@prefix epid: . @prefix void: . @prefix xsd: . @prefix cc: . @prefix ep: . @prefix eprel: . @prefix dc: . @prefix bibo: . @prefix geo: . @prefix owl: . @prefix event: . @prefix skos: . @prefix foaf: . @prefix rdfs: . @prefix rdf: . @prefix dct: . <> rdfs:comment "The repository administrator has not yet configured an RDF license."^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #92440 \n\nA Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The rapid integration of the Internet into our daily lives has led to many benefits but also to a number of new, wide-spread threats such as online hate, trolling, bullying, and generally aggressive behaviours. While research has traditionally explored online hate, in particular, on one platform, the reality is that such hate is a phenomenon that often makes use of multiple online networks. In this article, we seek to advance the discussion into online hate by harnessing a comparative approach, where we make use of various Natural Language Processing (NLP) techniques to computationally analyse hateful content from Reddit and 4chan relating to the 2020 US Presidential Elections. Our findings show how content and posting activity can differ depending on the platform being used. Through this, we provide initial comparison into the platform-specific behaviours of online hate, and how different platforms can serve specific purposes. We further provide several avenues for future research utilising a cross-platform approach so as to gain a more comprehensive understanding of the global hate ecosystem."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2022-04-15"; dct:isPartOf ; dct:publisher ; dct:subject , , , ; dct:title "A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences (General)"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "37th ACM/SIGAPP Symposium On Applied Computing"^^xsd:string; rdf:type bibo:Conference . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Zahrah"^^xsd:string; foaf:givenName "Fatima"^^xsd:string; foaf:name "Fatima Zahrah"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Goldsmith"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Goldsmith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91586 \n\nA Self-Training Hierarchical Prototype-based Ensemble Framework for Remote Sensing Scene Classification\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "A Self-Training Hierarchical Prototype-based Ensemble Framework for Remote Sensing Scene Classification (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Self-Training Hierarchical Prototype-based Ensemble Framework for Remote Sensing Scene Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Self-Training Hierarchical Prototype-based Ensemble Framework for Remote Sensing Scene Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Self-Training Hierarchical Prototype-based Ensemble Framework for Remote Sensing Scene Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Self-Training Hierarchical Prototype-based Ensemble Framework for Remote Sensing Scene Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Self-Training Hierarchical Prototype-based Ensemble Framework for Remote Sensing Scene Classification (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Remote sensing scene classification plays a critical role in a wide range of real-world applications. Technically, however, scene classification is an extremely challenging task due to the huge complexity in remotely sensed scenes, and the difficulty in acquiring labelled data for model training such as supervised deep learning. To tackle these issues, a novel semi-supervised ensemble framework is proposed here using the self-training hierarchical prototype-based classifier as the base learner for chunk-by-chunk prediction. The framework has the ability to build a powerful ensemble model from both labelled and unlabelled images with minimum supervision. Different feature descriptors are employed in the proposed ensemble framework to offer multiple independent views of images. Thus, the diversity of base learners is guaranteed for ensemble classification. To further increase the overall accuracy, a novel cross-checking strategy was introduced to enable the base learners to exchange pseudo-labelling information during the self-training process, and maximize the correctness of pseudo-labels assigned to unlabelled images. Extensive numerical experiments on popular benchmark remote sensing scenes demonstrated the effectiveness of the proposed ensemble framework, especially where the number of labelled images available is limited. For example, the classification accuracy achieved on the OPTIMAL-31, PatternNet and RSI-CB256 datasets was up to 99.91%, 98. 67% and 99.07% with only 40% of the image sets used as labelled training images, surpassing or at least on par with mainstream benchmark approaches trained with double the number of labelled images."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "80"; dc:hasVersion ; dct:creator , , , , , ; dct:date "2022-04"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A Self-Training Hierarchical Prototype-based Ensemble Framework for Remote Sensing Scene Classification"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Zhang"^^xsd:string; foaf:givenName "Ce"^^xsd:string; foaf:name "Ce Zhang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Han"^^xsd:string; foaf:givenName "Jungong"^^xsd:string; foaf:name "Jungong Han"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen"^^xsd:string; foaf:name "Plamen Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Atkinson"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Atkinson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Shen"^^xsd:string; foaf:givenName "Qiang"^^xsd:string; foaf:name "Qiang Shen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "15662535"; foaf:name "Information Fusion"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #93038 \n\nPACO-VMP: Parallel Ant Colony Optimization for Virtual Machine Placement\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "PACO-VMP: Parallel Ant Colony Optimization for Virtual Machine Placement (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "PACO-VMP: Parallel Ant Colony Optimization for Virtual Machine Placement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "PACO-VMP: Parallel Ant Colony Optimization for Virtual Machine Placement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "PACO-VMP: Parallel Ant Colony Optimization for Virtual Machine Placement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "PACO-VMP: Parallel Ant Colony Optimization for Virtual Machine Placement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "PACO-VMP: Parallel Ant Colony Optimization for Virtual Machine Placement (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "The Virtual Machine Placement (VMP) problem is a challenging optimization task that involves the assignment of virtual machines to physical machines in a cloud computing environment. The placement of virtual machines can significantly affect the use of resources in a cluster, with a subsequent impact on operational costs and the environment. In this paper, we present an improved algorithm for VMP, based on Parallel Ant Colony Optimization (PACO), which makes effective use of parallelization techniques and modern processor technologies. We achieve solution qualities that are comparable with or superior to those obtained by other nature-inspired methods, with our parallel implementation obtaining a speed-up of up to 2002x over recent serial algorithms in the literature. This allows us to rapidly find high-quality solutions that are close to the theoretical minimum number of Virtual Machines."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "129"; dc:hasVersion ; dct:creator , , , , ; dct:date "2022-04"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "PACO-VMP: Parallel Ant Colony Optimization for Virtual Machine Placement"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Peake"^^xsd:string; foaf:givenName "Joshua"^^xsd:string; foaf:name "Joshua Peake"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Costen"^^xsd:string; foaf:givenName "Nicholas"^^xsd:string; foaf:name "Nicholas Costen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Amos"^^xsd:string; foaf:givenName "Martyn"^^xsd:string; foaf:name "Martyn Amos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lloyd"^^xsd:string; foaf:givenName "Huw"^^xsd:string; foaf:name "Huw Lloyd"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Masala"^^xsd:string; foaf:givenName "Giovanni"^^xsd:string; foaf:name "Giovanni Masala"^^xsd:string; rdf:type foaf:Person . bibo:issn "0167739X"; foaf:name "Future Generation Computer Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "cgf2022.pdf"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #93697 \n\nComputing Schematic Layouts for Spatial Hypergraphs on Concentric Circles and Grids\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Computing Schematic Layouts for Spatial Hypergraphs on Concentric Circles and Grids (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Computing Schematic Layouts for Spatial Hypergraphs on Concentric Circles and Grids (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Computing Schematic Layouts for Spatial Hypergraphs on Concentric Circles and Grids (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Computing Schematic Layouts for Spatial Hypergraphs on Concentric Circles and Grids (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Computing Schematic Layouts for Spatial Hypergraphs on Concentric Circles and Grids (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Computing Schematic Layouts for Spatial Hypergraphs on Concentric Circles and Grids (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Set systems can be visualized in various ways. An important distinction between techniques is whether the elements have a spatial location that is to be used for the visualization; for example, the elements are cities on a map. Strictly adhering to such location may severely limit the visualization and force overlay, intersections and other forms of clutter. On the other hand, completely ignoring the spatial dimension omits information and may hide spatial patterns in the data. We study layouts for set systems (or hypergraphs) in which spatial locations are displaced onto concentric circles or a grid, to obtain schematic set visualizations. We investigate the tractability of the underlying algorithmic problems adopting different optimization criteria (e.g. crossings or bends) for the layout structure, also known as the support of the hypergraph. Furthermore, we describe a simulated-annealing approach to heuristically optimize a combination of such criteria. Using this method in computational experiments, we explore the trade-offs and dependencies between criteria for computing high-quality schematic set visualizations."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , ; dct:date "2022-03-18"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Computing Schematic Layouts for Spatial Hypergraphs on Concentric Circles and Grids"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Wiley Online Library"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Wessel"^^xsd:string; foaf:givenName "S."^^xsd:string; foaf:name "S. Wessel"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Schulz"^^xsd:string; foaf:givenName "A."^^xsd:string; foaf:name "A. Schulz"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dekker"^^xsd:string; foaf:givenName "F.F."^^xsd:string; foaf:name "F.F. Dekker"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bekos"^^xsd:string; foaf:givenName "M.A."^^xsd:string; foaf:name "M.A. Bekos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rodgers"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Rodgers"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Meulemens"^^xsd:string; foaf:givenName "W."^^xsd:string; foaf:name "W. Meulemens"^^xsd:string; rdf:type foaf:Person . bibo:issn "14678659"; foaf:name "Computer Graphics Forum"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Daniel_Soria.pdf"^^xsd:string . rdfs:label "Daniel_Soria.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #93613 \n\nNovel Molecular classification of colorectal cancer and correlation with survival\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Novel Molecular classification of colorectal cancer and correlation with survival (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Novel Molecular classification of colorectal cancer and correlation with survival (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Novel Molecular classification of colorectal cancer and correlation with survival (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Novel Molecular classification of colorectal cancer and correlation with survival (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Novel Molecular classification of colorectal cancer and correlation with survival (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Novel Molecular classification of colorectal cancer and correlation with survival (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "Colorectal cancer (CRC) is one of the most common cancers worldwide. This study was designed to evaluate biological patterns, explore molecular classification and correlate with survival outcome in treatment naïve CRC patients.\r\nMethods\r\nOver 11 years consecutive series of 435 CRC patients were operated on as primary surgical therapy. A total of 201 CRC patients were included, whose complete set of clinical information was available, and their good quality tumour blocks were retrieved. Immunohistochemistry was used for tumour analysis, and partitional clustering was performed using R software for cluster analysis.\r\nResults\r\nThe median age was 43 (range 10-85) years; adenocarcinoma was the most commonly seen histological type. The great majority had positive CK20, CEA, E-Cadherin, Ki67, CDX2, and p53 expression. There were four distinct molecular classes found, whereas Ki67, CDX2, and p53 play 3 the main role in partitioning. Younger age negatively impacted survival; overall and diseasespecific survival was 26 months only with 50 months’ longest survival.\r\nConclusion\r\nColorectal cancer is a biologically heterogeneous disease with at least four distinct molecular patterns, where cell proliferation and gene repair mechanisms appear to play the key role."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2022-03-10"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Novel Molecular classification of colorectal cancer and correlation with survival"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Manzoor Syed"^^xsd:string; foaf:givenName "Binafsha"^^xsd:string; foaf:name "Binafsha Manzoor Syed"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Naeem Qureshi"^^xsd:string; foaf:givenName "Jawaid"^^xsd:string; foaf:name "Jawaid Naeem Qureshi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Muhammad Waryah"^^xsd:string; foaf:givenName "Ali"^^xsd:string; foaf:name "Ali Muhammad Waryah"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ahmed Shaikh"^^xsd:string; foaf:givenName "Tanweer"^^xsd:string; foaf:name "Tanweer Ahmed Shaikh"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Din Ujjan"^^xsd:string; foaf:givenName "Ikram"^^xsd:string; foaf:name "Ikram Din Ujjan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hussian Mangi"^^xsd:string; foaf:givenName "Fayaz"^^xsd:string; foaf:name "Fayaz Hussian Mangi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Soria"^^xsd:string; foaf:givenName "Daniele"^^xsd:string; foaf:name "Daniele Soria"^^xsd:string; rdf:type foaf:Person . bibo:issn "1319562X"; foaf:name "Saudi Journal of Biological Sciences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #93468 \n\nPersonal Information: Perceptions, Types and Evolution\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Personal Information: Perceptions, Types and Evolution (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Personal Information: Perceptions, Types and Evolution (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Personal Information: Perceptions, Types and Evolution (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Personal Information: Perceptions, Types and Evolution (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Personal Information: Perceptions, Types and Evolution (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Personal Information: Perceptions, Types and Evolution (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Advances in technology have made us as a society think more about cyber security and privacy, particularly how we consider and protect personal information. Such developments have introduced a temporal dimension to the definition of personal information and we have also witnessed new types of data emerging (e.g., phone sensor data, stress level measurements). These rapid technological changes introduce several challenges as legislation is often inadequate, and therefore questions regularly arise pertaining whether information should be considered personal or sensitive and thereby better protected. In this paper, therefore, we look to significantly advance research into this domain by investigating how personal information is regarded in governmental legislations/regulations, privacy policies of applications, and academic research articles. Through an assessment of how personal information has evolved and is perceived differently (e.g., in the context of sensitivity) across these key stakeholders identifying fundamental disconnects, this work contributes to understanding the social implications of new technologies. Furthermore, we introduce a series of novel taxonomies of personal information which can significantly support and help guide how researchers and practitioners work with, or develop tools to protect, such information."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2022-03-04"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Personal Information: Perceptions, Types and Evolution"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences (General)"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology (General)"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hodges"^^xsd:string; foaf:givenName "Duncan"^^xsd:string; foaf:name "Duncan Hodges"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Belen Sağlam"^^xsd:string; foaf:givenName "Rahime"^^xsd:string; foaf:name "Rahime Belen Sağlam"^^xsd:string; rdf:type foaf:Person . bibo:issn "22142126"; foaf:name "Journal of Information Security and Applications"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "127Joanna_Sharrad_Thesis_Final.pdf"^^xsd:string . rdfs:label "127Joanna_Sharrad_Thesis_Final.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #93540 \n\nDebugging Type Errors with a Blackbox Compiler\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Debugging Type Errors with a Blackbox Compiler (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Debugging Type Errors with a Blackbox Compiler (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Debugging Type Errors with a Blackbox Compiler (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Debugging Type Errors with a Blackbox Compiler (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Debugging Type Errors with a Blackbox Compiler (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Debugging Type Errors with a Blackbox Compiler (Other)"^^xsd:string . rdf:_1 . ; bibo:abstract "Type error debugging can be a laborious yet necessary process for programmers of statically typed functional programming languages. Often a compiler compounds this by inaccurately reporting the location of a type error, a problem that has been a subject of research for over thirty years. However, despite its long history, the solutions proposed are often reliant on direct modifications to the compiler, often distributed in the form of patches. These patches append another level of arduous activity to the task of debugging, keeping them modernised to the ever-changing programming language they support.\r\nThis thesis investigates an additional option; the blackbox compiler. Split into three central parts, it shows the individual solutions involved in using a blackbox compiler to debug type errors in functional programming languages. First is a demonstration of how the combination of a blackbox compiler and a generic debugging algorithm can successfully locate type errors. Next tackled is a side-effect of this new combination, the introduction of extra errors, combated with a new speed boosted algorithm, evaluated with a proposed framework based on Data Science techniques to quantify the quality of a type error debugger. Lastly, the algorithms employed throughout this thesis, along with the blackbox compiler, have agnostic properties, they do not need language-specific knowledge. Thus, the final part presents utilising the agnostic abilities for an agnostic debugger to locate type errors."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2022-03"; dct:isPartOf ; dct:issuer , ; dct:subject ; dct:title "Debugging Type Errors with a Blackbox Compiler"^^xsd:string; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Sharrad"^^xsd:string; foaf:givenName "Joanna"^^xsd:string; foaf:name "Joanna Sharrad"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chitil"^^xsd:string; foaf:givenName "Olaf"^^xsd:string; foaf:name "Olaf Chitil"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "1-s2.0-S0167404821003692-main.pdf"^^xsd:string . rdfs:label "1-s2.0-S0167404821003692-main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91647 \n\nA System to Calculate Cyber-Value-at-Risk\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "A System to Calculate Cyber-Value-at-Risk (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A System to Calculate Cyber-Value-at-Risk (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A System to Calculate Cyber-Value-at-Risk (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A System to Calculate Cyber-Value-at-Risk (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A System to Calculate Cyber-Value-at-Risk (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A System to Calculate Cyber-Value-at-Risk (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A System to Calculate Cyber-Value-at-Risk (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A System to Calculate Cyber-Value-at-Risk (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A System to Calculate Cyber-Value-at-Risk (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A System to Calculate Cyber-Value-at-Risk (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A System to Calculate Cyber-Value-at-Risk (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A System to Calculate Cyber-Value-at-Risk (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "In the face of increasing numbers of cyber-attacks, it is critical for organisations to understand the risk they are exposed to even after deploying security controls. This residual risk forms part of the ongoing operational environment, and must be understood and planned for if resilience is to be achieved. However, there is a lack of rigorous frameworks to help organisations reason about how their use of risk controls can change the nature of the potential losses they face, given an often changing threat landscape. To address this gap, we present a system that calculates Cyber-Value-at-Risk (CVaR) of an organisation. CVaR is a probabilistic density function for losses from cyber-incidents, for any given threats of interest and risk control practice. It can take account of varying effectiveness of controls, the consequences for risk propagation through infrastructures, and the cyber-harms that result. We demonstrate the utility of the system in a real case study by calculating the CVaR of an organisation that experienced a significant cyber-incident. We show that the system is able to produce predictions representative of the actual financial loss. The presented system can be used by insurers offering cyber products to better inform the calculation of insurance premiums, and by organisations to reason about the effects of using particular risk control setups on reducing their exposure to cyber-risk."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "113"; dc:hasVersion , ; dct:creator , , , , , ; dct:date "2022-02"; dct:isPartOf , ; dct:publisher ; dct:subject , , , ; dct:title "A System to Calculate Cyber-Value-at-Risk"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences (General)"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Goldsmith"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Goldsmith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Erola"^^xsd:string; foaf:givenName "Arnau"^^xsd:string; foaf:name "Arnau Erola"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Agrafiotis"^^xsd:string; foaf:givenName "Ioannis"^^xsd:string; foaf:name "Ioannis Agrafiotis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Axon"^^xsd:string; foaf:givenName "Louise"^^xsd:string; foaf:name "Louise Axon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Creese"^^xsd:string; foaf:givenName "Sadie"^^xsd:string; foaf:name "Sadie Creese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R.C."^^xsd:string; foaf:name "Jason R.C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "01674048"; foaf:name "Computers & Security"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "2105.12497.pdf"^^xsd:string . rdfs:label "2105.12497.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #92005 \n\nDesigning ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Deep learning plays a vital role in classifying different arrhythmias using electrocardiography (ECG) data. Nevertheless, training deep learning models normally requires a large amount of data and can lead to privacy concerns. Unfortunately, a large amount of healthcare data cannot be easily collected from a single silo. Additionally, deep learning models are like black-box, with no explainability of the predicted results, which is often required in clinical healthcare. This limits the application of deep learning in real-world health systems.\r\n\r\nIn this paper, to address the above-mentioned challenges, we design a novel end-to-end framework in a federated setting for ECG-based healthcare using explainable artificial intelligence (XAI) and deep convolutional neural networks (CNN). The federated setting is used to solve challenges such as data availability and privacy concerns. Furthermore, the proposed framework effectively classifies different arrhythmias using an autoencoder and a classifier, both based on a CNN. Additionally, we propose an XAI-based module on top of the proposed classifier for interpretability of the classification results, which helps clinical practitioners to interpret the predictions of the classifier and to make quick and reliable decisions. The proposed framework was trained and tested using the baseline Massachusetts Institute of Technology - Boston's Beth Israel Hospital (MIT-BIH) Arrhythmia database. The trained classifier outperformed existing work by achieving accuracy up to 94.5% and 98.9% for arrhythmia detection using noisy and clean data, respectively, with five-fold cross-validation. We also propose a new communication cost reduction method to reduce the communication costs and to enhance the privacy of users' data in the federated setting. While the proposed framework was tested and validated for ECG classification, it is general enough to be extended to many other healthcare applications."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "236"; dc:hasVersion ; dct:creator , , , ; dct:date "2022-01-25"; dct:isPartOf , ; dct:publisher ; dct:subject , , , , , , ; dct:title "Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI"^^xsd:string; ep:hasDocument , , , , , ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76.E95 Expert Systems (Intelligent Knowledge Based Systems) "@en . rdf:type skos:Concept; skos:prefLabel "QA76.87 Neural computers, neural networks"@en . rdf:type skos:Concept; skos:prefLabel "R858 Computer applications to medicine. Medical informatics. Medical information technology" . rdf:type skos:Concept; skos:prefLabel "TK5102.9 Signal processing" . rdf:type skos:Concept; skos:prefLabel "TK7882.P3 Pattern recognition systems"@en . rdf:type skos:Concept; skos:prefLabel "TK7885 Computer engineering. Computer hardware"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Raza"^^xsd:string; foaf:givenName "Ali"^^xsd:string; foaf:name "Ali Raza"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tran"^^xsd:string; foaf:givenName "Kim Phuc"^^xsd:string; foaf:name "Kim Phuc Tran"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Koehl"^^xsd:string; foaf:givenName "Ludovic"^^xsd:string; foaf:name "Ludovic Koehl"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . bibo:issn "09507051"; foaf:name "Knowledge-Based Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Cost-sensitive_Boosting_Pruning_Trees_for_depression_detection_on_Twitter.pdf"^^xsd:string . rdfs:label "Cost-sensitive_Boosting_Pruning_Trees_for_depression_detection_on_Twitter.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #93004 \n\nCost-sensitive Boosting Pruning Trees for depression detection on Twitter\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Cost-sensitive Boosting Pruning Trees for depression detection on Twitter (PDF)"^^xsd:string . rdf:type bibo:Document, ep:Document; rdfs:label "Cost-sensitive Boosting Pruning Trees for depression detection on Twitter (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Cost-sensitive Boosting Pruning Trees for depression detection on Twitter (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Cost-sensitive Boosting Pruning Trees for depression detection on Twitter (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cost-sensitive Boosting Pruning Trees for depression detection on Twitter (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cost-sensitive Boosting Pruning Trees for depression detection on Twitter (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cost-sensitive Boosting Pruning Trees for depression detection on Twitter (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cost-sensitive Boosting Pruning Trees for depression detection on Twitter (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cost-sensitive Boosting Pruning Trees for depression detection on Twitter (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cost-sensitive Boosting Pruning Trees for depression detection on Twitter (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cost-sensitive Boosting Pruning Trees for depression detection on Twitter (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cost-sensitive Boosting Pruning Trees for depression detection on Twitter (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 ; rdf:_11 ; rdf:_12 . bibo:abstract "Depression is one of the most common mental health disorders, and a large number of depressed people commit suicide each year. Potential depression sufferers usually do not consult psychological doctors because they feel ashamed or are unaware of any depression, which may result in severe delay of diagnosis and treatment. In the meantime, evidence shows that social media data provides valuable clues about physical and mental health conditions. In this paper, we argue that it is feasible to identify depression at an early stage by mining online social behaviours. Our approach, which is innovative to the practice of depression detection, does not rely on the extraction of numerous or complicated features to achieve accurate depression detection. Instead, we propose a novel classifier, namely, Cost-sensitive Boosting Pruning Trees (CBPT), which demonstrates a strong classification ability on two publicly accessible Twitter depression detection datasets. To comprehensively evaluate the classification capability of CBPT, we use additional three datasets from the UCI machine learning repository and CBPT obtains appealing classification results against several state of the arts boosting algorithms. Finally, we comprehensively explore the influence factors for the model prediction, and the results manifest that our proposed framework is promising for identifying Twitter users with depression"^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , , , , , , ; dct:date "2022-01-25"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Cost-sensitive Boosting Pruning Trees for depression detection on Twitter"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Lyu"^^xsd:string; foaf:givenName "Jialin"^^xsd:string; foaf:name "Jialin Lyu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chen"^^xsd:string; foaf:givenName "Long"^^xsd:string; foaf:name "Long Chen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhang"^^xsd:string; foaf:givenName "Qianni"^^xsd:string; foaf:name "Qianni Zhang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhou"^^xsd:string; foaf:givenName "Feixiang"^^xsd:string; foaf:name "Feixiang Zhou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Liu"^^xsd:string; foaf:givenName "Zhihua"^^xsd:string; foaf:name "Zhihua Liu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sadka"^^xsd:string; foaf:givenName "Abdul"^^xsd:string; foaf:name "Abdul Sadka"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Yinhai"^^xsd:string; foaf:name "Yinhai Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhang"^^xsd:string; foaf:givenName "Xiangrong"^^xsd:string; foaf:name "Xiangrong Zhang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jiang"^^xsd:string; foaf:givenName "Zheheng"^^xsd:string; foaf:name "Zheheng Jiang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tong"^^xsd:string; foaf:givenName "Lei"^^xsd:string; foaf:name "Lei Tong"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhou"^^xsd:string; foaf:givenName "Huiyu"^^xsd:string; foaf:name "Huiyu Zhou"^^xsd:string; rdf:type foaf:Person . bibo:issn "23719850"; foaf:name "IEEE Transactions on Affective Computing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #92827 \n\nData stream classification with ant colony optimisation\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Data stream classification with ant colony optimisation (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data stream classification with ant colony optimisation (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data stream classification with ant colony optimisation (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data stream classification with ant colony optimisation (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data stream classification with ant colony optimisation (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Data stream classification with ant colony optimisation (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Data stream mining has recently emerged in response to the rapidly increasing continuous data generation. While the majority of Ant Colony Optimisation (ACO) rule induction algorithms have proved to be successful in producing both accurate and comprehensive classification models in nonstreaming (batch) settings, currently ACO-based algorithms for classification problems are not suited to be applied to data stream mining. One of the main challenges is the iterative nature of ACO algorithms, where many procedures—for example, heuristic calculation, selection of continuous attributes, pruning—require multiple passes through the data to create a model. In this paper, we present a new ACO-based algorithm for data stream classification. The proposed algorithm, called Stream Ant-Miner (sAnt-Miner), uses a novel hybrid pheromone model combining both a traditional construction graph and solution archives models to efficiently handle a large number of mixed-type (nominal and continuous) attributes directly without the need for additional procedures, reducing the computational time required to complete an iteration of the algorithm. Our results show that sAnt-Miner produces statistically significant concise models compared with state-of-the-art rule induction data stream algorithms, without negative effects on their predictive accuracy."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2022-01-10"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Data stream classification with ant colony optimisation"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Wiley"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Helal"^^xsd:string; foaf:givenName "Ayah"^^xsd:string; foaf:name "Ayah Helal"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando E.B."^^xsd:string; foaf:name "Fernando E.B. Otero"^^xsd:string; rdf:type foaf:Person . bibo:issn "08848173"; foaf:name "International Journal of Intelligent Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "Reliability_Analysis_For_Finger_Movement_Recognition_With_Raw_Electromyographic_Signal_by_Evidential_Convolutional_Networks.pdf"^^xsd:string . rdfs:label "Reliability_Analysis_For_Finger_Movement_Recognition_With_Raw_Electromyographic_Signal_by_Evidential_Convolutional_Networks.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "TNSRE3141593_completed.pdf"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #92603 \n\nReliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (Other)"^^xsd:string . cc:license ; dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Hand gesture recognition with surface electromyography (sEMG) is indispensable for Muscle-Gesture-Computer Interface. The usual focus of it is upon performance evaluation involving the accuracy and robustness of hand gesture recognition. However, addressing the reliability of such classifiers has been absent, to our best knowledge. This may be due to the lack of consensus on the definition of model reliability in this field. An uncertainty-aware model has the potential to self-evaluate the quality of its inference, thereby making it more reliable. Moreover, uncertainty-based rejection has been shown to improve the performance of sEMG-based hand gesture recognition. Therefore, we first define model reliability here as the quality of its uncertainty estimation and propose an offline framework to quantify it. To promote reliability analysis, we propose a novel end-to-end uncertainty-aware finger movement classifier, i.e., evidential convolutional neural network (ECNN), and illustrate the advantages of its multidimensional uncertainties such as vacuity and dissonance. Extensive comparisons of accuracy and reliability are conducted on NinaPro Database 5, exercise A, across CNN and three variants of ECNN based on different training strategies. The results of classifying 12 finger movements over 10 subjects show that the best mean accuracy achieved by ECNN is 76.34%, which is slightly higher than the state-of-the-art performance. Furthermore, ECNN variants are more reliable than CNN in general, where the highest improvement of reliability of 19.33% is observed. This work demonstrates the potential of ECNN and recommends using the proposed reliability analysis as a supplementary measure for studying sEMG-based hand gesture recognition."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion , , ; dct:creator , , , ; dct:date "2022-01-07"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Reliability Analysis For Finger Movement Recognition With Raw Electromyographic Signal by Evidential Convolutional Networks"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , , , , , , , ; ep:hasPublished , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Wilde"^^xsd:string; foaf:givenName "Philippe"^^xsd:string; foaf:name "Philippe De Wilde"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lin"^^xsd:string; foaf:givenName "Yuzhou"^^xsd:string; foaf:name "Yuzhou Lin"^^xsd:string; rdf:type foaf:Person . bibo:issn "15344320"; foaf:name "IEEE Transactions on Neural Systems and Rehabilitation Engineering"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Device Identification using DWT_Camera Ready Version.pdf"^^xsd:string . rdfs:label "Device Identification using DWT_Camera Ready Version.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #90749 \n\nDevice Identification Using Discrete Wavelet Transform\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Device Identification Using Discrete Wavelet Transform (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Device Identification Using Discrete Wavelet Transform (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Device Identification Using Discrete Wavelet Transform (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Device Identification Using Discrete Wavelet Transform (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Device Identification Using Discrete Wavelet Transform (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Device Identification Using Discrete Wavelet Transform (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "This paper investigates the effectiveness of employing measured hardware features mapped into the frequency domain for devices identification. The technique is to utilize Discrete Wavelet Transform (DWT) coefficients as distinguishing features. The DWT coefficients address the degree of relationship between the investigated features and the wavelet function at different occurrences of time. Therefore, DWT coefficients carry useful temporal information about the transient activity of the investigated wavelet features. We study the impacts of utilizing different wavelet functions (Coiflets, Haar and Symlets) on the performance of the device identification system. This system yields 92.5 % of accuracy using Sym6 wavelet. A comparison is made of the accuracy of wavelet features and raw features with standard classifiers."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2022-01-05"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Device Identification Using Discrete Wavelet Transform"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "TA1637 Image processing"@en . dct:title "7th International Conference on Engineering and Emerging Technologies (ICEET)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Istanbul, Turkey"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Khanna"^^xsd:string; foaf:givenName "Pooja"^^xsd:string; foaf:name "Pooja Khanna"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yadav"^^xsd:string; foaf:givenName "Supriya"^^xsd:string; foaf:name "Supriya Yadav"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Howells"^^xsd:string; foaf:givenName "Gareth"^^xsd:string; foaf:name "Gareth Howells"^^xsd:string; rdf:type foaf:Person . rdfs:label "BMC-Bioinformatics-2022-Magdaleno-as-published.pdf"^^xsd:string . rdfs:label "BMC-Bioinformatics-2022-Magdaleno-as-published.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #92554 \n\nMachine learning-based predictions of dietary restriction associations across ageing-related genes\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Machine learning-based predictions of dietary restriction associations across ageing-related genes (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Machine learning-based predictions of dietary restriction associations across ageing-related genes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine learning-based predictions of dietary restriction associations across ageing-related genes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine learning-based predictions of dietary restriction associations across ageing-related genes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine learning-based predictions of dietary restriction associations across ageing-related genes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine learning-based predictions of dietary restriction associations across ageing-related genes (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:authorList ; bibo:status , ; bibo:volume "23"; dc:hasVersion ; dct:creator , , , , ; dct:date "2022-01-04"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Machine learning-based predictions of dietary restriction associations across ageing-related genes"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "de Magalhaes"^^xsd:string; foaf:givenName "João Pedro"^^xsd:string; foaf:name "João Pedro de Magalhaes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Magdaleno"^^xsd:string; foaf:givenName "G.D.V."^^xsd:string; foaf:name "G.D.V. Magdaleno"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bespalov"^^xsd:string; foaf:givenName "V."^^xsd:string; foaf:name "V. Bespalov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zheng"^^xsd:string; foaf:givenName "Y."^^xsd:string; foaf:name "Y. Zheng"^^xsd:string; rdf:type foaf:Person . bibo:issn "14712105"; foaf:name "BMC Bioinformatics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91573 \n\nAn Explainable Semi-Supervised Self-Organizing Fuzzy Inference System for Streaming Data Classification\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "An Explainable Semi-Supervised Self-Organizing Fuzzy Inference System for Streaming Data Classification (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An Explainable Semi-Supervised Self-Organizing Fuzzy Inference System for Streaming Data Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Explainable Semi-Supervised Self-Organizing Fuzzy Inference System for Streaming Data Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Explainable Semi-Supervised Self-Organizing Fuzzy Inference System for Streaming Data Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Explainable Semi-Supervised Self-Organizing Fuzzy Inference System for Streaming Data Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Explainable Semi-Supervised Self-Organizing Fuzzy Inference System for Streaming Data Classification (Other)"^^xsd:string . rdf:_1 . bibo:abstract "As a powerful tool for data streams processing, the vast majority of existing evolving intelligent systems (EISs) learn prediction models from data in a supervised manner. However, high-quality labelled data can be difficult to obtain in many real-world classification applications concerning data streams, though unlabelled data is plentiful. To overcome the labelling bottleneck and construct a stronger classification model, a novel semi-supervised EIS is proposed in this paper. After being primed with a small amount of labelled data, the proposed method is capable of continuously self-developing its system structure and self-updating the meta-parameters from unlabelled data streams chunk-by-chunk in a non-iterative, exploratory manner by exploiting a novel pseudo-labelling strategy. Thanks to its transparent prototype-based structure and human-understandable reasoning process, the proposed method can provide users high explainability and interpretability while achieving great classification precision. Experimental investigation demonstrates the superior performance of the proposed method."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "583"; dc:hasVersion ; dct:creator ; dct:date "2022-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "An Explainable Semi-Supervised Self-Organizing Fuzzy Inference System for Streaming Data Classification"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "00200255"; foaf:name "Information Sciences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "99Ribeiro2022phdfinal.pdf"^^xsd:string . rdfs:label "99Ribeiro2022phdfinal.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #92963 \n\nNew Longitudinal Classification Approaches and Applications to Age-Related Disease Data\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "New Longitudinal Classification Approaches and Applications to Age-Related Disease Data (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "New Longitudinal Classification Approaches and Applications to Age-Related Disease Data (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "New Longitudinal Classification Approaches and Applications to Age-Related Disease Data (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "New Longitudinal Classification Approaches and Applications to Age-Related Disease Data (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "New Longitudinal Classification Approaches and Applications to Age-Related Disease Data (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "New Longitudinal Classification Approaches and Applications to Age-Related Disease Data (Other)"^^xsd:string . rdf:_1 . ; bibo:abstract "Traditional supervised machine learning techniques need to be adapted when applied to longitudinal datasets, due to their specific characteristics such as a large amount of missing data and the dependency between repeated measurements of the same variables. These adaptations range from data preprocessing techniques that maintain and use information from the underlying temporal data structure of longitudinal datasets, to algorithm adaptations that consider the temporal aspect of the data when making predictions.\r\n\r\nIn this thesis we focus on the classification task of supervised learning, in the context of longitudinal biomedical and health data from ageing studies. More specifically, we address the problem of predicting the diagnosis of age-related diseases, given several years of observations about each instance (individual).\r\n\r\nIn order to evaluate our proposed approaches for longitudinal supervised learning (described below), we created 30 longitudinal classification datasets. These datasets are comprised of data from the English and Irish longitudinal studies of ageing, which collect biomedical and self-reported health information on thousands of participants, over multiple waves carried out throughout the years. \r\n\r\nRegarding supervised learning algorithms, we focus on decision tree-based algorithms, namely Random Forests (which learn an ensemble of decision trees) and a decision tree algorithm (which learns a single decision tree). These algorithms were chosen because they represent a good trade-off between predictive accuracy and interpretability, which is particularly relevant for our health application. Random Forests are known to achieve high predictive accuracy in general, and are partially interpretable (via feature importance measures), whilst decision trees are directly interpretable, although usually less accurate than Random Forests.