432,511 Hits in 2.1 sec

Model-Checking Based Data Retrieval [chapter]

Agostino Dovier, Elisa Quintarelli
2002 Lecture Notes in Computer Science  
In this way, the retrieval of data fulfilling a query is reduced to the problem of finding out the states of the model which satisfy the formula (the model-checking problem) that can be done in linear  ...  In this paper we develop a new method for solving queries on semistructured data.  ...  Conclusions and Future Work In this work we have shown how it is possible to effectively solve the data retrieval problem for semistructured data using techniques and algorithms coming from the model-checking  ... 
doi:10.1007/3-540-46093-4_4 fatcat:cw7jr5najbg2hc6lhijdiykkny

3. Model-Checking Based Data Retrieval [chapter]

Elisa Quintarelli
2004 Lecture Notes in Computer Science  
In this way, the retrieval of data fulfilling a query is reduced to the problem of finding out the states of the model which satisfy the formula (the model-checking problem) that can be done in linear  ...  In this paper we develop a new method for solving queries on semistructured data.  ...  Conclusions and Future Work In this work we have shown how it is possible to effectively solve the data retrieval problem for semistructured data using techniques and algorithms coming from the model-checking  ... 
doi:10.1007/978-3-540-24603-9_3 fatcat:b6shdiaugbexfdre4mnfcnf25q

Matching Tweets With Applicable Fact-Checks Across Languages [article]

Ashkan Kazemi, Zehua Li, Verónica Pérez-Rosas, Scott A. Hale, Rada Mihalcea
2022 arXiv   pre-print
We also find that a BM25 baseline outperforms state-of-the-art multilingual embedding models for the retrieval task during our monolingual experiments.  ...  We conduct both classification and retrieval experiments, in monolingual (English only), multilingual (Spanish, Portuguese), and cross-lingual (Hindi-English) settings using multilingual transformer models  ...  Building specialized embedding models for searching through applicable fact-checks is a promising next step in improving the embedding-based retrieval systems.  ... 
arXiv:2202.07094v1 fatcat:2k7e6e3gk5es7hvyznodb3ezbi

A memory-based model of Hick's law

Darryl W. Schneider, John R. Anderson
2011 Cognitive Psychology  
We propose and evaluate a memory-based model of Hick's law, the approximately linear increase in choice reaction time with the logarithm of set size (the number of stimulus-response alternatives).  ...  According to the model, Hick's law reflects a combination of associative interference during retrieval from declarative memory and occasional savings for stimulus-response repetitions due to nonretrieval  ...  The model fits reported in the present study are available under the reference for this article in the Models section of the ACT-R website: http://act-r.psy.cmu. edu/.  ... 
doi:10.1016/j.cogpsych.2010.11.001 pmid:21293788 pmcid:PMC3031137 fatcat:oo3k7lwrvfcxfbywgugj65o3em

A new semi-automated workflow for chemical data retrieval and quality checking for modeling applications

Domenico Gadaleta, Anna Lombardo, Cosimo Toma, Emilio Benfenati
2018 Journal of Cheminformatics  
In the light of this, we designed and implemented a semi-automated workflow integrating structural data retrieval from several web-based databases, automated comparison of these data, chemical structure  ...  The quality of data used for QSAR model derivation is extremely important as it strongly affects the final robustness and predictive power of the model.  ...  QSAR models derived from datasets characterized by a great percentage of data with moderate reliability cannot be expected to give results of the same quality as models based only on high-quality data.  ... 
doi:10.1186/s13321-018-0315-6 pmid:30536051 pmcid:PMC6503381 fatcat:zlax5eiamjchbb2tz43ts2rxwm

Analytical Literature Survey on Existing Schemes to Improve Data Security and Robustness in Cloud Computing

N. Abirami, S. Murugan
2016 International Journal of Engineering Research and  
In user perspective instead of storing the data in USB drive or hard-disk, the data is stored in a remote unknown location.  ...  This paper gives the various issues of cloud computing systems, the existing solutions to avoid the issues like security and data robustness, performance analysis of the schemes and comparison of the schemes  ...  The integrity check scheme is proved by means of model security game.  ... 
doi:10.17577/ijertv5is100295 fatcat:qjvag43wsvho5iuvt6gn4q5vsy

Probabilistic Model to Access the Possible Information using Query Representation

M. Sandhya, B.Hanmanthu B.Hanmanthu, B.Raghuram B.Raghuram
2014 International Journal of Computer Applications  
With n data units users failed to retrieve their expectations. This approach includes Probabilistic algorithms used for large vocabulary word correction system with language model.  ...  The searching of data Process end users search their data needs using query representation, by using this way of retrieving data may not meet their expectations.  ...  In Paper [1] we implement IQP model for retrieving information from data base, it won't check for spellings, and user must need to know schema knowledge.  ... 
doi:10.5120/18726-9959 fatcat:5xx7u2wshncyxezdbwfhi35qqu

