A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Application of Provenance for Automated and Research Driven Workflows
[chapter]
2008
Lecture Notes in Computer Science
This paper presents a number of use cases where provenance can play an important role in understanding how data was derived, how decisions were made, and enable sharing of data from a variety of sources ...
environments, and data streaming (data analysis) environments. ...
Augmentation: We encountered numerous examples where users would like to go back and augment the provenance record. ...
doi:10.1007/978-3-540-89965-5_14
fatcat:apihpxbainedpiirhnxaiuvbv4
Dataset Generation for Development of Multi-Node Cyber Threat Detection Systems
2021
Electronics
, data augmentation of training datasets, and preparation of machine learning classifiers based on Random Forest and Multilayer Perceptron architectures. ...
The generated datasets were used in the data-driven research workflow for cyber threat detection, including the generation of data representations (network flows), feature selection based on correlations ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/electronics10212711
fatcat:y2kl5mrsprb4xoa7gms6ok7p6m
From image-guided surgery to surgeOmics: Facing the era of intelligent automation and robotics
2019
International Journal of Gastrointestinal Intervention
A wide range of semantic and agnostic features can be extracted from the different phases of the IGS's workflow, like entry point coordinates, angle, distance, target location, amongst the most important ...
Radiomics addressed this item using images as datasets, focusing in the region of interest and extracting features, allowing reproducibility, and finally introducing radiology into the quantitative sciences ...
The growing industry of CAD systems leads uncovered the intrusion of the datacentric trends in the field of medicine and, a new conception of images as data became visible. ...
doi:10.18528/ijgii180043
fatcat:mmahr2nuxzemdgsbskr55rpuge
Dash: Data Sharing Made Easy at the University of California
2016
International Journal of Digital Curation
By imposing minimal prescriptive eligibility and submission requirements; automating and hiding the mechanical details of DOI assignment, data packaging, and repository deposit; and featuring a streamlined ...
This led to the development of Dash, an online data publication service making campus data sharing easy. ...
Acknowledgements The development of the current version of Dash was generously supported by the Alfred P. Sloan Foundation, #G-2014-13603. ...
doi:10.2218/ijdc.v11i1.408
fatcat:2ohudukolfef5mvxrhoheqaxk4
Repeatable Semantic Reef-Mapping through Photogrammetry and Label-Augmentation
2021
Remote Sensing
We propose using label-augmentation, i.e., propagation of sparse manual labels, to accelerate the task of full segmentation of photomosaics. ...
Our approach for label-augmentation shows human-level accuracy in full segmentation of photomosaics using labeling as sparse as 0.1%, evaluated on several ecological measures. ...
Acknowledgments: We thank the Morris-Kahn Marine Research Station, the Interuniversity Institute for Marine Sciences of Eilat, and the Caribbean Netherland Science Institute for making their facilities ...
doi:10.3390/rs13040659
fatcat:slbi7zrimjhitpl4q5sj55w47u
A primer on provenance
2014
Communications of the ACM
ASSESSING THE QUALITY or validity of a piece of data is not usually done in isolation. ...
As the quantity of data that contributes to a particular result increases, keeping track of how different sources and transformations are related to each other becomes more difficult. ...
minimize the overhead. ...
doi:10.1145/2596628
fatcat:votcaprhhfe25laiohnm7tc7de
Performance Measures to Enable Agent-Based Support in Demanding Circumstances
[chapter]
2011
Lecture Notes in Computer Science
In this paper, an evaluation of measurements that can be used by a personal support agent to measure the quality of human task performance is addressed. ...
Such measurements are important in order for a support agent to give effective and personalized support during the performance of demanding tasks. ...
In the field of augmented cognition, both are useful. ...
doi:10.1007/978-3-642-21852-1_67
fatcat:eulmguophrasnlmawxpcpvxpkm
TextBrewer: An Open-Source Knowledge Distillation Toolkit for Natural Language Processing
[article]
2020
arXiv
pre-print
TextBrewer provides a simple and uniform workflow that enables quick setting up of distillation experiments with highly flexible configurations. ...
With simple configurations, we achieve results that are comparable with or even higher than the public distilled BERT models with similar numbers of parameters. ...