\r\n\r\nThis thesis' main contributions are three new approaches for coping with longitudinal data in supervised learning (particularly classification). The first two main contributions involve data preparation, namely missing value replacement and the construction of features representing temporal information in the data. These contributions are independent from the choice of classification algorithm to be applied to the longitudinal data, so they are widely applicable to longitudinal studies. The third main contribution involves algorithm adaptation, adapting decision tree-based algorithms to consider the temporal information in the data.\r\n\r\nMore precisely, the first main contribution of this thesis is the proposal of a data-driven missing value replacement approach to estimate the missing values in longitudinal datasets. The proposed approach performs a feature-wise ranking of an input set of missing value replacement methods, using known data as ground-truth to estimate the error rates of each method. Then it uses that ranking to choose the best missing value replacement method for each feature. Experiments have shown that this approach improved predictive accuracy in general, by comparison with several baseline methods for handling missing values.\r\n\r\nThe second main contribution consists of several types of constructed temporal features, which are are calculated (in a data preprocessing phase) using the repeated measurements of the original longitudinal features. These constructed features represent different types of temporal patterns that can occur in longitudinal datasets. The constructed features are then added to the original dataset,\r\nand used together with the original features when running any chosen classification algorithm. Experiments have shown that the constructed features benefited from datasets with more temporal data available, and that the added features overall increased the predictive accuracy of the Random Forest classifiers.\r\n\r\nThe third main contribution of this work is an algorithm adaptation approach for decision tree-based algorithms (more precisely, Random Forests and decision tree algorithms) applied to longitudinal data inputs. We adapted the node split function of such algorithms to consider two criteria, using a lexicographic optimisation approach. This approach first tries to select the best split feature at each tree node based on the features' information gain ratio, as the primary criterion. If, however, two or more features have about the same information gain ratio, as a tie-breaking (secondary) criterion, the algorithm prefers to select a more recent feature, since these are assumed to be more relevant for classification than older features.\r\n\r\nExperiments have shown that this lexicographic split approach led to increased predictive accuracy in general for the Random Forest classifier."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2022-01"; dct:isPartOf ; dct:issuer , ; dct:subject ; dct:title "New Longitudinal Classification Approaches and Applications to Age-Related Disease Data"^^xsd:string; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex"^^xsd:string; foaf:name "Alex Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ribeiro"^^xsd:string; foaf:givenName "Caio Eduardo"^^xsd:string; foaf:name "Caio Eduardo Ribeiro"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #90984 \n\nInterval Type-2 Fuzzy Programming Method for Risky Multicriteria Decision-Making with Heterogeneous Relationship\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Interval Type-2 Fuzzy Programming Method for Risky Multicriteria Decision-Making with Heterogeneous Relationship (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Interval Type-2 Fuzzy Programming Method for Risky Multicriteria Decision-Making with Heterogeneous Relationship (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Interval Type-2 Fuzzy Programming Method for Risky Multicriteria Decision-Making with Heterogeneous Relationship (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Interval Type-2 Fuzzy Programming Method for Risky Multicriteria Decision-Making with Heterogeneous Relationship (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Interval Type-2 Fuzzy Programming Method for Risky Multicriteria Decision-Making with Heterogeneous Relationship (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Interval Type-2 Fuzzy Programming Method for Risky Multicriteria Decision-Making with Heterogeneous Relationship (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "We propose a new interval type-2 fuzzy (IT2F) programming method for risky multicriteria decision-making (MCDM) problems with IT2F truth degrees, where the criteria exhibit a heterogeneous relationship and decision-makers behave according to bounded rationality. First, we develop a technique to calculate the Banzhaf-based overall perceived utility values of alternatives based on 2-additive fuzzy measures and regret theory. Subsequently, considering pairwise comparisons of alternatives with IT2F truth degrees, we define the Banzhaf-based IT2F risky consistency index (BIT2FRCI) and the Banzhaf-based IT2F risky inconsistency index (BIT2FRII). Next, to identify the optimal weights, an IT2F programming model is established based on the concept that BIT2FRII must be minimized and must not exceed the BIT2FRCI using a fixed IT2F set. Furthermore, we design an effective algorithm using an external archive-based constrained state transition algorithm to solve the established model. Accordingly, the ranking order of alternatives is derived using the Banzhaf-based overall perceived utility values. Experimental studies pertaining to investment selection problems demonstrate the state-of-the-art performance of the proposed method, that is, its strong capability in addressing risky MCDM problems."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "584"; dc:hasVersion ; dct:creator , , , , , ; dct:date "2022-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Interval Type-2 Fuzzy Programming Method for Risky Multicriteria Decision-Making with Heterogeneous Relationship"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chiclana"^^xsd:string; foaf:givenName "Francisco"^^xsd:string; foaf:name "Francisco Chiclana"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tang"^^xsd:string; foaf:givenName "Guolin"^^xsd:string; foaf:name "Guolin Tang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Liu"^^xsd:string; foaf:givenName "Peide"^^xsd:string; foaf:name "Peide Liu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Fubin"^^xsd:string; foaf:name "Fubin Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Long"^^xsd:string; foaf:givenName "Jianpeng"^^xsd:string; foaf:name "Jianpeng Long"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "00200255"; foaf:name "Information Sciences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Daniel Soria - Journal-published - Feb2022 (3).pdf"^^xsd:string . rdfs:label "Daniel Soria - Journal-published - Feb2022 (3).pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #93415 \n\nDevelopment and Optimization of a Machine-Learning Prediction Model for Acute Desquamation After Breast Radiation Therapy in the Multicenter REQUITE Cohort\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Development and Optimization of a Machine-Learning Prediction Model for Acute Desquamation After Breast Radiation Therapy in the Multicenter REQUITE Cohort (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Development and Optimization of a Machine-Learning Prediction Model for Acute Desquamation After Breast Radiation Therapy in the Multicenter REQUITE Cohort (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Development and Optimization of a Machine-Learning Prediction Model for Acute Desquamation After Breast Radiation Therapy in the Multicenter REQUITE Cohort (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Development and Optimization of a Machine-Learning Prediction Model for Acute Desquamation After Breast Radiation Therapy in the Multicenter REQUITE Cohort (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Development and Optimization of a Machine-Learning Prediction Model for Acute Desquamation After Breast Radiation Therapy in the Multicenter REQUITE Cohort (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Development and Optimization of a Machine-Learning Prediction Model for Acute Desquamation After Breast Radiation Therapy in the Multicenter REQUITE Cohort (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 ; rdf:_11 ; rdf:_12 ; rdf:_13 ; rdf:_14 ; rdf:_15 ; rdf:_16 ; rdf:_17 ; rdf:_18 ; rdf:_19 ; rdf:_20 ; rdf:_21 ; rdf:_22 ; rdf:_23 ; rdf:_24 ; rdf:_25 ; rdf:_26 ; rdf:_27 ; rdf:_28 ; rdf:_29 ; rdf:_30 ; rdf:_31 ; rdf:_32 ; rdf:_33 ; rdf:_34 ; rdf:_35 ; rdf:_36 ; rdf:_37 ; rdf:_38 ; rdf:_39 ; rdf:_40 ; rdf:_41 ; rdf:_42 . bibo:abstract "Purpose: Some patients with breast cancer treated by surgery and radiation therapy experience clinically significant toxicity, which may adversely affect cosmesis and quality of life. There is a paucity of validated clinical prediction models for radiation toxicity. We used machine learning (ML) algorithms to develop and optimise a clinical prediction model for acute breast desquamation after whole breast external beam radiation therapy in the prospective multicenter REQUITE cohort study. Methods and Materials: Using demographic and treatment-related features (m = 122) from patients (n = 2058) at 26 centers, we trained 8 ML algorithms with 10-fold cross-validation in a 50:50 random-split data set with class stratification to predict acute breast desquamation. Based on performance in the validation data set, the logistic model tree, random forest, and naïve Bayes models were taken forward to cost-sensitive learning optimisation. Results: One hundred and ninety-two patients experienced acute desquamation. Resampling and cost-sensitive learning optimisation facilitated an improvement in classification performance. Based on maximising sensitivity (true positives), the “hero” model was the cost-sensitive random forest algorithm with a false-negative: false-positive misclassification penalty of 90:1 containing m = 114 predictive features. Model sensitivity and specificity were 0.77 and 0.66, respectively, with an area under the curve of 0.77 in the validation cohort. Conclusions: ML algorithms with resampling and cost-sensitive learning generated clinically valid prediction models for acute desquamation using patient demographic and treatment features. Further external validation and inclusion of genomic markers in ML prediction models are worthwhile, to identify patients at increased risk of toxicity who may benefit from supportive intervention or even a change in treatment plan"^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "7"; dc:hasVersion ; dct:creator , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ; dct:date "2022"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Development and Optimization of a Machine-Learning Prediction Model for Acute Desquamation After Breast Radiation Therapy in the Multicenter REQUITE Cohort"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Green"^^xsd:string; foaf:givenName "Sheryl"^^xsd:string; foaf:name "Sheryl Green"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Aldraimli"^^xsd:string; foaf:givenName "Mahmoud"^^xsd:string; foaf:name "Mahmoud Aldraimli"^^xsd:string; rdf:type foaf:Person . foaf:familyName "West"^^xsd:string; foaf:givenName "Catharine M."^^xsd:string; foaf:name "Catharine M. West"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rattay"^^xsd:string; foaf:givenName "Tim"^^xsd:string; foaf:name "Tim Rattay"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Seibold"^^xsd:string; foaf:givenName "Petra"^^xsd:string; foaf:name "Petra Seibold"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Santis"^^xsd:string; foaf:givenName "Maria C."^^xsd:string; foaf:name "Maria C. de Santis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rosenstein"^^xsd:string; foaf:givenName "Barry S."^^xsd:string; foaf:name "Barry S. Rosenstein"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Veldeman"^^xsd:string; foaf:givenName "Liv"^^xsd:string; foaf:name "Liv Veldeman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Oliveira"^^xsd:string; foaf:givenName "Jorge"^^xsd:string; foaf:name "Jorge Oliveira"^^xsd:string; rdf:type foaf:Person . foaf:familyName "van Hulle"^^xsd:string; foaf:givenName "Hans"^^xsd:string; foaf:name "Hans van Hulle"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Veldwijk"^^xsd:string; foaf:givenName "Marlon R."^^xsd:string; foaf:name "Marlon R. Veldwijk"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lambrecht"^^xsd:string; foaf:givenName "Maarten"^^xsd:string; foaf:name "Maarten Lambrecht"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mistry"^^xsd:string; foaf:givenName "Anil"^^xsd:string; foaf:name "Anil Mistry"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Webb"^^xsd:string; foaf:givenName "Adam"^^xsd:string; foaf:name "Adam Webb"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Stobart"^^xsd:string; foaf:givenName "Hilary"^^xsd:string; foaf:name "Hilary Stobart"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chaussalet"^^xsd:string; foaf:givenName "Thierry J."^^xsd:string; foaf:name "Thierry J. Chaussalet"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Samuel"^^xsd:string; foaf:givenName "Robert"^^xsd:string; foaf:name "Robert Samuel"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Shelley"^^xsd:string; foaf:givenName "Leila E.A."^^xsd:string; foaf:name "Leila E.A. Shelley"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lozza"^^xsd:string; foaf:givenName "Laura"^^xsd:string; foaf:name "Laura Lozza"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Talbot"^^xsd:string; foaf:givenName "Christopher J."^^xsd:string; foaf:name "Christopher J. Talbot"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Reyes"^^xsd:string; foaf:givenName "Victoria"^^xsd:string; foaf:name "Victoria Reyes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Giraldo"^^xsd:string; foaf:givenName "Alexandra"^^xsd:string; foaf:name "Alexandra Giraldo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Vakaet"^^xsd:string; foaf:givenName "Vincent J.L."^^xsd:string; foaf:name "Vincent J.L. Vakaet"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sperk"^^xsd:string; foaf:givenName "Elena"^^xsd:string; foaf:name "Elena Sperk"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Weltens"^^xsd:string; foaf:givenName "Caroline"^^xsd:string; foaf:name "Caroline Weltens"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ingram"^^xsd:string; foaf:givenName "Samuel"^^xsd:string; foaf:name "Samuel Ingram"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Ruysscher"^^xsd:string; foaf:givenName "Dirk"^^xsd:string; foaf:name "Dirk de Ruysscher"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grishchuck"^^xsd:string; foaf:givenName "Diana"^^xsd:string; foaf:name "Diana Grishchuck"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Vega"^^xsd:string; foaf:givenName "Ana"^^xsd:string; foaf:name "Ana Vega"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lyon"^^xsd:string; foaf:givenName "Robert"^^xsd:string; foaf:name "Robert Lyon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Aguado-Barrera"^^xsd:string; foaf:givenName "Miguel E."^^xsd:string; foaf:name "Miguel E. Aguado-Barrera"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Herskind"^^xsd:string; foaf:givenName "Carsten"^^xsd:string; foaf:name "Carsten Herskind"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Symonds"^^xsd:string; foaf:givenName "R. Paul"^^xsd:string; foaf:name "R. Paul Symonds"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gutiérrez-Enríquez"^^xsd:string; foaf:givenName "Sara"^^xsd:string; foaf:name "Sara Gutiérrez-Enríquez"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Azria"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Azria"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Osman"^^xsd:string; foaf:givenName "Sarah"^^xsd:string; foaf:name "Sarah Osman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Soria"^^xsd:string; foaf:givenName "Daniele"^^xsd:string; foaf:name "Daniele Soria"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rancati"^^xsd:string; foaf:givenName "Tiziana"^^xsd:string; foaf:name "Tiziana Rancati"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Taboada-Valadares"^^xsd:string; foaf:givenName "Begoña"^^xsd:string; foaf:name "Begoña Taboada-Valadares"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dwek"^^xsd:string; foaf:givenName "Miriam V."^^xsd:string; foaf:name "Miriam V. Dwek"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dunning"^^xsd:string; foaf:givenName "Alison"^^xsd:string; foaf:name "Alison Dunning"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chang-Claude"^^xsd:string; foaf:givenName "Jenny"^^xsd:string; foaf:name "Jenny Chang-Claude"^^xsd:string; rdf:type foaf:Person . bibo:issn "24521094"; foaf:name "Advances in Radiation Oncology"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "ICWSM_2022_preprint_.pdf"^^xsd:string . rdfs:label "ICWSM_2022_preprint_.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #93628 \n\nAre You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Recently, there has been a rise in the development of powerful pre-trained natural language models, including GPT-2, Grover, and XLM. These models have shown state-of-the-art capabilities towards a variety of different NLP tasks, including question answering, content summarisation, and text generation. Alongside this, there have been many studies focused on online authorship attribution (AA). That is, the use of models to identify the authors of online texts. Given the power of natural language models in generating convincing texts, this paper examines the degree to which these language models can generate texts capable of deceiving online AA models. Experimenting with both blog and Twitter data, we utilise GPT-2 language models to generate texts using the existing posts of online users. We then examine whether these AI-based text generators are capable of mimicking authorial style to such a degree that they can deceive typical AA models. From this, we find that current AI-based text generators are able to successfully mimic authorship, showing capabilities towards this on both datasets. Our findings, in turn, highlight the current capacity of powerful natural language models to generate original online posts capable of mimicking authorial style sufficiently to deceive popular AA methods; a key finding given the proposed role of AA in real world applications such as spam-detection and forensic investigation."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2022"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "Are You Robert or RoBERTa? Deceiving Online Authorship Attribution Models Using Neural Text Generators"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.87 Neural computers, neural networks"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "16th International AAAI Conference on Web and Social Media (ICWSM-22)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Atlanta, USA"^^xsd:string . foaf:name "Association for the Advancement of Artificial Intelligence"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jones"^^xsd:string; foaf:givenName "Keenan"^^xsd:string; foaf:name "Keenan Jones"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91292 \n\nSimplifying Regular Expressions Further\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Simplifying Regular Expressions Further (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Simplifying Regular Expressions Further (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Simplifying Regular Expressions Further (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Simplifying Regular Expressions Further (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Simplifying Regular Expressions Further (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Simplifying Regular Expressions Further (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "We describe a cumulative series of transformations to simplify regular expressions, and investigate their effectiveness and cost. Transformations depending on increasingly powerful comparisons of expressions give results clearly superior to commonly used algebraic simplifications. Early in the series, efficient transformations enabled by language-invariant attributes are surprisingly effective. Later in the series, transformations depending on comparisons of expressed languages are made feasible by bounding the size of subexpressions to which they are applied. We set out the principles of our transformations, address some key implementation issues, and evaluate the results of systematic test measurements."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "109"; dc:hasVersion ; dct:creator , ; dct:date "2022"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Simplifying Regular Expressions Further"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 9 Formal systems, logics"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Runciman"^^xsd:string; foaf:givenName "Colin"^^xsd:string; foaf:name "Colin Runciman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kahrs"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Kahrs"^^xsd:string; rdf:type foaf:Person . bibo:issn "07477171"; foaf:name "Journal of Symbolic Computation"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "IEEE_ICTAI-2021_paper_243.pdf"^^xsd:string . rdfs:label "IEEE_ICTAI-2021_paper_243.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #90285 \n\nTowards Safer Industrial Serial Networks: An Expert System Framework for Anomaly Detection\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Towards Safer Industrial Serial Networks: An Expert System Framework for Anomaly Detection (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Towards Safer Industrial Serial Networks: An Expert System Framework for Anomaly Detection (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Safer Industrial Serial Networks: An Expert System Framework for Anomaly Detection (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Safer Industrial Serial Networks: An Expert System Framework for Anomaly Detection (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Safer Industrial Serial Networks: An Expert System Framework for Anomaly Detection (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Safer Industrial Serial Networks: An Expert System Framework for Anomaly Detection (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Cyber security is a topic of increasing relevance in relation to industrial networks. The higher intensity and intelligent use of data pushed by smart technology (Industry 4.0) together with an augmented integration between the operational technology (production) and the information technology (business) parts of the network have considerably raised the level of vulnerabilities. On the other hand, many industrial facilities still use serial networks as underlying communication system, and they are notoriously limited from a cyber security perspective since protection mechanisms available for TCP/IP communication do not apply. Therefore, an attacker gaining access to a serial network can easily control the industrial components, potentially causing catastrophic incidents, jeopardizing assets and human lives. This study proposes a framework to act as an anomaly detection system (ADS) for industrial serial networks. It has three ingredients: an unsupervised K-means component to analyse message content, a knowledge-based expert system component to analyse message metadata, and a voting process to generate alerts for security incidents, anomalous states, and faults. The framework was evaluated using the Profibus-DP, a network simulator which implements a serial bus system. Results for the simulated traffic were promising: 99.90% for accuracy, 99,64% for precision, and 99.28% for F1-Score. They indicate feasibility of the framework applied to serial-based industrial networks."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-12-21"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Towards Safer Industrial Serial Networks: An Expert System Framework for Anomaly Detection"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "The 33rd IEEE International Conference on Tools with Artificial Intelligence (ICTAI)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "virtual event"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Pessin"^^xsd:string; foaf:givenName "Gustavo"^^xsd:string; foaf:name "Gustavo Pessin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Moura"^^xsd:string; foaf:givenName "Ralf Luis de"^^xsd:string; foaf:name "Ralf Luis de Moura"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N. L."^^xsd:string; foaf:name "Virginia N. L. Franqueira"^^xsd:string; rdf:type foaf:Person . bibo:issn "9781665408981"; foaf:name "Proceedings: 2021 IEEE 33rd International Conference on Tools with Artificial Intelligence ICTAI 2021"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #92832 \n\nNested Trees for Longitudinal Classification\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Nested Trees for Longitudinal Classification (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Nested Trees for Longitudinal Classification (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Nested Trees for Longitudinal Classification (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Nested Trees for Longitudinal Classification (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Nested Trees for Longitudinal Classification (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Nested Trees for Longitudinal Classification (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Longitudinal datasets contain repeated measurements of the same variables at different points in time. Longitudinal data mining algorithms aim to utilize such datasets to extract interesting knowledge and produce useful models. Many existing longitudinal classification methods either dismiss the longitudinal aspect of the data during model construction or produce complex models that are scarcely interpretable. We propose a new longitudinal classification algorithm based on decision trees, named Nested Trees. It utilizes a unique longitudinal model construction method that is fully aware of the longitudinal aspect of the predictive attributes (variables) and constructs tree nodes that make decisions based on a longitudinal attribute as a whole, considering measurements of that attribute across multiple time points. The algorithm was evaluated using 10 classification tasks based on the English Longitudinal Study of Ageing (ELSA) data."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-12-12"; dct:isPartOf ; dct:subject ; dct:title "Nested Trees for Longitudinal Classification"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "37th ACM/SIGAPP Symposium On Applied Computing"^^xsd:string; rdf:type bibo:Conference . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando E.B."^^xsd:string; foaf:name "Fernando E.B. Otero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ovchinnik"^^xsd:string; foaf:givenName "Sergey"^^xsd:string; foaf:name "Sergey Ovchinnik"^^xsd:string; rdf:type foaf:Person . rdfs:label "Privacy and Security in the Covid-19 Work from Home Context Tensi.pdf"^^xsd:string . rdfs:label "Privacy and Security in the Covid-19 Work from Home Context Tensi.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #92838 \n\nPrivacy and Security in the Covid-19 Work from Home Context Tensions and Challenges\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Privacy and Security in the Covid-19 Work from Home Context Tensions and Challenges (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Privacy and Security in the Covid-19 Work from Home Context Tensions and Challenges (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy and Security in the Covid-19 Work from Home Context Tensions and Challenges (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy and Security in the Covid-19 Work from Home Context Tensions and Challenges (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy and Security in the Covid-19 Work from Home Context Tensions and Challenges (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy and Security in the Covid-19 Work from Home Context Tensions and Challenges (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "The COVID-19 pandemic has triggered an astonishing and sudden transition into home working, and is likely to lead to a permanent transformation of the workplace. With an increasing number of employees working from home, and more organizations having to manage their dispersed employees and operations remotely (Waizenegger et al, 2020), privacy and security are not only challenged, but also compromised and overlooked (Naidoo, 2020). This is exacerbated by the deployment of potentially unfamiliar technologies (e.g., Zoom, Slack), often without due diligence checks. Following these, we aim to explore the emerging tensions and risks to privacy and security accompanying the mass transition in the Covid-19 WFH context. Based on a series of qualitative interviews with managers and employees of different organizations, we identified relevant factors that challenge privacy and security within the COVID-19 WFH setting. Tensions and challenges are of technological, organizational and behavioral nature. Our research has found that often difficult balances need to be made. The WFH context that includes co-located families or housemates, shared spaces and caring responsibilities introduces complexities around these conflicting identities, and the ability to keep work-life separate from home-life. This increased blurring of work and home also means privacy is difficult to maintain, with greater opportunities for accidental disclosures in both directions. However, many also failed to appreciate the risks these possible invasions of privacy may introduce. Finally, whilst some workplaces have been able to support heightened security measures while WFH, for many there remains a chasm between best practice and actual behavior afforded by the more relaxed working environment. Overall, our research highlights the support needed for both organizations and their employees to ensure that privacy and security not only continue to be considered, but also revisited in light of the new threat landscape. With both individuals and organizations showing a preference for remote and/or hybrid work further research on privacy and security is clearly necessary."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2021-12-12"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "Privacy and Security in the Covid-19 Work from Home Context Tensions and Challenges"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "42nd International Conference on Information Systems (ICIS) TREOs"^^xsd:string; rdf:type bibo:Conference . foaf:name "AIS Electronic Library (AISeL)"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Panteli"^^xsd:string; foaf:givenName "Niki"^^xsd:string; foaf:name "Niki Panteli"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Williams"^^xsd:string; foaf:givenName "Nikki"^^xsd:string; foaf:name "Nikki Williams"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Collins"^^xsd:string; foaf:givenName "Emily"^^xsd:string; foaf:name "Emily Collins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . rdfs:label "EMBC21_1354_FI.pdf"^^xsd:string . rdfs:label "EMBC21_1354_FI.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91421 \n\nAttentional bias towards high and low caloric food on repeated visual food stimuli: An ERP study\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Attentional bias towards high and low caloric food on repeated visual food stimuli: An ERP study (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Attentional bias towards high and low caloric food on repeated visual food stimuli: An ERP study (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Attentional bias towards high and low caloric food on repeated visual food stimuli: An ERP study (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Attentional bias towards high and low caloric food on repeated visual food stimuli: An ERP study (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Attentional bias towards high and low caloric food on repeated visual food stimuli: An ERP study (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Attentional bias towards high and low caloric food on repeated visual food stimuli: An ERP study (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Food variety influences appetitive behaviour, motivation to eat and energy intake. Research found that repeated exposure to varied food images increases the motivation towards food in adults and children. This study investigates the effects of repetition on the modulation of early and late components of event-related potentials (ERPs) when participants passively viewed the same food and non-food images repeatedly. The motivational attention to food and non-food images were assessed in frontal, centroparietal, parietooccipital and occipitotemporal areas of the brain. Participants showed increased late positive potential (late ERP component) to high caloric image in the occipitotemporal region compared to low caloric and nonfood images. Similar effects could be seen in the early ERP component in the frontal region, but with reversed polarity. Data suggest that both the early and late ERP components show greater ERP amplitude when viewing high caloric images than low caloric and non-food images. Despite repeated exposure to same image, high caloric food continued to show sustained attention compared to low caloric and non-food image."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-12-09"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Attentional bias towards high and low caloric food on repeated visual food stimuli: An ERP study"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "R858 Computer applications to medicine. Medical informatics. Medical information technology" . dct:title "2021 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC) (EMBC 2021)"^^xsd:string; rdf:type bibo:Conference . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Duraisingam"^^xsd:string; foaf:givenName "Aruna"^^xsd:string; foaf:name "Aruna Duraisingam"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Soria"^^xsd:string; foaf:givenName "Daniele"^^xsd:string; foaf:name "Daniele Soria"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . rdfs:label "EMBC21_0867_FI.pdf"^^xsd:string . rdfs:label "EMBC21_0867_FI.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91424 \n\nAcoustic Based Footstep Detection in Pervasive Healthcare\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Acoustic Based Footstep Detection in Pervasive Healthcare (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Acoustic Based Footstep Detection in Pervasive Healthcare (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Acoustic Based Footstep Detection in Pervasive Healthcare (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Acoustic Based Footstep Detection in Pervasive Healthcare (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Acoustic Based Footstep Detection in Pervasive Healthcare (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Acoustic Based Footstep Detection in Pervasive Healthcare (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Passive detection of footsteps in domestic settings can allow the development of assistive technologies that can monitor mobility patterns of older adults in their home environment. Acoustic footstep detection is a promising approach for nonintrusive detection of footsteps. So far there has been limited work in developing robust acoustic footstep detection systems that can operate in noisy home environments. In this paper, we propose a novel application of the Attention based Recurrent Deep Neural Network to detect human footsteps in noisy overlapping audio streams. The model is trained on synthetic data which simulates the acoustic scene in a home environment. To evaluate performance, we reproduced two footstep detection models from literature and compared them using the newly developed Polyphonic Sound Detection Scores (PSDS). Our model achieved the highest PSDS and is close to the highest score achieved by generic indoor AED models in DCASE. The proposed system is designed to both detect and track footsteps within a home setting, and to enhance state-of-the-art digital health-care solutions for empowering older adults to live autonomously in their own homes."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , ; dct:date "2021-12-09"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Acoustic Based Footstep Detection in Pervasive Healthcare"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "R858 Computer applications to medicine. Medical informatics. Medical information technology" . dct:title "43rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society"^^xsd:string; rdf:type bibo:Conference . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Dasgupta"^^xsd:string; foaf:givenName "S."^^xsd:string; foaf:name "S. Dasgupta"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Das"^^xsd:string; foaf:givenName "D."^^xsd:string; foaf:name "D. Das"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Efstratiou"^^xsd:string; foaf:givenName "C."^^xsd:string; foaf:name "C. Efstratiou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Summoogum"^^xsd:string; foaf:givenName "K."^^xsd:string; foaf:name "K. Summoogum"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "I."^^xsd:string; foaf:name "I. McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "R."^^xsd:string; foaf:name "R. Palaniappan"^^xsd:string; rdf:type foaf:Person . rdfs:label "Perez-Delgado_2021_New_J._Phys._23_123015.pdf"^^xsd:string . rdfs:label "Perez-Delgado_2021_New_J._Phys._23_123015.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #92288 \n\nCoherent Parallelization of Universal Classical Computation\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Coherent Parallelization of Universal Classical Computation (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Coherent Parallelization of Universal Classical Computation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Coherent Parallelization of Universal Classical Computation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Coherent Parallelization of Universal Classical Computation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Coherent Parallelization of Universal Classical Computation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Coherent Parallelization of Universal Classical Computation (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Previously, higher-order Hamiltonians (HoH) had been shown to offer an advantage in both metrology and quantum energy storage. Here, we axiomatize a model of computation that allows us to consider such Hamiltonians for the purposes of computation. From this axiomatic model, we formally prove that an HoH-based algorithm can gain up to a quadratic speed-up over classical sequential algorithms—for any possible classical computation. We show how our axiomatic model is grounded in the same physics as that used in HoH-based quantum advantage for metrology and battery charging. Thus we argue that any advance in implementing HoH-based quantum advantage in those scenarios can be co-opted for the purpose of speeding up computation."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "23"; dc:hasVersion ; dct:creator , ; dct:date "2021-12-08"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Coherent Parallelization of Universal Classical Computation"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . rdf:type skos:Concept; skos:prefLabel "QC174.12 Quantum theory"@en . foaf:name "IOP Publishing"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Pérez-Delgado"^^xsd:string; foaf:givenName "Carlos A"^^xsd:string; foaf:name "Carlos A Pérez-Delgado"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Vinjanampathy"^^xsd:string; foaf:givenName "Sai"^^xsd:string; foaf:name "Sai Vinjanampathy"^^xsd:string; rdf:type foaf:Person . bibo:issn "13672630"; foaf:name "New Journal of Physics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Kamaleson_SGAI2021_preprint.pdf"^^xsd:string . rdfs:label "Kamaleson_SGAI2021_preprint.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91696 \n\nAutomatic Information Extraction from Electronic Documents using Machine Learning\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Automatic Information Extraction from Electronic Documents using Machine Learning (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Information Extraction from Electronic Documents using Machine Learning (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Information Extraction from Electronic Documents using Machine Learning (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Information Extraction from Electronic Documents using Machine Learning (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Information Extraction from Electronic Documents using Machine Learning (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Information Extraction from Electronic Documents using Machine Learning (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The digital processing of electronic documents is widely exploited across many domains to improve the efficiency of information extraction. However, paper documents are still largely being used in practice. In order to process such documents, a manual procedure is used to inspect them and extract the values of interest. As this task is monotonous and time consuming, it is prone to introduce human errors during the process. In this paper, we present an efficient and robust system that automates the aforementioned task by using a combination of machine learning techniques: optical character recognition, object detection and image processing techniques. This not only speeds up the process but also improves the accuracy of extracted information compared to a manual procedure."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "13101"; dc:hasVersion ; dct:creator , , ; dct:date "2021-12-06"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Automatic Information Extraction from Electronic Documents using Machine Learning"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "41st SGAI International Conference on Artificial Intelligence"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Cambridge, England"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chu"^^xsd:string; foaf:givenName "Dominique"^^xsd:string; foaf:name "Dominique Chu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando E.B."^^xsd:string; foaf:name "Fernando E.B. Otero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kamaleson"^^xsd:string; foaf:givenName "Nishanthan"^^xsd:string; foaf:name "Nishanthan Kamaleson"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Misra_SGAI2021_preprint.pdf"^^xsd:string . rdfs:label "Misra_SGAI2021_preprint.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91697 \n\nBehavioural User Identification from Clickstream Data for Business Improvement\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Behavioural User Identification from Clickstream Data for Business Improvement (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Behavioural User Identification from Clickstream Data for Business Improvement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behavioural User Identification from Clickstream Data for Business Improvement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behavioural User Identification from Clickstream Data for Business Improvement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behavioural User Identification from Clickstream Data for Business Improvement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behavioural User Identification from Clickstream Data for Business Improvement (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "One of the key elements for businesses to succeed is to get to know their customers. Traditionally this task has been performed through user studies, however, over the last few years clickstream analysis has been proposed as a potential way of conducting automated behavioural studies at scale. In this paper, we explore the use of a recently-proposed unsupervised data-mining technique to identify common behavioural patterns from a clickstream and use them to automatically group users into clusters. In particular, our goal is to validate the potential of behavioural user identification with respect to a key business-level objective. We consider to which extent it is possible to link overall user in-application behaviour to the completion of a particular business-relevant action. Identifying behavior patterns resulting in such business-relevant actions can enable businesses to make changes to their interface, target relevant user groups or trigger actionable insights, all with the objective of maximizing the likelihood of preferable user actions. We analyzed a realworld dataset from a mobile application deployed on both the iOS and Android platforms for this experiment."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-12-06"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Behavioural User Identification from Clickstream Data for Business Improvement"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "Forty-first SGAI International Conference on Artificial Intelligence"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Cambridge, England"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando E.B."^^xsd:string; foaf:name "Fernando E.B. Otero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Misra"^^xsd:string; foaf:givenName "Gaurav"^^xsd:string; foaf:name "Gaurav Misra"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Migliavacca"^^xsd:string; foaf:givenName "Matteo"^^xsd:string; foaf:name "Matteo Migliavacca"^^xsd:string; rdf:type foaf:Person . rdfs:label "CHI-2022-Smart-Home-Security.pdf"^^xsd:string . rdfs:label "CHI-2022-Smart-Home-Security.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #92356 \n\n\"It was hard to find the words\": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "\"It was hard to find the words\": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "\"It was hard to find the words\": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "\"It was hard to find the words\": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "\"It was hard to find the words\": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "\"It was hard to find the words\": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "\"It was hard to find the words\": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "This study considers how well an autoethnographic diary study helps as a method to explore why families might struggle in the application of strong and cohesive cyber security measures within the smart home. Combining two human-computer interaction (HCI) research methods - the relatively unstructured process of autoethnography and the more structured diary study - allowed the first author to reflect on the differences between researchers or experts, and everyday users. Having a physical set of structured diary prompts allowed for a period of 'thinking as writing', enabling reflection upon how having expert knowledge may or may not translate into useful knowledge when dealing with everyday life. This is particularly beneficial in the context of home cyber security use, where first-person narratives have not made up part of the research corpus to date, despite a consistent recognition that users struggle to apply strong cyber security methods in personal contexts. The framing of the autoethnographic diary study contributes a very simple, but extremely powerful, tool for anyone with more knowledge than the average user of any technology, enabling the expert to reflect upon how they themselves have fared when using, understanding and discussing the technology in daily life."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-12-02"; dct:isPartOf ; dct:publisher ; dct:subject , , , ; dct:title "\"It was hard to find the words\": Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF41 Psychology and philosophy" . