Search For:

Displaying 1-50 out of 348 total
Semiautomatic Domain Model Building from Text-Data
Found in: Semantic Media Adaptation and Personalization, International Workshop on
By Petr Šaloun,Zdenek Velart,Petr Klimanek
Issue Date:December 2011
pp. 15-20
Our research is focused on semiautomatic domain model building from texts written in a natural language. The paper deals with defining the scope of the work and describes approaches of domain model creation and its representation. We describe the context o...
Introducing Support for Embedded and Real-Time Devices into Existing Hierarchical Component System: Lessons Learned
Found in: Software Engineering Research, Management and Applications, ACIS International Conference on
By Tom´š Pop,Jaroslav Keznikl,Petr Hošek,Michal Malohlava,Tom´š Bures,Petr Hnetynka
Issue Date:August 2011
pp. 3-11
As embedded and real-time systems became an inherent part of many electronic appliances of everyday use, the demand for their development has grown enormously. Increasing complexity of these systems leads to demands of tools and techniques addressing their...
High-Resolution Cytometry Network Project: Client/Server System for 3D Optical Microscope Data Storage and Analysis
Found in: 3D Data Processing Visualization and Transmission, International Symposium on
By Pavel Matula, Petr Matula, Michal Kozubek, Petr Mejzlík
Issue Date:September 2004
pp. 580-583
If several laboratories work in the same field and need to cooperate, it is necessary to exchange and mutually compare their computer results. The quick way to solve this problem is to unite their file formats (if it is practicable) or to install new softw...
SumatraTT: a Generic Data Pre-processing System
Found in: Database and Expert Systems Applications, International Workshop on
By Petr Aubrecht, Petr Miksovský, Lubos Král
Issue Date:September 2003
pp. 120
A systematic process of indexing cultural heritage artefacts began well before the era of computers. The first step of digitising such archives of hand- and typewriter-written data was naturally focused on transfer of these files into a digital form - eith...
High-Resolution Cytometry Network Project:Towards Remote a d Distributed Acquisition, Processing and Visualisation of 3D Image Data in Human Genome Research
Found in: 3D Data Processing Visualization and Transmission, International Symposium on
By Michal Kozubek, Petr Matula, Pavel Matula, Petr Mejzlík
Issue Date:June 2002
pp. 99
The absence of common image storage, processing and visualisation approaches is a very serious problem of the collaboration between optical microscopy laboratories. The results produced by individual groups are therefore often not comparable. Even a simple...
How Software Designers Interact with Sketches at the Whiteboard
Found in: IEEE Transactions on Software Engineering
By Nicolas Mangano,Thomas LaToza,Marian Petre,Andre Van der Hoek
Issue Date:February 2015
pp. 1
Whiteboard sketches play a crucial role in software development, helping to support groups of designers in reasoning about a software design problem at hand. However, little is known about these sketches and how they support design ‘in the moment’, particu...
A Community-Driven Workflow Recommendations and Reuse Infrastructure
Found in: 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE)
By Jia Zhang,Chris Lee,Sean Xiao,Petr Votava,Tsengdar J. Lee,Ramakrishna Nemani,Ian Foster
Issue Date:April 2014
pp. 162-172
NASA Earth Exchange (NEX) aims to provide a platform to enable and facilitate scientific collaboration and knowledge sharing in the Earth sciences, as current satellite measurements rapidly magnify the accumulation of more than 40 years of NASA datasets. O...
Dfuzzer: A D-Bus Service Fuzzing Tool
Found in: 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
By Matu Marhefka,Petr Muller
Issue Date:March 2014
pp. 383-389
We present Dfuzzer, a fully automated tool for fuzz testing programs communicating via D-Bus. D-Bus is the prevalent modern mechanism for an inter-process communication in the GNU/Linux ecosystem. Programs receiving data over D-Bus should sanitize the inpu...
A fast abstract syntax tree interpreter for R
Found in: Proceedings of the 10th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments (VEE '14)
By Floreal Morandat, Jan Vitek, Petr Maj, Tomas Kalibera
Issue Date:March 2014
pp. 89-102
Dynamic languages have been gaining popularity to the point that their performance is starting to matter. The effort required to develop a production-quality, high-performance runtime is, however, staggering and the expertise required to do so is often out...
Model Checking Parallel Programs with Inputs
Found in: 2014 22nd Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)
By Jiri Barnat,Petr Bauch,Vojtech Havel
Issue Date:February 2014
pp. 756-759
Verification of parallel programs with input variables represents a significant and well-motivated challenge. This paper addresses the challenge with a verification method that combines explicit and symbolic approaches to the state space representation. Th...
