499 result(s)
Page Size: 10, 20, 50
Export: bibtex, xml, json, csv
Order by:

CNR Author operator: and / or
more
Typology operator: and / or
more
Language operator: and / or
Date operator: and / or
more
Rights operator: and / or
2008 Journal article Closed Access
Anonymity preserving pattern discovery
Atzori M., Bonchi F., Giannotti F., Pedreschi D.
It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in order to ensure a required statistical significance, represent a large number of individuals and thus conceal individual identities: this is the case of the minimum support threshold in frequent pattern mining. In this paper we show that this belief is ill-founded. By shifting the concept of k -anonymity from the source data to the extracted patterns, we formally characterize the notion of a threat to anonymity in the context of pattern discovery, and provide a methodology to efficiently and effectively identify all such possible threats that arise from the disclosure of the set of extracted patterns. On this basis, we obtain a formal notion of privacy protection that allows the disclosure of the extracted knowledge while protecting the anonymity of the individuals in the source database. Moreover, in order to handle the cases where the threats to anonymity cannot be avoided, we study how to eliminate such threats by means of pattern (not data!) distortion performed in a controlled way.Source: The VLDB journal 17 (2008): 703–727. doi:10.1007/s00778-006-0034-x
DOI: 10.1007/s00778-006-0034-x
Metrics:


See at: The VLDB Journal Restricted | link.springer.com Restricted | CNR ExploRA


2008 Journal article Open Access OPEN
Erratum to "Nearest neighbor search in metric spaces through Content-Addressable Networks" [Information Processing and Management 43 (2007) 665-683]
Falchi F., Gennaro C., Zezula P.
Most of the peer-to-peer search techniques proposed in the recent years have focused on the single-key retrieval. However, similarity search in metric spaces represents an important paradigm for content-based retrieval in many applications. In this paper we introduce an extension of the well-known Content-Addressable Network paradigm to support storage and retrieval of more generic metric space objects. In particular we address the problem of executing the nearest neighbors queries, and propose three different algorithms of query propagation. An extensive experimental study on real-life data sets explores the performance characteristics of the proposed algorithms by showing their advantages and disadvantages.Source: Information processing & management 44 (2008): 411–429. doi:10.1016/j.ipm.2007.03.002
DOI: 10.1016/j.ipm.2007.03.002
DOI: 10.1016/j.ipm.2006.04.002
Metrics:


See at: ISTI Repository Open Access | Information Processing & Management Restricted | Information Processing & Management Restricted | scienceserver.cilea.it Restricted | CNR ExploRA


2008 Journal article Restricted
Space debris mitigation in geosynchronous orbit
Anselmo L., Pardini C.
In order to preserve the geosynchronous region, the Inter-Agency Space Debris Coordination Committee (IADC) proposed and endorsed a re-orbiting strategy for spacecraft at the end-of-life: they should be disposed above the synchronous altitude and passivated, to reduce the risk of inadvertent explosions. The recommended perigee altitude of the disposal orbit took into account all relevant perturbations and was a function of the expected perturbing acceleration induced by solar radiation pressure. It was intended to prevent any further interference with a properly defined geostationary protected region. This paper addresses four main aspects related to space debris mitigation in geosynchronous orbit, by reviewing the rationale and expected effectiveness of spacecraft end-of-life disposal. First, the role played by the initial eccentricity vector on the trajectory evolution of disposed satellites. Second, the collision risk posed by debris clouds and the importance of passivation to prevent energetic breakups. Third, the impact of the operational limitations characteristic of aging spacecraft (e.g. reliability of residual propellant estimates, maneuver constraints and subsystems performance) on the definition of practicable disposal strategies. Last, the potential problem represented by low energy, non-explosive, fragmentations leading to the release of debris with high area-to-mass ratio. Based on the modeling results obtained, some possible mitigation solutions are discussed, including possible enhancements or revisions of the IADC recommendation.Source: Advances in space research 41 (2008): 1091–1099. doi:10.1016/j.asr.2006.12.018
DOI: 10.1016/j.asr.2006.12.018
Metrics:


See at: Advances in Space Research Restricted | www.sciencedirect.com Restricted | CNR ExploRA


2008 Conference article Open Access OPEN
A semi-automatic support to adapt e-documents in an accessible and usable format for vision impaired users
Contini E., Leporini B., Paternò F.
Electronic material (e-documents, e-books, on line resources, etc.) represents an essential tool for continuous learning for print-impaired people, provided it is well-structured. To obtain accessible and usable e-content, specific requirements should be applied from the early beginning or used when adapting existing electronic formats. In this paper we present a method, and a first associated prototype, for making e-documents in a format, which is accessible and usable for vision impaired users. The resulting environment is composed of various transformations, with different degree of automation, and applies a number of guidelines that have been defined for this purpose.Source: ICCHP 2008 - Computers Helping People with Special Needs. International Conference on Computers for Handicapped Persons, pp. 242–249, Linz, Austria, 9-11 2008
DOI: 10.1007/978-3-540-70540-6_36
Metrics:


See at: giove.isti.cnr.it Open Access | doi.org Restricted | link.springer.com Restricted | CNR ExploRA


2008 Journal article Open Access OPEN
A virtual 3D mobile guide in the INTERMEDIA project
Magnenat-Thalmann N., Peternier A., Righetti X., Lim M., Papagiannakis G., Fragopoulos T., Lambropoulou K., Barsocchi P., Thalmann D.
In this paper, we introduce a european re- search pro ject, interactive media with personal networked devices (INTERMEDIA) in which we seek to progress beyond home and device-centric convergence toward truly user-centric convergence of multimedia. Our vision is The User as Multimedia Central: the user as the point at which multimedia services and the means for interact- ing with them converge. This paper proposes the main research goals so that users can be provided with a per- sonalized interface and content independently of physical networked devices, space and time. As a case study, we describe an indoors, mobile mixed reality guide system: Chloe@University. With a see-through head-mounted dis- play (HMD) connected to a small wearable computing device, Chloe@University provides users with an efficient way of guiding in a building. A 3D virtual character in front of the user guides him/her to the required destina- tion.Source: The visual computer 24 (2008): 827–836. doi:10.1007/s00371-008-0264-6
DOI: 10.1007/s00371-008-0264-6
Metrics:


See at: Archive ouverte UNIGE Open Access | The Visual Computer Open Access | RERO DOC Digital Library Open Access | Infoscience - EPFL scientific publications Open Access | The Visual Computer Restricted | www.springerlink.com Restricted | CNR ExploRA


2008 Journal article Open Access OPEN
Active video surveillance based on stereo and infrared imaging
Pieri G., Moroni D.
Video surveillance is a very actual and critical issue at the present time. Within this topics, we address the problem of firstly identifying moving people in a scene through motion detection techniques, and subsequently categorising them in order to identify humans for tracking their movements. The use of stereo cameras, coupled with infrared vision, allows to apply this technique to images acquired through different and variable conditions, and allows an a priori filtering based on the characteristics of such images to give evidence to objects emitting a higher radiance (i.e., higher temperature).Source: EURASIP Journal on Advances in Signal Processing (Online) Article ID 380210 (2008). doi:10.1155/2008/380210
DOI: 10.1155/2008/380210
Metrics:


See at: EURASIP Journal on Advances in Signal Processing Open Access | asp.eurasipjournals.com Open Access | EURASIP Journal on Advances in Signal Processing Open Access | EURASIP Journal on Advances in Signal Processing Open Access | ISTI Repository Open Access | CNR ExploRA