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "HM Sociology"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "2022 ACM CHI Conference on Human Factors in Computing Systems"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "New Orleans, USA"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Turner"^^xsd:string; foaf:givenName "Sarah"^^xsd:string; foaf:name "Sarah Turner"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #92302 \n\nOn the Effectiveness of Ransomware Decryption Tools\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "On the Effectiveness of Ransomware Decryption Tools (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "On the Effectiveness of Ransomware Decryption Tools (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the Effectiveness of Ransomware Decryption Tools (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the Effectiveness of Ransomware Decryption Tools (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the Effectiveness of Ransomware Decryption Tools (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the Effectiveness of Ransomware Decryption Tools (Other)"^^xsd:string . rdf:type bibo:Document, ep:Document; rdfs:label "On the Effectiveness of Ransomware Decryption Tools (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the Effectiveness of Ransomware Decryption Tools (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the Effectiveness of Ransomware Decryption Tools (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the Effectiveness of Ransomware Decryption Tools (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the Effectiveness of Ransomware Decryption Tools (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "On the Effectiveness of Ransomware Decryption Tools (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Ransomware is a type of malware that locks out its victim’s access to their device or data – typically by encrypting files – and demands payment in exchange of restoring access. To fight the increasing threat posed by ransomware, security researchers and practitioners have developed decryption tools. These tools aim to help victims in recovering their data, generally by decrypting the compromised files without paying the ransom. Unfortunately, there has been minimal research on the effectiveness of decryption and recovery tools. There is a scant understanding regarding the extent to which these tools can actually recover compromised data. The research presented in this work aims to cover this gap by providing an empirical study on these tools’ effectiveness – in terms of decrypting and restoring compromised data. For doing so, we tested a total of 78 tools created by 11 security companies against 61 ransomware samples. That allows us to present an in-depth critical discussion of the real effectiveness of the recovery tools studied. We found that nearly half of the tools fail to recover compromised data satisfactorily. We conclude that there is still a lot of work to be done before these tools can make a real positive impact on ransomware victims. We finish our work by offering some additional insights and recommendations that could help in improving the effectiveness of ransomware decryption tools."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "111"; dc:hasVersion , ; dct:creator , , , ; dct:date "2021-12"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "On the Effectiveness of Ransomware Decryption Tools"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Arief"^^xsd:string; foaf:givenName "Budi"^^xsd:string; foaf:name "Budi Arief"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Filiz"^^xsd:string; foaf:givenName "Burak"^^xsd:string; foaf:name "Burak Filiz"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio C."^^xsd:string; foaf:name "Julio C. Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cetin"^^xsd:string; foaf:givenName "Orcun"^^xsd:string; foaf:name "Orcun Cetin"^^xsd:string; rdf:type foaf:Person . bibo:issn "01674048"; foaf:name "Computers & Security"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #91242 \n\nVREED: Virtual Reality Emotion Recognition Dataset using Eye Tracking & Physiological Measures\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "VREED: Virtual Reality Emotion Recognition Dataset using Eye Tracking & Physiological Measures (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "VREED: Virtual Reality Emotion Recognition Dataset using Eye Tracking & Physiological Measures (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "VREED: Virtual Reality Emotion Recognition Dataset using Eye Tracking & Physiological Measures (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "VREED: Virtual Reality Emotion Recognition Dataset using Eye Tracking & Physiological Measures (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "VREED: Virtual Reality Emotion Recognition Dataset using Eye Tracking & Physiological Measures (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "VREED: Virtual Reality Emotion Recognition Dataset using Eye Tracking & Physiological Measures (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "The paper introduces a multimodal affective dataset named VREED (VR Eyes: Emotions Dataset) in which emotions were triggered using immersive 360° Video-Based Virtual Environments (360-VEs) delivered via Virtual Reality (VR) headset. Behavioural (eye tracking) and physiological signals (Electrocardiogram (ECG) and Galvanic Skin Response (GSR)) were captured, together with self-reported responses, from healthy participants (n=34) experiencing 360-VEs (n=12, 1-3 min each) selected through focus groups and a pilot trial. Statistical analysis confirmed the validity of the selected 360-VEs in eliciting the desired emotions. Preliminary machine learning analysis was carried out, demonstrating state-of-the-art performance reported in affective computing literature using non-immersive modalities. VREED is among the first multimodal VR datasets in emotion recognition using behavioural and physiological signals. VREED is made publicly available on Kaggle 1. We hope that this contribution encourages other researchers to utilise VREED further to understand emotional responses in VR and ultimately enhance VR experiences design in applications where emotional elicitation plays a key role, i.e. healthcare, gaming, education, etc."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "5"; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2021-12"; dct:isPartOf , ; dct:subject ; dct:title "VREED: Virtual Reality Emotion Recognition Dataset using Eye Tracking & Physiological Measures"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . foaf:familyName "Ang"^^xsd:string; foaf:givenName "Chee Siang"^^xsd:string; foaf:name "Chee Siang Ang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Glancy"^^xsd:string; foaf:givenName "Maxine"^^xsd:string; foaf:name "Maxine Glancy"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Intarasirisawat"^^xsd:string; foaf:givenName "Jittrapol"^^xsd:string; foaf:name "Jittrapol Intarasirisawat"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tabbaa"^^xsd:string; foaf:givenName "Luma"^^xsd:string; foaf:name "Luma Tabbaa"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hossain"^^xsd:string; foaf:givenName "Md. Moinul"^^xsd:string; foaf:name "Md. Moinul Hossain"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Searle"^^xsd:string; foaf:givenName "Ryan"^^xsd:string; foaf:name "Ryan Searle"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mirzaee"^^xsd:string; foaf:givenName "Saber"^^xsd:string; foaf:name "Saber Mirzaee"^^xsd:string; rdf:type foaf:Person . foaf:name "Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"^^xsd:string; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #91977 \n\nAddressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "The cybersecurity skills shortage and gap are well-documented issues that are currently having an impact on national labour markets worldwide. While various initiatives related to cybersecurity skills have been proposed and multiple actions have been launched to address the problems, the shortage and gap persist. ENISA has a long tradition of studies and programmes that have attempted to mitigate similar cybersecurity issues. In an effort to increase the EU’s future cybersecurity workforce and ensure the availability of appropriately trained professionals, ENISA has investigated the problem further.\r\n\r\nIn this report, ENISA contributes to both practice and research on the cybersecurity skills shortage and gap in two distinctive areas. Firstly, it provides an overview of the current supply of cybersecurity skills in Europe through an analysis of data gathered and generated by the recently established Cybersecurity Higher Education Database (CyberHEAD). Secondly, it describes the policy approaches adopted by EU Member States in their quest to increase and sustain their national cybersecurity workforces. These approaches have been classified and analysed based on objectives defined by ENISA’s National Capabilities Assessment Framework (NCAF), namely cybersecurity awareness, training, challenges and exercises. Here we note that this report focuses on the role of the higher education sector in addressing the EU cybersecurity skills shortage and gap, and therefore vocational or lower forms of education in cybersecurity related topics are not considered as core parts of this study.\r\n\r\nBased on the data collected and analysed under the two areas mentioned above, this report makes five recommendations to address the EU cybersecurity skills shortage and gap:\r\n- Increase enrolments and eventually graduates in cybersecurity programmes through:\r\n-- the diversification of the Higher Educational Institutes’ (HEIs) curricula in terms of content, levels and language.\r\n-- the provision of scholarships, especially for underrepresented groups, and more active efforts to promote cybersecurity as a diverse field.\r\n\r\n- Support a unified approach across government, industry and HEIs through:\r\n-- the adoption of a common framework regarding cybersecurity roles, competencies, skills and knowledge, for example, the one provided by the European Cybersecurity Skills Framework.\r\n-- the promotion of challenges and competitions in cybersecurity skills.\r\n\r\n- Increase collaborations between Member States in:\r\n-- launching European cybersecurity initiatives with shared objectives.\r\n-- sharing of the outputs of programmes (including results and lessons learnt).\r\n\r\n- Promote analysis of the cybersecurity market needs and trends through:\r\n-- the identification of metrics showing the extent of the problem and possible measures to cope with it.\r\n\r\n- Support the promotion of CyberHEAD (and its further evolution) in order to:\r\n-- facilitate an ongoing understanding of the status of cybersecurity higher education programmes in the EU.\r\n-- monitor trends regarding the number of cybersecurity graduates who could potentially fill current vacancies in the sector.\r\n-- support the analysis of demographics (including the diversity) of new students and graduates in cybersecurity.\r\n-- assist in monitoring the effectiveness of cybersecurity initiatives targeting the supply side (e.g. changes in enrolments in HEI programmes after the release of new cybersecurity initiatives).\r\n-- demonstrate the value of CyberHEAD for HEIs as well as incentivise HEIs to submit their programmes to CyberHEAD."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2021-11-24"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:Article, ep:EPrint, ep:OtherEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "European Union Agency for Cybersecurity (ENISA)"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Di Franco"^^xsd:string; foaf:givenName "Fabio"^^xsd:string; foaf:name "Fabio Di Franco"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Adamos"^^xsd:string; foaf:givenName "Konstantinos"^^xsd:string; foaf:name "Konstantinos Adamos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grammatopoulos"^^xsd:string; foaf:givenName "Athanasios"^^xsd:string; foaf:name "Athanasios Grammatopoulos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:name "European Union Agency for Cybersecurity (ENISA) Report"^^xsd:string; rdf:type bibo:Collection . rdfs:label "FWAdaBoostSOFIES_v1.pdf"^^xsd:string . rdfs:label "FWAdaBoostSOFIES_v1.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91288 \n\nMulti-Class Fuzzily Weighted Adaptive Boosting-based Self-Organising Fuzzy Inference Ensemble Systems for Classification\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Multi-Class Fuzzily Weighted Adaptive Boosting-based Self-Organising Fuzzy Inference Ensemble Systems for Classification (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Multi-Class Fuzzily Weighted Adaptive Boosting-based Self-Organising Fuzzy Inference Ensemble Systems for Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multi-Class Fuzzily Weighted Adaptive Boosting-based Self-Organising Fuzzy Inference Ensemble Systems for Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multi-Class Fuzzily Weighted Adaptive Boosting-based Self-Organising Fuzzy Inference Ensemble Systems for Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multi-Class Fuzzily Weighted Adaptive Boosting-based Self-Organising Fuzzy Inference Ensemble Systems for Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multi-Class Fuzzily Weighted Adaptive Boosting-based Self-Organising Fuzzy Inference Ensemble Systems for Classification (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Adaptive boosting (AdaBoost) is a widely used technique to construct a stronger ensemble classifier by combining a set of weaker ones. Zero-order fuzzy inference systems (FISs) are very powerful prototype-based predictive models for classification, offering both great prediction precision and high user-interpretability. However, the use of zero-order FISs as base classifiers in AdaBoost has not been explored yet. To bridge the gap, in this paper, a novel multi-class fuzzily weighted AdaBoost (FWAdaBoost)-based ensemble system with self-organising fuzzy inference system (SOFIS) as the ensemble component is proposed. To better incorporate SOFIS, FWAdaBoost utilises the confidence scores produced by SOFIS in both sample weight updating and ensemble output generation, resulting in more accurate classification boundaries and greater prediction precision. Numerical examples on a wide range of benchmark classification problems demonstrate the efficacy of the proposed approach."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2021-11-13"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Multi-Class Fuzzily Weighted Adaptive Boosting-based Self-Organising Fuzzy Inference Ensemble Systems for Classification"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen"^^xsd:string; foaf:name "Plamen Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "10636706"; foaf:name "IEEE Transactions on Fuzzy Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Akintunde2021_Article_FormalVerificationOfNeuralAgen.pdf"^^xsd:string . rdfs:label "Akintunde2021_Article_FormalVerificationOfNeuralAgen.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #92680 \n\nFormal verification of neural agents in non-deterministic environments\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Formal verification of neural agents in non-deterministic environments (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Formal verification of neural agents in non-deterministic environments (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Formal verification of neural agents in non-deterministic environments (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Formal verification of neural agents in non-deterministic environments (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Formal verification of neural agents in non-deterministic environments (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Formal verification of neural agents in non-deterministic environments (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "We introduce a model for agent-environment systems where the agents are implemented via feed-forward ReLU neural networks and the environment is non-deterministic. We study the verification problem of such systems against CTL properties. We show that verifying these systems against reachability properties is undecidable. We introduce a bounded fragment of CTL, show its usefulness in identifying shallow bugs in the system, and prove that the verification problem against specifications in bounded CTL is in coNEXPTIME and PSPACE-hard. We introduce sequential and parallel algorithms for MILP-based verification of agent-environment systems, present an implementation, and report the experimental results obtained against a variant of the VerticalCAS use-case and the frozen lake scenario."^^xsd:string; bibo:authorList ; bibo:issue "1"; bibo:status , ; bibo:volume "36"; dc:hasVersion ; dct:creator , , , ; dct:date "2021-11-09"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Formal verification of neural agents in non-deterministic environments"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Lomuscio"^^xsd:string; foaf:givenName "Alessio"^^xsd:string; foaf:name "Alessio Lomuscio"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Akintunde"^^xsd:string; foaf:givenName "Michael E."^^xsd:string; foaf:name "Michael E. Akintunde"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kouvaros"^^xsd:string; foaf:givenName "Panagiotis"^^xsd:string; foaf:name "Panagiotis Kouvaros"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Botoeva"^^xsd:string; foaf:givenName "Elena"^^xsd:string; foaf:name "Elena Botoeva"^^xsd:string; rdf:type foaf:Person . bibo:issn "13872532"; foaf:name "Autonomous Agents and Multi-Agent Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "3487351.3492716.pdf"^^xsd:string . rdfs:label "3487351.3492716.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #90995 \n\nDetecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Many cyber security experts, organizations, and cyber criminals are active users on online social networks (OSNs). Therefore, detecting cyber security related accounts on OSNs and monitoring their activities can be very useful for different purposes such as cyber threat intelligence, detecting and preventing cyber attacks and online harms on OSNs, and evaluating the effectiveness of cyber security awareness activities on OSNs.\r\nIn this paper, we report our work on developing several machine learning based classifiers for detecting cyber security related accounts on Twitter, including a base-line classifier for detecting cyber security related accounts in general, and three sub-classifiers for detecting three subsets of cyber security related accounts (individuals, hackers, and academia). To train and test the classifiers, we followed a more systemic approach (based on a cyber security taxonomy, real-time sampling of tweets, and crowdsourcing) to construct a dataset of cyber security related accounts with multiple tags assigned to each account. For each classifier, we considered a richer set of features than those used in past studies. Among five machine learning models tested, the Random Forest model achieved the best performance: 93% for the base-line classifier, 88-91% for the three sub-classifiers. We also studied feature reduction of the base-line classifier and showed that using just six features we can already achieve the same performance."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion , ; dct:creator , ; dct:date "2021-11-08"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Detecting Cyber Security Related Twitter Accounts and Different Sub-Groups: A Multi-Classifier Approach"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . dct:title "The 2nd International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2021), co-located with the 13th IEEE/ACM International Conference on Advances in Social Network Analysis and Mining (ASONAM 2021)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Virtual Event, Netherlands"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Mahaini"^^xsd:string; foaf:givenName "Mohamad Imad"^^xsd:string; foaf:name "Mohamad Imad Mahaini"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90398 \n\nA self-adaptive fuzzy learning system for streaming data prediction\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "In this paper, a novel self-adaptive fuzzy learning (SAFL) system is proposed for streaming data prediction. SAFL self-learns from data streams a predictive model composed of a set of prototype-based fuzzy rules, with each of which representing a certain local data distribution, and continuously self-evolves to follow the changing data patterns in non-stationary environments. Unlike conventional evolving fuzzy systems, both the fuzzy inference and consequent parameter learning schemes utilised by SAFL are simplified so that only a small number of selected fuzzy rules within the rule base are involved in system output generation and parameter updating during a learning cycle. Such simplification not only significantly reduces the system’s computational complexity but also increases its prediction precision. In addition, both theoretical and empirical investigations guarantee the stability of the resulting SAFL. Comparative experimental studies on a wide variety of benchmark and real-world problems demonstrate that SAFL is able to learn from streaming data in a highly efficient manner and to make predictions with a great accuracy, revealing the effectiveness and validity of the proposed approach."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "579"; dct:creator , ; dct:date "2021-11-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A self-adaptive fuzzy learning system for streaming data prediction"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Shen"^^xsd:string; foaf:givenName "Qiang"^^xsd:string; foaf:name "Qiang Shen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "00200255"; foaf:name "Information Sciences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #92304 \n\nIndustrialising Blackmail: Privacy Invasion Based IoT Ransomware\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Industrialising Blackmail: Privacy Invasion Based IoT Ransomware (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Industrialising Blackmail: Privacy Invasion Based IoT Ransomware (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Industrialising Blackmail: Privacy Invasion Based IoT Ransomware (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Industrialising Blackmail: Privacy Invasion Based IoT Ransomware (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Industrialising Blackmail: Privacy Invasion Based IoT Ransomware (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Industrialising Blackmail: Privacy Invasion Based IoT Ransomware (Other)"^^xsd:string . rdf:type bibo:Document, ep:Document; rdfs:label "Industrialising Blackmail: Privacy Invasion Based IoT Ransomware (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Industrialising Blackmail: Privacy Invasion Based IoT Ransomware (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Industrialising Blackmail: Privacy Invasion Based IoT Ransomware (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Industrialising Blackmail: Privacy Invasion Based IoT Ransomware (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Industrialising Blackmail: Privacy Invasion Based IoT Ransomware (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Industrialising Blackmail: Privacy Invasion Based IoT Ransomware (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . rdf:_1 ; rdf:_2 ; rdf:_3 . , , ; bibo:abstract "Ransomware (malware that threatens to lock or publish victims’ assets unless a ransom is paid) has become a serious security threat, targeting individual users, companies and even governments, causing significant damage, disruption and cost. Instances of ransomware have also been observed stealing private data and blackmailing their victims. Worryingly, the prevalence of Internet of Things (IoT) devices and the massive amount of personal data that they collect have opened up another avenue of attack. The main aim of this paper is to determine whether privacy invasion based ransomware would be a viable vector for attackers to use on IoT devices. The secondary aim is to identify countermeasures that can be implemented to prevent such attacks from being used. To accomplish these aims, we examined how private data accessible via IoT devices could be obtained, processed and managed by a ransomware attacker. We identified a number of data sources on IoT devices that can be used to access private data, such as audio and video feeds. We then investigated methods to interpret such data in order to blackmail the device’s owner. We then produced proof of concept malware for multiple IoT devices, including an external “collator” that manages the valuable data collected, demonstrating that an attack could be performed at scale. This research shows that attackers can use the functionality of an infected device to invade the privacy of the device’s owner, as part of a ransomware attack. We have demonstrated that, given suitable infrastructure, attackers would be able to ransom users for values higher than the cost of the compromised device, as well as heavily damage the trust in the device itself, which would cause further negative impact on the device manufacturer. Finally, we highlight the need for proactive measures to deter this style of attack by applying the suggested countermeasures."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "13115"; dc:hasVersion , ; dct:creator , , , ; dct:date "2021-11"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Industrialising Blackmail: Privacy Invasion Based IoT Ransomware"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "The 26th Nordic Conference on Secure IT Systems (NordSec 2021)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Tampere University (Virtual Event)"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Michalas"^^xsd:string; foaf:givenName "A."^^xsd:string; foaf:name "A. Michalas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Arief"^^xsd:string; foaf:givenName "Budi"^^xsd:string; foaf:name "Budi Arief"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Brumley"^^xsd:string; foaf:givenName "B.B."^^xsd:string; foaf:name "B.B. Brumley"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Brierley"^^xsd:string; foaf:givenName "Calvin"^^xsd:string; foaf:name "Calvin Brierley"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Barnes"^^xsd:string; foaf:givenName "David J."^^xsd:string; foaf:name "David J. Barnes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tuveri"^^xsd:string; foaf:givenName "N."^^xsd:string; foaf:name "N. Tuveri"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio C."^^xsd:string; foaf:name "Julio C. Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #92152 \n\nReal-time identification of frequency-hopping millimeter-wave signals using photonic time stretch and reservoir computing\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 . bibo:abstract "Real-time identification of frequency-hopping millimeter-wave (mm-wave) signals is a real challenge, due to the high demand for detection bandwidth and processing speed. In this paper, we propose and demonstrate a novel microwave photonic approach to identifying frequency hopping of mm-wave signals based on the concepts of photonic time stretch (PTS) and Reservoir Computing (RC). The PTS scheme allows the modulated signal to be slowed down hence reducing the required detection bandwidth. The developed RC model offers unique features such as being more efficient and time saving in temporal data pattern classification than traditional methods. According to the simulation, RC can recognize the hopping instants and give a precise hop timing estimation in real-time."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , , , , , , ; dct:date "2021-10-19"; dct:isPartOf ; dct:title "Real-time identification of frequency-hopping millimeter-wave signals using photonic time stretch and reservoir computing"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "SPIE/COS Photonics Asia"^^xsd:string; rdf:type bibo:Conference . foaf:familyName "Yue"^^xsd:string; foaf:givenName "Yuanli"^^xsd:string; foaf:name "Yuanli Yue"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ming"^^xsd:string; foaf:name "Ming Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Feng"^^xsd:string; foaf:givenName "Yue"^^xsd:string; foaf:name "Yue Feng"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhang"^^xsd:string; foaf:givenName "Ailing"^^xsd:string; foaf:name "Ailing Zhang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jalali"^^xsd:string; foaf:givenName "Bahram"^^xsd:string; foaf:name "Bahram Jalali"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Chao"^^xsd:string; foaf:name "Chao Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shuo"^^xsd:string; foaf:name "Shuo Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Asghari"^^xsd:string; foaf:givenName "Mohammad Hossein"^^xsd:string; foaf:name "Mohammad Hossein Asghari"^^xsd:string; rdf:type foaf:Person . rdfs:label "ICHI-2021-Ribeiro-post-review.pdf"^^xsd:string . rdfs:label "ICHI-2021-Ribeiro-post-review.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91011 \n\nConstructed temporal features for longitudinal classification of human ageing data\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Constructed temporal features for longitudinal classification of human ageing data (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Constructed temporal features for longitudinal classification of human ageing data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Constructed temporal features for longitudinal classification of human ageing data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Constructed temporal features for longitudinal classification of human ageing data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Constructed temporal features for longitudinal classification of human ageing data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Constructed temporal features for longitudinal classification of human ageing data (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Standard classification algorithms ignore the time-related information contained in longitudinal data, as they do not consider the time indexes of the features’ different measurements. Accounting for temporal patterns may improve the algorithms’ performance, when applied to longitudinal data. Representing temporal patterns in the data itself has the advantage that those patterns are generic enough to be used with existing powerful classification algorithms, without requiring the design of new and more complex algorithms to exploit them. In this article, we propose 6 different types of constructed temporal features (3 of them being novel contributions), calculated from the values of the different feature measurements taken over time, and investigate whether adding those constructed temporal features to the original longitudinal dataset improves the classification model’s predictive accuracy. Our experiments involved 20 real-world longitudinal datasets created from a human-ageing study, and showed that the proposed approach of adding the constructed temporal features to the original feature set produced better classifiers overall."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2021-10-17"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Constructed temporal features for longitudinal classification of human ageing data"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "2021 IEEE 9th International Conference on Healthcare Informatics (ICHI)"^^xsd:string; rdf:type bibo:Conference . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex"^^xsd:string; foaf:name "Alex Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ribeiro"^^xsd:string; foaf:givenName "Caio"^^xsd:string; foaf:name "Caio Ribeiro"^^xsd:string; rdf:type foaf:Person . foaf:name "Proceedings of the 2021 IEEE 9th International Conference on Healthcare Informatics (ICHI)"^^xsd:string; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90751 \n\nA Novel ICMetric Public Key Framework for Secure Communication\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "A Novel ICMetric Public Key Framework for Secure Communication (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Novel ICMetric Public Key Framework for Secure Communication (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Novel ICMetric Public Key Framework for Secure Communication (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Novel ICMetric Public Key Framework for Secure Communication (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Novel ICMetric Public Key Framework for Secure Communication (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Novel ICMetric Public Key Framework for Secure Communication (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "The Integrated Circuit Metric (ICMetric) technology is a novel trust basis that uses the system features to create an identication of a device. The ICMetric of the device is used for the provision of security services, thereby addressing the issue of trust associated with device identity. The ICMetric technology can be adapted to function with varying environments; however, the short length and low entropy of the ICMetric key pose a major threat to applications based on ICMetric. This paper proposes a secure compre-hensive ICMetric based architecture that facilitates asymmetric ICMetric applications for secure services in an end-to-end environment. This novel framework has been designed keeping in mind the construction principles of ICMetric thereby preventing threats that are prevalent in many security schemes. Finally, an empirical evaluation and feasibility has been presented by implementing the proposed framework and doing an extensive security analysis."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "195"; dc:hasVersion ; dct:creator , , , , ; dct:date "2021-10-06"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A Novel ICMetric Public Key Framework for Secure Communication"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Tahir"^^xsd:string; foaf:givenName "Shahzaib"^^xsd:string; foaf:name "Shahzaib Tahir"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tahir"^^xsd:string; foaf:givenName "Ruhma"^^xsd:string; foaf:name "Ruhma Tahir"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McDonald-Maier"^^xsd:string; foaf:givenName "Klaus D."^^xsd:string; foaf:name "Klaus D. McDonald-Maier"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sajjad"^^xsd:string; foaf:givenName "Ali"^^xsd:string; foaf:name "Ali Sajjad"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Howells"^^xsd:string; foaf:givenName "Gareth"^^xsd:string; foaf:name "Gareth Howells"^^xsd:string; rdf:type foaf:Person . bibo:issn "10848045"; foaf:name "Journal of Network and Computer Applications"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #89756 \n\nIntegrate-and-Fire Neurons for Low-Powered Pattern Recognition\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Integrate-and-Fire Neurons for Low-Powered Pattern Recognition (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Integrate-and-Fire Neurons for Low-Powered Pattern Recognition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Integrate-and-Fire Neurons for Low-Powered Pattern Recognition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Integrate-and-Fire Neurons for Low-Powered Pattern Recognition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Integrate-and-Fire Neurons for Low-Powered Pattern Recognition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Integrate-and-Fire Neurons for Low-Powered Pattern Recognition (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Embedded systems acquire information about the real world from sensors and process it to make decisions and/or for transmission. In some situations, the relationship between the data and the decision is complex and/or the amount of data to transmit is large (e.g. in biologgers). Artificial Neural Networks (ANNs) can efficiently detect patterns in the input data which makes them suitable for decision making or compression of information for data transmission. However, ANNs require a substantial amount of energy which reduces the lifetime of battery-powered devices. Therefore, the use of Spiking Neural Networks can improve such systems by providing a way to efficiently process sensory data without being too energy-consuming. In this work, we introduce a low-powered neuron model called Integrate-and-Fire which exploits the charge and discharge properties of the capacitor. Using parallel and series RC circuits, we developed a trainable neuron model that can be expressed in a recurrent form. Finally, we trained its simulation with an artificially generated dataset of dog postures and implemented it as hardware that showed promising energetic properties."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2021-10-05"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Integrate-and-Fire Neurons for Low-Powered Pattern Recognition"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "20th International Conference on Artificial Intelligence and Soft Computing"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Zakopane, Poland"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chu"^^xsd:string; foaf:givenName "Dominique"^^xsd:string; foaf:name "Dominique Chu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bacho"^^xsd:string; foaf:givenName "Florian"^^xsd:string; foaf:name "Florian Bacho"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90779 \n\nManaging Cybersecurity and Privacy Risks of Cyber Threat intelliegence\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Managing Cybersecurity and Privacy Risks of Cyber Threat intelliegence (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Managing Cybersecurity and Privacy Risks of Cyber Threat intelliegence (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Managing Cybersecurity and Privacy Risks of Cyber Threat intelliegence (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Managing Cybersecurity and Privacy Risks of Cyber Threat intelliegence (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Managing Cybersecurity and Privacy Risks of Cyber Threat intelliegence (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Managing Cybersecurity and Privacy Risks of Cyber Threat intelliegence (Other)"^^xsd:string . rdf:_1 . ; bibo:abstract "In recent years, the number of cyber-attacks that affect critical infrastructures\r\nsuch as health, telecommunications and banks has been rapidly increasing. Sharing Cyber Threat Intelligence (CTI) is being encouraged and mandated as a way of improving overall cyber intelligence and defence, but its take up is slow. Organisations may well be justified in perceiving risks in sharing and disclosing cyber incident information, but they tend to express such worries in broad and vague terms. There are risks of breaching regulations and laws regarding privacy. With laws and regulations such as the General Data Protection Regulation (GDPR), the managers of CTI datasets need clear guidance on how and when it is legal to share such information. This thesis supports the decision of sharing CTI datasets as it proposes a novel contribution through a detailed understanding of which information in cyber incident reports requires protection against specific threats with assessed severity.\r\nIt presents a specific and granular analysis of the risks in cyber incident information sharing, looking in detail at what information may be contained in incident reports and which specific risks are associated with its disclosure. It provides a set of guidelines for the disciplined use of the STIX incident model in order to reduce information security risk. Then, it proposes a quantitative risk model to assess the risk of sharing CTI datasets enabled by sharing with different entities in various situations. The evaluation of the cyber incident model analysis and the quantative risk model has been validated by means of experts' opinions.\r\nAs a final contribution, this thesis defines the impact that GDPR legal aspects\r\nmay have on the sharing of CTI that helps technical people and CTI managers\r\nwith limited legal expertise to encompass legal consideration before sharing CTI datasets. In addition, it recommends protection levels for sharing CTI to ensure compliance with the GDPR."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2021-10"; dct:isPartOf ; dct:issuer , ; dct:title "Managing Cybersecurity and Privacy Risks of Cyber Threat intelliegence"^^xsd:string; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Albakri"^^xsd:string; foaf:givenName "Adham"^^xsd:string; foaf:name "Adham Albakri"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rodgers"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Rodgers"^^xsd:string; rdf:type foaf:Person . rdfs:label "Finger_Vein_Image_Deblurring_Using_Neighbors_based_Binary_GAN_NB_GAN_20210701_last.pdf"^^xsd:string . rdfs:label "Finger_Vein_Image_Deblurring_Using_Neighbors_based_Binary_GAN_NB_GAN_20210701_last.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #90399 \n\nFinger Vein Image Deblurring Using Neighbors-based Binary-GAN (NB-GAN)\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Finger Vein Image Deblurring Using Neighbors-based Binary-GAN (NB-GAN) (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Finger Vein Image Deblurring Using Neighbors-based Binary-GAN (NB-GAN) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Finger Vein Image Deblurring Using Neighbors-based Binary-GAN (NB-GAN) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Finger Vein Image Deblurring Using Neighbors-based Binary-GAN (NB-GAN) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Finger Vein Image Deblurring Using Neighbors-based Binary-GAN (NB-GAN) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Finger Vein Image Deblurring Using Neighbors-based Binary-GAN (NB-GAN) (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "Vein contraction and venous compression typically caused by low temperature and excessive placement pressure can blur the captured finger vein images and severely impair the quality of extracted features. To improve the quality of captured finger vein image, this paper proposes a 26-layer generator network constrained by Neighbors-based Binary Patterns (NBP) texture loss to recover the clear image (guessing the original clear image). Firstly, by analyzing various types and degrees of blurred finger vein images captured in real application scenarios, a method to mathematically model the local and global blurriness using a pair of defocused and mean blur kernels is proposed. By iteratively and alternatively convoluting clear images with both kernels in a multi-scale window, a polymorphic blur training set is constructed for network training. Then, NBP texture loss is used for training the generator to enhance the deblurring ability of the network on images. Lastly, a novel network structure is proposed to retain more vein texture feature information, and two residual connections are added on both sides of the residual module of the 26-layer generator network to prevent degradation and overfitting. Theoretical analysis and simulation results show that the proposed neighbors-based binary-GAN (NB-GAN) can achieve better deblurring performance than the the-state-of-the-art approaches."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2021-09-23"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Finger Vein Image Deblurring Using Neighbors-based Binary-GAN (NB-GAN)"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Yao"^^xsd:string; foaf:givenName "YuDong"^^xsd:string; foaf:name "YuDong Yao"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ding"^^xsd:string; foaf:givenName "Weiping"^^xsd:string; foaf:name "Weiping Ding"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "HuaXia"^^xsd:string; foaf:name "HuaXia Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "He"^^xsd:string; foaf:givenName "Jing"^^xsd:string; foaf:name "Jing He"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhao"^^xsd:string; foaf:givenName "GuoDong"^^xsd:string; foaf:name "GuoDong Zhao"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Shen"^^xsd:string; foaf:givenName "Lei"^^xsd:string; foaf:name "Lei Shen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "2471285X"; foaf:name "IEEE Transactions on Emerging Topics in Computational Intelligence"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "champion21AIwithVMP.pdf"^^xsd:string . rdfs:label "champion21AIwithVMP.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #88015 \n\nRealising Active Inference in Variational Message Passing: the Outcome-blind Certainty Seeker\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Realising Active Inference in Variational Message Passing: the Outcome-blind Certainty Seeker (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Realising Active Inference in Variational Message Passing: the Outcome-blind Certainty Seeker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Realising Active Inference in Variational Message Passing: the Outcome-blind Certainty Seeker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Realising Active Inference in Variational Message Passing: the Outcome-blind Certainty Seeker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Realising Active Inference in Variational Message Passing: the Outcome-blind Certainty Seeker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Realising Active Inference in Variational Message Passing: the Outcome-blind Certainty Seeker (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Active inference is a state-of-the-art framework in neuroscience that offers a unified theoryof brain function. It is also proposed as a framework for planning in AI. Unfortunately, thecomplex mathematics required to create new models — can impede application of activeinference in neuroscience and AI research. This paper addresses this problem by providinga complete mathematical treatment of the active inference framework — in discrete timeand state spaces — and the derivation of the update equations for any new model. Weleverage the theoretical connection between active inference and variational message passingas describe by John Winn and Christopher M. Bishop in 2005. Since, variational messagepassing is a well-defined methodology for deriving Bayesian belief update equations, thispaper opens the door to advanced generative models for active inference. We show thatusing a fully factorized variational distribution simplifies the expected free energy — that furnishes priors over policies — so that agents seek unambiguous states. Finally, we considerfuture extensions that support deep tree searches for sequential policy optimisation — basedupon structure learning and belief propagation."^^xsd:string; bibo:authorList ; bibo:issue "10"; bibo:status , ; bibo:volume "33"; dc:hasVersion ; dct:creator , , ; dct:date "2021-09-16"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Realising Active Inference in Variational Message Passing: the Outcome-blind Certainty Seeker"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "MIT Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Champion"^^xsd:string; foaf:givenName "Théophile"^^xsd:string; foaf:name "Théophile Champion"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grześ"^^xsd:string; foaf:givenName "Marek"^^xsd:string; foaf:name "Marek Grześ"^^xsd:string; rdf:type foaf:Person . bibo:issn "08997667"; foaf:name "Neural Computation"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "ICCC_2021_paper_131.pdf"^^xsd:string . rdfs:label "ICCC_2021_paper_131.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #90259 \n\nThe Humble Creative Machine\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "The Humble Creative Machine (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The Humble Creative Machine (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Humble Creative Machine (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Humble Creative Machine (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Humble Creative Machine (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Humble Creative Machine (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "In this paper, we present a fresh perspective at co- creativity - using human development as a blueprint, we argue that fostering human creativity is a natural evolu- tion of creative machines. We introduce the notion of a “humble” creative machine - one that is less concerned with demonstrating its own independence, and instead uses its (potentially advanced) creative abilities to cul- tivate human creativity. We present characteristics of Humble Creative Machines and offer examples of ex- isting (almost) humble machines."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-09-14"; dct:isPartOf ; dct:publisher ; dct:subject , , , ; dct:title "The Humble Creative Machine"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76.I59 Interactive media, hypermedia"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "Twelfth International Conference on Computational Creativity, ICCC’21"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Mexico City, Mexico"^^xsd:string . foaf:name "Association of Computational Creativity"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Jordanous"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Jordanous"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cassion"^^xsd:string; foaf:givenName "Christopher"^^xsd:string; foaf:name "Christopher Cassion"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ackerman"^^xsd:string; foaf:givenName "Margareta"^^xsd:string; foaf:name "Margareta Ackerman"^^xsd:string; rdf:type foaf:Person . rdfs:label "ICCC_2021_paper_89.pdf"^^xsd:string . rdfs:label "ICCC_2021_paper_89.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #90258 \n\nThe 7th AISB Symposium on Computational Creativity (CC@AISB2020/21)\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "The 7th AISB Symposium on Computational Creativity (CC@AISB2020/21) (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The 7th AISB Symposium on Computational Creativity (CC@AISB2020/21) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The 7th AISB Symposium on Computational Creativity (CC@AISB2020/21) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The 7th AISB Symposium on Computational Creativity (CC@AISB2020/21) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The 7th AISB Symposium on Computational Creativity (CC@AISB2020/21) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The 7th AISB Symposium on Computational Creativity (CC@AISB2020/21) (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "The 7th AISB Symposium on Computational Creativity (CC@AISB2020/21) took place online during April 2021. As event organisers, we report on the event, its ongoing history at the AISB and its future."