Temporal Verification of Simulink Diagrams
Found in: 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering (HASE)
By Jiri Barnat,Petr Bauch,Vojtech Havel
Issue Date:January 2014
pp. 81-88
Automatic verification of programs and computer systems with input variables represents a significant and well-motivated challenge. The case of Simulink diagrams is especially difficult, because there the inputs are read iteratively and the number of input...
MOOCs schmoocs: the education is in the dialogues
Found in: ACM Inroads
By Marian Petre
Issue Date:December 2013
pp. 22-23
No summary available.
Facing reality: an industrial view on large scale use of facial expression analysis
Found in: Proceedings of the 2013 on Emotion recognition in the wild challenge and workshop (EmotiW '13)
By Dániel Szolgay, Gábor Szirtes, István Petrás, Ákos Utasi, Dániel Takács, Gábor Fodor
Issue Date:December 2013
pp. 1-8
In spite of the advances in the field of automatic face analysis (including detection, verification, recognition or expression classification), unconstrained, realistic conditions still present a great challenge for most computer based methods. We discuss ...
ShadowVM: robust and comprehensive dynamic program analysis for the java platform
Found in: Proceedings of the 12th international conference on Generative programming: concepts & experiences (GPCE '13)
By Aibek Sarimbekov, Lubomír Bulej, Petr Tůma, Yudi Zheng, Andreas Sewe, Danilo Ansaloni, Lukáš Marek, Stephen Kell, Walter Binder
Issue Date:October 2013
pp. 105-114
Dynamic analysis tools are often implemented using instrumentation, particularly on managed runtimes including the Java Virtual Machine (JVM). Performing instrumentation robustly is especially complex on such runtimes: existing frameworks offer limited cov...
PsybOt malware: A step-by-step decompilation case study
Found in: 2013 20th Working Conference on Reverse Engineering (WCRE)
By Lukas Durfina,Jakub Kroustek,Petr Zemek
Issue Date:October 2013
pp. 449-456
Decompilation (i.e. reverse compilation) represents one of the most toughest and challenging tasks in reverse engineering. Even more difficult task is the decompilation of malware because it typically does not follow standard application binary interface c...
An online design studio
Found in: ACM Inroads
By Marian Petre
Issue Date:September 2013
pp. 44-45
As authors consider forums for publication, some common questions involve copyright: Who owns the copyright? May I post a copy of my piece on the Web? Could I publish the material in another publication?
Software transactional networking: concurrent and consistent policy composition
Found in: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking (HotSDN '13)
By Dan Levin, Marco Canini, Petr Kuznetsov, Stefan Schmid
Issue Date:August 2013
pp. 1-6
It seems natural to imagine that SDN policy specification and control is distributed, and this paper focuses on the resulting concurrency issues. Indeed, conflicts among concurrent policy updates may result in serious inconsistencies on the data plane, eve...
I/O Performance Modeling of Virtualized Storage Systems
Found in: 2013 IEEE 21st International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS)
By Qais Noorshams,Kiana Rostami,Samuel Kounev,Petr Tuma,Ralf Reussner
Issue Date:August 2013
pp. 121-130
Server virtualization is a key technology to share physical resources efficiently and flexibly. With the increasing popularity of I/O-intensive applications, however, the virtualized storage used in shared environments can easily become a bottleneck and ca...
Media Streams Planning with Transcoding
Found in: 2013 IEEE 12th International Symposium on Network Computing and Applications (NCA)
By Pavel Troubil,Hana Rudova,Petr Holub
Issue Date:August 2013
pp. 41-48
High-quality video, both uncompressed and compressed with relatively low compression ratio, is used in interactive environments, where minimum end-to-end latency is required. The media streams planning solves multi-point data routing for such applications ...
Wringing out objects for programming and modeling component-based systems
Found in: Proceedings of the Second International Workshop on Combined Object-Oriented Modelling and Programming Languages (ECOOP'13)
By Chouki Tibermacine, Christophe Dony, Luc Fabresse, Petr Spacek
Issue Date:July 2013
pp. 1-6
Languages and technologies used to implement component-based software are not component-based, i.e. while the design phase happens in the component world, the programming phase occurs in the object-oriented world. When an object-oriented language is used f...