2008 Conference article Restricted
An extensible virtual digital libraries generator
Assante M., Candela L., Castelli D., Frosini L., Lelii L., Manghi P., Manzi A., Pagano P., Simi M.
In this paper we describe the design and implementation of the VDL Generator, a tool to simplify and automatise the Digital Library development process. In particular, we discuss how our approach to the realisation of this tool simplifies the task of implementing, extending and modifying such a fundamental component. This tool models its issue as a generic search problem that can easily be adapted to different application scenarios. In particular, to guarantee its extensibility we carefully identify, isolate and organise the VDL Generator constituents, i.e. (i) the set of logical components that can be used when designing a Digital Library, (ii) the set of physical components that by implementing the logical components contribute to implement the Digital Library and (iii) the search strategy exploited to accomplish the generation task. Furthermore, we report on the experiences matured in implementing and exploiting such an innovative service in the context of the Diligent EU funded project and discuss future plans for its consolidation.Source: 12th European Conference on Digital Libraries, ECDL 2008, pp. 122–134, Aarhus, Denmark, September 14-19, 2008
DOI: 10.1007/978-3-540-87599-4_14
Project(s): D4SCIENCE via OpenAIRE
Metrics:


See at: doi.org Restricted | link.springer.com Restricted | CNR ExploRA


2008 Conference article Restricted
An infrastructure for mining medical multimedia data
Colantonio S., Salvetti O., Tampucci M.
Biomedical research processes related to disease diagnosis, prognosis and monitoring would great benefit from advanced tools able not exclusively to store and manage multimodal data but also to process and extract significant relations and then novel knowledge from them. Indeed, making a prediction on a disease outcome usually requires considering heterogeneous pieces of information obtained from several sources which should be compared and related. Mining medical multimedia objects is aimed at discovering and making available the hidden useful knowledge embedded in collections of data and is, then, of key importance for supporting clinical decision-making. In this paper, we report current results of a medical warehouse we are developing in an integrated environment for mining clinical data acquired by different media. In particular, focus is herein given to the infrastructure of the warehouse and its current functionalities not limited to storage and management but including intelligent representation and annotation of multimedia objects.Source: Advances in Data Mining. Medical Applications, E-Commerce, Marketing, and Theoretical Aspects. 8th Industrial Conference, pp. 102–113, Leipzig, Germany, 16-18 July 2008
DOI: 10.1007/978-3-540-70720-2_8
Metrics:


See at: doi.org Restricted | link.springer.com Restricted | CNR ExploRA


2008 Conference article Restricted
An ontology-based approach for the semantic modelling and reasoning on trajectories
Baglioni M., Macedo J., Renso C., Wachowicz M.
In this paper we present a methodology for the semantic enrichment of trajectories. The objective of this process is to provide a semantic interpretation of a trajectory in term of behaviour. This has been achieved by enhancing raw trajectories with semantic information about moves and stops and by exploiting some domain knowledge encoded in an ontology. Furthermore, the reasoning mechanisms provided by the OWL ontology formalism have been exploited to accomplish a further semantic enrichment step that puts together the different levels of knowledge of the domain. A final example application shows the added power of the enrichment process in characterizing people behaviour.Source: Advances in Conceptual Modeling - Challenges and Opportunities. ER 2008 Workshops CMLSA, ECDM, FP-UML, M2AS, RIGiM, SeCoGIS, WISM Workshop on Semantic and Conceptual Issues in GIS, pp. 344–353, Barcellona, Spain, 20-23 ottobre 2008
DOI: 10.1007/978-3-540-87991-6_41
Metrics:


See at: doi.org Restricted | www.springerlink.com Restricted | CNR ExploRA


2008 Journal article Restricted
Analysis of a redundant architecture for critical infrastructure protection
Daidone A., Chiaradonna S., Bondavalli A., Verissimo P.
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becomes more and more evident as the damage and the risks deriving from wrong behaviors (both accidental and intentionally caused) are increasing. It is becoming evident that existing (legacy) subsystem must be interconnected together following some disciplined and controlled way. This is one of the challenges taken by the European Project CRUTIAL, where an infrastructure architecture seen as a WAN of LANs is being proposed, where LANs confine existing sub-systems, protected by special interconnection and filtering devices (CIS - CRUTIAL Information Switches). Previous work led to the definition of the CIS internal and interconnection architecture, so that a set of CIS can collectively ensure that the computers controlling the physical process correctly exchange information despite accidents and malicious attacks. CIS resilience is achieved thanks to replication for intrusion tolerance and replica recovery for self-healing. This chapter analyzes the redundant architecture of the CIS, with a set of objectives: identifying the relevant parameters of the architecture; evaluating how effective is the trade-off between proactive and reactive recoveries; and finding the best parameter setup. Two measures of interest were identified, a model of the recovery strategy was constructed and the quantitative behavior of the recovery strategy was analyzed. The impact of the detection coverage, of the intrusions and of the number of CIS replicas was analyzed and discussed. The directions for refining and improving the recovery strategy were proposed.Source: Lecture notes in computer science 5135 (2008): 78–100. doi:10.1007/978-3-540-85571-2_4
DOI: 10.1007/978-3-540-85571-2_4
Metrics:


See at: doi.org Restricted | www.springerlink.com Restricted | CNR ExploRA


2008 Journal article Restricted
Analytical and semi-analytical investigations of geosynchronous space debris with high area-to-mass ratios
Valk S., Lemaitre A., Anselmo L.
This paper provides a Hamiltonian formulation of the averaged equations of motion with respect to short periods (1 day) of a space debris subjected to direct solar radiation pressure and orbiting near the geostationary ring. This theory is based on a semi-analytical theory of order 1 regarding the averaging process, formulated using canonical and non-singular elements for eccentricity and inclination. The analysis is based on an expansion in powers of the eccentricity and of the inclination, truncated at an arbitrary high order. First, the dynamical evolution of space debris released near the geostationary ring, with area-to-mass ratios as high as 40 m2/kg is analyzed within the framework of mid-term evolution (1 year) as well as long-term evolution (several decades). This study is carried out, using both simplified analytical models to clarify some properties, as well as our complete semi-analytical theory which leads to an accurate understanding of the mid-term and long-term evolution of the eccentricity and of the inclination. We also analyzed the coupling equations between the eccentricity and the inclination, considering a doubly averaged analytical model. Second, we also focused our attention on the comparison of various direct radiation pressure approximations in order to assess their consequences. Last, this paper claims to be the continuation and the counterpart of previous papers dealing with geosynchronous orbits and radiation pressure, that is [Anselmo, L., Pardini, C. Orbital evolution of geosynchronous objects with high area-to-mass ratios. In: Danesy, D. (Ed.), Proceedings of the Fourth European Conference on Space Debris, ESA SP-587. ESA Publications Division, Noordwijk, The Netherlands, pp. 279-284, 2005] and [Valk, S., Lemaitre, A., Deleflie, F. Semi-analytical theory of mean orbital motion for geosynchronous space debris under gravitational influence, Advances in Space Research, submitted for publication].Source: Advances in space research 41 (2008): 1077–1090. doi:10.1016/j.asr.2007.10.025
DOI: 10.1016/j.asr.2007.10.025
Metrics:


See at: Advances in Space Research Restricted | CNR ExploRA


2008 Journal article Open Access OPEN
Applying Web Usability Criteria for Vision-Impaired Users: Does It Really Improve Task Performance?
Leporini B., Paternò F.
Available accessibility guidelines do not necessarily guarantee usable Web sites, particularly when specific groups of users with special needs are considered. We have identified 15 Web design criteria aiming to provide integrated support of accessibility and usability for vision-impaired users. In this article, we present the results of a study investigating whether the application of such guidelines for vision-impaired users can actually improve their task performance when accessing Web applications. We report on two user tests, both involving vision-impaired users, that aim to provide empirical validation of the design criteria. During each test, users had to access and navigate two versions of a Web site, one version supporting the selected design criteria and one obtained with traditional techniques. Our results indicate that the 15 design criteria improved Web site usability both quantitatively and qualitatively by reducing the navigation time needed to perform the assigned tasks and by making the Web sites easier to navigate for blind and low-vision users.Source: International journal of human-computer interaction 24 (2008): 17–47. doi:10.1080/10447310701771472
DOI: 10.1080/10447310701771472
Metrics:


See at: International Journal of Human-Computer Interaction Open Access | International Journal of Human-Computer Interaction Restricted | www.tandfonline.com Restricted | CNR ExploRA