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2021-09-14"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "The 7th AISB Symposium on Computational Creativity (CC@AISB2020/21)"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA76.17 History of computing"@en . rdf:type skos:Concept; skos:prefLabel "QA76.575 Multimedia systems"@en . dct:title "Twelfth International Conference on Computational Creativity, ICCC’21"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Mexico City, Mexico"^^xsd:string . foaf:name "Association of Computational Creativity"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Jordanous"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Jordanous"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Alvarado"^^xsd:string; foaf:givenName "Juan"^^xsd:string; foaf:name "Juan Alvarado"^^xsd:string; rdf:type foaf:Person . rdfs:label "A_Novel_Hybrid_Feature_Selection_Algorithm_for_Hierarchical_Classification.pdf"^^xsd:string . rdfs:label "A_Novel_Hybrid_Feature_Selection_Algorithm_for_Hierarchical_Classification.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #90295 \n\nA Novel Hybrid Feature Selection Algorithm for Hierarchical Classification\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Novel Hybrid Feature Selection Algorithm for Hierarchical Classification (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Novel Hybrid Feature Selection Algorithm for Hierarchical Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Novel Hybrid Feature Selection Algorithm for Hierarchical Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Novel Hybrid Feature Selection Algorithm for Hierarchical Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Novel Hybrid Feature Selection Algorithm for Hierarchical Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Novel Hybrid Feature Selection Algorithm for Hierarchical Classification (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Feature selection is a widespread preprocessing step in the data mining field. One of its purposes is to reduce the number of original dataset features to improve a predictive model’s performance. Despite the benefits of feature selection for the classification task, to the best of our knowledge, few studies in the literature address feature selection for the hierarchical classification context. This paper proposes a novel feature selection method based on the general variable neighborhood search metaheuristic, combining a filter and a wrapper step, wherein a global model hierarchical classifier evaluates feature subsets. We used twelve datasets from the proteins and images domains to perform computational experiments to validate the effect of the proposed algorithm on classification performance when using two global hierarchical classifiers proposed in the literature. Statistical tests showed that using our method for feature selection led to predictive performances that were consistently better than or equivalent to that obtained by using all features with the benefit of reducing the number of features needed, which justifies its efficiency for the hierarchical classification scenario."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "9"; dc:hasVersion ; dct:creator , , , ; dct:date "2021-09-14"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A Novel Hybrid Feature Selection Algorithm for Hierarchical Classification"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando E.B."^^xsd:string; foaf:name "Fernando E.B. Otero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lima"^^xsd:string; foaf:givenName "Helen C. S. C."^^xsd:string; foaf:name "Helen C. S. C. Lima"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Merschmann"^^xsd:string; foaf:givenName "Luiz H.C."^^xsd:string; foaf:name "Luiz H.C. Merschmann"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Souza"^^xsd:string; foaf:givenName "Marcone J. F."^^xsd:string; foaf:name "Marcone J. F. Souza"^^xsd:string; rdf:type foaf:Person . bibo:issn "21693536"; foaf:name "IEEE Access"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Robust Device Authentication_ICITST.pdf"^^xsd:string . rdfs:label "Robust Device Authentication_ICITST.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #90750 \n\nRobust Device Authentication Using Non-Standard Classification Features\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Robust Device Authentication Using Non-Standard Classification Features (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Robust Device Authentication Using Non-Standard Classification Features (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust Device Authentication Using Non-Standard Classification Features (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust Device Authentication Using Non-Standard Classification Features (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust Device Authentication Using Non-Standard Classification Features (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust Device Authentication Using Non-Standard Classification Features (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "This paper investigates the use of novel hardware features derived from the physical and behavioral characteristics of electronic devices to identify such devices uniquely. Importantly, the features examined exhibit non-standard and multimodal distributions which present a significant challenge to model and characterize. Specifically, the potency of four data classification methods is compared whilst employing such characteristics, proposed model Multivariate Gaussian Distribution (MVGD -address multimodality), Logistic Regression (LogR), Linear Discriminant Analysis (LDA), Support Vector Machine (SVM). Performance is measured based on its accuracy, precision, recall and f measure. The experimental results reveal that by addressing multimodal features with proposed model Multivariate Gaussian Distribution classifier, the overall performance is better than the other classifiers."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-09-09"; dct:isPartOf ; dct:subject , ; dct:title "Robust Device Authentication Using Non-Standard Classification Features"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "TA1637 Image processing"@en . dct:title "International Conference for Internet Technology and Secured Transactions"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "London, UK"^^xsd:string . foaf:familyName "Khanna"^^xsd:string; foaf:givenName "Pooja"^^xsd:string; foaf:name "Pooja Khanna"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yadav"^^xsd:string; foaf:givenName "Supriya"^^xsd:string; foaf:name "Supriya Yadav"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Howells"^^xsd:string; foaf:givenName "Gareth"^^xsd:string; foaf:name "Gareth Howells"^^xsd:string; rdf:type foaf:Person . rdfs:label "article.pdf"^^xsd:string . rdfs:label "article.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #90252 \n\nStandardized Crypto-Loans on the Cardano Blockchain\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Standardized Crypto-Loans on the Cardano Blockchain (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Standardized Crypto-Loans on the Cardano Blockchain (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Standardized Crypto-Loans on the Cardano Blockchain (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Standardized Crypto-Loans on the Cardano Blockchain (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Standardized Crypto-Loans on the Cardano Blockchain (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Standardized Crypto-Loans on the Cardano Blockchain (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Crypto-loans are innovative financial instruments that allow trustless peer-to-peer lending, and potentially providing a safe and convenient source of liquidity for cryptocurrency holders. In this paper we explore a smart contract framework for building standardised crypto-loans using the Marlowe domain-specific language and the ACTUS standard for financial contracts."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "12676"; dc:hasVersion ; dct:creator , , , ; dct:date "2021-09-07"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Standardized Crypto-Loans on the Cardano Blockchain"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Seijas"^^xsd:string; foaf:givenName "Pablo Lamela"^^xsd:string; foaf:name "Pablo Lamela Seijas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kondratiuk"^^xsd:string; foaf:givenName "Dmytro"^^xsd:string; foaf:name "Dmytro Kondratiuk"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nemish"^^xsd:string; foaf:givenName "Alexander"^^xsd:string; foaf:name "Alexander Nemish"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Thompson"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Thompson"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "FC 2021: Financial Cryptography and Data Security. FC 2021 International Workshops"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "30LamPham_thesis_final_submit.pdf"^^xsd:string . rdfs:label "30LamPham_thesis_final_submit.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #90835 \n\nRobust Deep Learning Frameworks for Acoustic Scene and Respiratory Sound Classification\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Robust Deep Learning Frameworks for Acoustic Scene and Respiratory Sound Classification (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Robust Deep Learning Frameworks for Acoustic Scene and Respiratory Sound Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust Deep Learning Frameworks for Acoustic Scene and Respiratory Sound Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust Deep Learning Frameworks for Acoustic Scene and Respiratory Sound Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust Deep Learning Frameworks for Acoustic Scene and Respiratory Sound Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust Deep Learning Frameworks for Acoustic Scene and Respiratory Sound Classification (Other)"^^xsd:string . rdf:_1 . ; bibo:abstract "Although research on Acoustic Scene Classification (ASC) is very close to, or even overshadowed by different popular research areas known as Automatic Speech Recognition (ASR), Speaker Recognition (SR) or Image Processing (IP), this field potentially opens up several distinct and meaningful application areas based on environment context detection. The challenges of ASC mainly come from different noise resources, various sounds in real-world environments, occurring as single sounds, continuous sounds or overlapping sounds. In comparison to speech, sound scenes are more challenging mainly due to their being unstructured in form and closely similar to noise in certain contexts. Although a wide range of publications have focused on ASC recently, they show task-specific ways that either explore certain aspects of an ASC system or are evaluated on limited acoustic scene datasets. Therefore, the aim of this thesis is to contribute to the development of a robust framework to be applied for ASC, evaluated on various recently published datasets, and to achieve competitive performance compared to the state-of-the-art systems. To do this, a baseline model is firstly introduced. Next, extensive experiments on the baseline are conducted to identify key factors affecting final classification accuracy. From the comprehensive analysis, a robust deep learning framework, namely the Encoder-Decoder structure, is proposed to address three main factors that directly affect an ASC system. These factors comprise low-level input features, high-level feature extraction methodologies, and architectures for final classification. Within the proposed framework, three spectrogram transformations, namely Constant Q Transform (CQT), gammatone filter (Gamma), and log-mel, are used to convert recorded audio signals into spectrogram representations that resemble two-dimensional images. These three spectrograms used are referred to as low-level input features. To extract high-level features from spectrograms, a novel Encoder architecture, based on Convolutional Neural Networks, is proposed. In terms of the Decoder, also referred as to the final classifier, various models such as Random Forest Classifier, Deep Neural Network and Mixture of Experts, are evaluated and structured to obtain the best performance. To further improve an ASC system's performance, a scheme of two-level hierarchical classification, replacing the role of Decoder classification recently mentioned, is proposed. This scheme is useful to transform an ASC task over all categories into multiple ASC sub-tasks, each spanning fewer categories, in a divide-and- conquer strategy. At the highest level of the proposed scheme, meta-categories of acoustic scene sounds showing similar characteristics are classified. Next, categories within each meta-category are classified at the second level. Furthermore, an analysis of loss functions applied to different classifiers is conducted. This analysis indicates that a combination of entropy loss and triplet loss is useful to enhance performance, especially with tasks that comprise fewer categories. Further exploring ASC in terms of potential application to the health services, this thesis also explores the 2017 Internal Conference on Biomedical Health Informatics (ICBHI) benchmark dataset of lung sounds. A deep-learning frame- work, based on our novel ASC approaches, is proposed to classify anomaly cycles and predict respiratory diseases. The results obtained from these experiments show exceptional performance. This highlights the potential applications of using advanced ASC frameworks for early detection of auditory signals. In this case, signs of respiratory diseases, which could potentially be highly useful in future in directing treatment and preventing their spread."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2021-09"; dct:isPartOf ; dct:issuer , ; dct:subject ; dct:title "Robust Deep Learning Frameworks for Acoustic Scene and Respiratory Sound Classification"^^xsd:string; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Pham"^^xsd:string; foaf:givenName "Lam Dang"^^xsd:string; foaf:name "Lam Dang Pham"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ramaswamy"^^xsd:string; foaf:givenName "Palaniappan"^^xsd:string; foaf:name "Palaniappan Ramaswamy"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #92301 \n\nInvestigating the Impact of Ransomware Splash Screens\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Investigating the Impact of Ransomware Splash Screens (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Impact of Ransomware Splash Screens (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Impact of Ransomware Splash Screens (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Impact of Ransomware Splash Screens (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Impact of Ransomware Splash Screens (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Impact of Ransomware Splash Screens (Other)"^^xsd:string . rdf:type bibo:Document, ep:Document; rdfs:label "Investigating the Impact of Ransomware Splash Screens (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Impact of Ransomware Splash Screens (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Impact of Ransomware Splash Screens (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Impact of Ransomware Splash Screens (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Impact of Ransomware Splash Screens (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Impact of Ransomware Splash Screens (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Ransomware is a type of malicious software that locks out its victim from accessing functionality or data on their device, typically by encrypting files. To regain access, victims would typically need to make a ransom payment. Victims get notified that their device has been infected through a ransom note (splash screen) displayed on their device. Ransomware splash screens can be presented in many ways; the most common ones are via a text file or a graphical user interface (GUI). Splash screens may also include additional features, such as a countdown timer, as part of the ransomware operator's ploy to encourage their victims to pay. The main aim of this study was to gain valuable insights into how ransomware splash screens might affect victims' responses. Moreover, the study also investigated whether exposure to different splash screens would encourage participants to adopt good security behaviours. A controlled experiment was conducted by randomly assigning 538 participants into one of the three ransomware infection scenarios based on the splash screen type (Text-based, GUI or GUI + Timer). After watching a demonstration of a ransomware scenario, each participant was asked to complete a survey regarding their post-infection behaviour and their cybersecurity habits. The study concluded that ransomware's user interface elements do not have a notable effect on how victims would react, in terms of their willingness to pay or their reporting rates. Additionally findings included that, even though 60% of the participants would like to report a ransomware incident, they were not sure how to do this. This illustrates the lack of public awareness about cybercrime reporting. Lack of trust was the main reason why participants did not want to click on links offering cybersecurity advice after the exposure. This shows that more effective methods for encouraging cybersecurity behaviour are still needed."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "61"; dc:hasVersion , ; dct:creator , , , ; dct:date "2021-09"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Investigating the Impact of Ransomware Splash Screens"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Arief"^^xsd:string; foaf:givenName "Budi"^^xsd:string; foaf:name "Budi Arief"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio C."^^xsd:string; foaf:name "Julio C. Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cetin"^^xsd:string; foaf:givenName "Orcun"^^xsd:string; foaf:name "Orcun Cetin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yilmaz"^^xsd:string; foaf:givenName "Yagiz"^^xsd:string; foaf:name "Yagiz Yilmaz"^^xsd:string; rdf:type foaf:Person . bibo:issn "22142126"; foaf:name "Journal of Information Security and Applications"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "PLoSONE2022.pdf"^^xsd:string . rdfs:label "PLoSONE2022.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #89955 \n\nPrivacy nudges for disclosure of personal information: A systematic literature review and meta-analysis\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Objective\r\nDigital nudging has been mooted as a tool to alter user privacy behavior. However, empirical studies on digital nudging have yielded divergent results: while some studies found nudging to be highly effective, other studies found no such effects. Furthermore, previous studies employed a wide range of digital nudges, making it difficult to discern the effectiveness of digital nudging. To address these issues, we performed a systematic review of empirical studies on digital nudging and information disclosure as a specific privacy behavior.\r\n\r\nMethod\r\nThe search was conducted in five digital libraries and databases: Scopus, Google Scholar, ACM Digital Library, Web of Science, and Science Direct for peer-reviewed papers published in English after 2006, examining the effects of various nudging strategies on disclosure of personal information online.\r\n\r\nResults\r\nThe review unveiled 78 papers that employed four categories of nudge interventions: presentation, information, defaults, and incentives, either individually or in combination. A meta-analysis on a subset of papers with available data (n = 54) revealed a significant small-to-medium sized effect of the nudge interventions on disclosure (Hedges’ g = 0.32). There was significant variation in the effectiveness of nudging (I2 = 89%), which was partially accounted for by interventions to increase disclosure being more effective than interventions to reduce disclosure. No evidence was found for differences in the effectiveness of nudging with presentation, information, defaults, and incentives interventions.\r\n\r\nConclusion\r\nIdentifying ways to nudge users into making more informed and desirable privacy decisions is of significant practical and policy value. There is a growing interest in digital privacy nudges for disclosure of personal information, with most empirical papers focusing on nudging with presentation. Further research is needed to elucidate the relative effectiveness of different intervention strategies and how nudges can confound one another."^^xsd:string; bibo:authorList ; bibo:issue "8"; bibo:status , ; bibo:volume "16"; dc:hasVersion ; dct:creator , , , , ; dct:date "2021-08-27"; dct:isPartOf , ; dct:publisher ; dct:subject , , , , , ; dct:title "Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "HF5548.32 E-commerce"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.875.I57 Internet"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.888 World Wide Web"@en . foaf:name "Public Library of Science"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ioannou"^^xsd:string; foaf:givenName "Athina"^^xsd:string; foaf:name "Athina Ioannou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Miller"^^xsd:string; foaf:givenName "Graham"^^xsd:string; foaf:name "Graham Miller"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tussyadiah"^^xsd:string; foaf:givenName "Iis"^^xsd:string; foaf:name "Iis Tussyadiah"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Weick"^^xsd:string; foaf:givenName "Mario"^^xsd:string; foaf:name "Mario Weick"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . bibo:issn "19326203"; foaf:name "PLoS ONE"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "3465481.3470038.pdf"^^xsd:string . rdfs:label "3465481.3470038.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #88746 \n\nPractitioners' Views on Cybersecurity Control Adoption and Effectiveness\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Cybersecurity practitioners working in organisations implement risk controls aiming to improve the security of their systems. Determining prioritisation of the deployment of controls and understanding their likely impact on overall cybersecurity posture is challenging, yet without this understanding there is a risk of implementing inefficient or even harmful security practices. There is a critical need to comprehend the value of controls in reducing cyberrisk exposure in various organisational contexts, and the factors affecting their usage. Such information is important for research into cybersecurity risk and defences, for supporting cybersecurity decisions within organisations, and for external parties guiding cybersecurity practice such as standards bodies and cyber-insurance companies. Cybersecurity practitioners possess a wealth of field knowledge in this area, yet there has been little academic work collecting and synthesising their views. In an attempt to highlights trends and a range of wider organisational factors that impact on a control's effectiveness and deployment, we conduct a set of interviews exploring practitioners' perceptions. We compare alignment with the recommendations of security standards and requirements of cyberinsurance policies to validate findings. Although still exploratory, we believe this methodology would help in identifying points of improvement in cybersecurity investment, describing specific potential benefits."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion , ; dct:creator , , , , , ; dct:date "2021-08-17"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "Practitioners' Views on Cybersecurity Control Adoption and Effectiveness"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "HF Commerce"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "16th International Conference on Availability, Reliability and Security (ARES)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Online"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Creese"^^xsd:string; foaf:givenName "Sadie"^^xsd:string; foaf:name "Sadie Creese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Axon"^^xsd:string; foaf:givenName "Louise"^^xsd:string; foaf:name "Louise Axon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Janse van Rensburg"^^xsd:string; foaf:givenName "Alastair"^^xsd:string; foaf:name "Alastair Janse van Rensburg"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Erola"^^xsd:string; foaf:givenName "Arnau"^^xsd:string; foaf:name "Arnau Erola"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Goldsmith"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Goldsmith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #89886 \n\nImproving trend reversal estimation in forex markets under a directional changes paradigm with classification algorithms\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Improving trend reversal estimation in forex markets under a directional changes paradigm with classification algorithms (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Improving trend reversal estimation in forex markets under a directional changes paradigm with classification algorithms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improving trend reversal estimation in forex markets under a directional changes paradigm with classification algorithms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improving trend reversal estimation in forex markets under a directional changes paradigm with classification algorithms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improving trend reversal estimation in forex markets under a directional changes paradigm with classification algorithms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improving trend reversal estimation in forex markets under a directional changes paradigm with classification algorithms (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The majority of forecasting methods use a physical time scale for studying price fluctuations of financial markets. Using physical time scales can make companies oblivious to significant activities in the market as the flow of time is discontinuous, which could translate to missed profitable opportunities or risk exposure. Directional changes (DC) has gained attention in the recent years by translating physical time series to event-based series. Under this framework, trend reversals can be predicted by using the length of events. Having this knowledge allows traders to take an action before such reversals happen and thus increase their profitability. In this paper, we investigate how classification algorithms can be incorporated in the process of predicting trend reversals to create DC-based trading strategies. The effect of the proposed trend reversal estimation is measured on 20 foreign exchange markets over a 10-month period in a total of 1000 data sets. We compare our results across 16 algorithms, both DC and non-DC based, such as technical analysis and buy-and-hold. Our findings show that the introduction of classification leads to return higher profit and statistically outperform all other trading strategies."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-08-08"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Improving trend reversal estimation in forex markets under a directional changes paradigm with classification algorithms"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Wiley"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Adegboye"^^xsd:string; foaf:givenName "Adesola"^^xsd:string; foaf:name "Adesola Adegboye"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando E.B."^^xsd:string; foaf:name "Fernando E.B. Otero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kampouridis"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Kampouridis"^^xsd:string; rdf:type foaf:Person . bibo:issn "08848173"; foaf:name "International Journal of Intelligent Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90812 \n\nStatic Output Feedback Control of a Two-wheeled \nInverted Pendulum Using Sliding Mode Technique\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Static Output Feedback Control of a Two-wheeled\r\nInverted Pendulum Using Sliding Mode Technique (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Static Output Feedback Control of a Two-wheeled\r\nInverted Pendulum Using Sliding Mode Technique (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Static Output Feedback Control of a Two-wheeled\r\nInverted Pendulum Using Sliding Mode Technique (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Static Output Feedback Control of a Two-wheeled\r\nInverted Pendulum Using Sliding Mode Technique (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Static Output Feedback Control of a Two-wheeled\r\nInverted Pendulum Using Sliding Mode Technique (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Static Output Feedback Control of a Two-wheeled\r\nInverted Pendulum Using Sliding Mode Technique (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "This paper presents a static output feedback sliding\r\nmode control method to regulate a two-wheeled inverted pendulum\r\nsystem with considerations of matched and unmatched\r\nuncertainties. A sliding surface is designed and the associated\r\nsliding motion stability is analysed based on the reduced-order\r\ndynamics. A static output sliding mode control law is synthesised\r\nto drive the system to the sliding surface and maintain a sliding\r\nmotion afterwards. The nonlinear bounds on the uncertainties\r\nare employed in the stability analysis and control design to\r\nimprove the robustness. The simulation results demonstrate the\r\neffectiveness of the proposed control."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2021-08-05"; dct:isPartOf ; dct:subject ; dct:title "Static Output Feedback Control of a Two-wheeled\r\nInverted Pendulum Using Sliding Mode Technique"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Control engineering"@en . dct:title "International Conference on Robotics and Control Systems"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Montreal, Canada"^^xsd:string . foaf:familyName "Sirlantzis"^^xsd:string; foaf:givenName "Konstantinos"^^xsd:string; foaf:name "Konstantinos Sirlantzis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Howells"^^xsd:string; foaf:givenName "Gareth"^^xsd:string; foaf:name "Gareth Howells"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yan"^^xsd:string; foaf:givenName "Xinggang"^^xsd:string; foaf:name "Xinggang Yan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yang"^^xsd:string; foaf:givenName "Yankun"^^xsd:string; foaf:name "Yankun Yang"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90184 \n\nMultilayer Ensemble Evolving Fuzzy Inference System\n\n"; foaf:primaryTopic . rdf:_1 . bibo:abstract "In order to tackle high dimensional, complex problems, learning models have to go deeper. In this article, a novel multilayer ensemble learning model with first-order evolving fuzzy systems as its building blocks is introduced. The proposed approach can effectively learn from streaming data on a sample-by-sample basis and self-organizes its multilayered system structure and meta-parameters in a feedforward, noniterative manner. Benefiting from its multilayered distributed representation learning ability, the ensemble system not only demonstrates the state-of-the-art performance on various problems, but also offers high level of system transparency and explainability. Theoretical justifications and experimental investigation show the validity and effectiveness of the proposed concept and general principles."^^xsd:string; bibo:authorList ; bibo:issue "8"; bibo:status , ; bibo:volume "29"; dct:creator ; dct:date "2021-08-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Multilayer Ensemble Evolving Fuzzy Inference System"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "10636706"; foaf:name "IEEE Transactions on Fuzzy Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90394 \n\nA multi-granularity locally optimal prototype-based approach for classification\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "Prototype-based approaches generally provide better explainability and are widely used for classification. However, the majority of them suffer from system obesity and lack transparency on complex problems. In this paper, a novel classification approach with a multi-layered system structure self-organized from data is proposed. This approach is able to identify local peaks of multi-modal density derived from static data and filter out more representative ones at multiple levels of granularity acting as prototypes. These prototypes are then optimized to their locally optimal positions in the data space and arranged in layers with meaningful dense links in-between to form pyramidal hierarchies based on the respective levels of granularity accordingly. After being primed offline, the constructed classification model is capable of self-developing continuously from streaming data to self-expend its knowledge base. The proposed approach offers higher transparency and is convenient for visualization thanks to the hierarchical nested architecture. Its system identification process is objective, data-driven and free from prior assumptions on data generation model with user- and problem- specific parameters. Its decision-making process follows the “nearest prototype” principle, and is highly explainable and traceable. Numerical examples on a wide range of benchmark problems demonstrate its high performance."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "569"; dct:creator , ; dct:date "2021-08-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A multi-granularity locally optimal prototype-based approach for classification"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Li"^^xsd:string; foaf:givenName "Miqing"^^xsd:string; foaf:name "Miqing Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "00200255"; foaf:name "Information Sciences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "PUBLISHED.pdf"^^xsd:string . rdfs:label "PUBLISHED.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #89480 \n\nValidating Formal Semantics by Property-Based Cross-Testing\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Validating Formal Semantics by Property-Based Cross-Testing (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Validating Formal Semantics by Property-Based Cross-Testing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Validating Formal Semantics by Property-Based Cross-Testing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Validating Formal Semantics by Property-Based Cross-Testing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Validating Formal Semantics by Property-Based Cross-Testing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Validating Formal Semantics by Property-Based Cross-Testing (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "To describe the behaviour of programs in a programming language we can define a formal semantics for the language, and formalise it in a proof assistant. From this semantics we can derive the behaviour of each particular program in the language. But there remains the question of validating the formal semantics: have we got the formalisation right?\r\n\r\nOur approach is to use property-based cross-testing of formal semantics, which is based on the combination of a number of existing approaches to validation. In particular, we give a concrete implementation of our ideas for a set of formalisations of Erlang and Core Erlang. We describe the adjustments that need to be made to execute these seman- tics, then we present and evaluate property-based testing in the context of cross-checking semantics, including random program generation and counterexample shrinking."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2021-07-27"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Validating Formal Semantics by Property-Based Cross-Testing"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "32nd Symposium on Implementation and Application of Functional Languages (IFL ’20)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Canterbury, UK"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bereczky"^^xsd:string; foaf:givenName "Péter"^^xsd:string; foaf:name "Péter Bereczky"^^xsd:string; rdf:type foaf:Person . foaf:familyName "K?szegi"^^xsd:string; foaf:givenName "Judit"^^xsd:string; foaf:name "Judit K?szegi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Szeier"^^xsd:string; foaf:givenName "Soma"^^xsd:string; foaf:name "Soma Szeier"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Horpácsi"^^xsd:string; foaf:givenName "Dániel"^^xsd:string; foaf:name "Dániel Horpácsi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Thompson"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Thompson"^^xsd:string; rdf:type foaf:Person . rdfs:label "CUI-2021-FinBot-Nurse.pdf"^^xsd:string . rdfs:label "CUI-2021-FinBot-Nurse.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #88386 \n\nStockBabble: A Conversational Financial Agent to support Stock Market Investors\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "StockBabble: A Conversational Financial Agent to support Stock Market Investors (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "StockBabble: A Conversational Financial Agent to support Stock Market Investors (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "StockBabble: A Conversational Financial Agent to support Stock Market Investors (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "StockBabble: A Conversational Financial Agent to support Stock Market Investors (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "StockBabble: A Conversational Financial Agent to support Stock Market Investors (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "StockBabble: A Conversational Financial Agent to support Stock Market Investors (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "We introduce StockBabble, a conversational financial agent designed to support understanding and engagement with the stock market. StockBabble's value and novelty is in its ability to empower retail investors -- many of which may be new to investing -- and supplement their informational needs using a user-friendly agent. Users have the ability to query information on companies to retrieve a general and financial overview of a stock, including accessing the latest news and trading recommendations. They can also request charts which contain live prices and technical investment indicators, and add shares to a personal portfolio to allow performance monitoring over time. To evaluate our agent's potential, we conducted a user study with 15 participants. In total, 73% (11/15) of respondents said that they felt more confident in investing after using StockBabble, and all 15 would consider recommending it to others. These results are encouraging and suggest a wider appeal for such agents. Moreover, we believe this research can help to inform the design and development of future intelligent, financial personal assistants."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-07-27"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "StockBabble: A Conversational Financial Agent to support Stock Market Investors"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "3rd ACM Conference on Conversational User Interfaces (CUI 2021)"^^xsd:string; rdf:type bibo:Conference . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Sharma"^^xsd:string; foaf:givenName "Suraj"^^xsd:string; foaf:name "Suraj Sharma"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Brennan"^^xsd:string; foaf:givenName "Joseph"^^xsd:string; foaf:name "Joseph Brennan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #91357 \n\nSpecial Issue on “Natural Language Processing: Emerging Neural Approaches and Applications”\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:authorList ; bibo:issue "15"; bibo:status , ; bibo:volume "11"; dct:creator , , , ; dct:date "2021-07-22"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Special Issue on “Natural Language Processing: Emerging Neural Approaches and Applications”"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Multidisciplinary Digital Publishing Institute"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Minutolo"^^xsd:string; foaf:givenName "Aniello"^^xsd:string; foaf:name "Aniello Minutolo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pota"^^xsd:string; foaf:givenName "Marco"^^xsd:string; foaf:name "Marco Pota"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Esposito"^^xsd:string; foaf:givenName "Massimo"^^xsd:string; foaf:name "Massimo Esposito"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Masala"^^xsd:string; foaf:givenName "Giovanni Luca"^^xsd:string; foaf:name "Giovanni Luca Masala"^^xsd:string; rdf:type foaf:Person . bibo:issn "20763417"; foaf:name "Applied Sciences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #88354 \n\nWireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (PDF)"^^xsd:string . rdf:type bibo:Document, ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (Other)"^^xsd:string . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 ; rdf:_11 . bibo:abstract "Motor imagery offers an excellent opportunity as a stimulus-free paradigm for brain-machine interfaces. Conventional electroencephalography (EEG) for motor imagery requires a hair cap with multiple wired electrodes and messy gels, causing motion artifacts. Here, we introduce a wireless scalp electronic system with virtual reality for real-time, continuous classification of motor imagery brain signals. This low-profile, portable system integrates imperceptible microneedle electrodes and soft wireless circuits. Virtual reality addresses subject variance in detectable EEG response to motor imagery by providing clear, consistent visuals and instant biofeedback. The wearable soft system offers advantageous contact surface area and reduced electrode impedance density, resulting in significantly enhanced EEG signals and classification accuracy. The combination with convolutional neural network-machine learning provides a real-time, continuous motor imagery-based brain-machine interface. With four human subjects, the scalp electronic system offers a high classification accuracy (93.22±1.33% for four classes), allowing wireless, real-time control of a virtual reality game."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion , ; dct:creator , , , , , , , , , , ; dct:date "2021-07-17"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Wireless Soft Scalp Electronics and Virtual Reality System for Motor Imagery-based Brain-Machine Interfaces"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , , , , , , , ; ep:hasPublished ; ep:hasSupplemental ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . foaf:name "Wiley"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Jun Yu"^^xsd:string; foaf:givenName "Ki"^^xsd:string; foaf:name "Ki Jun Yu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jang"^^xsd:string; foaf:givenName "Young C"^^xsd:string; foaf:name "Young C Jang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Siriaraya"^^xsd:string; foaf:givenName "Panote"^^xsd:string; foaf:name "Panote Siriaraya"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kim"^^xsd:string; foaf:givenName "Yun-Soung"^^xsd:string; foaf:name "Yun-Soung Kim"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Boris"^^xsd:string; foaf:givenName "Otkhmezuri,"^^xsd:string; foaf:name "Otkhmezuri, Boris"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kwon"^^xsd:string; foaf:givenName "Shinjae"^^xsd:string; foaf:name "Shinjae Kwon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Choi"^^xsd:string; foaf:givenName "Jeongmoon"^^xsd:string; foaf:name "Jeongmoon Choi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kang"^^xsd:string; foaf:givenName "Kyowon"^^xsd:string; foaf:name "Kyowon Kang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ang"^^xsd:string; foaf:givenName "Chee Siang"^^xsd:string; foaf:name "Chee Siang Ang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yeo"^^xsd:string; foaf:givenName "Woon-Hong"^^xsd:string; foaf:name "Woon-Hong Yeo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mahmood"^^xsd:string; foaf:givenName "Musa"^^xsd:string; foaf:name "Musa Mahmood"^^xsd:string; rdf:type foaf:Person . bibo:issn "21983844"; foaf:name "Advanced Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Anonymous_v2.pdf"^^xsd:string . rdfs:label "Anonymous_v2.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #89408 \n\nOut of the Shadows: Analyzing Anonymous’ Twitter Resurgence during the 2020 Black Lives Matter Protests\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Out of the Shadows: Analyzing Anonymous’ Twitter Resurgence during the 2020 Black Lives Matter Protests (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Out of the Shadows: Analyzing Anonymous’ Twitter Resurgence during the 2020 Black Lives Matter Protests (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Out of the Shadows: Analyzing Anonymous’ Twitter Resurgence during the 2020 Black Lives Matter Protests (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Out of the Shadows: Analyzing Anonymous’ Twitter Resurgence during the 2020 Black Lives Matter Protests (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Out of the Shadows: Analyzing Anonymous’ Twitter Resurgence during the 2020 Black Lives Matter Protests (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Out of the Shadows: Analyzing Anonymous’ Twitter Resurgence during the 2020 Black Lives Matter Protests (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Recently, there had been little notable activity from the once prominent hacktivist group, Anonymous. The group, responsible for activist-based cyber attacks on major businesses and governments, appeared to have fragmented after key members were arrested in 2013. In response to the major Black Lives Matter (BLM) protests that occurred after the killing of George Floyd, however, reports indicated that the group was back. To examine this apparent resurgence, we conduct a large-scale study of Anonymous affiliates on Twitter. To this end, we first use machine learning to identify a significant network of more than 33,000 Anonymous accounts. Through topic modelling of tweets collected from these accounts, we find evidence of sustained interest in topics related to BLM. We then use sentiment analysis on tweets focused on these topics, finding evidence of a united approach amongst the group, with positive tweets typically being used to express support towards BLM, and negative tweets typically being used to criticize police actions. Finally, we examine the presence of automation in the network, identifying indications of bot-like behavior across the majority of Anonymous accounts. These findings show that whilst the group has seen a resurgence during the protests, bot activity may be responsible for exaggerating the extent of this resurgence."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-07-15"; dct:isPartOf ; dct:publisher ; dct:subject , , , , , ; dct:title "Out of the Shadows: Analyzing Anonymous’ Twitter Resurgence during the 2020 Black Lives Matter Protests"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "HM Sociology"@en . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "16th International AAAI Conference on Web and Social Media (ICWSM-22)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Atlanta, USA"^^xsd:string . foaf:name "AAAI"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jones"^^xsd:string; foaf:givenName "Keenan"^^xsd:string; foaf:name "Keenan Jones"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . rdfs:label "2021-Profiling_Cyber_Criminal.pdf"^^xsd:string . rdfs:label "2021-Profiling_Cyber_Criminal.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #87945 \n\nProfiling the Cybercriminal: A Systematic Review of Research\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Profiling the Cybercriminal: A Systematic Review of Research (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Profiling the Cybercriminal: A Systematic Review of Research (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Profiling the Cybercriminal: A Systematic Review of Research (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Profiling the Cybercriminal: A Systematic Review of Research (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Profiling the Cybercriminal: A Systematic Review of Research (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Profiling the Cybercriminal: A Systematic Review of Research (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "As cybercrime becomes one of the most significant threats facing society today, it is of utmost importance to better understand the perpetrators behind such attacks. In this article, we seek to advance research and practitioner understanding of the cybercriminal (cyber-offender) profiling domain by conducting a rigorous systematic review. This work investigates the aforementioned domain to answer the question: what is the state-of-the-art in the academic field of understanding, characterising and profiling cybercriminals. Through the application of the PRISMA systematic literature review technique, we identify 39 works from the last 14 years (2006-2020). Our findings demonstrate that overall, there is lack of a common definition of profiling for cyber-offenders. The review found that one of the primary types of cybercriminals that studies have focused on is hackers and the majority of papers used the deductive approach as a preferred one. This article produces an up-to-date characterisation of the field and also defines open issues deserving of further attention such as the role of security professionals and law enforcement in supporting such research, as well as factors including personality traits which must be further researched whilst exploring online criminal behaviour. By understanding online offenders and their pathways towards malevolent behaviours, we can better identify steps that need to be taken to prevent such criminal activities."