This work was supported by the National Natural Science Foundation of China (NSFC) via grant 61976072, 61632011, and 61772153. ...
arXiv:2002.12620v2
fatcat:fvhdjioqtvdwziss5llyuxovtq
Job life cycle management libraries for CMS workflow management projects
2010
Journal of Physics, Conference Series
The CMS workflow infrastructure consists of three layers: high level specification of the various tasks based on input/output data sets, life cycle management of task instances derived from the high level ...
The workflow library is the result of a convergence of three CMS sub projects that respectively deal with scientific analysis, simulation and real time data aggregation from the experiment. ...
Acknowledgements This work is partly supported by US Department of Energy grant DOE DE-FG02-06ER86271, US National Science Foundation grant NSF PHY-0533280 and grants from the UK Science and Technology ...
doi:10.1088/1742-6596/219/4/042024
fatcat:2glmrjnedbf6hnxkxvdudu5f2y
Modelling Provenance Collection Points and Their Impact on Provenance Graphs
[chapter]
2016
Lecture Notes in Computer Science
Applications such as intrusion detection, load balancing, traffic routing, and insider threat detection all involve monitoring and analyzing the data provenance. ...
We provide use cases of complex systems-of-systems within which users wish to capture provenance. ...
For instance, for intrusion detection, seeing as close to 100% of the provenance as possible would detect the greatest number of possible anomalies. ...
doi:10.1007/978-3-319-40593-3_12
fatcat:v77swyj55feijfrpkkpct2nefu
A Survey on Data-Driven Learning for Intelligent Network Intrusion Detection Systems
2022
Electronics
Further, the need to protect private data and conceal sensitive data features has limited data sharing, thus encouraging the use of synthetic data for training predictive and intrusion detection models ...
It surveys and synthesizes generative-based data augmentation techniques for addressing the uneven data distribution and generative-based adversarial techniques for generating synthetic yet realistic data ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/electronics11020213
fatcat:ej2mjxxghrhurfz2cz4pxaszaq
Ask Me Anything: A Conversational Interface to Augment Information Security Workers
[article]
2017
arXiv
pre-print
through triage and hunt workflows. ...
Designed to empower inexperienced and junior security workers to better understand their security environment, Artemis provides an intuitive platform to ask questions of alert data as users are guided ...
Threats such as data theft, ransomware, and phishing have brought an influx of security products designed to detect and respond to intrusions and anomalies on a network. ...
arXiv:1707.05768v1
fatcat:4mh7umsef5bb7hfgynlx25cnfa
Demonstration Paper: Wirelessly Sensing Medication Administration: Cyber-Physical Event Detection and Notification Utilizing Multi-Element Chipless RFID
[article]
2018
arXiv
pre-print
We also present a prototype MECL-RFID to demonstrate potential future improvements to eMAR systems that minimize ADEs. ...
Augmenting physical objects, such as a pill container, with MECL-RFID can allow caregivers to detect the moment a particular pill container is opened or closed. ...
Carl Dietrich for all of the helpful discussions throughout the course of this work, and our anonymous reviewers for their thoughtful and constructive feedback that allowed us to improve upon our original ...
arXiv:1812.02172v1
fatcat:4lcjdif47zbklolaryxx4bqili
Analysis of Cybersecurity Threats in Industry 4.0: The Case of Intrusion Detection
[chapter]
2018
Lecture Notes in Computer Science
Cloud Computing or Big data within the organization. ...
As a result, this paper provides an analysis of the evolution of these cybersecurity issues and the requirements that must be satisfied by intrusion detection defense mechanisms in this context. ...
, plus their influence on the creation of specific intrusion detection systems. ...
doi:10.1007/978-3-319-99843-5_11
fatcat:vwusensdtbg3xc52mdiujvvr6i
Simple data and workflow management with the signac framework
2018
Computational materials science
Researchers in the field of materials science, chemistry, and computational physics are regularly posed with the challenge of managing large and heterogeneous data spaces. ...
We present a framework designed to aid in the integration of various specialized data formats, tools and workflows. ...
Department of Energy, Office of Science, Basic Energy Sciences, Materials Sciences and Engineering Division, under Subcontract No. 6F-30844. ...
doi:10.1016/j.commatsci.2018.01.035
fatcat:wfjxy3xfavgyhfa3sxanoylhxq
« Previous
Showing results 1 — 15 out of 1,557 results