2008 Conference article Restricted
Asynchronous training in wireless sensor networks
Barsi F., Bertossi A. A., Betti Sorbelli F., Ciotti R., Olariu S., Pinotti M. C.
A scalable energy-efficient training protocol is proposed for massively-deployed sensor networks, where sensors are initially anony- mous and unaware of their location. The protocol is based on an intuitive coordinate system imposed onto the deployment area which partitions the anonymous sensors into clusters. The protocol is asynchronous, in the sense that the sensors wake up for the first time at random, then alternate between sleep and awake periods both of fixed length, and no explicit synchronization is performed between them and the sink. Theo- retical properties are stated under which the training of all the sensors is possible. Moreover, a worst-case analysis as well as an experimental evaluation of the performance is presented, showing that the protocol is lightweight and flexible.Source: Third International Workshop, ALGOSENSORS 2007, pp. 46–57, Wroclaw, Poland, 14 July 2007
DOI: 10.1007/978-3-540-77871-4
Metrics:


See at: doi.org Restricted | www.springerlink.com Restricted | CNR ExploRA


2008 Journal article Restricted
Biomedical signal and image processing for decision support in heart failure
Chiarugi F., Colantonio S., Emmanouilidou D., Moroni D., Salvetti O.
Signal and imaging investigations are currently a basic step of the diagnostic, prognostic and follow-up processes of heart diseases. Besides, the need of a more efficient, cost-effective and personalized care has lead nowadays to a renaissance of clinical decision support systems (CDSS). The purpose of this paper is to present an effective way to achieve a high-level integration of signal and image processing methods in the general process of care, by means of a clinical decision support system, and to discuss the advantages of such an approach. Among several heart diseases, we treat heart failure, that for its complexity highlights best the benefits of this integration. Architectural details of the related components of the CDSS are provided with special attention to their seamless integration in the general IT infrastructure. In particular, significant and suitably designed image and signal processing algorithms are introduced to objectively and reliably evaluate important features that, in collaboration with the CDSS, can facilitate decisional problems in the heart failure domain. Furthermore, additional signal and image processing tools enrich the model base of the CDSS.Source: Lecture notes in computer science 5108 (2008): 38–51. doi:10.1007/978-3-540-70715-8_4
DOI: 10.1007/978-3-540-70715-8_4
Metrics:


See at: doi.org Restricted | www.springerlink.com Restricted | CNR ExploRA


2008 Journal article Open Access OPEN
Boosting multi-label hierarchical text categorization
Esuli A., Fagni T., Sebastiani F.
Hierarchical Text Categorization (HTC) is the task of generating (usually by means of supervised learning algorithms) text classifiers that operate on hierarchically structured classification schemes. Notwithstanding the fact that most large-sized classification schemes for text have a hierarchical structure, so far the attention of text classification researchers has mostly focused on algorithms for "flat" classification, i.e. algorithms that operate on non-hierarchical classification schemes. These algorithms, once applied to a hierarchical classification problem, are not capable of taking advantage of the information inherent in the class hierarchy, and may thus be suboptimal, in terms of efficiency and/or effectiveness. In this paper we propose TreeBoost.MH, a multi-label HTC algorithm consisting of a hierarchical variant of AdaBoost.MH, a very well-known member of the family of "boosting" learning algorithms. TreeBoost.MH embodies several intuitions that had arisen before within HTC: e.g. the intuitions that both feature selection and the selection of negative training examples should be performed "locally", i.e. by paying attention to the topology of the classification scheme. It also embodies the novel intuition that the weight distribution that boosting algorithms update at every boosting round should likewise be updated "locally". All these intuitions are embodied within TreeBoost.MH in an elegant and simple way, i.e. by defining TreeBoost.MH as a recursive algorithm that uses AdaBoost.MH as its base step, and that recurs over the tree structure. We present the results of experimenting TreeBoost.MH on three HTC benchmarks, and discuss analytically its computational cost.Source: Information retrieval (Boston) 11 (2008): 287–313. doi:10.1007/s10791-008-9047-y
DOI: 10.1007/s10791-008-9047-y
Metrics:


See at: Information Retrieval Open Access | ISTI Repository Open Access | Information Retrieval Restricted | www.springerlink.com Restricted | CNR ExploRA


2008 Conference article Open Access OPEN
CLEF 2007: ad hoc track overview
Di Nunzio G., Ferro N., Mandl T., Peters C.
We describe the objectives and organization of the CLEF 2007 Ad Hoc track and discuss the main characteristics of the tasks offered to test monolingual and cross-language textual document retrieval systems. The track was divided into two streams. The main stream offered mono- and bilingual tasks on target collections for central European languages (Bulgarian, Czech and Hungarian). Similarly to last year, a bilingual task that encouraged system testing with non-European languages against English documents was also offered; this year, particular attention was given to Indian languages. The second stream, designed for more experienced participants, offered mono- and bilingual "robust" tasks with the objective of privileging experiments which achieve good stable performance over all queries rather than high average performance. These experiments re-used CLEF test collections from previous years in three languages (English, French, and Portuguese). The performance achieved for each task is presented and discussed.Source: 8th Workshop of the Cross-Language Evaluation Forum, CLEF 2007, pp. 13–32, Budapest, Hungary, 19-21 September 2007
DOI: 10.1007/978-3-540-85760-0_2
Metrics:


See at: doras.dcu.ie Open Access | doi.org Restricted | link.springer.com Restricted | www.scopus.com Restricted | CNR ExploRA


2008 Journal article Open Access OPEN
Cohomology of affine artin groups and applications
Callegaro F., Moroni D., Salvetti M.
The result of this paper is the determination of the cohomology of Artin groups of type A_n, B_n and A. _n with non-trivial local coefficients. The main result is an explicit computation of the cohomology of the Artin group of type B_n with coefficients over the module Q[q±1, t±1]. Here the first n - 1 standard generators of the group act by (-q)-multiplication, while the last one acts by (-t)-multiplication. The proof uses some technical results from previous papers plus computations over a suitable spectral sequence. The remaining cases follow from an application of Shapiro's lemma, by considering some well-known inclusions: we obtain the rational cohomology of the Artin group of affine type A. _n as well as the cohomology of the classical braid group Br_n with coefficients in the n-dimensional representation presented in Tong, Yang, and Ma (1996). The topological counterpart is the explicit construction of finite CW-complexes endowed with a free action of the Artin groups, which are known to be K(p, 1) spaces in some cases (including finite type groups). Particularly simple formulas for the Euler-characteristic of these orbit spaces are derived.Source: Transactions of the American Mathematical Society 360 (2008): 4169–4188. doi:10.1090/S0002-9947-08-04488-7
DOI: 10.1090/s0002-9947-08-04488-7
DOI: 10.48550/arxiv.0705.2823
Metrics:


See at: arXiv.org e-Print Archive Open Access | Transactions of the American Mathematical Society Open Access | Transactions of the American Mathematical Society Restricted | doi.org Restricted | www.ams.org Restricted | CNR ExploRA