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2021-07-13"; dct:isPartOf ; dct:publisher ; dct:subject , , , ; dct:title "Profiling the Cybercriminal: A Systematic Review of Research"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "K Law"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "IEEE Cyber Science 2021 Conference"^^xsd:string; rdf:type bibo:Conference . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bada"^^xsd:string; foaf:givenName "Maria"^^xsd:string; foaf:name "Maria Bada"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . rdfs:label "HAISA-2021-Gamification-Nurse.pdf"^^xsd:string . rdfs:label "HAISA-2021-Gamification-Nurse.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #88345 \n\nSherLOCKED: A Detective-Themed Serious Game for Cyber Security Education\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Gamification and Serious Games are progressively being used over a host of fields, particularly to support education. Such games provide a new way to engage students with content and can complement more traditional approaches to learning. This article proposes SherLOCKED, a new serious game created in the style of a 2D top-down puzzle adventure. The game is situated in the context of an undergraduate cyber security course, and is used to consolidate students' knowledge of foundational security concepts (e.g. the CIA triad, security threats and attacks and risk management). SherLOCKED was built based on a review of existing serious games and a study of common gamification principles. It was subsequently implemented within an undergraduate course, and evaluated with 112 students. We found the game to be an effective, attractive and fun solution for allowing further engagement with content that students were introduced to during lectures. This research lends additional evidence to the use of serious games in supporting learning about cyber security."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "613"; dc:hasVersion ; dct:creator , , ; dct:date "2021-07-08"; dct:isPartOf , ; dct:publisher ; dct:subject , , , ; dct:title "SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "L Education"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology (General)"@en . dct:title "International Symposium on Human Aspects of Information Security and Assurance"^^xsd:string; rdf:type bibo:Conference . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Finn"^^xsd:string; foaf:givenName "Conor"^^xsd:string; foaf:name "Conor Finn"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jaffray"^^xsd:string; foaf:givenName "Alice"^^xsd:string; foaf:name "Alice Jaffray"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "18684238"; foaf:name "IFIP Advances in Information and Communication Technology"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "HAISA_2021_Website_review.pdf"^^xsd:string . rdfs:label "HAISA_2021_Website_review.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #88357 \n\nWhen Googling it doesn’t work: The challenge of finding security advice for smart home devices\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "When Googling it doesn’t work: The challenge of finding security advice for smart home devices (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "When Googling it doesn’t work: The challenge of finding security advice for smart home devices (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "When Googling it doesn’t work: The challenge of finding security advice for smart home devices (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "When Googling it doesn’t work: The challenge of finding security advice for smart home devices (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "When Googling it doesn’t work: The challenge of finding security advice for smart home devices (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "When Googling it doesn’t work: The challenge of finding security advice for smart home devices (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "As users increasingly introduce Internet-connected devices into their homes, having access to accurate and relevant cyber security information is a fundamental means of ensuring safe use. Given the paucity of information provided with many devices at the time of purchase, this paper engages in a critical study of the type of advice that home Internet of Things (IoT) or smart device users might be presented with on the Internet to inform their cyber security practices. We base our research on an analysis of 427 web pages from 234 organisations that present information on security threats and relevant cyber security advice. The results show that users searching online for information are subject to an enormous range of advice and news from various sources with differing levels of credibility and relevance. With no clear explanation of how a user may assess the threats as they are pertinent to them, it becomes difficult to understand which pieces of advice would be the most effective in their situation. Recommendations are made to improve the clarity, consistency and availability of guidance from recognised sourcesto improve user access and understanding."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "613"; dc:hasVersion ; dct:creator , , ; dct:date "2021-07-08"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "When Googling it doesn’t work: The challenge of finding security advice for smart home devices"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences (General)"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology (General)"@en . dct:title "15th International Symposium on Human Aspects of Information Security & Assurance (HAISA)"^^xsd:string; rdf:type bibo:Conference . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Turner"^^xsd:string; foaf:givenName "Sarah"^^xsd:string; foaf:name "Sarah Turner"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90405 \n\nFramework to Create Cloud-Free Remote Sensing Data Using Passenger Aircraft as the Platform\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 . bibo:abstract "Cloud removal in optical remote sensing imagery is essential for many Earth observation applications. To recover the cloud obscured information, some preconditions must be satisfied. For example, the cloud must be semitransparent or relationships between contaminated and cloud-free pixels must be assumed. Due to the inherent imaging geometry features in satellite remote sensing, it is impossible to observe the ground under the clouds directly; therefore, cloud removal algorithms are always not perfect owing to the loss of ground truth. Recently, the use of passenger aircraft as a platform for remote sensing has been proposed by some researchers and institutes, including Airbus and the Japan Aerospace Exploration Agency. Passenger aircraft have the advantages of short visitation frequency and low cost. Additionally, because passenger aircraft fly at lower altitudes compared to satellites, they can observe the ground under the clouds at an oblique viewing angle. In this study, we examine the possibility of creating cloud-free remote sensing data by stacking multiangle images captured by passenger aircraft. To accomplish this, a processing framework is proposed, which includes four main steps: first, multiangle image acquisition from passenger aircraft, second, cloud detection based on deep learning semantic segmentation models, third, cloud removal by image stacking, and fourth, image quality enhancement via haze removal. This method is intended to remove cloud contamination without the requirements of reference images and predetermination of cloud types. The proposed method was tested in multiple case studies, wherein the resultant cloud- and haze-free orthophotos were visualized and quantitatively analyzed in various land cover type scenes. The results of the case studies demonstrated that the proposed method could generate high quality, cloud-free orthophotos. Therefore, we conclude that this framework has great potential for creating cloud-free remote sensing images when the cloud removal of satellite imagery is difficult or inaccurate."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "14"; dct:creator , , , , , , , , , ; dct:date "2021-07-07"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Framework to Create Cloud-Free Remote Sensing Data Using Passenger Aircraft as the Platform"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Chisheng"^^xsd:string; foaf:name "Chisheng Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Yongquan"^^xsd:string; foaf:name "Yongquan Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Shuying"^^xsd:string; foaf:name "Shuying Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tang"^^xsd:string; foaf:givenName "Qiandi"^^xsd:string; foaf:name "Qiandi Tang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sebela"^^xsd:string; foaf:givenName "Monja B."^^xsd:string; foaf:name "Monja B. Sebela"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cui"^^xsd:string; foaf:givenName "Hongxing"^^xsd:string; foaf:name "Hongxing Cui"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fang"^^xsd:string; foaf:givenName "Xu"^^xsd:string; foaf:name "Xu Fang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhang"^^xsd:string; foaf:givenName "Ce"^^xsd:string; foaf:name "Ce Zhang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hu"^^xsd:string; foaf:givenName "Zhongwen"^^xsd:string; foaf:name "Zhongwen Hu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "19391404"; foaf:name "IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #89070 \n\nA data science approach for early-stage prediction of patient’s susceptibility to acute side effects of advanced radiotherapy\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "A data science approach for early-stage prediction of patient’s susceptibility to acute side effects of advanced radiotherapy (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A data science approach for early-stage prediction of patient’s susceptibility to acute side effects of advanced radiotherapy (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A data science approach for early-stage prediction of patient’s susceptibility to acute side effects of advanced radiotherapy (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A data science approach for early-stage prediction of patient’s susceptibility to acute side effects of advanced radiotherapy (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A data science approach for early-stage prediction of patient’s susceptibility to acute side effects of advanced radiotherapy (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A data science approach for early-stage prediction of patient’s susceptibility to acute side effects of advanced radiotherapy (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 ; rdf:_11 ; rdf:_12 ; rdf:_13 ; rdf:_14 ; rdf:_15 ; rdf:_16 ; rdf:_17 ; rdf:_18 ; rdf:_19 ; rdf:_20 ; rdf:_21 ; rdf:_22 ; rdf:_23 ; rdf:_24 ; rdf:_25 ; rdf:_26 ; rdf:_27 . bibo:abstract "The prediction by classification of side effects incidence in a given medical treatment is a common challenge in medical research. Machine Learning (ML) methods are widely used in the areas of risk prediction and classification. The primary objective of such algorithms is to use several features to predict dichotomous responses (e.g., disease positive/negative). Similar to statistical inference modelling, ML modelling is subject to the class imbalance problem and is affected by the majority class, increasing the false-negative rate. In this study, seventynine ML models were built and evaluated to classify approximately 2000 participants from 26 hospitals in eight different countries into two groups of radiotherapy (RT) side effects incidence based on recorded observations\r\nfrom the international study of RT related toxicity “REQUITE”. We also examined the effect of sampling techniques and cost-sensitive learning methods on the models when dealing with class imbalance. The combinations of such techniques used had a significant impact on the classification. They resulted in an improvement in incidence status prediction by shifting classifiers’ attention to the minority group. The best classification model for RT acute toxicity prediction was identified based on domain experts' success criteria. The Area Under Receiver Operator Characteristic curve of the models tested with an isolated dataset ranged between 0.50 and 0.77. The scale of improved results is promising and will guide further development of models to predict RT acute toxicities. One model was optimised and found to be beneficial to identify patients who are at risk of developing acute RT early-stage toxicities as a result of undergoing breast RT ensuring relevant treatment interventions can be appropriately targeted. The design of the approach presented in this paper resulted in\r\nproducing a preclinical-valid prediction model. The study was developed by a multi-disciplinary collaboration of data scientists, medical physicists, oncologists and surgeons in the UK Radiotherapy Machine Learning Network."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , , , , , , , , , , , , , , , , , , , , , , ; dct:date "2021-07-05"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A data science approach for early-stage prediction of patient’s susceptibility to acute side effects of advanced radiotherapy"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "REQUITE Consortium"^^xsd:string; rdf:type foaf:Organization . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Stobart"^^xsd:string; foaf:givenName "Hilary"^^xsd:string; foaf:name "Hilary Stobart"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Vega"^^xsd:string; foaf:givenName "Ana"^^xsd:string; foaf:name "Ana Vega"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Symonds"^^xsd:string; foaf:givenName "R Paul"^^xsd:string; foaf:name "R Paul Symonds"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gutiérrez-Enríquez"^^xsd:string; foaf:givenName "Sara"^^xsd:string; foaf:name "Sara Gutiérrez-Enríquez"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Samuel"^^xsd:string; foaf:givenName "Robert"^^xsd:string; foaf:name "Robert Samuel"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Ruysscher"^^xsd:string; foaf:givenName "Dirk"^^xsd:string; foaf:name "Dirk De Ruysscher"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Oliveira"^^xsd:string; foaf:givenName "Jorge"^^xsd:string; foaf:name "Jorge Oliveira"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lyon"^^xsd:string; foaf:givenName "Robert"^^xsd:string; foaf:name "Robert Lyon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Shelley"^^xsd:string; foaf:givenName "Leila E.A."^^xsd:string; foaf:name "Leila E.A. Shelley"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ingram"^^xsd:string; foaf:givenName "Samuel"^^xsd:string; foaf:name "Samuel Ingram"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Azria"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Azria"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rosenstein"^^xsd:string; foaf:givenName "Barry S."^^xsd:string; foaf:name "Barry S. Rosenstein"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Aldraimli"^^xsd:string; foaf:givenName "Mahmoud"^^xsd:string; foaf:name "Mahmoud Aldraimli"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grishchuck"^^xsd:string; foaf:givenName "Diana"^^xsd:string; foaf:name "Diana Grishchuck"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Talbot"^^xsd:string; foaf:givenName "Christopher J."^^xsd:string; foaf:name "Christopher J. Talbot"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chaussalet"^^xsd:string; foaf:givenName "Thierry J."^^xsd:string; foaf:name "Thierry J. Chaussalet"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Veldeman"^^xsd:string; foaf:givenName "Liv"^^xsd:string; foaf:name "Liv Veldeman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "West"^^xsd:string; foaf:givenName "Catharine M."^^xsd:string; foaf:name "Catharine M. West"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Osman"^^xsd:string; foaf:givenName "Sarah"^^xsd:string; foaf:name "Sarah Osman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rattay"^^xsd:string; foaf:givenName "Tim"^^xsd:string; foaf:name "Tim Rattay"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dwek"^^xsd:string; foaf:givenName "Miriam V."^^xsd:string; foaf:name "Miriam V. Dwek"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Soria"^^xsd:string; foaf:givenName "Daniele"^^xsd:string; foaf:name "Daniele Soria"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chang-Claude"^^xsd:string; foaf:givenName "Jenny"^^xsd:string; foaf:name "Jenny Chang-Claude"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Webb"^^xsd:string; foaf:givenName "Adam"^^xsd:string; foaf:name "Adam Webb"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Santis"^^xsd:string; foaf:givenName "Maria Carmen"^^xsd:string; foaf:name "Maria Carmen De Santis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sperk"^^xsd:string; foaf:givenName "Elena"^^xsd:string; foaf:name "Elena Sperk"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mistry"^^xsd:string; foaf:givenName "Anil"^^xsd:string; foaf:name "Anil Mistry"^^xsd:string; rdf:type foaf:Person . bibo:issn "00104825"; foaf:name "Computers in Biology and Medicine"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #92027 \n\nBuilding Market Timing Strategies Using Trend Representative Testing and Computational Intelligence Metaheuristics\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Building Market Timing Strategies Using Trend Representative Testing and Computational Intelligence Metaheuristics (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Building Market Timing Strategies Using Trend Representative Testing and Computational Intelligence Metaheuristics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Building Market Timing Strategies Using Trend Representative Testing and Computational Intelligence Metaheuristics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Building Market Timing Strategies Using Trend Representative Testing and Computational Intelligence Metaheuristics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Building Market Timing Strategies Using Trend Representative Testing and Computational Intelligence Metaheuristics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Building Market Timing Strategies Using Trend Representative Testing and Computational Intelligence Metaheuristics (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . , , , , ; bibo:abstract "Market timing, one of the core deciding when to buy or sell an asset of interest on a financial market. Market timing strategies can be built by using a collection of components or functions that process market context and return a recommendation on the course of action to take. In this chapter, we revisit the work presented in [20] on the application of Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) to the issue of market timing while using a novel approach for training and testing called Trend Representative Testing. We provide more details on the process of building trend representative datasets, as well as, introduce a new PSO variant with a different approach to pruning. Results show that the new pruning procedure is capable of reducing solution length while not adversely affecting the quality of the solutions in a statistically significant manner."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2021-07-02"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Building Market Timing Strategies Using Trend Representative Testing and Computational Intelligence Metaheuristics"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Linares-Barranco"^^xsd:string; foaf:givenName "A"^^xsd:string; foaf:name "A Linares-Barranco"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Madani"^^xsd:string; foaf:givenName "K"^^xsd:string; foaf:name "K Madani"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Merelo"^^xsd:string; foaf:givenName "J"^^xsd:string; foaf:name "J Merelo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Garibaldi"^^xsd:string; foaf:givenName "J"^^xsd:string; foaf:name "J Garibaldi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando E.B."^^xsd:string; foaf:name "Fernando E.B. Otero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Warwick"^^xsd:string; foaf:givenName "K"^^xsd:string; foaf:name "K Warwick"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mohamed"^^xsd:string; foaf:givenName "Ismail"^^xsd:string; foaf:name "Ismail Mohamed"^^xsd:string; rdf:type foaf:Person . rdfs:label "TITS3091291.pdf"^^xsd:string . rdfs:label "TITS3091291.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #88998 \n\nInvestigating the Cognitive Response of Brake Lights in Initiating Braking Action Using EEG\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Investigating the Cognitive Response of Brake Lights in Initiating Braking Action Using EEG (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Cognitive Response of Brake Lights in Initiating Braking Action Using EEG (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Cognitive Response of Brake Lights in Initiating Braking Action Using EEG (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Cognitive Response of Brake Lights in Initiating Braking Action Using EEG (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Cognitive Response of Brake Lights in Initiating Braking Action Using EEG (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Cognitive Response of Brake Lights in Initiating Braking Action Using EEG (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Half of all road accidents result from either lack of driver attention or from maintaining insufficient separation between vehicles. Collision from the rear, in particular, has been identified as the most common class of accident in the UK, and its influencing factors have been widely studied for many years. Rear-mounted stop lamps, illuminated when braking, are the primary mechanism to alert following drivers to the need to reduce speed or brake. This paper develops a novel brain response approach to measuring subject reaction to different brake light designs. A variety of off-the-shelf brake light assemblies are tested in a physical simulated driving environment to assess the cognitive reaction times of 22 subjects. Eight pairs of LED-based and two pairs of incandescent bulb-based brake light assemblies are used and electroencephalogram (EEG) data recorded. Channel Pz is utilised to extract the P3 component evoked during the decision making process that occurs in the brain when a participant decides to lift their foot from the accelerator and depress the brake. EEG analysis shows that both incandescent bulb-based lights are statistically slower to evoke cognitive responses than all tested LED-based lights. Between the LED designs, differences are evident, but not statistically significant, attributed to the significant amount of movement artifact in the EEG signal"^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2021-07-02"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Investigating the Cognitive Response of Brake Lights in Initiating Braking Action Using EEG"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "TE Highway engineering. Roads and pavements"@en . rdf:type skos:Concept; skos:prefLabel "TL Motor vehicles. Aeronautics. Astronautics"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mouli"^^xsd:string; foaf:givenName "Surej"^^xsd:string; foaf:name "Surej Mouli"^^xsd:string; rdf:type foaf:Person . bibo:issn "15249050"; foaf:name "IEEE Transactions on Intelligent Transportation Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "turner.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #88974 \n\nConstructive mathematics, Church's Thesis, and free choice sequences\n\n"; foaf:primaryTopic . dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Constructive mathematics, Church's Thesis, and free choice sequences (PDF)"^^xsd:string . rdf:_1 . bibo:abstract "We see the defining properties of constructive mathematics as being the proof interpretation of the logical connectives and the definition of function as rule or method. We sketch the development of intuitionist type theory as an alternative to set theory. We note that the axiom of choice is constructively valid for types, but not for sets. We see the theory of types, in which proofs are directly algorithmic, as a more natural setting for constructive mathematics than set theories like IZF. Church’s thesis provides an objective definition of effective computability. It cannot be proved mathematically because it is a conjecture about what kinds of mechanisms are physically possible, for which we have scientific evidence but not proof. We consider the idea of free choice sequences and argue that they do not undermine Church’s Thesis."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator ; dct:date "2021-07-02"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Constructive mathematics, Church's Thesis, and free choice sequences"^^xsd:string; ep:hasAccepted ; ep:hasDocument ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 8 Philosophy of mathematics"@en . rdf:type skos:Concept; skos:prefLabel "QA 21 History of mathematics"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "17th Conference on Computability in Europe, CiE 2021"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Virtual Event, Ghent"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Turner"^^xsd:string; foaf:givenName "David A."^^xsd:string; foaf:name "David A. Turner"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "preface.pdf"^^xsd:string . rdfs:label "preface.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #90050 \n\nIFL 2020: Proceedings of the 32nd Symposium on Implementation and Application of Functional Languages\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "IFL 2020: Proceedings of the 32nd Symposium on Implementation and Application of Functional Languages (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "IFL 2020: Proceedings of the 32nd Symposium on Implementation and Application of Functional Languages (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "IFL 2020: Proceedings of the 32nd Symposium on Implementation and Application of Functional Languages (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "IFL 2020: Proceedings of the 32nd Symposium on Implementation and Application of Functional Languages (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "IFL 2020: Proceedings of the 32nd Symposium on Implementation and Application of Functional Languages (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "IFL 2020: Proceedings of the 32nd Symposium on Implementation and Application of Functional Languages (Other)"^^xsd:string . rdf:_1 . ; bibo:editorList ; bibo:status , ; dct:date "2021-07-01"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "IFL 2020: Proceedings of the 32nd Symposium on Implementation and Application of Functional Languages"^^xsd:string; ep:hasDocument , , , , , ; ep:hasOther ; owl:sameAs ; rdf:type bibo:Article, ep:EPrint, ep:EdbookEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chitil"^^xsd:string; foaf:givenName "Olaf"^^xsd:string; foaf:name "Olaf Chitil"^^xsd:string; rdf:type foaf:Person . rdfs:label "icooolps21-greenwood-thessman-et-al-naive-transient-cast-insertion-isnt-that-bad.pdf"^^xsd:string . rdfs:label "icooolps21-greenwood-thessman-et-al-naive-transient-cast-insertion-isnt-that-bad.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #89178 \n\nNaïve Transient Cast Insertion Isn’t (That) Bad\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Naïve Transient Cast Insertion Isn’t (That) Bad (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Naïve Transient Cast Insertion Isn’t (That) Bad (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Naïve Transient Cast Insertion Isn’t (That) Bad (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Naïve Transient Cast Insertion Isn’t (That) Bad (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Naïve Transient Cast Insertion Isn’t (That) Bad (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Naïve Transient Cast Insertion Isn’t (That) Bad (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Transient gradual type systems often depend on type-based cast insertion to achieve good performance: casts are inserted whenever the static checker detects that a dynamically-typed value may flow into a statically-typed context. Transient gradually typed programs are then often executed using just-in-time compilation, and contemporary just-in-time compilers are very good at removing redundant computations.\r\n\r\nIn this paper we present work-in-progress to measure the ability of just-in-time compilers to remove redundant type checks. We investigate worst-case performance and so take a na'ive approach, annotating every subexpression to insert every plausible dynamic cast. Our results indicate that the Moth VM still manages to eliminate much of the overhead, by relying on the state-of-the-art SOMns substrate and Graal just-in-time compiler.\r\n\r\nWe hope these results will help language implementers evaluate the tradeoffs between dynamic optimisations (which can improve the performance of both statically and dynamically typed programs) and static optimisations (which improve only statically typed code)."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , ; dct:date "2021-07"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Naïve Transient Cast Insertion Isn’t (That) Bad"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "16th ACM International Workshop on Implementation, Compilation, Optimization of OO Languages, Programs and Systems"^^xsd:string; rdf:type bibo:Conference . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Gariano"^^xsd:string; foaf:givenName "Isaac Oscar"^^xsd:string; foaf:name "Isaac Oscar Gariano"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Greenwood-Thessman"^^xsd:string; foaf:givenName "Erin"^^xsd:string; foaf:name "Erin Greenwood-Thessman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Roberts"^^xsd:string; foaf:givenName "Richard"^^xsd:string; foaf:name "Richard Roberts"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Homer"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Homer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Noble"^^xsd:string; foaf:givenName "James"^^xsd:string; foaf:name "James Noble"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "Cyber-Security-Culture-2021-Nurse-KAR.pdf"^^xsd:string . rdfs:label "Cyber-Security-Culture-2021-Nurse-KAR.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #88878 \n\nDeveloping a Cyber Security Culture: Current Practices and Future Needs\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Developing a Cyber Security Culture: Current Practices and Future Needs (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Developing a Cyber Security Culture: Current Practices and Future Needs (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Developing a Cyber Security Culture: Current Practices and Future Needs (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Developing a Cyber Security Culture: Current Practices and Future Needs (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Developing a Cyber Security Culture: Current Practices and Future Needs (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Developing a Cyber Security Culture: Current Practices and Future Needs (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "While the creation of a strong security culture has been researched and discussed for decades, it continues to elude many businesses. Part of the challenge faced is distilling pertinent, recent academic findings and research into useful guidance. In this article, we aim to tackle this issue by conducting a state-of-the-art study into organisational cyber security culture research. This work investigates four questions, including how cyber security culture is defined, what factors are essential to building and maintaining such a culture, the frameworks proposed to cultivate a security culture and the metrics suggested to assess it. Through the application of the PRISMA systematic literature review technique, we identify and analyse 58 research articles from the last 10 years (2010-2020). Our findings demonstrate that while there have been notable changes in the use of terms (e.g., information security culture and cyber security culture), many of the most influential factors across papers are similar. Top management support, policy and procedures, and awareness for instance, are critical in engendering cyber security culture. Many of the frameworks reviewed revealed common foundations, with organisational culture playing a substantial role in crafting appropriate cyber security culture models. Questionnaires and surveys are the most used tool to measure cyber security culture, but there are also concerns as to whether more dynamic measures are needed. For practitioners, this article highlights factors and models essential to the creation and management of a robust security culture. For research, we produce an up-to-date characterisation of the field and also define open issues deserving of further attention such as the role of change management processes and national culture in an enterprise's cyber security culture."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2021-06-30"; dct:isPartOf , ; dct:publisher ; dct:subject , , , ; dct:title "Developing a Cyber Security Culture: Current Practices and Future Needs"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Furnell"^^xsd:string; foaf:givenName "Steven"^^xsd:string; foaf:name "Steven Furnell"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Uchendu"^^xsd:string; foaf:givenName "Betsy"^^xsd:string; foaf:name "Betsy Uchendu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bada"^^xsd:string; foaf:givenName "Maria"^^xsd:string; foaf:name "Maria Bada"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R.C."^^xsd:string; foaf:name "Jason R.C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "01674048"; foaf:name "Computers & Security"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "frobt-08-662036.pdf"^^xsd:string . rdfs:label "frobt-08-662036.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #88875 \n\nEmbodiment in 18th Century Depictions of Human-Machine Co-Creativity\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Embodiment in 18th Century Depictions of Human-Machine Co-Creativity (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Embodiment in 18th Century Depictions of Human-Machine Co-Creativity (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Embodiment in 18th Century Depictions of Human-Machine Co-Creativity (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Embodiment in 18th Century Depictions of Human-Machine Co-Creativity (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Embodiment in 18th Century Depictions of Human-Machine Co-Creativity (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Embodiment in 18th Century Depictions of Human-Machine Co-Creativity (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Artificial intelligence has a rich history in literature; fiction has shaped how we view artificial agents and their capacities in the real world. This paper looks at embodied examples of human-machine co-creation from the literature of the Long 18th Century (1650–1850), examining how older depictions of creative machines could inform and inspire modern day research. The works are analyzed from the perspective of design fiction with special focus on the embodiment of the systems and the creativity exhibited by them. We find that the chosen examples highlight the importance of recognizing the environment as a major factor in human-machine co-creative processes and that some of the works seem to precede current examples of artificial systems reaching into our everyday lives. The examples present embodied interaction in a positive, creativity-oriented way, but also highlight ethical risks of human-machine co-creativity. Modern day perceptions of artificial systems and creativity can be limited to some extent by the technologies available; fictitious examples from centuries past allow us to examine such limitations using a Design Fiction approach. We conclude by deriving four guidelines for future research from our fictional examples: 1) explore unlikely embodiments; 2) think of situations, not systems; 3) be aware of the disjunction between action and appearance; and 4) consider the system as a situated moral agent."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-06-28"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Embodiment in 18th Century Depictions of Human-Machine Co-Creativity"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "PN Literature (General)"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Frontiers"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Jordanous"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Jordanous"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kantosalo"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Kantosalo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Falk"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Falk"^^xsd:string; rdf:type foaf:Person . bibo:issn "22969144"; foaf:name "Frontiers in Robotics and AI"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "RUSI-Kent-OP-Cyber-insurance.pdf"^^xsd:string . rdfs:label "RUSI-Kent-OP-Cyber-insurance.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #89041 \n\nCyber Insurance and the Cyber Security Challenge\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Cyber Insurance and the Cyber Security Challenge (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Insurance and the Cyber Security Challenge (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Insurance and the Cyber Security Challenge (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Insurance and the Cyber Security Challenge (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Insurance and the Cyber Security Challenge (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Insurance and the Cyber Security Challenge (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Governments and businesses are struggling to cope with the scale and complexity of managing cyber risk. Over the last year, remote working, rapid digitalisation and the need for increased connectivity have emphasised the cyber security challenge. As the pursuit of approaches to prevent, mitigate and recover from malicious cyber activity has progressed, one tool that has gained traction is cyber insurance. If it can follow the path of other insurance classes, it could play a significant role in managing digital risk. \r\n\r\nThis paper explores whether cyber insurance can incentivise better cyber security practices among policyholders. It finds that the shortcomings of cyber insurance mean that its contribution to improving cyber security practices is more limited than policymakers and businesses might hope. Although several means by which cyber insurance can incentivise better cyber security practices are identified, they have significant limitations. Interviewees from across government, industry and business consistently stated that the positive effects of cyber insurance on cyber security have yet to fully materialise. While some mature insurers are moving in the right direction, cyber insurance as a whole is still struggling to move from theory into practice when it comes to incentivising cyber security. \r\n\r\nIf this is to change, the insurance industry must overcome significant challenges. One is the competitiveness of the nascent cyber insurance market over the last two decades. Most of the market has used neither carrots (financial incentives) nor sticks (security obligations) to improve the cyber security practices of policyholders. The industry is also struggling to collect and share reliable cyber risk data that can inform underwriting and risk modelling. The difficulties inherent in understanding cyber risk, which is anthropogenic and systemic, mean insurers and reinsurers are unable to accurately quantify its causes and effects. This limits insurers’ ability to accurately assess an organisation’s risk profile or security practices and price policy premiums accordingly. The spectre of systemic incidents such as NotPetya1 and SolarWinds2 has also limited the availability of capital for cyber insurance markets. \r\n\r\nHowever, the most pressing challenge currently facing the industry is ransomware. Although it is a societal problem, cyber insurers have received considerable criticism for facilitating ransom payments to cybercriminals. These add fuel to the fire by incentivising cybercriminals’ engagement in ransomware operations and enabling existing operators to invest in and expand their capabilities. Growing losses from ransomware attacks have also emphasised that the current reality is not sustainable for insurers either. \r\n\r\nTo overcome these challenges and champion the positive effects of cyber insurance, this paper calls for a series of interventions from government and industry. Some in the industry favour allowing the market to mature on its own, but it will not be possible to rely on changing market forces alone. To date, the UK government has taken a light-touch approach to the cyber insurance industry. With the market undergoing changes amid growing losses, more coordinated action by government and regulators is necessary to help the industry reach its full potential. \r\n\r\nThe interventions recommended here are still relatively light, and reflect the fact that cyber insurance is only a potential incentive for managing societal cyber risk. They include: developing guidance for minimum security standards for underwriting; expanding data collection and data sharing; mandating cyber insurance for government suppliers; and creating a new collaborative approach between insurers and intelligence and law enforcement agencies around ransomware. \r\n\r\nFinally, although a well-functioning cyber insurance industry could improve cyber security practices on a societal scale, it is not a silver bullet for the cyber security challenge. It is important to remember that the primary purpose of cyber insurance is not to improve cyber security, but to transfer residual risk. As such, it should be one of many tools that governments and businesses can draw on to manage cyber risk more effectively."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-06-28"; dct:isPartOf , ; dct:subject , , , ; dct:title "Cyber Insurance and the Cyber Security Challenge"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences (General)"@en . rdf:type skos:Concept; skos:prefLabel "HF5351 Business"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:familyName "Sullivan"^^xsd:string; foaf:givenName "James"^^xsd:string; foaf:name "James Sullivan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "MacColl"^^xsd:string; foaf:givenName "Jamie"^^xsd:string; foaf:name "Jamie MacColl"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "23970286"; foaf:name "RUSI Occasional Paper"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "A Cyber-security Strategy for Internationally-dispersed Industrial_v5.pdf"^^xsd:string . rdfs:label "A Cyber-security Strategy for Internationally-dispersed Industrial_v5.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #84285 \n\nA Cyber-Security Strategy for Internationally-dispersed Industrial Networks\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Cyber-Security Strategy for Internationally-dispersed Industrial Networks (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Cyber-Security Strategy for Internationally-dispersed Industrial Networks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Cyber-Security Strategy for Internationally-dispersed Industrial Networks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Cyber-Security Strategy for Internationally-dispersed Industrial Networks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Cyber-Security Strategy for Internationally-dispersed Industrial Networks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Cyber-Security Strategy for Internationally-dispersed Industrial Networks (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Globalization implies geographically dispersed supply chains composed of facilities strategically located in several countries and regions of the world. These structures commonly involve several Operational Technology (OT) and Information Technology (IT) infrastructures and integration to enable accurate and useful information processing. Such integration (also called Cyber-Physical Systems) transforms the industry and facilitates massive data volumes' systematic transformation into valuable information. Security risks posed by such integration may be substantial and, depending on the size of the company, and the number of integration points, dealing with them could easily cost millions of dollars. With the main objective of studying available strategies to manage security risks in companies with dispersed supply chains, this paper reviews international cyber-security standards and regulations and proposes a more comprehensive strategy. The strategy includes IT services, optimized perimeter segregation, and data flow policies among OT and IT networks to balance a high level of protection and cost-effectiveness."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2021-06-23"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "A Cyber-Security Strategy for Internationally-dispersed Industrial Networks"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "2020 International Conference on Computational Science & Computational Intelligence (CSCI)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Online"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Gonzalez"^^xsd:string; foaf:givenName "Alexandre"^^xsd:string; foaf:name "Alexandre Gonzalez"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Neto"^^xsd:string; foaf:givenName "Antonio Lemos Maia"^^xsd:string; foaf:name "Antonio Lemos Maia Neto"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Moura"^^xsd:string; foaf:givenName "Ralf Luis de"^^xsd:string; foaf:name "Ralf Luis de Moura"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N. L."^^xsd:string; foaf:name "Virginia N. L. Franqueira"^^xsd:string; rdf:type foaf:Person . rdfs:label "main.pdf"^^xsd:string . rdfs:label "main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #88249 \n\nZooid: A DSL for Certified Multiparty Computation\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Zooid: A DSL for Certified Multiparty Computation (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Zooid: A DSL for Certified Multiparty Computation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Zooid: A DSL for Certified Multiparty Computation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Zooid: A DSL for Certified Multiparty Computation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Zooid: A DSL for Certified Multiparty Computation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Zooid: A DSL for Certified Multiparty Computation (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "We design and implement Zooid, a domain specific language for certified multiparty communication, embedded in Coq and implemented atop our mechanisation framework of asynchronous multiparty session types (the first of its kind). Zooid provides a fully mechanised metatheory forthe semantics of global and local types, and a fully verified end-point process language that faithfully reflects the type-level behaviours and thus inherits the global types properties such as deadlock freedom, protocol compliance, and liveness guarantees."