Temperature and Humidity Monitoring Using DHT22 Sensor and Cayenne API

Whisnumurti Adhiwibowo, April Firman Daru, Alauddin Maulana Hirzan
2020 Transformatika  
The stored data from the cultivation can be exported as a CSV format if the farmers want to check the temperature and humidity statistic.  ...  <p>Internet of Thing is a new technology which enables small processing-capable devices to capture or retrieve information from a sensor and send the data to the central computer.  ...  Retrieved Data Result All retrieved data are exported CSV and used as data analysis for sensor validation and forecasting.  ... 
doi:10.26623/transformatika.v17i2.1820 fatcat:yfiyivhyxfazjbswj6pee2iuyi

An Image-Based Multimedia Database and Efficient Detection though Features

2019 VFAST Transactions on Software Engineering  
Accurate feature detection during Image retrieval is important, data retrieves through image retrieval methods like CBIR and CBIR higher dimension data also need storage and access through different methods  ...  , content-based Image retrieval uses query like query by feature and query by example.  ...  For processing point of view need of study is to check content-based image retrieval because accuracy-based retrieval is required.  ... 
doi:10.21015/vtse.v14i1.536 fatcat:yrvawpihjrdxljqbvhrrp5wq7i

Android Repository Mining for Detecting Publicly Accessible Functions Missing Permission Checks

Hoang H. Nguyen, Lingxiao Jiang, Tho Quan
2017 2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC)  
Based on such information, we can detect some publicly accessible functions in the system that may miss sufficient permission checks.  ...  and should be protected by certain permission checks.  ...  data without permission checks.  ... 
doi:10.1109/icpc.2017.14 dblp:conf/iwpc/NguyenJQ17 fatcat:hevdx57mb5ambfl334yzutxn2e

Based on Capability of C4ISR Architectural Modeling and Analysis

Ting-ting ZHANG, Hui LI, Yi YAO
2017 DEStech Transactions on Engineering and Technology Research  
The paper uses an extended UML modeling technique to analyzing the requirements of C4ISR capabilities. It also introduces a new model convert domain model into the Description Logic ontology.  ...  Finally, domain model checking is automated by the inference engine such as Pellet and Racer.  ...  To capture and model domain knowledge, it proposes a domain modeling framework and suggests that the domain knowledge should be built under the constraints of Meta-Model Data Groups of DoD AF with the  ... 
doi:10.12783/dtetr/icca2016/6054 fatcat:2pxrqkmwofcx7i236to37qh7sa

Probabilistic Local Expert Retrieval [chapter]

Wen Li, Carsten Eickhoff, Arjen P. de Vries
2016 Lecture Notes in Computer Science  
This paper proposes a range of probabilistic models of local expertise based on geo-tagged social network streams.  ...  To capture this notion, we rely on spatio-temporal information from users' online check-in profiles.  ...  Based on this kind of data, Liu et al. [13] proposed to use language models to profile candidates, Zhang et al.  ... 
doi:10.1007/978-3-319-30671-1_17 fatcat:3o3woyapuza65aetqvecaswrpi

Refining Search Performance through Semantic based CBR Model and QoS Ranking Methodology

K Palaniammal, Department of Computer Science, Vidhyaa Giri College of Arts and Science (Affiliated to the Alagappa University, Karaikudi), Puduvayal, Tamil Nadu, India
2021 Indian Journal of Science and Technology  
The experimental results show that the NLP technique improves the performance of SCBR model, and achieves higher average precision and recall values.  ...  Objectives: To refine search performance using semantic web with an improved algorithm to retrieve the information efficiently.  ...  In this experiment, Recall R is defined as the number of retrieved relevant data to total number of relevant data in the knowledge base.  ... 
doi:10.17485/ijst/v14i21.696 fatcat:3zrmexrmjbh6vcjjv2o7gbbate

Robust Information Retrieval for False Claims with Distracting Entities In Fact Extraction and Verification [article]

Mingwen Dong, Christos Christodoulopoulos, Sheng-Min Shih, Xiaofei Ma
2021 arXiv   pre-print
These results suggest that we can increase the BERT-based retrieval model's robustness to false claims with irrelevant entities via data augmentation and model ensemble.  ...  A BERT-based retrieval model made more mistakes in retrieving refuting evidence for false claims than supporting evidence for true claims.  ...  Baseline BERT-based Retrieval Model is Not Robust to Irrelevant Entities in Claims.  ... 
arXiv:2112.07618v1 fatcat:y4mkckp5i5aqva67hrhrck5x4m

Remote Data Integrity Checking and Sharing in Cloud-Based Health Internet of Things

Huaqun WANG, Keqiu LI, Kaoru OTA, Jian SHEN
2016 IEICE transactions on information and systems  
The patient can check his own medical/health data integrity and retrieve them.  ...  The paper studies the system model, security model and concrete scheme for ICS in public clouds. Based on the bilinear pairing technique, we design an efficient ICS protocol.  ...  Since PDP is a very efficient remote data integrity checking model, many researchers proposed a variety of PDP security models and concrete schemes [10] - [14] .  ... 
doi:10.1587/transinf.2015ini0001 fatcat:ftanh6itebfcbho5vovgq6sale
« Previous Showing results 1 — 15 out of 432,511 results