Learning uncertainty models from weather forecast performance databases using quantile regression
Found in: Proceedings of the 25th International Conference on Scientific and Statistical Database Management (SSDBM)
By Ashkan Zarnani, Petr Musilek
Issue Date:July 2013
pp. 1-9
Forecast uncertainty information is not available in the immediate output of Numerical weather prediction (NWP) models. Such important information is required for optimal decision making processes in many domains. Prediction intervals are a prominent form ...
CORE: aggregation use cases for open access
Found in: Proceedings of the 13th ACM/IEEE-CS joint conference on Digital libraries (JCDL '13)
By Petr Knoth, Zdenek Zdrahal
Issue Date:July 2013
pp. 441-442
The push for free online availability of research outputs promoted by the Open Access (OA) movement is undoubtedly transforming the publishing industry. However, the mere availability of research outputs is insufficient. To exploit the full potential of OA...
Safety of Deferred Update in Transactional Memory
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS)
By Hagit Attiya,Sandeep Hans,Petr Kuznetsov,Srivatsan Ravi
Issue Date:July 2013
pp. 601-610
Transactional memory allows the user to declare sequences of instructions as speculative transactions that can either commit or abort. If a transaction commits, it appears to be executed sequentially, so that the committed transactions constitute a correct...
Equivalence of deterministic one-counter automata is NL-complete
Found in: Proceedings of the 45th annual ACM symposium on Symposium on theory of computing (STOC '13)
By Petr Jancar, Stanislav Böhm, Stefan Göller
Issue Date:June 2013
pp. 131-140
We prove that language equivalence of deterministic one-counter automata is NL-complete. This improves the superpolynomial time complexity upper bound shown by Valiant and Paterson in 1975. Our main contribution is to prove that two deterministic one-count...
Multi-gigabit traffic identification on GPU
Found in: Proceedings of the first edition workshop on High performance and programmable networking (HPPN '13)
By Alysson Feitoza Santos, Djamel Fawzi Hadj Sadok, Geza Szabo, Petrônio Gomes Lopes Júnior, Stenio Flavio de Lacerda Fernandes
Issue Date:June 2013
pp. 39-44
Traffic Identification is a crucial task performed by ISP administrators to evaluate and improve network service quality. Deep Packet Inspection (DPI) is a well-known technique used to identify networked traffic. DPI relies mostly on Regular Expressions (R...
Comment on "Remote Physical Device Fingerprinting"
Found in: IEEE Transactions on Dependable and Secure Computing
By Libor Polcak,Jakub Jirasek,Petr Matousek
Issue Date:June 2013
pp. 1
In this paper we revisited a method to identify computers by their clocks skew computed from TCP timestamps. We introduced our own tool to compute clock skew of computers in a network. We validated that the original method is suitable for the computer iden...
Bridging VisTrails Scientific Workflow Management System to High Performance Computing
Found in: 2013 IEEE World Congress on Services (SERVICES)
By Jia Zhang,Petr Votava,Tsengdar J. Lee,Owen Chu,Clyde Li,David Liu,Kate Liu,Norman Xin,Ramakrishna Nemani
Issue Date:June 2013
pp. 29-36
NASA Earth Exchange (NEX) is a collaboration platform whose goal is to accelerate Earth science research, by leveraging NASA's vast collections of global satellite data together with access to NASA's High-End Computing (HEC) facilities. NEX also aims to fa...
A Technique of Analyzing Trust Relationships to Facilitate Scientific Service Discovery and Recommendation
Found in: 2013 IEEE International Conference on Services Computing (SCC)
By Jia Zhang,Petr Votava,Tsengdar J. Lee,Shrikant Adhikarla,Isaraporn Cherry Kulkumjon,Matthew Schlau,Divya Natesan,Ramakrishna Nemani
Issue Date:June 2013
pp. 57-64
Most of the existing service discovery methods focus on finding candidate services based on functional and non-functional requirements. However, while the open science community engenders many similar scientific services, how to differentiate them remains ...
Learning and Calibrating Per-Location Classifiers for Visual Place Recognition
Found in: 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Petr Gronat,Guillaume Obozinski,Josef Sivic,Toma Pajdla
Issue Date:June 2013
pp. 907-914
The aim of this work is to localize a query photograph by finding other images depicting the same place in a large geotagged image database. This is a challenging task due to changes in viewpoint, imaging conditions and the large size of the image database...