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2021-06-19"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Zooid: A DSL for Certified Multiparty Computation"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "42nd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2021)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Virtual"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Castro-Perez"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Castro-Perez"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ferreira"^^xsd:string; foaf:givenName "Francisco"^^xsd:string; foaf:name "Francisco Ferreira"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gheri"^^xsd:string; foaf:givenName "Lorenzo"^^xsd:string; foaf:name "Lorenzo Gheri"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yoshida"^^xsd:string; foaf:givenName "Nobuko"^^xsd:string; foaf:name "Nobuko Yoshida"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #89067 \n\nGeographically Dispersed Supply Chains: A Strategy to Manage Cybersecurity in Industrial Networks Integration\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Geographically Dispersed Supply Chains: A Strategy to Manage Cybersecurity in Industrial Networks Integration (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Geographically Dispersed Supply Chains: A Strategy to Manage Cybersecurity in Industrial Networks Integration (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Geographically Dispersed Supply Chains: A Strategy to Manage Cybersecurity in Industrial Networks Integration (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Geographically Dispersed Supply Chains: A Strategy to Manage Cybersecurity in Industrial Networks Integration (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Geographically Dispersed Supply Chains: A Strategy to Manage Cybersecurity in Industrial Networks Integration (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Geographically Dispersed Supply Chains: A Strategy to Manage Cybersecurity in Industrial Networks Integration (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Large industries usually imply geographically dispersed supply chains composed of facilities localized in diverse regions. These facilities commonly involve operational technology (OT) (i.e., industrial control systems—ICS) and information technology (IT) infrastructures, which require integration to enable information processing. Such integration, achieved through cyber-physical systems, and leveraged by the Industry 4.0 emergence, may transform the industry and facilitate the transformation of vast data volumes into valuable information. Security risks posed by dispersed cyber-physical systems may be substantial, and dealing with cybersecurity issues in such context could be very expensive. This study reviews directives regarding cybersecurity risks in companies with dispersed supply chains and also applicable international cybersecurity standards and regulations to derive a strategy to manage cybersecurity in integrated industrial networks. The strategy proposes centralized services, optimized perimeter segregation, and data flow policies among OT and IT networks to balance the trade-off between a high level of protection with cost-effectiveness."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2021-06-16"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Geographically Dispersed Supply Chains: A Strategy to Manage Cybersecurity in Industrial Networks Integration"^^xsd:string; ep:hasDocument , , , , , ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Gonzalez"^^xsd:string; foaf:givenName "Alexandre"^^xsd:string; foaf:name "Alexandre Gonzalez"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Neto"^^xsd:string; foaf:givenName "Antonio Lemos Maia"^^xsd:string; foaf:name "Antonio Lemos Maia Neto"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pessin"^^xsd:string; foaf:givenName "Gustavo"^^xsd:string; foaf:name "Gustavo Pessin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Moura"^^xsd:string; foaf:givenName "Ralf Luis de"^^xsd:string; foaf:name "Ralf Luis de Moura"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N. L."^^xsd:string; foaf:name "Virginia N. L. Franqueira"^^xsd:string; rdf:type foaf:Person . rdfs:label "icooolps21-kaleba-et-al-avoiding-monomorphisation-bottlenecks-with-phase-based-splitting.pdf"^^xsd:string . rdfs:label "icooolps21-kaleba-et-al-avoiding-monomorphisation-bottlenecks-with-phase-based-splitting.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #89179 \n\nAvoiding Monomorphisation Bottlenecks with Phase-based Splitting\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Avoiding Monomorphisation Bottlenecks with Phase-based Splitting (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Avoiding Monomorphisation Bottlenecks with Phase-based Splitting (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Avoiding Monomorphisation Bottlenecks with Phase-based Splitting (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Avoiding Monomorphisation Bottlenecks with Phase-based Splitting (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Avoiding Monomorphisation Bottlenecks with Phase-based Splitting (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Avoiding Monomorphisation Bottlenecks with Phase-based Splitting (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-06-15"; dct:isPartOf ; dct:title "Avoiding Monomorphisation Bottlenecks with Phase-based Splitting"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "16th ACM International Workshop on Implementation, Compilation, Optimization of OO Languages, Programs and Systems"^^xsd:string; rdf:type bibo:Conference . foaf:familyName "Jones"^^xsd:string; foaf:givenName "Richard E."^^xsd:string; foaf:name "Richard E. Jones"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kaleba"^^xsd:string; foaf:givenName "Sophie"^^xsd:string; foaf:name "Sophie Kaleba"^^xsd:string; rdf:type foaf:Person . rdfs:label "Auditory_Evoked_Potential_Detection_During_Pure-Tone_Audiometry.pdf"^^xsd:string . rdfs:label "Auditory_Evoked_Potential_Detection_During_Pure-Tone_Audiometry.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91394 \n\nAuditory evoked potential detection during pure-tone audiometry\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Auditory evoked potential detection during pure-tone audiometry (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Auditory evoked potential detection during pure-tone audiometry (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Auditory evoked potential detection during pure-tone audiometry (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Auditory evoked potential detection during pure-tone audiometry (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Auditory evoked potential detection during pure-tone audiometry (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Auditory evoked potential detection during pure-tone audiometry (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Modern audiometry is largely a behavioural task, with the pure-tone audiogram (PTA) being the gold standard for evaluating frequency-specific hearing thresholds in adults. The nature of behavioural audiometry makes estimating accurate hearing thresholds difficult in infants and people with disabilities, where following instructions or interacting with the test may be difficult or impossible. We propose a method in which Auditory Evoked Potentials (AEPs) are used as an alternative to behavioural audiometry for detecting frequency-specific thresholds. Specifically, P300 responses elicited by the tones of a PTA are automatically detected from electroencephalogram (EEG) data, to evaluate hearing acuity. To assess the effectiveness of this method, we created a dataset of EEG recordings from participants presented with a series of pure tones at 6 different frequencies with steadily decreasing volumes, during a PTA test. This dataset was used to train a support vector machine (SVM) to identify when a participant was played a tone, whether they perceived it or not using their EEG. Results demonstrate that detecting hearing events can be very accurate for participants for whom the classifier has been trained apriori. However, accuracy drops significantly for unseen participants - when the classifier has not been trained on any prior data from a given participant before classifying their EEG. However, by establishing that AEP response-based audiometry is viable for detecting tones, future work will explore the ability of more powerful deep neural networks to accurately estimate for unseen participants."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-06-02"; dct:isPartOf ; dct:publisher ; dct:title "Auditory evoked potential detection during pure-tone audiometry"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "10th International IEEE/EMBS Conference on Neural Engineering (NER)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Italy"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Langroudi"^^xsd:string; foaf:givenName "George"^^xsd:string; foaf:name "George Langroudi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . rdfs:label "NER2021_EMDR_FINAL.pdf"^^xsd:string . rdfs:label "NER2021_EMDR_FINAL.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #86568 \n\nMotion Sickness Reduction through Vibro-motor Reprocessing Therapy: A First Study\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Motion Sickness Reduction through Vibro-motor Reprocessing Therapy: A First Study (XML Word Processing Document (DOCX))"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Motion Sickness Reduction through Vibro-motor Reprocessing Therapy: A First Study (Other)"^^xsd:string . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Motion Sickness Reduction through Vibro-motor Reprocessing Therapy: A First Study (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Motion Sickness Reduction through Vibro-motor Reprocessing Therapy: A First Study (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Motion Sickness Reduction through Vibro-motor Reprocessing Therapy: A First Study (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Motion Sickness Reduction through Vibro-motor Reprocessing Therapy: A First Study (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Motion Sickness Reduction through Vibro-motor Reprocessing Therapy: A First Study (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Motion Sickness Reduction through Vibro-motor Reprocessing Therapy: A First Study (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "In order to reduce motion sickness (MS), a novel vibro-motor reprocessing therapy (VRT), based on an Eye Movement Desensitization and Reprocessing (EMDR) technique is investigated. To the best of the authors knowledge, this is the first time that reprocessing therapy has been evaluated for alleviating MS. Experimentally, MS was induced using visual stimulus of motion videos. Subjective MS was then recorded at baseline for both VRT and non-VRT stimulation conditions, and after each condition, evaluated using a Motion Sickness Assessment Questionnaire (MSAQ). MSAQ scores were compared for both conditions in eight test subjects, with a significant and clear reduction in motion sickness symptoms revealed when applying VRT stimulation. While the subject pool is small, this pilot study indicates that the proposed approach has potential for future exploration in terms of non-pharmacological treatment and management of MS."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion , ; dct:creator , , ; dct:date "2021-06-02"; dct:isPartOf ; dct:publisher ; dct:subject , , , ; dct:title "Motion Sickness Reduction through Vibro-motor Reprocessing Therapy: A First Study"^^xsd:string; ep:hasAccepted , ; ep:hasDocument , , , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "RM Therapeutics. Pharmacology"@en . rdf:type skos:Concept; skos:prefLabel "RZ Other systems of medicine"@en . dct:title "10th International IEEE EMBS Conference on Neural Engineering"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Virtual"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Molefi"^^xsd:string; foaf:givenName "Emmanuel"^^xsd:string; foaf:name "Emmanuel Molefi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ramaswamy"^^xsd:string; foaf:givenName "Palaniappan"^^xsd:string; foaf:name "Palaniappan Ramaswamy"^^xsd:string; rdf:type foaf:Person . rdfs:label "12main.pdf"^^xsd:string . rdfs:label "12main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #90261 \n\nProgram Verification Using Polynomials Over Modular Arithmetic\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Program Verification Using Polynomials Over Modular Arithmetic (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Program Verification Using Polynomials Over Modular Arithmetic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Program Verification Using Polynomials Over Modular Arithmetic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Program Verification Using Polynomials Over Modular Arithmetic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Program Verification Using Polynomials Over Modular Arithmetic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Program Verification Using Polynomials Over Modular Arithmetic (Other)"^^xsd:string . rdf:_1 . ; bibo:abstract "As program verification has matured as a discipline, so distinct topics have emerged and then developed into thriving sub-disciplines, each with their own language and focus. In Satisfiability Modulo Theories (SMT) solving the focus is on deciding the satisfiability of formulae over predicates (constraints) drawn from a background theory. If a SMT formula encodes the existence of a problematic path through a program, then a model of the formula will expose a fault as demonstrated with a counter-example. In abstract interpretation, on the other hand, the objective is typically to infer invariants for a program so as to demonstrate the absence of a fault. These complementary sub-disciplines do not exist in silos completing against one another: one sub-discipline informs the other. This thesis illustrates how these sub-disciplines cross-fertilise in both directions: presenting a new abstract domain that draws on techniques from SMT solving, namely solving systems of symbolic equations (theory solving). One fundamental operation used in the domain construction applies a propagation technique that suggests how the satisfiability the SMT formulae can be reduced to that of deciding the satisfiability of a compact SAT instance. This leads to a new technique for SMT solving.\r\n\r\nAlthough developed in tandem, for sake of presentation the thesis first addresses the satisfiability of systems of polynomial equations over bit-vectors. Instead of conventional bit-blasting, we exploit word-level inference to translate these systems into non-linear pseudo-boolean constraints. We derive the pseudo-booleans by simulating bit assignments through the addition of (linear) polynomials and applying a strong form of propagation by computing Gröbner bases, which provide an analog of a triangular form for systems of polynomials. By handling bit assignments symbolically, the number of Gröbner basis calculations, along with the number of assignments, is reduced. The final Gröbner basis yields an assignment to the bit-vectors, expressed parametrically in terms of the symbolic bits, together with non-linear pseudo-boolean constraints on the symbolic variables, modulo a power of two. The pseudo-booleans can be solved by translation into classical linear pseudo-boolean constraints (without a modulo) or by encoding them as propositional formulae, for which a novel translation process is described. This aspect of the thesis has a practical bias.\r\n\r\nThe dual theme of the thesis on abstract domain construction has a theoretical bias. The thesis presents MPAD, the modulo polynomial abstract domain, whose invariants are systems of polynomial equations that hold modulo 2 to the power of ω, where ω is bit-width. MPAD systems over d variables symbolically represent sets of points in d-dimensional space as their solutions, and provide a way of representing and inferring polynomial invariants in the presence of wrap-around arithmetic. The domain operations of MPAD are computed using Gröbner bases, but are founded on a closure operation, mirroring a construction familiar in numeric abstraction. Given an input system of polynomials, and their associated solutions, closure derives a finite polynomial representation of all polynomials that satisfy these solutions. Closure is necessary for faithfully computing join and projection, operations that preserve it. Meet does not maintain closure, hence the need for an algorithm for computing it. Unlike convention polynomial abstraction, MPAD satisfies the ascending chain condition, finessing the need for widening. It also remedies the disparity in handling of equality but not disequality in guards, normally found in numeric abstraction: the structure of MPAD allowing the addition of a single polynomial disequality to be reexpressed using closure and join. We demonstrate that MPAD can derive invariants necessary for verifying the correctness of algorithms which exploit integrality, that were previously out of reach.\r\n\r\nAs a whole, the thesis makes contributions to SMT solving and abstract interpretation, two complementary themes of program verification, both of which draw on common techniques from algebraic computation, namely Gröbner bases."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2021-06"; dct:isPartOf ; dct:issuer , ; dct:subject ; dct:title "Program Verification Using Polynomials Over Modular Arithmetic"^^xsd:string; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "King"^^xsd:string; foaf:givenName "Andy"^^xsd:string; foaf:name "Andy King"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Seed"^^xsd:string; foaf:givenName "Thomas"^^xsd:string; foaf:name "Thomas Seed"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #91360 \n\nLearning Actions From Natural Language Instructions Using an ON-World Embodied Cognitive Architecture\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Endowing robots with the ability to view the world the way humans do, to understand natural language and to learn novel semantic meanings when they are deployed in the physical world, is a compelling problem. Another significant aspect is linking language to action, in particular, utterances involving abstract words, in artificial agents. In this work, we propose a novel methodology, using a brain-inspired architecture, to model an appropriate mapping of language with the percept and internal motor representation in humanoid robots. This research presents the first robotic instantiation of a complex architecture based on the Baddeley's Working Memory (WM) model. Our proposed method grants a scalable knowledge representation of verbal and non-verbal signals in the cognitive architecture, which supports incremental open-ended learning. Human spoken utterances about the workspace and the task are combined with the internal knowledge map of the robot to achieve task accomplishment goals. We train the robot to understand instructions involving higher-order (abstract) linguistic concepts of developmental complexity, which cannot be directly hooked in the physical world and are not pre-defined in the robot's static self-representation. Our proposed interactive learning method grants flexible run-time acquisition of novel linguistic forms and real-world information, without training the cognitive model anew. Hence, the robot can adapt to new workspaces that include novel objects and task outcomes. We assess the potential of the proposed methodology in verification experiments with a humanoid robot. The obtained results suggest robust capabilities of the model to link language bi-directionally with the physical environment and solve a variety of manipulation tasks, starting with limited knowledge and gradually learning from the run-time interaction with the tutor, past the pre-trained stage."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "15"; dct:creator , , ; dct:date "2021-05-13"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Learning Actions From Natural Language Instructions Using an ON-World Embodied Cognitive Architecture"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Frontiers Media"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Giorgi"^^xsd:string; foaf:givenName "I."^^xsd:string; foaf:name "I. Giorgi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cangelosi"^^xsd:string; foaf:givenName "A."^^xsd:string; foaf:name "A. Cangelosi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Masala"^^xsd:string; foaf:givenName "Giovanni Luca"^^xsd:string; foaf:name "Giovanni Luca Masala"^^xsd:string; rdf:type foaf:Person . foaf:name "Frontiers in Neurorobotics"^^xsd:string; rdf:type bibo:Collection . rdfs:label "Virtually_Immersive_Improv__Effect_of_Immersive_Visualisations_on_Rehearsing_and_Performing_Theatre_Online__Copy_.pdf"^^xsd:string . rdfs:label "Virtually_Immersive_Improv__Effect_of_Immersive_Visualisations_on_Rehearsing_and_Performing_Theatre_Online__Copy_.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #87284 \n\nTele-Immersive Improv: Effects of Immersive Visualisations on Rehearsing and Performing Theatre Online\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Tele-Immersive Improv: Effects of Immersive Visualisations on Rehearsing and Performing Theatre Online (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Tele-Immersive Improv: Effects of Immersive Visualisations on Rehearsing and Performing Theatre Online (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tele-Immersive Improv: Effects of Immersive Visualisations on Rehearsing and Performing Theatre Online (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tele-Immersive Improv: Effects of Immersive Visualisations on Rehearsing and Performing Theatre Online (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tele-Immersive Improv: Effects of Immersive Visualisations on Rehearsing and Performing Theatre Online (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tele-Immersive Improv: Effects of Immersive Visualisations on Rehearsing and Performing Theatre Online (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Performers acutely need but lack tools to remotely rehearse and create live theatre, particularly due to global restrictions on social interactions during the Covid-19 pandemic. No studies, however, have heretofore examined how remote video-collaboration affects performance. This paper presents the findings of a field study with 16 domain experts over six weeks investigating how tele-immersion affects the rehearsal and performance of improvisational theatre. To conduct the study, an original media server was developed for co-locating remote performers into shared virtual 3D environments which were accessed through popular video conferencing software. The results of this qualitative study indicate that tele-immersive environments uniquely provide performers with a strong sense of co- presence, feelings of physical connection, and an increased ability to enter the social-flow states required for improvisational theatre. Based on our observations, we put forward design recommendations for video collaboration tools tailored to the unique demands of live performance."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2021-05-06"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Tele-Immersive Improv: Effects of Immersive Visualisations on Rehearsing and Performing Theatre Online"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . dct:title "CHI Conference on Human Factors in Computing Systems 2021"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Yokohama Japan"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Branch"^^xsd:string; foaf:givenName "Boyd"^^xsd:string; foaf:name "Boyd Branch"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Efstratiou"^^xsd:string; foaf:givenName "Christos"^^xsd:string; foaf:name "Christos Efstratiou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mathewson"^^xsd:string; foaf:givenName "Kory"^^xsd:string; foaf:name "Kory Mathewson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Allain"^^xsd:string; foaf:givenName "Paul"^^xsd:string; foaf:name "Paul Allain"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mirowski"^^xsd:string; foaf:givenName "Piotr"^^xsd:string; foaf:name "Piotr Mirowski"^^xsd:string; rdf:type foaf:Person . rdfs:label "CHI2021_MemoryHome_CameraReady.pdf"^^xsd:string . rdfs:label "CHI2021_MemoryHome_CameraReady.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #85592 \n\nLiving Memory Home: Understanding Continuing Bond in the Digital Age through Backstage Grieving\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Living Memory Home: Understanding Continuing Bond in the Digital Age through Backstage Grieving (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Living Memory Home: Understanding Continuing Bond in the Digital Age through Backstage Grieving (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Living Memory Home: Understanding Continuing Bond in the Digital Age through Backstage Grieving (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Living Memory Home: Understanding Continuing Bond in the Digital Age through Backstage Grieving (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Living Memory Home: Understanding Continuing Bond in the Digital Age through Backstage Grieving (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Living Memory Home: Understanding Continuing Bond in the Digital Age through Backstage Grieving (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Prolong Grief Disorder (PGD) is a condition in which mourners are stuck in the grief process for a prolonged period and continue to suffer from an intense, mal-adaptive level of grief. Despite the increased popularity of virtual mourning practices, and subsequently the emergence of HCI research in this area, there is little research looking into how continuing bonds maintained digitally promote or impede bereavement adjustment. Through a one-month diary study and in-depth interviews with 17 participants who recently lost their loved ones, we identified four broad mechanisms of how grievers engage in what we called \"backstage\" grieving (as opposed to bereavement through digital public space like social media). We further discuss how this personal and private grieving is important in maintaining emotional well-being hence avoiding developing PGD, as well as possible design opportunities and challenges for future digital tools to support grieving."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2021-05-06"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Living Memory Home: Understanding Continuing Bond in the Digital Age through Backstage Grieving"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . dct:title "ACM SIGCHI 2021"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Online"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Siriaraya"^^xsd:string; foaf:givenName "Panote"^^xsd:string; foaf:name "Panote Siriaraya"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Prigerson"^^xsd:string; foaf:givenName "Holly"^^xsd:string; foaf:name "Holly Prigerson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "She"^^xsd:string; foaf:givenName "Wan Jou"^^xsd:string; foaf:name "Wan Jou She"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ang"^^xsd:string; foaf:givenName "Chee Siang"^^xsd:string; foaf:name "Chee Siang Ang"^^xsd:string; rdf:type foaf:Person . rdfs:label "ICWSM_21_Emoji_preprint.pdf"^^xsd:string . rdfs:label "ICWSM_21_Emoji_preprint.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #87962 \n\nThe Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter (PDF)"^^xsd:string . rdf:type bibo:Document, ep:Document; rdfs:label "The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Emojis have established themselves as a popular means of communication in online messaging. Despite the apparent ubiquity in these image-based tokens, however, interpretation and ambiguity may allow for unique uses of emojis to appear. In this paper, we present the first examination of emoji usage by hacktivist groups via a study of the Anonymous collective on Twitter. This research aims to identify whether Anonymous affiliates have evolved their own approach to using emojis. To do this, we compare a large dataset of Anonymous tweets to a baseline tweet dataset from randomly sampled Twitter users using computational and qualitative analysis to compare their emoji usage. We utilise Word2Vec language models to examine the semantic relationships between emojis, identifying clear distinctions in the emoji-emoji relationships of Anonymous users. We then explore how emojis are used as a means of conveying emotions, finding that despite little commonality in emoji-emoji semantic ties, Anonymous emoji usage displays similar patterns of emotional purpose to the emojis of baseline Twitter users. Finally, we explore the textual context in which these emojis occur, finding that although similarities exist between the emoji usage of our Anonymous and baseline Twitter datasets, Anonymous users appear to have adopted more specific interpretations of certain emojis. This includes the use of emojis as a means of expressing adoration and infatuation towards notable Anonymous affiliates. These findings indicate that emojis appear to retain a considerable degree of similarity within Anonymous accounts as compared to more typical Twitter users. However, their are signs that emoji usage in Anonymous accounts has evolved somewhat, gaining additional group-specific associations that reveal new insights into the behaviours of this unusual collective."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion , ; dct:creator , , ; dct:date "2021-04-30"; dct:isPartOf ; dct:subject , , ; dct:title "The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter"^^xsd:string; ep:hasAccepted , ; ep:hasDocument , , , , , , , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "HM Sociology"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "4th​ International Workshop on Emoji Understanding and Applications in Social Media"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Online"^^xsd:string . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jones"^^xsd:string; foaf:givenName "Keenan"^^xsd:string; foaf:name "Keenan Jones"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . rdfs:label "BreakingLandauerBound_Final.pdf"^^xsd:string . rdfs:label "BreakingLandauerBound_Final.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #88045 \n\nCan We Break the Landauer Bound in Spin-Based Electronics?\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Can We Break the Landauer Bound in Spin-Based Electronics? (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Can We Break the Landauer Bound in Spin-Based Electronics? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Can We Break the Landauer Bound in Spin-Based Electronics? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Can We Break the Landauer Bound in Spin-Based Electronics? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Can We Break the Landauer Bound in Spin-Based Electronics? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Can We Break the Landauer Bound in Spin-Based Electronics? (Other)"^^xsd:string . rdf:_1 . bibo:abstract "We found that the minimum energy of reading or erasing a spin datum should be expressed by delta E = 2*uB*B, in contrast to delta E = kB*T*ln(2) proposed by Landauer in 1961. The physics of using a spin'sorientation to represent a bit of information is fundamentally different from that of using a particle's position in classical charge-based data storage: the former is quantum-dynamic (independent of temperature below the Curie point), whereas the latter is thermodynamic (dependent on temperature). Quantitatively, this newenergy bound associated with a new information erasure protocol was estimated as 1.64e-36 J, 15 orders of magnitude lower than the Landauer bound (3e-21 J), at no cost of angular momentum and increasedtotal entropy. In this new information erasure protocol, there is no need to move the electron from one side of the potential well to the other side otherwise the energy used to retain the defined spin state still needs to be greater than the existing thermal fluctuation (the Landauer bound). We verified our new energy bound based on a number of experiments including the Rydberg atom and the spin-spin interaction."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "9"; dc:hasVersion ; dct:creator ; dct:date "2021-04-29"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Can We Break the Landauer Bound in Spin-Based Electronics?"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Frank Z."^^xsd:string; foaf:name "Frank Z. Wang"^^xsd:string; rdf:type foaf:Person . bibo:issn "21693536"; foaf:name "IEEE Access"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Wybrow2021_Article_EulerDiagramsDrawnWithEllipses.pdf"^^xsd:string . rdfs:label "Wybrow2021_Article_EulerDiagramsDrawnWithEllipses.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #89443 \n\nEuler diagrams drawn with ellipses area‑proportionally (Edeap)\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Euler diagrams drawn with ellipses area‑proportionally (Edeap) (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Euler diagrams drawn with ellipses area‑proportionally (Edeap) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Euler diagrams drawn with ellipses area‑proportionally (Edeap) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Euler diagrams drawn with ellipses area‑proportionally (Edeap) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Euler diagrams drawn with ellipses area‑proportionally (Edeap) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Euler diagrams drawn with ellipses area‑proportionally (Edeap) (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Background: Area-proportional Euler diagrams are frequently used to visualize data from Microarray experiments, but are also applied to a wide variety of other data from biosciences, social networks and other domains. Results: This paper details Edeap, a new simple, scalable method for drawing areaproportional Euler diagrams with ellipses. We use a search-based technique optimizing a multi-criteria objective function that includes measures for both area accuracy and usability, and which can be extended to further user-defned criteria. The Edeap software is available for use on the web, and the code is open source. In addition to describing our system, we present the frst extensive evaluation of software for producing area-proportional Euler diagrams, comparing Edeap to the current state-of-the-art; circle-based method, venneuler, and an alternative ellipse-based method, eulerr. Conclusions: Our evaluation—using data from the Gene Ontology database via GoMiner, Twitter data from the SNAP database, and randomly generated data sets—shows an ordering for accuracy (from best to worst) of eulerr, followed by Edeap and then venneuler. In terms of runtime, the results are reversed with venneuler being the fastest, followed by Edeap and fnally eulerr. Regarding scalability, eulerr cannot draw non-trivial diagrams beyond 11 sets, whereas no such limitation is present in Edeap or venneuler, both of which draw diagrams up to the tested limit of 20 sets."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "22"; dc:hasVersion ; dct:creator , , ; dct:date "2021-04-26"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Euler diagrams drawn with ellipses area‑proportionally (Edeap)"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Dib"^^xsd:string; foaf:givenName "Fadi"^^xsd:string; foaf:name "Fadi Dib"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wybrow"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Wybrow"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rodgers"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Rodgers"^^xsd:string; rdf:type foaf:Person . bibo:issn "14712105"; foaf:name "BMC Bioinformatics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90374 \n\nSelf-organizing fuzzy inference ensemble system for big streaming data classification\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "An evolving intelligent system (EIS) is able to self-update its system structure and meta-parameters from streaming data. However, since the majority of EISs are implemented on a single-model architecture, their performances on large-scale, complex data streams are often limited. To address this deficiency, a novel self-organizing fuzzy inference ensemble framework is proposed in this paper. As the base learner of the proposed ensemble system, the self-organizing fuzzy inference system is capable of self-learning a highly transparent predictive model from streaming data on a chunk-by-chunk basis through a human-interpretable process. Very importantly, the base learner can continuously self-adjust its decision boundaries based on the inter-class and intra-class distances between prototypes identified from successive data chunks for higher classification precision. Thanks to its parallel distributed computing architecture, the proposed ensemble framework can achieve great classification precision while maintain high computational efficiency on large-scale problems. Numerical examples based on popular benchmark big data problems demonstrate the superior performance of the proposed approach over the state-of-the-art alternatives in terms of both classification accuracy and computational efficiency."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "218"; dct:creator , , ; dct:date "2021-04-22"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Self-organizing fuzzy inference ensemble system for big streaming data classification"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen"^^xsd:string; foaf:name "Plamen Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhao"^^xsd:string; foaf:givenName "Zhijin"^^xsd:string; foaf:name "Zhijin Zhao"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "09507051"; foaf:name "Knowledge-Based Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90395 \n\nA Novel Data-driven Approach to Autonomous Fuzzy Clustering\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "In this paper, a new data-driven autonomous fuzzy clustering (AFC) algorithm is proposed for static data clustering. Employing a Gaussian-type membership function, AFC firstly uses all the data samples as micro-cluster medoids to assign memberships to each other and obtains the membership matrix. Based on this, AFC chooses these data samples that represent local models of data distribution as cluster medoids for initial partition. It then continues to optimize the cluster medoids iteratively to obtain a locally optimal partition as the algorithm output. Moreover, an online extension is introduced to AFC enabling the algorithm to cluster streaming data chunk-by-chunk in a one pass manner. Numerical examples based on a variety of benchmark problems demonstrate the efficacy of the AFC algorithm in both offline and online application scenarios, proving the effectiveness and validity of the proposed concept and general principles."^^xsd:string; bibo:authorList ; bibo:status , ; dct:creator , , ; dct:date "2021-04-20"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A Novel Data-driven Approach to Autonomous Fuzzy Clustering"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ni"^^xsd:string; foaf:givenName "Qiang"^^xsd:string; foaf:name "Qiang Ni"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tang"^^xsd:string; foaf:givenName "Guolin"^^xsd:string; foaf:name "Guolin Tang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "10636706"; foaf:name "IEEE Transactions on Fuzzy Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #91358 \n\nHRV features as viable physiological markers for stress detection using wearable devices\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "Stress has been identified as one of the major causes of automobile crashes which then lead to high rates of fatalities and injuries each year. Stress can be measured via physiological measurements and in this study the focus will be based on the features that can be extracted by common wearable devices. Hence, the study will be mainly focusing on heart rate variability (HRV). This study is aimed at investigating the role of HRV-derived features as stress markers. This is achieved by developing a good predictive model that can accurately classify stress levels from ECG-derived HRV features, obtained from automobile drivers, by testing different machine learning methodologies such as K-Nearest Neighbor (KNN), Support Vector Machines (SVM), Multilayer Perceptron (MLP), Random Forest (RF) and Gradient Boosting (GB). Moreover, the models obtained with highest predictive power will be used as reference for the development of a machine learning model that would be used to classify stress from HRV features derived from heart rate measurements obtained from wearable devices. We demonstrate that HRV features constitute good markers for stress detection as the best machine learning model developed achieved a Recall of 80%. Furthermore, this study indicates that HRV metrics such as the Average of normal-to-normal (NN) intervals (AVNN), Standard deviation of the average NN intervals (SDNN) and the Root mean square differences of successive NN intervals (RMSSD) were important features for stress detection. The proposed method can be also used on all applications in which is important to monitor the stress levels in a non-invasive manner, e.g., in physical rehabilitation, anxiety relief or mental wellbeing."^^xsd:string; bibo:authorList ; bibo:issue "8"; bibo:status , ; bibo:volume "21"; dct:creator , ; dct:date "2021-04-19"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "HRV features as viable physiological markers for stress detection using wearable devices"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Multidisciplinary Digital Publishing Institute"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Dalmeida"^^xsd:string; foaf:givenName "K.M."^^xsd:string; foaf:name "K.M. Dalmeida"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Masala"^^xsd:string; foaf:givenName "Giovanni Luca"^^xsd:string; foaf:name "Giovanni Luca Masala"^^xsd:string; rdf:type foaf:Person . bibo:issn "14248220"; foaf:name "Sensors"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Blake2021_Article_EvaluatingFreeRidesAndObservat.pdf"^^xsd:string . rdfs:label "Blake2021_Article_EvaluatingFreeRidesAndObservat.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #87057 \n\nEvaluating Free Rides and Observational Advantages in Set Visualizations\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Evaluating Free Rides and Observational Advantages in Set Visualizations (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Free Rides and Observational Advantages in Set Visualizations (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Free Rides and Observational Advantages in Set Visualizations (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Free Rides and Observational Advantages in Set Visualizations (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Free Rides and Observational Advantages in Set Visualizations (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Free Rides and Observational Advantages in Set Visualizations (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Evaluating Free Rides and Observational Advantages in Set Visualizations (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Free Rides and Observational Advantages in Set Visualizations (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Free Rides and Observational Advantages in Set Visualizations (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Free Rides and Observational Advantages in Set Visualizations (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Free Rides and Observational Advantages in Set Visualizations (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Free Rides and Observational Advantages in Set Visualizations (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Free rides and observational advantages occur in visualizations when they reveal facts that must be inferred from an alternative representation. Understanding whether these concepts correspond to cognitive advantages is important: do they facilitate information extraction, saving the `deductive cost' of making inferences? This paper presents the first evaluations of free rides and observational advantages in visualizations of sets compared to text. We found that, for Euler and linear diagrams, free rides and observational advantages yielded significant improvements in task performance. For Venn diagrams, whilst their observational advantages yielded significant performance benefits over text, this was not universally true for free rides. The consequences are two-fold: more research is needed to establish when free rides are beneficial, and the results suggest that observational advantages better explain the cognitive advantages of diagrams over text. A take-away message is that visualizations with observational advantages are likely to be cognitively advantageous over competing representations."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion , ; dct:creator , , , ; dct:date "2021-04-15"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Evaluating Free Rides and Observational Advantages in Set Visualizations"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Blake"^^xsd:string; foaf:givenName "Andrew"^^xsd:string; foaf:name "Andrew Blake"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Touloumis"^^xsd:string; foaf:givenName "Anestis"^^xsd:string; foaf:name "Anestis Touloumis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Stapleton"^^xsd:string; foaf:givenName "Gem"^^xsd:string; foaf:name "Gem Stapleton"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rodgers"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Rodgers"^^xsd:string; rdf:type foaf:Person . bibo:issn "09258531"; foaf:name "Journal of Logic, Language and Information"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #91411 \n\nAuricular vagus nerve stimulation for stress reduction: Evidence from alpha prefrontal asymmetry\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "This study explores auricular vagus nerve stimulation (aVNS) within the context of stress. Five healthy subjects underwent a pulsed mode aVNS (with a frequency of 25 Hz and pulse width of 200 μs) using a custom made current stimulation device. The device triggered the auricular vagus nerve branch through the tragus for 15 minutes, with prefrontal EEG data collected pre and post aVNS (each for 5 minutes) to capture stress indicators. Given that the frontal location is prone to noise, EEG signal pre-processing through independent component analysis (ICA) was used to reduce eye movements and other artifacts. Alpha (8-14 Hz) asymmetry in prefrontal location in both hemispheres was computed from locations Fp1 and Fp2 for one second segments of EEG; these asymmetry values were normalised by subtracting the post aVNS (or placebo) from pre aVNS (placebo). The normalised alpha frontal asymmetries were assessed for statistical significance using T-test. Results showed increased aVNS alpha prefrontal asymmetry compared to placebo, indicating reduced stress. This was statistically significant ( ) for all five subjects. It is therefore concluded that the pulsed mode aVNS stimulation at the tragus may represent a potential approach for stress relief."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , , , , , ; dct:date "2021-04-14"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Auricular vagus nerve stimulation for stress reduction: Evidence from alpha prefrontal asymmetry"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "R858 Computer applications to medicine. Medical informatics. Medical information technology" . dct:title "2020 IEEE-EMBS Conference on Biomedical Engineering and Sciences (IECBES)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Langkawi, Malaysia"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Kanegaonkar"^^xsd:string; foaf:givenName "Rahul"^^xsd:string; foaf:name "Rahul Kanegaonkar"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fringi"^^xsd:string; foaf:givenName "Evangelia"^^xsd:string; foaf:name "Evangelia Fringi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mouli"^^xsd:string; foaf:givenName "Surej"^^xsd:string; foaf:name "Surej Mouli"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ollis"^^xsd:string; foaf:givenName "Jane"^^xsd:string; foaf:name "Jane Ollis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Arora"^^xsd:string; foaf:givenName "Sunil"^^xsd:string; foaf:name "Sunil Arora"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #91402 \n\nDesign of a Deep Post Gripping Perception Framework for Industrial Robots\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "The use of flexible and autonomous robotic systems is a possible solution for automation in dynamic and unstructured industrial environments. Pick and place robotic applications are becoming common for the automation of manipulation tasks in an industrial context. This context requires the robot to be aware of its surroundings throughout the whole manipulation task, even after accomplishing the gripping action. This work introduces the deep post gripping perception framework, which includes post gripping perception abilities realized with the help of deep learning techniques, mainly unsupervised learning methods. These abilities help robots to execute a stable and precise placing of the gripped items while respecting the process quality requirements. The framework development is described based on the results of a literature review on post gripping perception functions and frameworks. This results in a modular design using three building components to realize planning, monitoring and verifying modules. Experimental evaluation of the framework shows its advantages in terms of process quality and stability in pick and place applications."^^xsd:string; bibo:authorList ; bibo:issue "2"; bibo:status , ; bibo:volume "21"; dct:creator , , , , ; dct:date "2021-04-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Design of a Deep Post Gripping Perception Framework for Industrial Robots"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "The American Society of Mechanical Engineers"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Zoghlami"^^xsd:string; foaf:givenName "Firas"^^xsd:string; foaf:name "Firas Zoghlami"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Salehi"^^xsd:string; foaf:givenName "Vahid"^^xsd:string; foaf:name "Vahid Salehi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kurrek"^^xsd:string; foaf:givenName "Philip"^^xsd:string; foaf:name "Philip Kurrek"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jocas"^^xsd:string; foaf:givenName "Mark"^^xsd:string; foaf:name "Mark Jocas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Masala"^^xsd:string; foaf:givenName "Giovanni Luca"^^xsd:string; foaf:name "Giovanni Luca Masala"^^xsd:string; rdf:type foaf:Person . bibo:issn "15309827"; foaf:name "Journal of Computing and Information Science in Engineering"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "ACMTOCHI2021.pdf"^^xsd:string . rdfs:label "ACMTOCHI2021.