1,557 Hits in 3.9 sec

Application of Provenance for Automated and Research Driven Workflows [chapter]

Tara Gibson, Karen Schuchardt, Eric Stephan
2008 Lecture Notes in Computer Science  
This paper presents a number of use cases where provenance can play an important role in understanding how data was derived, how decisions were made, and enable sharing of data from a variety of sources  ...  environments, and data streaming (data analysis) environments.  ...  Augmentation: We encountered numerous examples where users would like to go back and augment the provenance record.  ... 
doi:10.1007/978-3-540-89965-5_14 fatcat:apihpxbainedpiirhnxaiuvbv4

Dataset Generation for Development of Multi-Node Cyber Threat Detection Systems

Jędrzej Bieniasz, Krzysztof Szczypiorski
2021 Electronics  
, data augmentation of training datasets, and preparation of machine learning classifiers based on Random Forest and Multilayer Perceptron architectures.  ...  The generated datasets were used in the data-driven research workflow for cyber threat detection, including the generation of data representations (network flows), feature selection based on correlations  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10212711 fatcat:y2kl5mrsprb4xoa7gms6ok7p6m

From image-guided surgery to surgeOmics: Facing the era of intelligent automation and robotics

Juan Manuel Verde, Mariano E. Giménez
2019 International Journal of Gastrointestinal Intervention  
A wide range of semantic and agnostic features can be extracted from the different phases of the IGS's workflow, like entry point coordinates, angle, distance, target location, amongst the most important  ...  Radiomics addressed this item using images as datasets, focusing in the region of interest and extracting features, allowing reproducibility, and finally introducing radiology into the quantitative sciences  ...  The growing industry of CAD systems leads uncovered the intrusion of the datacentric trends in the field of medicine and, a new conception of images as data became visible.  ... 
doi:10.18528/ijgii180043 fatcat:mmahr2nuxzemdgsbskr55rpuge

Dash: Data Sharing Made Easy at the University of California

Stephen Abrams, John Kratz, Stephanie Simms, Marisa Strong, Perry Willett
2016 International Journal of Digital Curation  
By imposing minimal prescriptive eligibility and submission requirements; automating and hiding the mechanical details of DOI assignment, data packaging, and repository deposit; and featuring a streamlined  ...  This led to the development of Dash, an online data publication service making campus data sharing easy.  ...  Acknowledgements The development of the current version of Dash was generously supported by the Alfred P. Sloan Foundation, #G-2014-13603.  ... 
doi:10.2218/ijdc.v11i1.408 fatcat:2ohudukolfef5mvxrhoheqaxk4

Repeatable Semantic Reef-Mapping through Photogrammetry and Label-Augmentation

Matan Yuval, Iñigo Alonso, Gal Eyal, Dan Tchernov, Yossi Loya, Ana C. Murillo, Tali Treibitz
2021 Remote Sensing  
We propose using label-augmentation, i.e., propagation of sparse manual labels, to accelerate the task of full segmentation of photomosaics.  ...  Our approach for label-augmentation shows human-level accuracy in full segmentation of photomosaics using labeling as sparse as 0.1%, evaluated on several ecological measures.  ...  Acknowledgments: We thank the Morris-Kahn Marine Research Station, the Interuniversity Institute for Marine Sciences of Eilat, and the Caribbean Netherland Science Institute for making their facilities  ... 
doi:10.3390/rs13040659 fatcat:slbi7zrimjhitpl4q5sj55w47u

A primer on provenance

Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway, Ripduman Sohan, Margo Selter, Andy Hopper
2014 Communications of the ACM  
ASSESSING THE QUALITY or validity of a piece of data is not usually done in isolation.  ...  As the quantity of data that contributes to a particular result increases, keeping track of how different sources and transformations are related to each other becomes more difficult.  ...  minimize the overhead.  ... 
doi:10.1145/2596628 fatcat:votcaprhhfe25laiohnm7tc7de

Performance Measures to Enable Agent-Based Support in Demanding Circumstances [chapter]

Fiemke Both, Mark Hoogendoorn, Rianne M. van Lambalgen, Rogier Oorburg, Michael de Vos
2011 Lecture Notes in Computer Science  
In this paper, an evaluation of measurements that can be used by a personal support agent to measure the quality of human task performance is addressed.  ...  Such measurements are important in order for a support agent to give effective and personalized support during the performance of demanding tasks.  ...  In the field of augmented cognition, both are useful.  ... 
doi:10.1007/978-3-642-21852-1_67 fatcat:eulmguophrasnlmawxpcpvxpkm

TextBrewer: An Open-Source Knowledge Distillation Toolkit for Natural Language Processing [article]

Ziqing Yang, Yiming Cui, Zhipeng Chen, Wanxiang Che, Ting Liu, Shijin Wang, Guoping Hu
2020 arXiv   pre-print
TextBrewer provides a simple and uniform workflow that enables quick setting up of distillation experiments with highly flexible configurations.  ...  With simple configurations, we achieve results that are comparable with or even higher than the public distilled BERT models with similar numbers of parameters.  ...  This work was supported by the National Natural Science Foundation of China (NSFC) via grant 61976072, 61632011, and 61772153.  ... 
arXiv:2002.12620v2 fatcat:fvhdjioqtvdwziss5llyuxovtq

