms of resilience to disruption, efficiency and future scalability.  ...  Complexity theory [2.4] tells us that as the number of managed aircraft increase, the exponential combinatorial expansion of the highly non-convex search space, makes systematic deterministic approaches  ... 
doi:10.1109/dasc.2011.6095967 fatcat:5kfu6ba5h5g7pdffh7z3ftdjai

Policy-based self-management of wireless ad hoc networks

Antonis M. Hadjiantonis, George Pavlou
2009 2009 IFIP/IEEE International Symposium on Integrated Network Management  
All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is d e p e n d e n t upon the quality of the copy subm itted.  ...  In the unlikely e v e n t that the a u thor did not send a c o m p le te m anuscript and there are missing pages, these will be noted.  ...  In [122] a "promise theory" attempts to provide "political autonomy" to entities and decentralise policy management. Such requirements significantly increase the system's complexity.  ... 
doi:10.1109/inm.2009.5188885 dblp:conf/im/HadjiantonisP09 fatcat:sdd6vgxcdnef5nztnfbnx245ni

Proving Resource Consumption of Low-level Programs Using Automated Theorem Provers

Jaroslav Ševčík
2007 Electronical Notes in Theoretical Computer Science  
In this paper we use a program logic and automatic theorem provers to certify resource usage of low-level bytecode programs equipped with annotations describing resource consumption for methods.  ...  We discuss problems related to this and suggest techniques to solve them.  ...  compiled from a high-level functional language with explicit memory management to a subset of Java bytecode.  ... 
doi:10.1016/j.entcs.2007.02.065 fatcat:5xs5kattzvfndcbzbn37ooaiw4

QMDS: A File System Metadata Management Service Supporting a Graph Data Model-Based Query Language

Sasha Ames, Maya B. Gokhale, Carlos Maltzahn
2011 2011 IEEE Sixth International Conference on Networking, Architecture, and Storage  
We represent the semantic entities as directories linked from the file containing the text, and label such directories as 'nodes', hence the use of the 'NodeType' attribute. 2.  ...  Acknowledgements This work was supported in part by the Department of Energy under Contract DE-AC52-07NA27344, the Institute for Scalable Scientific Data Management (ISSDM), and the sponsors of the UCSC  ...  However, the variance for each class is due to different processing times from the use of a variety of literal values within each class.  ... 
doi:10.1109/nas.2011.33 dblp:conf/nas/AmesGM11 fatcat:d5jodtyjp5gnti7g4ljmswggyu

QMDS: a file system metadata management service supporting a graph data model-based query language

Sasha Ames, Maya Gokhale, Carlos Maltzahn
2013 International Journal of Parallel, Emergent and Distributed Systems  
We represent the semantic entities as directories linked from the file containing the text, and label such directories as 'nodes', hence the use of the 'NodeType' attribute. 2.  ...  Acknowledgements This work was supported in part by the Department of Energy under Contract DE-AC52-07NA27344, the Institute for Scalable Scientific Data Management (ISSDM), and the sponsors of the UCSC  ...  However, the variance for each class is due to different processing times from the use of a variety of literal values within each class.  ... 
doi:10.1080/17445760.2012.658802 fatcat:deakdfqlxzfftf56s2ghqcsyda

Continuous Verification of Large Embedded Software using SMT-Based Bounded Model Checking [article]

Lucas Cordeiro, Bernd Fischer, Joao Marques-Silva
2009 arXiv   pre-print
We also give a set of encodings that provide accurate support for program verification and use different background theories in order to improve scalability and precision in a completely automatic way.  ...  and static verification to reduce the state space to be explored.  ...  Encodings In this section, we focus on new encodings (compared to our previous work [8] ) that allow us to analyze more complex ANSI-C programs and show how to exploit different data types and solvers  ... 
arXiv:0911.3784v1 fatcat:amj75xel5rdcfb2mxkk2nu23eq

Report on BCTCS & AlgoUK 2020

Ulrich Berger, Faron Moller
2020 Bulletin of the European Association for Theoretical Computer Science  
AlgoUK is an EPSRC-funded research network for Algorithms and Complexity in the UK.  ...  The joint BCTCS & AlgoUK 2020 event was hosted by Swansea University and held from 6 th to 8 th April, 2020.  ...  To explore the space of possible unit cells within a discrete unit space it is necessary to capture these symmetries.  ... 
dblp:journals/eatcs/BergerM20 fatcat:tnr3ji4yazgethl4qyhxkk6esm

Continuous Verification of Large Embedded Software Using SMT-Based Bounded Model Checking