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #87545 \n\nCogTool+: Modeling human performance at large scale\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "CogTool+: Modeling human performance at large scale (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "CogTool+: Modeling human performance at large scale (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "CogTool+: Modeling human performance at large scale (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "CogTool+: Modeling human performance at large scale (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "CogTool+: Modeling human performance at large scale (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "CogTool+: Modeling human performance at large scale (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Cognitive modeling tools have been widely used by researchers and practitioners to help design, evaluate and study computer user interfaces (UIs). Despite their usefulness, large-scale modeling tasks can still be very challenging due to the amount of manual work needed. To address this scalability challenge, we propose CogTool+, a new cognitive modeling software framework developed on top of the well-known software tool CogTool. CogTool+ addresses the scalability problem by supporting the following key features: 1) a higher level of parameterization and automation; 2) algorithmic components; 3) interfaces for using external data; 4) a clear separation of tasks, which allows programmers and psychologists to define reusable components (e.g., algorithmic modules and behavioral templates) that can be used by UI/UX researchers and designers without the need to understand the low-level implementation details of such components. CogTool+ also supports mixed cognitive models required for many large-scale modeling tasks and provides an offline analyzer of simulation results. In order to show how CogTool+ can reduce the human effort required for large-scale modeling, we illustrate how it works using a pedagogical example, and demonstrate its s actual performance by applying it to large-scale modeling tasks of two real-world user-authentication systems."^^xsd:string; bibo:authorList ; bibo:issue "2"; bibo:status , ; bibo:volume "28"; dc:hasVersion ; dct:creator , , ; dct:date "2021-04"; dct:isPartOf , ; dct:publisher ; dct:subject , , , ; dct:title "CogTool+: Modeling human performance at large scale"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Yuan"^^xsd:string; foaf:givenName "Haiyue"^^xsd:string; foaf:name "Haiyue Yuan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rusconi"^^xsd:string; foaf:givenName "Patrice"^^xsd:string; foaf:name "Patrice Rusconi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . bibo:issn "10730516"; foaf:name "ACM Transactions on Computer-Human Interaction"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Gaboardi2021_Chapter_GradedHoareLogicAndItsCategori.pdf"^^xsd:string . rdfs:label "Gaboardi2021_Chapter_GradedHoareLogicAndItsCategori.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91713 \n\nGraded Hoare Logic and its Categorical Semantics\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Graded Hoare Logic and its Categorical Semantics (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Graded Hoare Logic and its Categorical Semantics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Graded Hoare Logic and its Categorical Semantics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Graded Hoare Logic and its Categorical Semantics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Graded Hoare Logic and its Categorical Semantics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Graded Hoare Logic and its Categorical Semantics (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Deductive verification techniques based on program logics (i.e., the family of Floyd-Hoare logics) are a powerful approach for program reasoning. Recently, there has been a trend of increasing the expressive power of such logics by augmenting their rules with additional information to reason about program side-effects. For example, general program logics have been augmented with cost analyses, logics for probabilistic computations have been augmented with estimate measures, and logics for differential privacy with indistinguishability bounds. In this work, we unify these various approaches via the paradigm of grading,\r\nadapted from the world of functional calculi and semantics. We propose Graded Hoare Logic (GHL), a parameterisable framework for augmenting program logics with a preordered monoidal analysis. We develop a\r\nsemantic framework for modelling GHL such that grading, logical assertions (pre- and post-conditions) and the underlying effectful semantics of an imperative language can be integrated together. Central to our\r\nframework is the notion of a graded category which we extend here, introducing graded Freyd categories which provide a semantics that can interpret many examples of augmented program logics from the literature.\r\nWe leverage coherent fibrations to model the base assertion language, and thus the overall setting is also fibrational."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2021-03-27"; dct:isPartOf , ; dct:publisher ; dct:title "Graded Hoare Logic and its Categorical Semantics"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Katsumata"^^xsd:string; foaf:givenName "Shin-ya"^^xsd:string; foaf:name "Shin-ya Katsumata"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sato"^^xsd:string; foaf:givenName "Tetsuya"^^xsd:string; foaf:name "Tetsuya Sato"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gaboardi"^^xsd:string; foaf:givenName "Marco"^^xsd:string; foaf:name "Marco Gaboardi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Orchard"^^xsd:string; foaf:givenName "Dominic"^^xsd:string; foaf:name "Dominic Orchard"^^xsd:string; rdf:type foaf:Person . foaf:name "European Symposium on Programming 2021"^^xsd:string; rdf:type bibo:Collection . rdfs:label "2010.13163.pdf"^^xsd:string . rdfs:label "2010.13163.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91712 \n\nGraded Modal Dependent Type Theory\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Graded Modal Dependent Type Theory (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Graded Modal Dependent Type Theory (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Graded Modal Dependent Type Theory (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Graded Modal Dependent Type Theory (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Graded Modal Dependent Type Theory (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Graded Modal Dependent Type Theory (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Graded type theories are an emerging paradigm for augmenting the reasoning power of types with parameterizable, fine-grained analyses of program properties. There have been many such theories in recent years which equip a type theory with quantitative dataflow tracking, usually via a semiring-like structure which provides analysis on variables (often called ‘quantitative’ or ‘coeffect’ theories). We present Graded Modal Dependent Type Theory (Grtt for short), which equips a dependent type theory with a general, parameterizable analysis of the flow of data, both in and between computational terms and types. In this theory, it is possible to study, restrict, and reason about data use in programs and types, enabling, for example, parametric quantifiers and linearity to be captured in a dependent setting. We propose Grtt, study its metatheory, and explore various case studies of its use in reasoning about programs and studying other type theories. We have implemented the theory and highlight the interesting details, including showing an application of grading to optimising the type checking procedure itself."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-03-27"; dct:isPartOf , ; dct:publisher ; dct:title "Graded Modal Dependent Type Theory"^^xsd:string; ep:hasDocument , , , , , ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Moon"^^xsd:string; foaf:givenName "Benjamin"^^xsd:string; foaf:name "Benjamin Moon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Orchard"^^xsd:string; foaf:givenName "Dominic"^^xsd:string; foaf:name "Dominic Orchard"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Eades"^^xsd:string; foaf:givenName "Harley"^^xsd:string; foaf:name "Harley Eades"^^xsd:string; rdf:type foaf:Person . foaf:name "Programming Languages and Systems - 30th European Symposium on Programming, ESOP 2021, Held as Part of the European Joint Conferences on Theory and Practice of Software"^^xsd:string; rdf:type bibo:Collection . rdfs:label "2007.07788.pdf"^^xsd:string . rdfs:label "2007.07788.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #84603 \n\nCANet: Context Aware Network for Brain Glioma Segmentation\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "CANet: Context Aware Network for Brain Glioma Segmentation (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "CANet: Context Aware Network for Brain Glioma Segmentation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "CANet: Context Aware Network for Brain Glioma Segmentation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "CANet: Context Aware Network for Brain Glioma Segmentation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "CANet: Context Aware Network for Brain Glioma Segmentation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "CANet: Context Aware Network for Brain Glioma Segmentation (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 . bibo:abstract "Automated segmentation of brain glioma plays an active role in diagnosis decision, progression monitoring and surgery planning. Based on deep neural networks, previous studies have shown promising technologies for brain glioma segmentation. However, these approaches lack powerful strategies to incorporate contextual information of tumor cells and their surrounding, which has been proven as a fundamental cue to deal with local ambiguity. In this work, we propose a novel approach named Context-Aware Network (CANet) for brain glioma segmentation. CANet captures high dimensional and discriminative features with contexts from both the convolutional space and feature interaction graphs. We further propose context guided attentive conditional random fields which can selectively aggregate features. We evaluate our method using publicly accessible brain glioma segmentation datasets BRATS2017, BRATS2018 and BRATS2019. The experimental results show that the proposed algorithm has better or competitive performance against several State-of-The-Art approaches under different segmentation metrics on the training and validation sets."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , , , , ; dct:date "2021-03-15"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "CANet: Context Aware Network for Brain Glioma Segmentation"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science (General)"@en . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Zhou"^^xsd:string; foaf:givenName "Feixiang"^^xsd:string; foaf:name "Feixiang Zhou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Yinhai"^^xsd:string; foaf:name "Yinhai Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tong"^^xsd:string; foaf:givenName "Lei"^^xsd:string; foaf:name "Lei Tong"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhang"^^xsd:string; foaf:givenName "Qianni"^^xsd:string; foaf:name "Qianni Zhang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jiang"^^xsd:string; foaf:givenName "Zheheng"^^xsd:string; foaf:name "Zheheng Jiang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Liu"^^xsd:string; foaf:givenName "Zhihua"^^xsd:string; foaf:name "Zhihua Liu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Shan"^^xsd:string; foaf:givenName "Caifeng"^^xsd:string; foaf:name "Caifeng Shan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhou"^^xsd:string; foaf:givenName "Huiyu"^^xsd:string; foaf:name "Huiyu Zhou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chen"^^xsd:string; foaf:givenName "Long"^^xsd:string; foaf:name "Long Chen"^^xsd:string; rdf:type foaf:Person . bibo:issn "02780062"; foaf:name "IEEE Transactions on Medical Imaging"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Phan CNN-MoE based 2021 Accepted.pdf"^^xsd:string . rdfs:label "Phan CNN-MoE based 2021 Accepted.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91393 \n\nCNN-MoE based framework for classification of respiratory anomalies and lung disease detection\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "CNN-MoE based framework for classification of respiratory anomalies and lung disease detection (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "CNN-MoE based framework for classification of respiratory anomalies and lung disease detection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "CNN-MoE based framework for classification of respiratory anomalies and lung disease detection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "CNN-MoE based framework for classification of respiratory anomalies and lung disease detection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "CNN-MoE based framework for classification of respiratory anomalies and lung disease detection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "CNN-MoE based framework for classification of respiratory anomalies and lung disease detection (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "This paper presents and explores a robust deep learning framework for auscultation analysis. This aims to classify anomalies in respiratory cycles and detect diseases, from respiratory sound recordings. The framework begins with front-end feature extraction that transforms input sound into a spectrogram representation. Then, a back-end deep learning network is used to classify the spectrogram features into categories of respiratory anomaly cycles or diseases. Experiments, conducted over the ICBHI benchmark dataset of respiratory sounds, confirm three main contributions towards respiratory- sound analysis. Firstly, we carry out an extensive exploration of the effect of spectrogram types, spectral-time resolution, overlapping/non-overlapping windows, and data augmentation on final prediction accuracy. This leads us to propose a novel deep learning system, built on the proposed framework, which outperforms current state-of-the-art methods. Finally, we apply a Teacher-Student scheme to achieve a trade-off between model performance and model complexity which holds promise for building real-time applications."^^xsd:string; bibo:authorList ; bibo:issue "8"; bibo:status , ; bibo:volume "25"; dc:hasVersion ; dct:creator , , , , ; dct:date "2021-03-08"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "CNN-MoE based framework for classification of respiratory anomalies and lung disease detection"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "R858 Computer applications to medicine. Medical informatics. Medical information technology" . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Mertins"^^xsd:string; foaf:givenName "Alfred"^^xsd:string; foaf:name "Alfred Mertins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pham"^^xsd:string; foaf:givenName "Lam Dang"^^xsd:string; foaf:name "Lam Dang Pham"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . bibo:issn "21682194"; foaf:name "IEEE Journal of Biomedical and Health Informatics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "SnapAppy__after_Elsevier_corrections_3_-3.pdf"^^xsd:string . rdfs:label "SnapAppy__after_Elsevier_corrections_3_-3.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #87300 \n\nSnapAppy: A positive psychology intervention using smartphone photography to improve emotional well-being\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "SnapAppy: A positive psychology intervention using smartphone photography to improve emotional well-being (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "SnapAppy: A positive psychology intervention using smartphone photography to improve emotional well-being (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SnapAppy: A positive psychology intervention using smartphone photography to improve emotional well-being (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SnapAppy: A positive psychology intervention using smartphone photography to improve emotional well-being (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SnapAppy: A positive psychology intervention using smartphone photography to improve emotional well-being (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SnapAppy: A positive psychology intervention using smartphone photography to improve emotional well-being (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Momentary photography is enjoyed by many smartphone users, especially with the popularity of apps such as Snapchat and Instagram. Many traditional positive psychology interventions focus on lengthy writing tasks to express positive emotions experienced during past events, acts of kindness and gratuitous situations. In this work we developed SnapAppy, a smartphone application to integrate momentary photography with traditional intervention methodologies to conduct a month-long positive psychology intervention to improve emotional well-being. A study involving 74 participants aimed to assess whether photo-taking, photo viewing and image contents are correlated with improvements in certain aspects of the participant’s emotional well-being including their mood, affect and satisfaction with life. The results indicated that features including the number of photos, the variety of categories, the effort applied to annotating photos, the number of photos revisited and photos taken of people were positively correlated with an improvement in the participant’s mood and positive and negative affect (PANAS)."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2021-03-06"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "SnapAppy: A positive psychology intervention using smartphone photography to improve emotional well-being"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Efstratiou"^^xsd:string; foaf:givenName "Christos"^^xsd:string; foaf:name "Christos Efstratiou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ang"^^xsd:string; foaf:givenName "Chee Siang"^^xsd:string; foaf:name "Chee Siang Ang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sharma"^^xsd:string; foaf:givenName "Dinkar"^^xsd:string; foaf:name "Dinkar Sharma"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lee"^^xsd:string; foaf:givenName "James Alexander"^^xsd:string; foaf:name "James Alexander Lee"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Siriaraya"^^xsd:string; foaf:givenName "Panote"^^xsd:string; foaf:name "Panote Siriaraya"^^xsd:string; rdf:type foaf:Person . bibo:issn "15741192"; foaf:name "Pervasive and Mobile Computing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Ribeiro-Freitas2021_Article_AData-drivenMissingValueImputa.pdf"^^xsd:string . rdfs:label "Ribeiro-Freitas2021_Article_AData-drivenMissingValueImputa.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #88186 \n\nA data-driven missing value imputation approach for longitudinal datasets\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "A data-driven missing value imputation approach for longitudinal datasets (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A data-driven missing value imputation approach for longitudinal datasets (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A data-driven missing value imputation approach for longitudinal datasets (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A data-driven missing value imputation approach for longitudinal datasets (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A data-driven missing value imputation approach for longitudinal datasets (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A data-driven missing value imputation approach for longitudinal datasets (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A data-driven missing value imputation approach for longitudinal datasets (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A data-driven missing value imputation approach for longitudinal datasets (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A data-driven missing value imputation approach for longitudinal datasets (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A data-driven missing value imputation approach for longitudinal datasets (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A data-driven missing value imputation approach for longitudinal datasets (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A data-driven missing value imputation approach for longitudinal datasets (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Longitudinal datasets of human ageing studies usually have a high volume of missing data, and one way to handle missing values in a dataset is to replace them with estimations. However, there are many methods to estimate missing values, and no single method is the best for all datasets. In this article, we propose a data-driven missing value imputation approach that performs a feature-wise selection of the best imputation method, using known information in the dataset to rank the five methods we selected, based on their estimation error rates. We evaluated the proposed approach in two sets of experiments: a classifier-independent scenario, where we compared the applicabilities and error rates of each imputation method; and a classifier-dependent scenario, where we compared the predictive accuracy of Random Forest classifiers generated with datasets prepared using each imputation method and a baseline approach of doing no imputation (letting the classification algorithm handle the missing values internally). Based on our results from both sets of experiments, we concluded that the proposed data-driven missing value imputation approach generally resulted in models with more accurate estimations for missing data and better performing classifiers, in longitudinal datasets of human ageing. We also observed that imputation methods devised specifically for longitudinal data had very accurate estimations. This reinforces the idea that using the temporal information intrinsic to longitudinal data is a worthwhile endeavour for machine learning applications, and that can be achieved through the proposed data-driven approach."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion , ; dct:creator , ; dct:date "2021-03-06"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A data-driven missing value imputation approach for longitudinal datasets"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ribeiro"^^xsd:string; foaf:givenName "Caio"^^xsd:string; foaf:name "Caio Ribeiro"^^xsd:string; rdf:type foaf:Person . bibo:issn "02692821"; foaf:name "Artificial Intelligence Review"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "102222.pdf"^^xsd:string . rdfs:label "102222.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91409 \n\nTragus Based Vagus Nerve Stimulation for Stress Reduction\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Tragus Based Vagus Nerve Stimulation for Stress Reduction (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Tragus Based Vagus Nerve Stimulation for Stress Reduction (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tragus Based Vagus Nerve Stimulation for Stress Reduction (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tragus Based Vagus Nerve Stimulation for Stress Reduction (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tragus Based Vagus Nerve Stimulation for Stress Reduction (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tragus Based Vagus Nerve Stimulation for Stress Reduction (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Non-invasive vagus nerve stimulation is fast becoming a popular alternative treatment method for various health disorders. The authors investigated the effects of auricular vagus nerve stimulation at tragus for activating the parasympathetic nervous system to reduce stress, in light of mixed results from other studies. Stimulation frequency of 25 Hz with a pulse-width of 200 μs was administered at tragus with ECG data recorded during pre- and post-stimulation trials to investigate changes in the low-frequency (LF) and high-frequency (HF) parameters of heart rate variability (HRV). The results from five subjects demonstrate an increase in the HF component and a decrease in LF when comparing pre- and post- stimulation values, denoting that VNS stimulated more of the parasympathetic activity. The LF/HF ratio was reduced for all participants after stimulation, with an average reduction of 64:5% observed. Overall, this study has indicated the feasibility of using tragus as a stimulation site to stimulate the vagus nerve; tragus being easier to administrate than many alternative sites while still being effective for stress reduction."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , ; dct:date "2021-03-04"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Tragus Based Vagus Nerve Stimulation for Stress Reduction"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "R858 Computer applications to medicine. Medical informatics. Medical information technology" . dct:title "14th International Conference on Bio-Inspired Systems and Signal Processing"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Vienna, Austria"^^xsd:string . foaf:name "Science Technology Publications"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ollis"^^xsd:string; foaf:givenName "Jane"^^xsd:string; foaf:name "Jane Ollis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sunil"^^xsd:string; foaf:givenName "Arora"^^xsd:string; foaf:name "Arora Sunil"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mouli"^^xsd:string; foaf:givenName "Surej"^^xsd:string; foaf:name "Surej Mouli"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kanegaonkar"^^xsd:string; foaf:givenName "Rahul"^^xsd:string; foaf:name "Rahul Kanegaonkar"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . bibo:issn "21844305"; foaf:name "BIOSIGNALS"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Persistence_in_IoT_Malware_Camera_Ready.pdf"^^xsd:string . rdfs:label "Persistence_in_IoT_Malware_Camera_Ready.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #84209 \n\nPersistence in Linux-Based IoT Malware\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Persistence in Linux-Based IoT Malware (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Persistence in Linux-Based IoT Malware (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Persistence in Linux-Based IoT Malware (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Persistence in Linux-Based IoT Malware (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Persistence in Linux-Based IoT Malware (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Persistence in Linux-Based IoT Malware (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "The Internet of Things (IoT) is a rapidly growing collection of “smart” devices capable of communicating over the Internet. Being connected to the Internet brings new features and convenience, but it also poses new security threats, such as IoT malware. IoT malware has shown similar growth, making IoT devices highly vulnerable to remote compromise. However, most IoT malware variants do not exhibit the ability to gain persistence, as they typically lose control over the compromised device when the device is restarted. This paper investigates how persistence for various IoT devices can be implemented by attackers, such that they retain control even after the device has been rebooted. Having persistence would make it harder to remove IoT malware. We investigated methods that could be used by an attacker to gain persistence on a variety of IoT devices, and compiled the requirements and potential issues faced by these methods, in order to understand how best to combat this future threat. We successfully used these methods to gain persistence on four vulnerable IoT devices with differing designs, features and architectures. We also identified ways to counter them. This work highlights the enormous risk that persistence poses to potentially billions of IoT devices, and we hope our results and study will encourage manufacturers and developers to consider implementing our proposed countermeasures or create new techniques to combat this nascent threat."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "12556"; dc:hasVersion ; dct:creator , , , , ; dct:date "2021-03-03"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Persistence in Linux-Based IoT Malware"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "25th Nordic Conference on Secure IT Systems (Nordsec)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Linköping, Sweden"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Arief"^^xsd:string; foaf:givenName "Budi"^^xsd:string; foaf:name "Budi Arief"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Brierley"^^xsd:string; foaf:givenName "Calvin"^^xsd:string; foaf:name "Calvin Brierley"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Barnes"^^xsd:string; foaf:givenName "David J."^^xsd:string; foaf:name "David J. Barnes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio C."^^xsd:string; foaf:name "Julio C. Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pont"^^xsd:string; foaf:givenName "Jamie"^^xsd:string; foaf:name "Jamie Pont"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Cyber_Security_in_the_Age_of_COVID_19.pdf"^^xsd:string . rdfs:label "Cyber_Security_in_the_Age_of_COVID_19.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #86976 \n\nCyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "The COVID-19 pandemic was a remarkable, unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of societal norms and the way we live and work. Aside from the extraordinary impact on society and business as a whole, the pandemic generated a set of unique cyber-crime related circumstances which also affected society and business. The increased anxiety caused by the pandemic heightened the likelihood of cyber-attacks succeeding corresponding with an increase in the number and range of cyber-attacks. This paper analyses the COVID-19 pandemic from a cyber-crime perspective and highlights the range of cyber-attacks experienced globally during the pandemic. Cyber-attacks are analysed and considered within the context of key global events to reveal the modus-operandi of cyber-attack campaigns. The analysis shows how following what appeared to be large gaps between the initial outbreak of the pandemic in China and the first COVID-19 related cyber-attack, attacks steadily became much more prevalent to the point that on some days, three or four unique cyber-attacks were being reported. The analysis proceeds to utilise the UK as a case study to demonstrate how cyber-criminals leveraged salient events and governmental announcements to carefully craft and execute cyber-crime campaigns."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2021-03-03"; dct:isPartOf , ; dct:publisher ; dct:subject , , , , ; dct:title "Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Erola"^^xsd:string; foaf:givenName "Arnau"^^xsd:string; foaf:name "Arnau Erola"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Epiphaniou"^^xsd:string; foaf:givenName "Gregory"^^xsd:string; foaf:name "Gregory Epiphaniou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lalli"^^xsd:string; foaf:givenName "Harjinder Singh"^^xsd:string; foaf:name "Harjinder Singh Lalli"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Shepherd"^^xsd:string; foaf:givenName "Lynsay A."^^xsd:string; foaf:name "Lynsay A. Shepherd"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Maple"^^xsd:string; foaf:givenName "Carsten"^^xsd:string; foaf:name "Carsten Maple"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bellekens"^^xsd:string; foaf:givenName "Xavier"^^xsd:string; foaf:name "Xavier Bellekens"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "01674048"; foaf:name "Computers & Security"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "HCII_2021-Chatbots-Privacy.pdf"^^xsd:string . rdfs:label "HCII_2021-Chatbots-Privacy.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #87226 \n\nPrivacy Concerns in Chatbot Interactions: When to Trust and When to Worry\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Through advances in their conversational abilities, chatbots have started to request and process an increasing variety of sensitive personal information. The accurate disclosure of sensitive information is essential where it is used to provide advice and support to users in the healthcare and finance sectors.\r\nIn this study, we explore users' concerns regarding factors associated with the use of sensitive data by chatbot providers. We surveyed a representative sample of 491 British citizens. \r\nOur results show that the user concerns focus on deleting personal information and concerns about their data's inappropriate use. We also identified that individuals were concerned about losing control over their data after a conversation with conversational agents. We found no effect from a user's gender or education but did find an effect from the user's age, with those over 45 being more concerned than those under 45. \r\nWe also considered the factors that engender trust in a chatbot. Our respondents' primary focus was on the chatbot's technical elements, with factors such as the response quality being identified as the most critical factor. We again found no effect from the user's gender or education level; however, when we considered some social factors (e.g. avatars or perceived `friendliness'), we found those under 45 years old rated these as more important than those over 45. \r\nThe paper concludes with a discussion of these results within the context of designing inclusive, digital systems that support a wide range of users."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-03-01"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "23rd International Conference on Human-Computer Interaction"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Online"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hodges"^^xsd:string; foaf:givenName "Duncan"^^xsd:string; foaf:name "Duncan Hodges"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Belen Sağlam"^^xsd:string; foaf:givenName "Rahime"^^xsd:string; foaf:name "Rahime Belen Sağlam"^^xsd:string; rdf:type foaf:Person . rdfs:label "Sharing_Secrets_with_Agents.pdf"^^xsd:string . rdfs:label "Sharing_Secrets_with_Agents.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #87341 \n\nSharing Secrets with Agents: Improving Sensitive Disclosures using Chatbots\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Sharing Secrets with Agents: Improving Sensitive Disclosures using Chatbots (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Sharing Secrets with Agents: Improving Sensitive Disclosures using Chatbots (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sharing Secrets with Agents: Improving Sensitive Disclosures using Chatbots (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sharing Secrets with Agents: Improving Sensitive Disclosures using Chatbots (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sharing Secrets with Agents: Improving Sensitive Disclosures using Chatbots (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sharing Secrets with Agents: Improving Sensitive Disclosures using Chatbots (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "There is an increasing shift towards the use of conversational agents, or chatbots, thanks to their inclusion in consumer hardware (e.g. Alexa, Siri and Google Assistant) and the growing number of essential services moving online. A chatbot allows an organisation to deal with a large volume of user queries with minimal overheads, which in turn allows human operators to deal with more complex issues. In this paper we present our work on maximising responsible, sensitive disclosures to chatbots. The paper focuses on two key studies, the first of which surveyed participants to establish the relative sensitivity of a range of disclosures. From this, we found that participants were equally comfortable making financial disclosures to a chatbot as to a human. The second study looked to support the dynamic personalisation of the chatbot in order to improve the disclosures. This was achieved by exploiting behavioural biometrics (keystroke and mouse dynamics) to identify demographic information about anonymous users. The research highlighted that a fusion approach, combining both keyboard and mouse dynamics, was the most reliable predictor of these biographic characteristics."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2021-03-01"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Sharing Secrets with Agents: Improving Sensitive Disclosures using Chatbots"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "23rd International Conference on Human-Computer Interaction"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Online"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Dawes"^^xsd:string; foaf:givenName "Helen"^^xsd:string; foaf:name "Helen Dawes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hodges"^^xsd:string; foaf:givenName "Duncan"^^xsd:string; foaf:name "Duncan Hodges"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wyer"^^xsd:string; foaf:givenName "Natalie"^^xsd:string; foaf:name "Natalie Wyer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Buckley"^^xsd:string; foaf:givenName "Oliver"^^xsd:string; foaf:name "Oliver Buckley"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Earl"^^xsd:string; foaf:givenName "Sally"^^xsd:string; foaf:name "Sally Earl"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Belen Sağlam"^^xsd:string; foaf:givenName "Rahime"^^xsd:string; foaf:name "Rahime Belen Sağlam"^^xsd:string; rdf:type foaf:Person . rdfs:label "HCII_2021-nurse-remote-working.pdf"^^xsd:string . rdfs:label "HCII_2021-nurse-remote-working.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #87308 \n\nRemote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "COVID-19 has radically changed society as we know it. To reduce the spread of the virus, millions across the globe have been forced to work remotely, often in make-shift home offices, and using a plethora of new, unfamiliar digital technologies. In this article, we critically analyse cyber security and privacy concerns arising due to remote working during the coronavirus pandemic. Through our work, we discover a series of security risks emerging because of the realities of this period. For instance, lack of remote-working security training, heightened stress and anxiety, rushed technology deployment, and the presence of untrusted individuals in a remote-working environment (e.g., in flatshares), can result in new cyber-risk. Simultaneously, we find that as organisations look to manage these and other risks posed by their remote workforces, employee's privacy (including personal information and activities) is often compromised. This is apparent in the significant adoption of remote workplace monitoring, management and surveillance technologies. Such technologies raise several privacy and ethical questions, and further highlight the tension between security and privacy going forward."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , ; dct:date "2021-03-01"; dct:isPartOf ; dct:subject , , ; dct:title "Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "HF Commerce"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "23rd International Conference on Human-Computer Interaction"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Online"^^xsd:string . foaf:familyName "Williams"^^xsd:string; foaf:givenName "Nikki"^^xsd:string; foaf:name "Nikki Williams"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Panteli"^^xsd:string; foaf:givenName "Niki"^^xsd:string; foaf:name "Niki Panteli"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Blythe"^^xsd:string; foaf:givenName "John"^^xsd:string; foaf:name "John Blythe"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Collins"^^xsd:string; foaf:givenName "Emily"^^xsd:string; foaf:name "Emily Collins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Koppelman"^^xsd:string; foaf:givenName "Ben"^^xsd:string; foaf:name "Ben Koppelman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90408 \n\nRobust unsupervised small area change detection from SAR imagery using deep learning\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Small area change detection using synthetic aperture radar (SAR) imagery is a highly challenging task, due to speckle noise and imbalance between classes (changed and unchanged). In this paper, a robust unsupervised approach is proposed for small area change detection using deep learning techniques. First, a multi-scale superpixel reconstruction method is developed to generate a difference image (DI), which can suppress the speckle noise effectively and enhance edges by exploiting local, spatially homogeneous information. Second, a two-stage centre-constrained fuzzy c-means clustering algorithm is proposed to divide the pixels of the DI into changed, unchanged and intermediate classes with a parallel clustering strategy. Image patches belonging to the first two classes are then constructed as pseudo-label training samples, and image patches of the intermediate class are treated as testing samples. Finally, a convolutional wavelet neural network (CWNN) is designed and trained to classify testing samples into changed or unchanged classes, coupled with a deep convolutional generative adversarial network (DCGAN) to increase the number of changed class within the pseudo-label training samples. Numerical experiments on four real SAR datasets demonstrate the validity and robustness of the proposed approach, achieving up to 99.61% accuracy for small area change detection"^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "173"; dct:creator , , , , , ; dct:date "2021-03-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Robust unsupervised small area change detection from SAR imagery using deep learning"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Zhang"^^xsd:string; foaf:givenName "Ce"^^xsd:string; foaf:name "Ce Zhang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tan"^^xsd:string; foaf:givenName "Xiaoheng"^^xsd:string; foaf:name "Xiaoheng Tan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhang"^^xsd:string; foaf:givenName "Xinzheng"^^xsd:string; foaf:name "Xinzheng Zhang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Su"^^xsd:string; foaf:givenName "Hang"^^xsd:string; foaf:name "Hang Su"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Atkinson"^^xsd:string; foaf:givenName "Peter M."^^xsd:string; foaf:name "Peter M. Atkinson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "09242716"; foaf:name "ISPRS Journal of Photogrammetry and Remote Sensing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "147A.Wesek_Masters_Thesis_Corrected_Final.pdf"^^xsd:string . rdfs:label "147A.Wesek_Masters_Thesis_Corrected_Final.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #87195 \n\nA Comprehensive Study of State-of-the-Art Word Embedding Algorithms for Natural Language\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Comprehensive Study of State-of-the-Art Word Embedding Algorithms for Natural Language (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Comprehensive Study of State-of-the-Art Word Embedding Algorithms for Natural Language (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Comprehensive Study of State-of-the-Art Word Embedding Algorithms for Natural Language (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Comprehensive Study of State-of-the-Art Word Embedding Algorithms for Natural Language (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Comprehensive Study of State-of-the-Art Word Embedding Algorithms for Natural Language (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Comprehensive Study of State-of-the-Art Word Embedding Algorithms for Natural Language (Other)"^^xsd:string . rdf:_1 . ; bibo:authorList ; bibo:status ; dct:creator ; dct:date "2021-03"; dct:isPartOf ; dct:issuer , ; dct:title "A Comprehensive Study of State-of-the-Art Word Embedding Algorithms for Natural Language"^^xsd:string; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Wesek"^^xsd:string; foaf:givenName "Adrian"^^xsd:string; foaf:name "Adrian Wesek"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grzes"^^xsd:string; foaf:givenName "Marek"^^xsd:string; foaf:name "Marek Grzes"^^xsd:string; rdf:type foaf:Person . rdfs:label "prog21-aumayr-et-al-capturing-high-level-nondeterminism-in-concurrent-programs-for-practical-concurrency-model-agnostic-record-replay.pdf"^^xsd:string . rdfs:label "prog21-aumayr-et-al-capturing-high-level-nondeterminism-in-concurrent-programs-for-practical-concurrency-model-agnostic-record-replay.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #86718 \n\nCapturing High-level Nondeterminism in Concurrent Programs for Practical Concurrency Model Agnostic Record and Replay\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Capturing High-level Nondeterminism in Concurrent Programs for Practical Concurrency Model Agnostic Record and Replay (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Capturing High-level Nondeterminism in Concurrent Programs for Practical Concurrency Model Agnostic Record and Replay (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Capturing High-level Nondeterminism in Concurrent Programs for Practical Concurrency Model Agnostic Record and Replay (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Capturing High-level Nondeterminism in Concurrent Programs for Practical Concurrency Model Agnostic Record and Replay (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Capturing High-level Nondeterminism in Concurrent Programs for Practical Concurrency Model Agnostic Record and Replay (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Capturing High-level Nondeterminism in Concurrent Programs for Practical Concurrency Model Agnostic Record and Replay (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "With concurrency being integral to most software systems, developers combine high-level concurrency models in the same application to tackle each problem with appropriate abstractions. While languages and libraries offer a wide range of concurrency models, debugging support for applications that combine them has not yet gained much attention. Record & replay aids debugging by deterministically reproducing recorded bugs, but is typically designed for a single concurrency model only. This paper proposes a practical concurrency-model-agnostic record & replay approach for multi-paradigm concurrent programs, i.e. applications that combine concurrency models. Our approach traces high-level non- deterministic events by using a uniform model-agnostic trace format and infrastructure. This enables ordering- based record & replay support for a wide range of concurrency models, and thereby enables debugging of applications that combine them. In addition, it allows language implementors to add new concurrency mod- els and reuse the model-agnostic record & replay support. We argue that a concurrency-model-agnostic record & replay is practical and enables advanced debugging support for a wide range of concurrency models. The evaluation shows that our approach is expressive and flexible enough to support record & replay of applications using threads & locks, communicating event loops, communicating sequential processes, software transactional memory and combinations of those concurrency models. For the actor model, we reach recording performance competitive with an optimized special-purpose record & replay solution. The average recording overhead on the Savina actor benchmark suite is 10% (min. 0%, max. 23%). The performance for other concurrency models and combinations thereof is at a similar level. We believe our concurrency-model-agnostic approach helps developers of applications that mix and match concurrency models. We hope that this substrate inspires new tools and languages making building and maintaining of multi-paradigm concurrent applications simpler and safer."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "5"; dc:hasVersion ; dct:creator , , , , ; dct:date "2021-02-28"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Capturing High-level Nondeterminism in Concurrent Programs for Practical Concurrency Model Agnostic Record and Replay"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "AOSA Inc."