Job life cycle management libraries for CMS workflow management projects

Frank van Lingen, Dave Evans, Simon Metson, Stuart Wakefield, Rick Wilkinson, James Jackson, Daniele Spiga, Stephen Foulkes, Anzar Afaq, Valentin Kuznetsov, Eric Vaandering, Seangchan Ryu (+3 others)
2010 Journal of Physics, Conference Series  
The CMS workflow infrastructure consists of three layers: high level specification of the various tasks based on input/output data sets, life cycle management of task instances derived from the high level  ...  The workflow library is the result of a convergence of three CMS sub projects that respectively deal with scientific analysis, simulation and real time data aggregation from the experiment.  ...  Acknowledgements This work is partly supported by US Department of Energy grant DOE DE-FG02-06ER86271, US National Science Foundation grant NSF PHY-0533280 and grants from the UK Science and Technology  ... 
doi:10.1088/1742-6596/219/4/042024 fatcat:2glmrjnedbf6hnxkxvdudu5f2y

Modelling Provenance Collection Points and Their Impact on Provenance Graphs [chapter]

David Gammack, Steve Scott, Adriane P. Chapman
2016 Lecture Notes in Computer Science  
Applications such as intrusion detection, load balancing, traffic routing, and insider threat detection all involve monitoring and analyzing the data provenance.  ...  We provide use cases of complex systems-of-systems within which users wish to capture provenance.  ...  For instance, for intrusion detection, seeing as close to 100% of the provenance as possible would detect the greatest number of possible anomalies.  ... 
doi:10.1007/978-3-319-40593-3_12 fatcat:v77swyj55feijfrpkkpct2nefu

A Survey on Data-Driven Learning for Intelligent Network Intrusion Detection Systems

Ghada Abdelmoumin, Jessica Whitaker, Danda B. Rawat, Abdul Rahman
2022 Electronics  
Further, the need to protect private data and conceal sensitive data features has limited data sharing, thus encouraging the use of synthetic data for training predictive and intrusion detection models  ...  It surveys and synthesizes generative-based data augmentation techniques for addressing the uneven data distribution and generative-based adversarial techniques for generating synthetic yet realistic data  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics11020213 fatcat:ej2mjxxghrhurfz2cz4pxaszaq

Ask Me Anything: A Conversational Interface to Augment Information Security Workers [article]

Bobby Filar, Richard J. Seymour, Matthew Park
2017 arXiv   pre-print
through triage and hunt workflows.  ...  Designed to empower inexperienced and junior security workers to better understand their security environment, Artemis provides an intuitive platform to ask questions of alert data as users are guided  ...  Threats such as data theft, ransomware, and phishing have brought an influx of security products designed to detect and respond to intrusions and anomalies on a network.  ... 
arXiv:1707.05768v1 fatcat:4mh7umsef5bb7hfgynlx25cnfa

Demonstration Paper: Wirelessly Sensing Medication Administration: Cyber-Physical Event Detection and Notification Utilizing Multi-Element Chipless RFID [article]

Xiaofu Ma, Thaddeus Czauski, Taeyoung Yang, Jeffrey H Reed
2018 arXiv   pre-print
We also present a prototype MECL-RFID to demonstrate potential future improvements to eMAR systems that minimize ADEs.  ...  Augmenting physical objects, such as a pill container, with MECL-RFID can allow caregivers to detect the moment a particular pill container is opened or closed.  ...  Carl Dietrich for all of the helpful discussions throughout the course of this work, and our anonymous reviewers for their thoughtful and constructive feedback that allowed us to improve upon our original  ... 
arXiv:1812.02172v1 fatcat:4lcjdif47zbklolaryxx4bqili

Analysis of Cybersecurity Threats in Industry 4.0: The Case of Intrusion Detection [chapter]

Juan E. Rubio, Rodrigo Roman, Javier Lopez
2018 Lecture Notes in Computer Science  
Cloud Computing or Big data within the organization.  ...  As a result, this paper provides an analysis of the evolution of these cybersecurity issues and the requirements that must be satisfied by intrusion detection defense mechanisms in this context.  ...  , plus their influence on the creation of specific intrusion detection systems.  ... 
doi:10.1007/978-3-319-99843-5_11 fatcat:vwusensdtbg3xc52mdiujvvr6i

Simple data and workflow management with the signac framework

Carl S. Adorf, Paul M. Dodd, Vyas Ramasubramani, Sharon C. Glotzer
2018 Computational materials science  
Researchers in the field of materials science, chemistry, and computational physics are regularly posed with the challenge of managing large and heterogeneous data spaces.  ...  We present a framework designed to aid in the integration of various specialized data formats, tools and workflows.  ...  Department of Energy, Office of Science, Basic Energy Sciences, Materials Sciences and Engineering Division, under Subcontract No. 6F-30844.  ... 
doi:10.1016/j.commatsci.2018.01.035 fatcat:wfjxy3xfavgyhfa3sxanoylhxq
« Previous Showing results 1 — 15 out of 1,557 results