Intentacles: wearable interactive antennae to sense and express emotion
Found in: CHI '13 Extended Abstracts on Human Factors in Computing Systems (CHI EA '13)
By Adam Lawson, Adam Martindale, Ben Moses, David Bowers, Ed Copcutt, Marian Petre, Thomas Baker, Yige Yan
Issue Date:April 2013
pp. 2861-2862
'Intentacles' are wearable, programmable antennae intended to augment the wearer's communication of emotion. The antennae move in 3D and change colour, controlled by an Arduino Nano. The antennae's behaviour can be controlled directly using buttons, or pro...
On performance estimation of a scalable VLIW soft-core in XILINX FPGAs
Found in: 2013 IEEE 16th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS)
By Petr Pfeifer,Zdenek Pliva,Mario Scholzel,Tobias Koal,Heinrich T. Vierhaus
Issue Date:April 2013
pp. 181-186
This paper presents performance estimations for a scalable VLIW soft-core in various XILINX FPGAs. It covers the low-cost low-power devices as well as the latest high-end FPGA families. The results represent the maximal clock frequency of the complete desi...
Improved design of the uninterruptable power supply unit for powering of network devices
Found in: 2013 IEEE 16th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS)
By Martin Pospisilik,Petr Neumann
Issue Date:April 2013
pp. 293-294
Paper describes suggestions on the improvement of the common On-line structure of the uninterruptable power supply units used for powering of network devices. According to these suggestions a prototype circuit able to deliver the output power up to 150 W w...
The Unary Arithmetical Algorithm in Bimodular Number Systems
Found in: 2013 IEEE 21st Symposium on Computer Arithmetic (ARITH)
By Petr Kurka,Martin Delacourt
Issue Date:April 2013
pp. 127-134
We analyze the performance of the unary arithmetical algorithm which computes a Moebius transformation in bimodular number systems which extend the binary signed system. We give statistical evidence that in some of these systems, the algorithm has linear a...
Random rules from data streams
Found in: Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC '13)
By Ezilda Almeida, João Gama, Petr Kosina
Issue Date:March 2013
pp. 813-814
Existing works suggest that random inputs and random features produce good results in classification. In this paper we study the problem of generating random rule sets from data streams. One of the most interpretable and flexible models for data stream min...
Using a distance approach to solve local challenges: working with JavaWIDE
Found in: ACM Inroads
By Marian Petre, Mark Hall
Issue Date:March 2013
pp. 17-18
Welcome to the latest installment of "EduBits," your quarterly pipeline to new and exciting happenings in the world of ACM education. In this edition, the ACM Education Board publishes an important white paper on online learning. In addition, Cameron Wilso...
Energy-Aware Social-Based Routing in Opportunistic Networks
Found in: 2013 Workshops of International Conference on Advanced Information Networking and Applications (WAINA)
By Cristian Chilipirea,Andreea-Cristina Petre,Ciprian Dobre
Issue Date:March 2013
pp. 791-796
In particular types of Delay-Tolerant Networks (DTN) such as Opportunistic Mobile Networks, node connectivity is transient. For this reason, traditional routing mechanisms are no longer suitable. New approaches use social relations between mobile users as ...
Local Search Heuristics for Media Streams Planning Problem
Found in: 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)
By Jiri Marek,Petr Holub,Hana Rudova
Issue Date:March 2013
pp. 945-953
High-quality video-mediated communication uses data streams with high bitrates, often comparable to capacity of network links, it also demands latency to be as low as possible. The problem of finding the optimal solution to multi-point data distribution on...
Educating the Internet-of-Things Generation
Found in: Computer
By Gerd Kortuem,Arosha K. Bandara,Neil Smith,Mike Richards,Marian Petre
Issue Date:February 2013
pp. 53-61
The Open University's My Digital Life course offers a learning infrastructure that allows complete novices to experiment with, and learn about, Internet-of-Things technologies by engaging in a range of activities that include collaborative and collective p...
An Empirical Study of the “Prototype Walkthrough”: A Studio-Based Activity for HCI Education
Found in: ACM Transactions on Computer-Human Interaction (TOCHI)
By C. D. Hundhausen, D. Fairbrother, M. Petre
Issue Date:December 2012
pp. 1-36
For over a century, studio-based instruction has served as an effective pedagogical model in architecture and fine arts education. Because of its design orientation, human-computer interaction (HCI) education is an excellent venue for studio-based instruct...
Teaching cybersecurity at a distance
Found in: ACM Inroads
By Arosha Bandara, Blaine Price, Marian Petre
Issue Date:December 2012
pp. 20-21
EduBits, your quarterly roundup of ACM educational activities, focuses on education policy and the way it affects the K--12 educational space. Cameron Wilson, Director of Public Policy for ACM, gives us a glimpse into the challenges of improving CS educati...