Lucas Cordeiro, Bernd Fischer, Joao Marques-Silva
2010 2010 17th IEEE International Conference and Workshops on Engineering of Computer Based Systems  
We also give a set of encodings that provide accurate support for program verification and use different background theories in order to improve scalability and precision in a completely automatic way.  ...  dynamic and static verification to reduce the state space to be explored.  ...  Fischer was visiting the University of Auckland. We thank J. Colley and R. Silva for their comments on a draft version.  ... 
doi:10.1109/ecbs.2010.24 dblp:conf/ecbs/CordeiroFM10 fatcat:xy6kly2y2rhdlnv4ppdlpvbof4

Formalising and verifying smart contracts with Solidifier: a bounded model checker for Solidity [article]

Pedro Antonino, A. W. Roscoe
2020 arXiv   pre-print
Unlike much of the work in this area, we do not try to find specific behavioural/code patterns that might lead to vulnerabilities.  ...  In this paper, we present a formalisation of Solidity and the Ethereum blockchain using the Solid language and its blockchain; a Solid program is obtained by explicating/desugaring a Solidity program.  ...  https://github.com/ethereum/solidity 5 The use of undecidable theories such as non-linear arithmetic, which we use to capture the modulo and multiplication operation, might lead the underlying solver to  ... 
arXiv:2002.02710v1 fatcat:srckz6p6zvf6fhml36kxqnyhc4

Mapping WordNet onto human brain connectome in emotion processing and semantic similarity recognition

Jan Kocoń, Marek Maziarz
2021 Information Processing & Management  
Based on lexicographer files and WordNet Domains the mapping goes from synset semantic categories to behavioural and cognitive functions and then directly to brain lobes.  ...  We evaluated the new structure in several tasks related to semantic similarity and emotion processing using brain-expanded Princeton WordNet (207k LUs) and Polish WordNet (285k LUs, 30k annotated with  ...  -emotions analyzer in the written word'' no POIR.01.01.01-00-0472/16, and by the Polish Ministry of Education and Science, Poland, CLARIN-PL Project.  ... 
doi:10.1016/j.ipm.2021.102530 fatcat:wduutlrpyrfllbzzc2ezpyatre

Formal modelling of list based dynamic memory allocators

Bin Fang, Mihaela Sighireanu, Geguang Pu, Wen Su, Jean-Raymond Abrial, Mengfei Yang, Lei Qiao
2018 Science China Information Sciences  
This paper proposes a solution to this problem by providing formal models for a full class of DMA, the class using various kinds of lists to manage the memory blocks controlled by the DMA.  ...  Firstly, there is no optimal general solution to obtain DMAs that provide both low overhead for the management of the memory region and high speed in satisfying memory requests, as demonstrated in the  ...  DMA interface DMA manages a set of memory blocks and provides to its clients an interface allowing to allocate and deallocate memory. A memory block managed by DMA is called a chunk.  ... 
doi:10.1007/s11432-017-9280-9 fatcat:h2ntb6sk5bc7fbytgu247oqvvq

Models of Bounded Rationality: The Approach of Fast and Frugal Heuristics

Ulrich Hoffrage, Torsten Reimer
2004 Management Revue  
The paper explains their ecological rationality, provides empirical evidence of their use, and illustrates some of their applications in consumer behaviour and group decision making.  ...  In a complex and uncertain world, humans draw inferences and make decisions under the constraints of limited knowledge, resources, and time.  ...  To illustrate the concept of scarce information, let us recall a fact from information theory: A class of N objects contains log 2 N bits of information.  ... 
doi:10.5771/0935-9915-2004-4-437 fatcat:cq66vah2e5bzpg6z6dptb4syom

Information Security Management Practices: Expectations and Reality [chapter]

Kaja Prislan, Branko Lobnikar, Igor Bernik
2017 Advances in Cybersecurity 2017  
Future research will focus on using multimodal biometrics, more precisely, face images and body images, and fusing the results in order to achieve better performance of the classifier.  ...  Acknowledgments This work was supported by the Ministry for Science and Culture of Lower Saxony as part of SecuRIn (VWZN3224). Acknowledgments The author would like to thank Mr.  ...  Since a rootkit clears its footprints from APIs that inspect file and memory access, the rootkits are harder to detect than other types of malware.  ... 
doi:10.18690/978-961-286-114-8.1 dblp:conf/cecc/PrislanLB17 fatcat:r4fyha6kdnd6zehhtbxtjqctey

PhD Abstracts

GRAHAM HUTTON
2014 Journal of functional programming  
As a service to the community, JFP is launching a new feature, in the form of a regular publication of abstracts from PhD dissertations that were completed during the previous year.  ...  The Journal of Functional Programming would like to change that!  ...  Since their introduction, type classes have been used to address a range of problems, from typing ordering and arithmetic operators to describing heterogeneous lists and limited subtyping.  ... 
doi:10.1017/s0956796814000215 fatcat:rs2j5wgm5ndf7ek2zls5pmg2w4
« Previous Showing results 1 — 15 out of 4,701 results