2008 International Multiconference on Computer Science and Information Technology最新文献

筛选
英文 中文
Computer-aided detecting of early strokes and its evaluation on the base of CT images 基于CT图像的早期脑卒中计算机辅助检测及评价
2008 International Multiconference on Computer Science and Information Technology Pub Date : 2008-10-01 DOI: 10.1109/IMCSIT.2008.4747247
Elzbieta Hudyma, G. Terlikowski
{"title":"Computer-aided detecting of early strokes and its evaluation on the base of CT images","authors":"Elzbieta Hudyma, G. Terlikowski","doi":"10.1109/IMCSIT.2008.4747247","DOIUrl":"https://doi.org/10.1109/IMCSIT.2008.4747247","url":null,"abstract":"This paper presents an easy way of finding strokes on computer tomography images. By calculating a cohesive rate (CR) of suspicious pixel on a series of CT images there is a possibility of calculating a general probability of a stroke. In a difficult case there is always an opportunity to generate a graph of all stroke probabilities interposed on the original image. It is a very helpful tool specialists and neurologists working in emergency situations. Supported by grant N518 022 3/1338 (Ministry of Science).","PeriodicalId":267715,"journal":{"name":"2008 International Multiconference on Computer Science and Information Technology","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115587120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Corporate blogs—innovative communication tool or another internet hype? empirical research study 企业博客——创新的沟通工具还是另一种互联网炒作?实证研究
2008 International Multiconference on Computer Science and Information Technology Pub Date : 2008-10-01 DOI: 10.1109/IMCSIT.2008.4747273
G. Mazurek
{"title":"Corporate blogs—innovative communication tool or another internet hype? empirical research study","authors":"G. Mazurek","doi":"10.1109/IMCSIT.2008.4747273","DOIUrl":"https://doi.org/10.1109/IMCSIT.2008.4747273","url":null,"abstract":"In the following paper the role, potential and perception of corporate blogging among key marketing decision makers from the companies listed on Warsaw stock exchange have been presented. The topic of blogs has been widely promoted in recent theoretical and practical publications, however very little information can be found on the scope of blogs usage and real impact of such modern communication tool on the business. Such issues as limitations in corporate blogs implementation, the perception of the blogspsila information value or the expected potential of blogs usage have been identified and explained. Author describes various models of corporate blogs and tries to find out whether blogs are truly used as modern communication tool for business or it is just another hype which soon is replaced in media by another ideas and concepts.","PeriodicalId":267715,"journal":{"name":"2008 International Multiconference on Computer Science and Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117179938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applying emphasized soft targets for Gaussian Mixture Model based classification 基于高斯混合模型的重点软目标分类
2008 International Multiconference on Computer Science and Information Technology Pub Date : 2008-10-01 DOI: 10.1109/IMCSIT.2008.4747229
Soufiane El Jelali, A. Lyhyaoui, A. Figueiras-Vidal
{"title":"Applying emphasized soft targets for Gaussian Mixture Model based classification","authors":"Soufiane El Jelali, A. Lyhyaoui, A. Figueiras-Vidal","doi":"10.1109/IMCSIT.2008.4747229","DOIUrl":"https://doi.org/10.1109/IMCSIT.2008.4747229","url":null,"abstract":"When training machines classifiers, it is possible to replace hard classification targets by their emphasized soft versions so as to reduce the negative effects of using cost functions as approximations to misclassification rates. This emphasis has the same effect as sample editing methods which have proved to be effective for improving classifiers performance. In this paper, we explore the effectiveness of using emphasized soft targets with generative models, such as Gaussian mixture models, that offer some advantages with respect to decision (prediction) oriented architectures, such as an easy interpretation and possibilities of dealing with missing values. Simulation results support the usefulness of the proposed approach to get better performance and show a low sensitivity to design parameters selection.","PeriodicalId":267715,"journal":{"name":"2008 International Multiconference on Computer Science and Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125806665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Network-level properties of modern anonymity systems 现代匿名系统的网络级特性
2008 International Multiconference on Computer Science and Information Technology Pub Date : 2008-10-01 DOI: 10.1109/IMCSIT.2008.4747339
M. Rybczynska