2008 Journal article Open Access OPEN
Component separation methods for the PLANCK mission
Leach S. M., Cardoso J., Baccigalupi C., Barreiro R. B., Betoule M., Bobin J., Bonaldi A., Delabrouille J., De Zotti G., Dickinson C., Eriksen H. K., Gonzalez-Nuevo J., Hansen F. K., Herranz D., Le Jeune M., Lopez-Caniego M., Martinez-Gonzalez E., Massardi M., Melin J., Miville-Dechêne M., Patanchon G., Prunet S., Ricciardi S., Salerno E., Sanz J. L., Stark J., Stivoli F., Stolyarov V., Stompor R., Vielva P.
Context. The planck satellite will map the full sky at nine frequencies from 30 to 857 GHz. The CMB intensity and polarization that are its prime targets are contaminated by foreground emission. Aims. The goal of this paper is to compare proposed methods for separating CMB from foregrounds based on their di?erent spectral and spatial characteristics, and to separate the foregrounds into "components" with di?erent physical origins (Galactic synchrotron, free-free and dust emissions; extra-galactic and far-IR point sources; Sunyaev-Zeldovich e?ect, etc.). Methods. A component separation challenge has been organised, based on a set of realistically complex simulations of sky emission. Several methods including those based on internal template subtraction, maximum entropy method, parametric method, spatial and harmonic cross correlation methods, and independent component analysis have been tested. Results. Di?erent methods proved to be e?ective in cleaning the CMB maps of foreground contamination, in reconstructing maps of di?use Galactic emissions, and in detecting point sources and thermal Sunyaev-Zeldovich signals. The power spectrum of the residuals is, on the largest scales, four orders of magnitude lower than the input Galaxy power spectrum at the foreground minimum. The CMB power spectrum was accurately recovered up to the sixth acoustic peak. The point source detection limit reaches 100 mJy, and about 2300 clusters are detected via the thermal SZ e?ect on two thirds of the sky.We have found that no single method performs best for all scientific objectives. Conclusions. We foresee that the final component separation pipeline for planck will involve a combination of methods and iterations between processing steps targeted at di?erent objectives such as di?use component separation, spectral estimation, and compact source extraction.Source: Astronomy & astrophysics (Print) 491 (2008): 597–615. doi:10.1051/0004-6361:200810116
DOI: 10.1051/0004-6361:200810116
DOI: 10.48550/arxiv.0805.0269
Metrics:


See at: arXiv.org e-Print Archive Open Access | SISSA Digital Library Open Access | Caltech Authors Open Access | Astronomy and Astrophysics Open Access | Astronomy and Astrophysics Restricted | doi.org Restricted | HAL-Inserm Restricted | www.aanda.org Restricted | CNR ExploRA


2008 Journal article Open Access OPEN
CostGlue: simulation data exchange in telecommunications
Savic D., Potortì F., Furfari F., Pustisek M., Tomazic S., Bester J.
Exchanging simulation data among simulation practitioners is, to a great extent, hindered by the use of different kinds of data formats in simulation software packages. The purpose of the CostGlue project is to facilitate the exchange of simulation data in the field of telecommunications. We propose a common data interchange format and a data exchange model for raw simulation data, metadata and post-processing data. Based on this model, we additionally propose a framework, CostGlue, designed for packaging simulation output data into the common interchange format, launching post-processing plugins and exporting data into input formats for various third party tools. As a proof of concept we have implemented the framework as a software package and released it as free softwareSource: Simulation (S. Diego Calif.) 84 (2008): 157–168. doi:10.1177/0037549708093715
DOI: 10.1177/0037549708093715
Metrics:


See at: SIMULATION Open Access | SIMULATION Restricted | sim.sagepub.com Restricted | CNR ExploRA


2008 Journal article Open Access OPEN
Customization of Web applications through an intelligent environment exploiting logical interface descriptions
Macias A., Paternò F.
Customization of Web-based applications is often considered a designer skill rather than an end-user need. However, there is an ongoing shift to end-user-centred technology, and even users with poor or no skill in Web-based languages may feel the need to customize Web applications according to their preferences. Although Web authoring environments have an increasing number of features, the challenge of providing end-users with the ability to easily customize entire Web applications still remains unsolved. In this paper, we propose an intelligent approach to customizing Web-based applications. Customizations rules are automatically inferred by the system from changes that users supply as examples. They remain as long-term knowledge that can be applied to support future interactions, thus minimizing the amount of authoring that end-users need to do for this purpose. In order to better understand the implications of the user's modifications, they are analysed using the logical descriptions of the corresponding Web pages.Source: Interacting with computers 20 (2008): 29–47. doi:10.1016/j.intcom.2007.07.007
DOI: 10.1016/j.intcom.2007.07.007
Metrics:


See at: Recolector de Ciencia Abierta, RECOLECTA Open Access | Interacting with Computers Restricted | www.sciencedirect.com Restricted | CNR ExploRA