A Non-Intrusive Read-Copy-Update for UTS
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Andrej Podzimek,Martin Decký,Lubomir Bulej,Petr Tuma
Issue Date:December 2012
pp. 482-489
Read-Copy-Update (RCU) is a mechanism designed to increase the level of concurrency in readers-writer synchronization scenarios, vastly improving scalability of software running on multiprocessor machines. Most existing RCU variants have been developed for...
Exploiting semantic annotations in math information retrieval
Found in: Proceedings of the fifth workshop on Exploiting semantic annotations in information retrieval (ESAIR '12)
By Petr Sojka
Issue Date:November 2012
pp. 15-16
This paper describes exploitation of semantic annotations in the design and architecture of MIaS (Math Indexer and Searcher) system for mathematics retrieval. Basing on the claim that navigational and research search are `killer' applications for digital l...
DNA motifs detection algorithms in long sequences
Found in: 2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE)
By Alin G. Voina,Petre G. Pop,Mircea F. Vaida
Issue Date:November 2012
pp. 169-174
The identification of DNA motifs remains an active challenge for the researchers in the bioinformatics domain. A considerable effort in this area was concentrated on understanding the evolution of the genome by identifying the DNA binding sites for transcr...
Fault Localization in MANET-Hosted Service-Based Systems
Found in: 2012 IEEE 31st International Symposium on Reliable Distributed Systems (SRDS)
By Petr Novotny,Alexander L. Wolf,Bong Jun Ko
Issue Date:October 2012
pp. 243-248
Fault localization in general refers to a technique for identifying the likely root causes of failures observed in systems formed from components. Fault localization in systems deployed on mobile ad hoc networks (MANETs) is a particularly challenging task ...
Detection and Recovery of Functions and their Arguments in a Retargetable Decompiler
Found in: 2012 19th Working Conference on Reverse Engineering (WCRE)
By Luká Durfina,Jakub Kroustek,Petr Zemek,Bretislav Kabele
Issue Date:October 2012
pp. 51-60
Detection and recovery of high-level control structures, such as functions and their arguments, plays an important role in decompilation. It has a direct impact on the quality of the generated code because it is needed for generating functionally equivalen...
Remote Access to 3D Models for Research, Engineering, and Art
Found in: IEEE MultiMedia
By Sven Ubik,Zdeněk Trávníček,Petr Žejdl,Jiří Halák
Issue Date:October 2012
pp. 12-19
Stereoscopic (3D) models and visualizations can add value to current videoconferencing systems by offering a higher level of immersion when accessing remote 3D models. The low-latency remote access to 3D models in high resolution over high-speed networks c...
An inheritance system for structural & behavioral reuse in component-based software programming
Found in: Proceedings of the 11th International Conference on Generative Programming and Component Engineering (GPCE '12)
By Chouki Tibermacine, Christophe Dony, Luc Fabresse, Petr Spacek
Issue Date:September 2012
pp. 60-69
In the context of Component-based Programming, which addresses the implementation stage of a component-based software engineering development process, this paper describes a specification and an operational integration of an inheritance system into a self-...
Ontology-driven mindmapping
Found in: Proceedings of the 8th International Conference on Semantic Systems (I-SEMANTICS '12)
By Marek šmíd, Miroslav Blaško, Pavel Mička, Petr Křemen
Issue Date:September 2012
pp. 125-132
Mindmaps have been a popular means for intuitive and user-friendly conceptual modeling for several years. This paper proposes a mindmapping tool driven by semantic web ontologies that allows to assign meanings to the mindmap nodes and, even more importantl...
The Phosphorylation of the Heat Shock Factor as a Modulator for the Heat Shock Response
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Eugen Czeizler, Ion Petre, Vladimir Rogojin
Issue Date:September 2012
pp. 1326-1337
The heat shock response is a well-conserved defence mechanism against the accumulation of misfolded proteins due to prolonged elevated heat. The cell responds to heat shock by raising the levels of heat shock proteins (hsp), which are responsible for chape...
What's the value proposition of distance education?
Found in: ACM Inroads
By Marian Petre, Mary Shaw
Issue Date:September 2012
pp. 26-28
Hello, and welcome to SIGCSE Spotlight, an ongoing column that highlights and reflects on the current trends within computing education and the SIGCSE community. In this quarter's issue we are going to go behind the scenes at the premier SIGCSE conference ...
 1  2 Next >>