{"title":"Network-level properties of modern anonymity systems","authors":"M. Rybczynska","doi":"10.1109/IMCSIT.2008.4747339","DOIUrl":"https://doi.org/10.1109/IMCSIT.2008.4747339","url":null,"abstract":"This paper shows the network-level view of the behaviour of two popular and deployed anonymity systems; Tor and JAP (AN.ON). The analysis uses the fact that both of them depend on TCP (transmission control protocol) and shows cases when network conditions may affect the systemspsila operations. The main topics are: on-off traffic, difference in available bandwidth between peers, and usage of the window mechanism in the TCP. The analysis is divided into two parts: from both the senderpsilas and receiverpsilas point of view. We present the results of experiments made on live systems, showing that the analyzed effects may be encountered in practice.","PeriodicalId":267715,"journal":{"name":"2008 International Multiconference on Computer Science and Information Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124831295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed scheduling for real-time railway traffic control 面向铁路交通实时控制的分布式调度
2008 International Multiconference on Computer Science and Information Technology Pub Date : 2008-10-01 DOI: 10.1109/IMCSIT.2008.4747316
T. Letia, M. Hulea, R. Miron
{"title":"Distributed scheduling for real-time railway traffic control","authors":"T. Letia, M. Hulea, R. Miron","doi":"10.1109/IMCSIT.2008.4747316","DOIUrl":"https://doi.org/10.1109/IMCSIT.2008.4747316","url":null,"abstract":"The increase of railway traffic efficiency and flexibility requires new real-time scheduling and control methods. New charter trains have to be added continuously without disturbing the other (periodic) train moves or decreasing the safety conditions. A distributed method to schedule new trains such that their real-time constraints are fulfilled is presented. The trains have timelines to meet and hence the deadlines are extracted taking into account the included laxity. The trains have pre-established routes specifying the stations and required arrival times. The paths containing the block sections from one station to another are dynamically allocated without leading to deadlocks.","PeriodicalId":267715,"journal":{"name":"2008 International Multiconference on Computer Science and Information Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130099951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A linguistic light approach to multilingualism in lexical layers for ontologies 本体词汇层中多语言现象的轻语言研究
2008 International Multiconference on Computer Science and Information Technology Pub Date : 2008-10-01 DOI: 10.1109/IMCSIT.2008.4747268
A. Troussov, J. Judge, Mikhail Sogrin, Amine Akrout, Brian Davis, S. Handschuh
{"title":"A linguistic light approach to multilingualism in lexical layers for ontologies","authors":"A. Troussov, J. Judge, Mikhail Sogrin, Amine Akrout, Brian Davis, S. Handschuh","doi":"10.1109/IMCSIT.2008.4747268","DOIUrl":"https://doi.org/10.1109/IMCSIT.2008.4747268","url":null,"abstract":"Semantic Web ontologies are being increasingly used in modern text analytics applications and ontology-based information extraction (OBIE) as a means to provide a semantic backbone either for modelling the internal conceptual data structures of the text analytics (TA) engine or to model the knowledge base to drive the analysis of unstructured information in raw text and subsequent Knowledge acquisition and population. creating and targeting language resources (LR)s from a TA to an ontology can be time consuming and costly.The authors describe a user-friendly method for ontology engineers to augment an ontologies with a lexical layer which provides a flexible framework to identify term mentions of ontology concepts in raw text. In this paper we explore multilinguality in these lexical layers using the same framework. We discuss a number of potential issues for the ldquolinguistic lightrdquo lexical extensions for ontologies (LEON) approach when looking at languages more morphologically rich and which have more complex linguistic constraints than English. We show how the LEON approach can cope with these phenomena once the morphological normaliser used in the lexical analysis process is able to generalise sufficiently well for the language concerned.","PeriodicalId":267715,"journal":{"name":"2008 International Multiconference on Computer Science and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129146126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
User behaviour based phishing websites detection 基于用户行为的钓鱼网站检测
2008 International Multiconference on Computer Science and Information Technology Pub Date : 2008-10-01 DOI: 10.1109/IMCSIT.2008.4747332
Xun Dong, J. A. Clark, J. Jacob
{"title":"User behaviour based phishing websites detection","authors":"Xun Dong, J. A. Clark, J. Jacob","doi":"10.1109/IMCSIT.2008.4747332","DOIUrl":"https://doi.org/10.1109/IMCSIT.2008.4747332","url":null,"abstract":"Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach to detect phishing websites based on analysis of userspsila online behaviours - i.e., the websites users have visited, and the data users have submitted to those websites. Such user behaviours can not be manipulated freely by attackers; detection based on those data can not only achieve high accuracy, but also is fundamentally resilient against changing deception methods.","PeriodicalId":267715,"journal":{"name":"2008 International Multiconference on Computer Science and Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115262333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Real time behavior of data in distributed embedded systems 分布式嵌入式系统中数据的实时行为
2008 International Multiconference on Computer Science and Information Technology Pub Date : 2008-10-01 DOI: 10.1109/IMCSIT.2008.4747300
Tanguy Le Berre, P. Mauran, G. Padiou, P. Quéinnec
{"title":"Real time behavior of data in distributed embedded systems","authors":"Tanguy Le Berre, P. Mauran, G. Padiou, P. Quéinnec","doi":"10.1109/IMCSIT.2008.4747300","DOIUrl":"https://doi.org/10.1109/IMCSIT.2008.4747300","url":null,"abstract":"Nowadays, most embedded systems become distributed systems structured as a set of communicating components. Therefore, they display a less deterministic global behavior than centralized systems and their design and analysis must address both computation and communication scheduling in more complex configurations. We propose a modeling framework centered on data. More precisely, the interactions between the data located in components are expressed in terms of a so-called observation relation. This abstraction is a relation between the values taken by two variables, the source and the image, where the image gets past values of the source. We extend this abstraction with time constraints in order to specify and analyze the availability of timely sound values. The formal description of the observation-based computation model is stated using the formalisms of transition systems. Real time is introduced as a dedicated variable. As a first result, this approach allows to focus on specifying time constraints attached to data and to postpone task and communication scheduling matters. At this level of abstraction, the designer has to specify time properties about the timeline of data such as their freshness, stability, latency... As a second result, a verification of the global consistency of the specified system can be automatically performed. A forward or backward approach can be chosen. The verification process can start from either the timed properties (e.g. the period) of data inputs or the timed requirements of data outputs (e.g. the latency). As a third result, communication protocols and task scheduling strategies can be derived as a refinement towards an actual implementation.","PeriodicalId":267715,"journal":{"name":"2008 International Multiconference on Computer Science and Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121616380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An application supporting language analysis within the framework of the phonetic grammar 在语音语法框架内支持语言分析的应用程序
2008 International Multiconference on Computer Science and Information Technology Pub Date : 2008-10-01 DOI: 10.1109/IMCSIT.2008.4747265
Krzysztof Dyczkowski, Norbert Kordek, P. Nowakowski, K. Stroński
{"title":"An application supporting language analysis within the framework of the phonetic grammar","authors":"Krzysztof Dyczkowski, Norbert Kordek, P. Nowakowski, K. Stroński","doi":"10.1109/IMCSIT.2008.4747265","DOIUrl":"https://doi.org/10.1109/IMCSIT.2008.4747265","url":null,"abstract":"The aim of the paper is to present an application supporting language analysis within the framework of the phonetic grammar. The notion of the phonetic grammar has been concisely introduced and the basic potential of the application and the algorithms employed in it are briefly discussed. The application is to enable a uniform description and a comparative analysis of many languages. At the first stage the languages taken into consideration are Polish, Chinese and Hindi.","PeriodicalId":267715,"journal":{"name":"2008 International Multiconference on Computer Science and Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125262093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A safety shell for UML-RT Projects UML-RT项目的安全外壳
2008 International Multiconference on Computer Science and Information Technology Pub Date : 2008-10-01 DOI: 10.1109/IMCSIT.2008.4747309
R. Gumzej, W. Halang
{"title":"A safety shell for UML-RT Projects","authors":"R. Gumzej, W. Halang","doi":"10.1109/IMCSIT.2008.4747309","DOIUrl":"https://doi.org/10.1109/IMCSIT.2008.4747309","url":null,"abstract":"A safety shell pattern was defined based on a reconfiguration management pattern, and inspired by the architectural specifications in Specification PEARL. It is meant to be used for real-time applications to be developed with UML-RT as described. The implementation of the safety shell features as defined by in [8], namely its timing and state guards as well as I/O protection and exception handling mechanisms, is explained. The pattern is parameterised by defining the properties of its components as well as by defining the mapping between software and hardware architectures. Initial and alternative execution scenarios as well as the method for switching between them are defined. The goal pursued with the safety shell is to obtain clearly specified operation scenarios with well defined transitions between them. To achieve safe and timely operation, the pattern must provide safety shell mechanisms for an application designed, i.e., enable its predictable deterministic and temporally predictable operation now and in the future.","PeriodicalId":267715,"journal":{"name":"2008 International Multiconference on Computer Science and Information Technology","volume":"496 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134175632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信