^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Aumayr"^^xsd:string; foaf:givenName "Dominik"^^xsd:string; foaf:name "Dominik Aumayr"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mössenböck"^^xsd:string; foaf:givenName "Hanspeter"^^xsd:string; foaf:name "Hanspeter Mössenböck"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gonzalez Boix"^^xsd:string; foaf:givenName "Elisa"^^xsd:string; foaf:name "Elisa Gonzalez Boix"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kaleba"^^xsd:string; foaf:givenName "Sophie"^^xsd:string; foaf:name "Sophie Kaleba"^^xsd:string; rdf:type foaf:Person . bibo:issn "24737321"; foaf:name "The Art, Science, and Engineering of Programming"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90816 \n\nRegular Form Based Sliding Mode Control Design \non a Two-wheeled Inverted Pendulum\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Regular Form Based Sliding Mode Control Design\r\non a Two-wheeled Inverted Pendulum (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Regular Form Based Sliding Mode Control Design\r\non a Two-wheeled Inverted Pendulum (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Regular Form Based Sliding Mode Control Design\r\non a Two-wheeled Inverted Pendulum (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Regular Form Based Sliding Mode Control Design\r\non a Two-wheeled Inverted Pendulum (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Regular Form Based Sliding Mode Control Design\r\non a Two-wheeled Inverted Pendulum (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Regular Form Based Sliding Mode Control Design\r\non a Two-wheeled Inverted Pendulum (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "In this paper, a Lagrangian-based dynamics is employed for a Two-\r\nwheeled Inverted Pendulum with the consideration of unknown matched and unmatched\r\nuncertainties which are bounded by known nonlinear functions. The model is linearised\r\nand further transformed into a regular form to facilitate the analysis and design. A sliding\r\nsurface is designed, and a set of conditions is developed such that the resulting sliding\r\nmotion is uniformly ultimately bounded from a practical perspective. Further, a sliding\r\nmode control scheme is proposed such that the system is driven to the sliding surface in\r\n�nite time and maintained on it thereafter. Finally, both simulation and experiment are\r\npresented using practical model parameters data to demonstrate the e�ectiveness and\r\nrobustness of the regulation control."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2021-02-26"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Regular Form Based Sliding Mode Control Design\r\non a Two-wheeled Inverted Pendulum"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Control engineering"@en . foaf:name "Inderscience"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Sirlantzis"^^xsd:string; foaf:givenName "Konstantinos"^^xsd:string; foaf:name "Konstantinos Sirlantzis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Howells"^^xsd:string; foaf:givenName "Gareth"^^xsd:string; foaf:name "Gareth Howells"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yan"^^xsd:string; foaf:givenName "Xinggang"^^xsd:string; foaf:name "Xinggang Yan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yang"^^xsd:string; foaf:givenName "Yankun"^^xsd:string; foaf:name "Yankun Yang"^^xsd:string; rdf:type foaf:Person . bibo:issn "17466172"; foaf:name "International Journal of Modelling, Identification and Control"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "WMWB2020_010_original_v1.pdf"^^xsd:string . rdfs:label "WMWB2020_010_original_v1.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #84439 \n\nAdapting to Movement Patterns for Face Recognition on Mobile Devices\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Adapting to Movement Patterns for Face Recognition on Mobile Devices (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Adapting to Movement Patterns for Face Recognition on Mobile Devices (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Adapting to Movement Patterns for Face Recognition on Mobile Devices (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Adapting to Movement Patterns for Face Recognition on Mobile Devices (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Adapting to Movement Patterns for Face Recognition on Mobile Devices (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Adapting to Movement Patterns for Face Recognition on Mobile Devices (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 . , , , , , , , ; bibo:abstract "Facial recognition is becoming an increasingly popular way to authenticate users, helped by the increased use of biometric technology within mobile devices, such as smartphones and tablets. Biometric systems use thresholds to identify whether a user is genuine or an impostor. Traditional biometric systems are static (such as eGates at airports), which allow the operators and developers to create an environment most suited for the successful operation of the biometric technology by using a fixed threshold value to determine the authenticity of the user. However, with a mobile device and scenario, the operational conditions are beyond the control of the developers and operators.\r\n\r\nIn this paper, we propose a novel approach to mobile biometric authentication within a mobile scenario, by offering an adaptive threshold to authenticate users based on the environment, situations and conditions in which they are operating the device. Utilising smartphone sensors, we demonstrate the creation of a successful scenario classification. Using this, we propose our idea of an extendable framework to allow multiple scenario thresholds. Furthermore, we test the concept with data collected from a smartphone device. Results show that using an adaptive scenario threshold approach can improve the biometric performance, and hence could allow manufacturers to produce algorithms that perform consistently in multiple scenarios without compromising security, allowing an increase in public trust towards the use of the technology."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "12668"; dc:hasVersion ; dct:creator , , ; dct:date "2021-02-21"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Adapting to Movement Patterns for Face Recognition on Mobile Devices"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "TK7882.B56 Biometric identification"@en . dct:title "TC4 Workshop on Mobile and Wearable Biometrics Workshop"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Milan, Italy"^^xsd:string . foaf:name "Springer International Publishing"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bertini"^^xsd:string; foaf:givenName "Marco"^^xsd:string; foaf:name "Marco Bertini"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Farinella"^^xsd:string; foaf:givenName "Giovanni Maria"^^xsd:string; foaf:name "Giovanni Maria Farinella"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mei"^^xsd:string; foaf:givenName "Tao"^^xsd:string; foaf:name "Tao Mei"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Vezzani"^^xsd:string; foaf:givenName "Roberto"^^xsd:string; foaf:name "Roberto Vezzani"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Escalante"^^xsd:string; foaf:givenName "Hugo Jair"^^xsd:string; foaf:name "Hugo Jair Escalante"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sclaroff"^^xsd:string; foaf:givenName "Stan"^^xsd:string; foaf:name "Stan Sclaroff"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Del Bimbo"^^xsd:string; foaf:givenName "Alberto"^^xsd:string; foaf:name "Alberto Del Bimbo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cucchiara"^^xsd:string; foaf:givenName "Rita"^^xsd:string; foaf:name "Rita Cucchiara"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Deravi"^^xsd:string; foaf:givenName "Farzin"^^xsd:string; foaf:name "Farzin Deravi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Boakes"^^xsd:string; foaf:givenName "Matthew"^^xsd:string; foaf:name "Matthew Boakes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Guest"^^xsd:string; foaf:givenName "Richard"^^xsd:string; foaf:name "Richard Guest"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #89066 \n\nThe Use of Structured Argumentation to Support Conclusions: A Video Authentication Case Study\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "The Use of Structured Argumentation to Support Conclusions: A Video Authentication Case Study (Archive (ZIP))"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Digital forensics can narrow key issues pending before a criminal or civil tribunal, resulting in a plea/settlement or a judicially economical trial. To support this, measures facilitating effective discourse between all parties regarding evidential matters may have value to judicial processes, where this session introduces the concept of Structured Argumentation (SA) for this purpose. The use of SA, applied to digital forensics investigations, was proposed and illustrated by Franqueira and Horsman (2020). It allows elaboration of investigative hypotheses, exposing not only how different (digital and/or non-digital) evidence logically fit together, but also the processes followed and conclusions reached, avoiding needless delay when arriving at a plea/disposition in a matter and/or narrowing the issues at a subsequent trial/proceeding. This session will be organised into 3 parts. First, the SA scheme (i.e., claim, ground, warrant, backing and rebuttal) and its dynamics will be described. Second, the results of an evaluation of SA applied to an anonymised video authentication case, from the field, will be presented. Finally, lessons learned and discussion points in relation to the use of SA, in theory and practice, will be elaborated."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , , ; dct:date "2021-02-15"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "The Use of Structured Argumentation to Support Conclusions: A Video Authentication Case Study"^^xsd:string; ep:hasDocument ; ep:hasPresentation ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "(W03) Scientific Working Group on Digital Evidence (SWGDE) and Digital Evidence: The Look of Modern Criminal Investigations"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "U.S. (virtual)"^^xsd:string . foaf:name "American Academy of Forensic Sciences"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Horsman"^^xsd:string; foaf:givenName "Graeme"^^xsd:string; foaf:name "Graeme Horsman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Remy"^^xsd:string; foaf:givenName "Joseph"^^xsd:string; foaf:name "Joseph Remy"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mullaney"^^xsd:string; foaf:givenName "Patricia"^^xsd:string; foaf:name "Patricia Mullaney"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N. L."^^xsd:string; foaf:name "Virginia N. L. Franqueira"^^xsd:string; rdf:type foaf:Person . rdfs:label "Hughes-Orchard2021_Chapter_ResourcefulProgramSynthesisFro.pdf"^^xsd:string . rdfs:label "Hughes-Orchard2021_Chapter_ResourcefulProgramSynthesisFro.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #84636 \n\nResourceful program synthesis from graded linear types\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Resourceful program synthesis from graded linear types (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Resourceful program synthesis from graded linear types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Resourceful program synthesis from graded linear types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Resourceful program synthesis from graded linear types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Resourceful program synthesis from graded linear types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Resourceful program synthesis from graded linear types (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Linear types provide a way to constrain programs by specifying that some values must be used exactly once. Recent work on graded modal types augments and refines this notion, enabling fine-grained, quantitative specification of data use in programs. The information provided by graded modal types appears to be useful for type-directed program synthesis, where these additional constraints can be used to prune the search space of candidate programs. We explore one of the major implementation challenges of a synthesis algorithm in this setting: how does the synthesis algorithm efficiently ensure that resource constraints are satisfied throughout program generation? We provide two solutions to this resource management problem, adapting Hodas and Miller’s input-output model of linear context management to a graded modal linear type theory. We evaluate the performance of both approaches via their implementation as a program synthesis tool for the programming language Granule, which provides linear and graded modal typing."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "12561"; dc:hasVersion ; dct:creator , ; dct:date "2021-02-13"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Resourceful program synthesis from graded linear types"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "International Symposium on Logic-Based Program Synthesis and Transformation"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Bologna, Italy"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hughes"^^xsd:string; foaf:givenName "Jack"^^xsd:string; foaf:name "Jack Hughes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Orchard"^^xsd:string; foaf:givenName "Dominic A."^^xsd:string; foaf:name "Dominic A. Orchard"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "09351984.pdf"^^xsd:string . rdfs:label "09351984.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #85926 \n\nIncandescent Bulb and LED Brake Lights: Novel Analysis of Reaction Times\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Incandescent Bulb and LED Brake Lights: Novel Analysis of Reaction Times (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Incandescent Bulb and LED Brake Lights: Novel Analysis of Reaction Times (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incandescent Bulb and LED Brake Lights: Novel Analysis of Reaction Times (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incandescent Bulb and LED Brake Lights: Novel Analysis of Reaction Times (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incandescent Bulb and LED Brake Lights: Novel Analysis of Reaction Times (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incandescent Bulb and LED Brake Lights: Novel Analysis of Reaction Times (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Incandescent Bulb and LED Brake Lights: Novel Analysis of Reaction Times (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Incandescent Bulb and LED Brake Lights: Novel Analysis of Reaction Times (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incandescent Bulb and LED Brake Lights: Novel Analysis of Reaction Times (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incandescent Bulb and LED Brake Lights: Novel Analysis of Reaction Times (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incandescent Bulb and LED Brake Lights: Novel Analysis of Reaction Times (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incandescent Bulb and LED Brake Lights: Novel Analysis of Reaction Times (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Rear-end collision accounts for around 8% of all vehicle crashes in the UK, with the failure to notice or react to a brake light signal being a major contributory cause. Meanwhile traditional incandescent brake light bulbs on vehicles are increasingly being replaced by a profusion of designs featuring LEDs. In this paper, we investigate the efficacy of brake light design using a novel approach to recording subject reaction times in a simulation setting using physical brake light assemblies. The reaction times of 22 subjects were measured for ten pairs of LED and incandescent bulb brake lights. Three events were investigated for each subject, namely the latency of brake light activation to accelerator release (BrakeAcc), the latency of accelerator release to brake pedal depression (AccPdl), and the cumulative time from light activation to brake pedal depression (BrakePdl). To our knowledge, this is the first study in which reaction times have been split into BrakeAcc and AccPdl. Results indicate that the two brake lights containing incandescent bulbs led to significantly slower reaction times compared to eight tested LED lights. BrakeAcc results also show that experienced subjects were quicker to respond to the activation of brake lights by releasing the accelerator pedal. Interestingly, analysis also revealed that the type of brake light influenced the AccPdl time, although experienced subjects did not always act quicker than inexperienced subjects. Overall, the study found that different designs of brake light can significantly influence driver response times."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "9"; dc:hasVersion , ; dct:creator , , , , ; dct:date "2021-02-10"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Incandescent Bulb and LED Brake Lights: Novel Analysis of Reaction Times"^^xsd:string; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "TE Highway engineering. Roads and pavements"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Mouli"^^xsd:string; foaf:givenName "Surej"^^xsd:string; foaf:name "Surej Mouli"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian"^^xsd:string; foaf:name "Ian McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fringi"^^xsd:string; foaf:givenName "Evangelia"^^xsd:string; foaf:name "Evangelia Fringi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . bibo:issn "21693536"; foaf:name "IEEE Access"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "1-s2.0-S105381192100118X-main.pdf"^^xsd:string . rdfs:label "1-s2.0-S105381192100118X-main.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #85843 \n\nHow hot is the hot zone? Computational modelling clarifies the role of parietal and frontoparietal connectivity during anaesthetic-induced loss of consciousness\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "How hot is the hot zone? Computational modelling clarifies the role of parietal and frontoparietal connectivity during anaesthetic-induced loss of consciousness (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "How hot is the hot zone? Computational modelling clarifies the role of parietal and frontoparietal connectivity during anaesthetic-induced loss of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "How hot is the hot zone? Computational modelling clarifies the role of parietal and frontoparietal connectivity during anaesthetic-induced loss of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "How hot is the hot zone? Computational modelling clarifies the role of parietal and frontoparietal connectivity during anaesthetic-induced loss of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "How hot is the hot zone? Computational modelling clarifies the role of parietal and frontoparietal connectivity during anaesthetic-induced loss of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "How hot is the hot zone? Computational modelling clarifies the role of parietal and frontoparietal connectivity during anaesthetic-induced loss of consciousness (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "How hot is the hot zone? Computational modelling clarifies the role of parietal and frontoparietal connectivity during anaesthetic-induced loss of consciousness (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "How hot is the hot zone? Computational modelling clarifies the role of parietal and frontoparietal connectivity during anaesthetic-induced loss of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "How hot is the hot zone? Computational modelling clarifies the role of parietal and frontoparietal connectivity during anaesthetic-induced loss of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "How hot is the hot zone? Computational modelling clarifies the role of parietal and frontoparietal connectivity during anaesthetic-induced loss of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "How hot is the hot zone? Computational modelling clarifies the role of parietal and frontoparietal connectivity during anaesthetic-induced loss of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "How hot is the hot zone? Computational modelling clarifies the role of parietal and frontoparietal connectivity during anaesthetic-induced loss of consciousness (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 . bibo:abstract "In recent years, specific cortical networks have been proposed to be crucial for sustaining consciousness, including the posterior hot zone and frontoparietal resting state networks (RSN). Here, we computationally evaluate the relative contributions of three RSNs – the default mode network (DMN), the salience network (SAL), and the central executive network (CEN) – to consciousness and its loss during propofol anaesthesia. Specifically, we use dynamic causal modelling (DCM) of 10 minutes of high-density EEG recordings (N = 10, 4 males) obtained during behavioural responsiveness, unconsciousness and post-anaesthetic recovery to characterise differences in effective connectivity within frontal areas, the posterior ‘hot zone’, frontoparietal connections, and between-RSN connections. We estimate – for the first time – a large DCM model (LAR) of resting EEG, combining the three RSNs into a rich club of interconnectivity. Consistent with the hot zone theory, our findings demonstrate reductions in inter-RSN connectivity in the parietal cortex. Within the DMN itself, the strongest reductions are in feed-forward frontoparietal and parietal connections at the precuneus node. Within the SAL and CEN, loss of consciousness generates small increases in bidirectional connectivity. Using novel DCM leave-one-out cross-validation, we show that the most consistent out-of-sample predictions of the state of consciousness come from a key set of frontoparietal connections. This finding also generalises to unseen data collected during post-anaesthetic recovery. Our findings provide new, computational evidence for the importance of the posterior hot zone in explaining the loss of consciousness, highlighting also the distinct role of frontoparietal connectivity in underpinning conscious responsiveness, and consequently, suggest a dissociation between the mechanisms most prominently associated with explaining the contrast between conscious awareness and unconsciousness, and those maintaining consciousness."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "231"; dc:hasVersion , ; dct:creator , , , , , , , , , ; dct:date "2021-02-09"; dct:isPartOf , ; dct:publisher ; dct:title "How hot is the hot zone? Computational modelling clarifies the role of parietal and frontoparietal connectivity during anaesthetic-induced loss of consciousness"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Gosseries"^^xsd:string; foaf:givenName "Olivia"^^xsd:string; foaf:name "Olivia Gosseries"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marinazzo"^^xsd:string; foaf:givenName "Daniele"^^xsd:string; foaf:name "Daniele Marinazzo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Van de Steen"^^xsd:string; foaf:givenName "Frederik"^^xsd:string; foaf:name "Frederik Van de Steen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Raimondo"^^xsd:string; foaf:givenName "Federico"^^xsd:string; foaf:name "Federico Raimondo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Panda"^^xsd:string; foaf:givenName "Rajanikant"^^xsd:string; foaf:name "Rajanikant Panda"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bonhomme"^^xsd:string; foaf:givenName "Vincent"^^xsd:string; foaf:name "Vincent Bonhomme"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Laureys"^^xsd:string; foaf:givenName "Steven"^^xsd:string; foaf:name "Steven Laureys"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ihalainen"^^xsd:string; foaf:givenName "Riku"^^xsd:string; foaf:name "Riku Ihalainen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chennu"^^xsd:string; foaf:givenName "Srivas"^^xsd:string; foaf:name "Srivas Chennu"^^xsd:string; rdf:type foaf:Person . bibo:issn "10538119"; foaf:name "NeuroImage"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90393 \n\nA Multi-Stream Deep Rule-Based Ensemble System for Aerial Image Scene Classification\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "Aerial scene classification is the key task for automated aerial image understanding and information extraction, but is highly challenging due to the great complexity and real-world uncertainties exhibited by such images. To perform precise aerial scene classification, in this research, a multi-stream deep rule-based ensemble system is proposed. The proposed ensemble system consists of three deep rule-based systems that are trained simultaneously on the same data. The three ensemble components employ ResNet50, DenseNet121 and InceptionV3 as their respective feature descriptors because of the state-of-the-art performances the three networks have demonstrated on aerial scene classification. The three networks are fine tuned on aerial images to further enhance their discriminative and descriptive abilities. Thanks to its prototype-based nature, the proposed approach is able to self-organize a transparent ensemble predictive model with prototypes learned from training images and perform highly explainable joint decision-making on testing images with greater precision. Numerical examples on both benchmark aerial image sets and satellite sensor images demonstrated the efficacy of the proposed approach, showing its great potential in solving real-world problems."^^xsd:string; bibo:authorList ; bibo:status , ; dct:creator , ; dct:date "2021-02-07"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "A Multi-Stream Deep Rule-Based Ensemble System for Aerial Image Scene Classification"^^xsd:string; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "World Scientific"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen"^^xsd:string; foaf:name "Plamen Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90290 \n\nA Semi-Supervised Deep Rule-Based Approach for Complex Satellite Sensor Image Analysis\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Large-scale {(large-area)}, fine spatial resolution satellite sensor images are valuable data sources for Earth observation while not yet fully exploited by research communities for practical applications. Often, such images exhibit highly complex geometrical structures and spatial patterns, and distinctive characteristics of multiple land-use categories may appear at the same region. Autonomous information extraction from these images is essential in the field of pattern recognition within remote sensing, but this task is extremely challenging due to the spectral and spatial complexity captured in satellite sensor imagery. In this research, a semi-supervised deep rule-based approach for satellite sensor image analysis (SeRBIA) is proposed, where large-scale satellite sensor images are analysed autonomously and classified into detailed land-use categories. Using an ensemble feature descriptor derived from pre-trained AlexNet and VGG-VD-16 models, SeRBIA is capable of learning continuously from both labelled and unlabelled images through self-adaptation without human involvement or intervention. Extensive numerical experiments were conducted on both benchmark datasets and real-world satellite sensor images to comprehensively test the validity and effectiveness of the proposed method. The novel information mining technique developed here can be applied to analyse large-scale satellite sensor images with high accuracy and interpretability, across a wide range of real-world applications."^^xsd:string; bibo:authorList ; bibo:status , ; dct:creator , , , ; dct:date "2021-02-04"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A Semi-Supervised Deep Rule-Based Approach for Complex Satellite Sensor Image Analysis"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen"^^xsd:string; foaf:name "Plamen Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhang"^^xsd:string; foaf:givenName "Ce"^^xsd:string; foaf:name "Ce Zhang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Atkinson"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Atkinson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "01628828"; foaf:name "IEEE Transactions on Pattern Analysis and Machine Intelligence"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #88179 \n\nMachine learning methods applied to audit of surgical margins after curative surgery for head and neck cancer\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Most surgical specialties have attempted to address concerns about the unfair comparison of outcomes by ‘risk-adjusting’ data to benchmark specialty-specific outcomes that are indicative of quality of care. We explore the ability to predict for positive margin status so that effective benchmarking that will account for complexity of case mix is possible. A dataset of care episodes recorded as a clinical audit of margin status after surgery for head and neck squamous cell carcinoma (n=1316) was analysed within the Waikato Environment for Knowledge Analyisis (WEKA) machine learning programme. The outcome was a classification model that can predict for positivity of tumour margins (defined as less than 1mm) using data on preoperative demographics, operations, functional status, and tumour stage. Positive resection margins of less than 1mm were common, and varied considerably between treatment units (19%-29%). Four algorithms were compared to attempt to risk-adjust for case complexity. The 'champion' model was a Naïve Bayes classifier (AUROC 0.72) that suggested acceptable discrimination. Calibration was good (Hosmer-Lemershow goodness-of-fit test p=0.9). Adjusted positive margin rates are presented on a funnel plot. Subspecialty groups within oral and maxillofacial surgery are seeking metrics that will allow for meaningful comparison of the quality of care delivered by surgical units in the UK. To enable metrics to be effective, we argue that they can be modelled so that meaningful benchmarking, which takes account of variation in complexity of patient need or care, is possible."^^xsd:string; bibo:authorList ; bibo:issue "2"; bibo:status , ; bibo:volume "59"; dct:creator , , ; dct:date "2021-02-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Machine learning methods applied to audit of surgical margins after curative surgery for head and neck cancer"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Tighe"^^xsd:string; foaf:givenName "D."^^xsd:string; foaf:name "D. Tighe"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "A."^^xsd:string; foaf:name "A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fabris"^^xsd:string; foaf:givenName "Fabio"^^xsd:string; foaf:name "Fabio Fabris"^^xsd:string; rdf:type foaf:Person . bibo:issn "02664356"; foaf:name "British Journal of Oral and Maxillofacial Surgery"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "138IsmailMohamed2021phd.pdf"^^xsd:string . rdfs:label "138IsmailMohamed2021phd.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #87076 \n\nUsing Particle Swarm Optimization for Market Timing Strategies\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Using Particle Swarm Optimization for Market Timing Strategies (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Using Particle Swarm Optimization for Market Timing Strategies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Particle Swarm Optimization for Market Timing Strategies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Particle Swarm Optimization for Market Timing Strategies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Particle Swarm Optimization for Market Timing Strategies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Particle Swarm Optimization for Market Timing Strategies (Other)"^^xsd:string . rdf:_1 . ; bibo:abstract "Market timing is the issue of deciding when to buy or sell a given asset on the market. As one of the core issues of algorithmic trading systems, designers of such system have turned to computational intelligence methods to aid them in this task. In this thesis, we explore the use of Particle Swarm Optimization (PSO) within the domain of market timing.nPSO is a search metaheuristic that was first introduced in 1995 [28] and is based on the behavior of birds in flight. Since its inception, the PSO metaheuristic has seen extensions to adapt it to a variety of problems including single objective optimization, multiobjective optimization, niching and dynamic optimization problems. Although popular in other domains, PSO has seen limited application to the issue of market timing. The current incumbent algorithm within the market timing domain is Genetic Algorithms (GA), based on the volume of publications as noted in [40] and [84]. In this thesis, we use PSO to compose market timing strategies using technical analysis indicators. Our first contribution is to use a formulation that considers both the selection of components and the tuning of their parameters in a simultaneous manner, and approach market timing as a single objective optimization problem. Current approaches only considers one of those aspects at a time: either selecting from a set of components with fixed values for their parameters or tuning the parameters of a preset selection of components. Our second contribution is proposing a novel training and testing methodology that explicitly exposes candidate market timing strategies to numerous price trends to reduce the likelihood of overfitting to a particular trend and give a better approximation of performance under various market conditions. Our final contribution is to consider market timing as a multiobjective optimization problem, optimizing five financial metrics and comparing the performance of our PSO variants against a well established multiobjective optimization algorithm. These algorithms address unexplored research areas in the context of PSO algorithms to the best of our knowledge, and are therefore original contributions. The computational results over a range of datasets shows that the proposed PSO algorithms are competitive to GAs using the same formulation. Additionally, the multiobjective variant of our PSO algorithm achieve statistically significant improvements over NSGA-II."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2021-02"; dct:isPartOf ; dct:issuer , ; dct:title "Using Particle Swarm Optimization for Market Timing Strategies"^^xsd:string; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando"^^xsd:string; foaf:name "Fernando Otero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mohamed Anwar Abdelsalam Mohamed"^^xsd:string; foaf:givenName "Ismail"^^xsd:string; foaf:name "Ismail Mohamed Anwar Abdelsalam Mohamed"^^xsd:string; rdf:type foaf:Person . rdfs:label "Aging-US-2021-Palmer-as-published.pdf"^^xsd:string . rdfs:label "Aging-US-2021-Palmer-as-published.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #87092 \n\nAgeing transcriptome meta-analysis reveals similarities between key mammalian tissues\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Ageing transcriptome meta-analysis reveals similarities between key mammalian tissues (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Ageing transcriptome meta-analysis reveals similarities between key mammalian tissues (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ageing transcriptome meta-analysis reveals similarities between key mammalian tissues (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ageing transcriptome meta-analysis reveals similarities between key mammalian tissues (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ageing transcriptome meta-analysis reveals similarities between key mammalian tissues (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ageing transcriptome meta-analysis reveals similarities between key mammalian tissues (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "By combining transcriptomic data with other data sources, inferences can be made about functional changes during ageing. Thus, we conducted a meta-analysis on 127 publicly available microarray and RNA-Seq datasets from mice, rats and humans, identifying a transcriptomic signature of ageing across species and tissues. Analyses on subsets of these datasets produced transcriptomic signatures of ageing for brain, heart and muscle. We then applied enrichment analysis and machine learning to functionally describe these signatures, revealing overexpression of immune and stress response genes and underexpression of metabolic and developmental genes. Further analyses revealed little overlap between genes differentially expressed with age in different tissues, despite ageing differentially expressed genes typically being widely expressed across tissues. Additionally we show that the ageing gene expression signatures (particularly the overexpressed signatures) of the whole meta-analysis, brain and muscle tend to include genes that are central in protein-protein interaction networks. We also show that genes underexpressed with age in the brain are highly central in a co-expression network, suggesting that underexpression of these genes may have broad phenotypic consequences. In sum, we show numerous functional similarities between the ageing transcriptomes of these important tissues, along with unique network properties of genes differentially expressed with age in both a protein-protein interaction and co-expression networks."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "13"; dc:hasVersion ; dct:creator , , , , ; dct:date "2021-02"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Ageing transcriptome meta-analysis reveals similarities between key mammalian tissues"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Impact Journals"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Palmer"^^xsd:string; foaf:givenName "Daniel"^^xsd:string; foaf:name "Daniel Palmer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Magalhaes"^^xsd:string; foaf:givenName "João Pedro"^^xsd:string; foaf:name "João Pedro de Magalhaes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Doherty"^^xsd:string; foaf:givenName "Aoife"^^xsd:string; foaf:name "Aoife Doherty"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fabris"^^xsd:string; foaf:givenName "Fabio"^^xsd:string; foaf:name "Fabio Fabris"^^xsd:string; rdf:type foaf:Person . bibo:issn "19454589"; foaf:name "Aging"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "awaa460.pdf"^^xsd:string . rdfs:label "awaa460.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #85902 \n\nDamage to Broca’s area does not contribute to long-term speech production outcome after stroke\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Damage to Broca’s area does not contribute to long-term speech production outcome after stroke (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Damage to Broca’s area does not contribute to long-term speech production outcome after stroke (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Damage to Broca’s area does not contribute to long-term speech production outcome after stroke (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Damage to Broca’s area does not contribute to long-term speech production outcome after stroke (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Damage to Broca’s area does not contribute to long-term speech production outcome after stroke (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Damage to Broca’s area does not contribute to long-term speech production outcome after stroke (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 ; rdf:_11 ; rdf:_12 . bibo:abstract "Broca’s area in the posterior half of the left inferior frontal gyrus has long been thought to be critical for speech production. The current view is that long-term speech production outcome in patients with Broca’s area damage is best explained by the combination of damage to Broca’s area and neighbouring regions including the underlying white matter, which was also damaged in Paul Broca’s two historic cases. Here, we dissociate the effect of damage to Broca’s area from the effect of damage to surrounding areas by studying long-term speech production outcome in 134 stroke survivors with relatively circumscribed left frontal lobe lesions that spared posterior speech production areas in lateral inferior parietal and superior temporal association cortices. Collectively, these patients had varying degrees of damage to one or more of nine atlas-based grey or white matter regions: Brodmann areas 44 and 45 (together known as Broca’s area), ventral premotor cortex, primary motor cortex, insula, putamen, the anterior segment of the arcuate fasciculus, uncinate fasciculus and frontal aslant tract. Spoken picture description scores from the ComprehensiveAphasia Test were used as the outcome measure. Multiple regression analyses allowed us to tease apart the contribution of other variables influencing speech production abilities such as total lesion volume and time post-stroke. We found that, in our sample of patients with left frontal damage, long-term speech production impairments (lasting beyond 3 months post-stroke) were solely predictedby the degree of damage to white matter, directly above the insula, in the vicinity of the anterior part of the arcuate fasciculus, with no contribution from the degree of damage to Broca’s area (as confirmed with Bayesian statistics). The effect of white matter damage cannot be explained by a disconnection of Broca’s area, because speech production scores were worse after damage to the anterior arcuate fasciculus with relative sparing of Broca’s area than after damage to Broca’s area with relative sparing of the anterior arcuate fasciculus. Our findings provide evidence for three novel conclusions: (i) Broca’s area damage does not contribute to long-term speech production outcome after left frontal lobe strokes; (ii) persistent speech production impairments after damage to the anterior arcuate fasciculus cannot be explained by a disconnection of Broca’s area; and (iii) the prior association between persistent speech production impairments and Broca’s area damage can be explained by co-occurring white matter damage, above the insula, in the vicinity of the anterior part of the arcuate fasciculus."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , , , , , , , ; dct:date "2021-01-31"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Damage to Broca’s area does not contribute to long-term speech production outcome after stroke"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "RC321 Neuroscience. Biological psychiatry. Neuropsychiatry"@en . foaf:name "PLORAS team"^^xsd:string; rdf:type foaf:Organization . foaf:name "Oxford University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Gajardo-Vidal"^^xsd:string; foaf:givenName "Andrea"^^xsd:string; foaf:name "Andrea Gajardo-Vidal"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lorca-Puls"^^xsd:string; foaf:givenName "Diego L."^^xsd:string; foaf:name "Diego L. Lorca-Puls"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Green"^^xsd:string; foaf:givenName "David W."^^xsd:string; foaf:name "David W. Green"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pshdary"^^xsd:string; foaf:givenName "Barwan"^^xsd:string; foaf:name "Barwan Pshdary"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hope"^^xsd:string; foaf:givenName "Thomas M.H."^^xsd:string; foaf:name "Thomas M.H. Hope"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Price"^^xsd:string; foaf:givenName "Cathy"^^xsd:string; foaf:name "Cathy Price"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Geva"^^xsd:string; foaf:givenName "Sharon"^^xsd:string; foaf:name "Sharon Geva"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Seghier"^^xsd:string; foaf:givenName "Mohamed L."^^xsd:string; foaf:name "Mohamed L. Seghier"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Warner"^^xsd:string; foaf:givenName "Holly"^^xsd:string; foaf:name "Holly Warner"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Leff"^^xsd:string; foaf:givenName "Alex P."^^xsd:string; foaf:name "Alex P. Leff"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Crinion"^^xsd:string; foaf:givenName "Jennifer T."^^xsd:string; foaf:name "Jennifer T. Crinion"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . bibo:issn "00068950"; foaf:name "Brain"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #86818 \n\nCybersecurity Awareness\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Cybersecurity Awareness (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cybersecurity Awareness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cybersecurity Awareness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cybersecurity Awareness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cybersecurity Awareness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Cybersecurity Awareness (Other)"^^xsd:string . rdf:_1 . bibo:abstract "Cybersecurity awareness can be viewed as the level of appreciation, understanding, or knowledge of cybersecurity or information security aspects. Such aspects include cognizance of cyber risks and threats, but also appropriate protection measures."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator ; dct:date "2021-01-19"; dct:isPartOf , ; dct:publisher ; dct:subject , , , ; dct:title "Cybersecurity Awareness"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "L Education"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:name "Encyclopedia of Cryptography, Security and Privacy"^^xsd:string; rdf:type bibo:Collection . rdfs:label "ejn.15098"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #85599 \n\nBreakthrough percepts of online identity: Detecting recognition of email addresses on the fringe of awareness\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Breakthrough percepts of online identity: Detecting recognition of email addresses on the fringe of awareness (PDF)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "A key issue facing cybercrime investigations is connecting online identities to real-world identities. This paper shows that by combining the Fringe-P3 method with a concealed information test, we can detect a participant's familiarity with their own email address, thus connecting their real-world identity to their online one. Participants were shown Rapid Serial Visual Presentation (RSVP) streams of email addresses, some including their own email address (probe) or a target email address. Familiarity with the probe was accurately detected with significant results at the group level and for 7 of 11 participants at the individual level. These promising results demonstrate that the method can be successfully used to detect online identities. Factors that may affect how well an email address probe stands out in the RSVP streams are also discussed."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2021-01-10"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Breakthrough percepts of online identity: Detecting recognition of email addresses on the fringe of awareness"^^xsd:string; ep:hasDocument ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "RC321 Neuroscience. Biological psychiatry. Neuropsychiatry"@en . foaf:name "Wiley"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Jose"^^xsd:string; foaf:givenName "Brendan"^^xsd:string; foaf:name "Brendan Jose"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Miller"^^xsd:string; foaf:givenName "Claire"^^xsd:string; foaf:name "Claire Miller"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Beech"^^xsd:string; foaf:givenName "Anthony"^^xsd:string; foaf:name "Anthony Beech"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Harris"^^xsd:string; foaf:givenName "Kathryn"^^xsd:string; foaf:name "Kathryn Harris"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . bibo:issn "0953816X"; foaf:name "European Journal of Neuroscience"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "Bhattacherjee-Sarkar2021_Article_WeightedVotingProcedureHavingA.pdf"^^xsd:string . rdfs:label "Bhattacherjee-Sarkar2021_Article_WeightedVotingProcedureHavingA.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #83677 \n\nWeighted Voting Procedure having a Unique Blocker\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Weighted Voting Procedure having a Unique Blocker (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Weighted Voting Procedure having a Unique Blocker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Weighted Voting Procedure having a Unique Blocker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Weighted Voting Procedure having a Unique Blocker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Weighted Voting Procedure having a Unique Blocker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Weighted Voting Procedure having a Unique Blocker (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Weighted Voting Procedure having a Unique Blocker (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Weighted Voting Procedure having a Unique Blocker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Weighted Voting Procedure having a Unique Blocker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Weighted Voting Procedure having a Unique Blocker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Weighted Voting Procedure having a Unique Blocker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Weighted Voting Procedure having a Unique Blocker (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "The Goods and Services Tax (GST) Council of India has a non-conventional weighted voting procedure having a primary player who is a blocker and a set of secondary players. The voting weights are not fixed and are determined based on the subset of players which participate in the voting. We introduce the notion of voting schema to formally model such a voting procedure. Individual voting games arise from a voting schema depending on the subset of secondary players who participate in the voting. We make a detailed formal study of the trade-off between the minimal sizes of winning and blocking coalitions in the voting games that can arise from a voting schema. Finally, the GST voting procedure is assessed using the theoretical results leading to suggestions for improvement."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion , ; dct:creator , ; dct:date "2021-01-07"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Weighted Voting Procedure having a Unique Blocker"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Sarkar"^^xsd:string; foaf:givenName "Palash"^^xsd:string; foaf:name "Palash Sarkar"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bhattacherjee"^^xsd:string; foaf:givenName "Sanjay"^^xsd:string; foaf:name "Sanjay Bhattacherjee"^^xsd:string; rdf:type foaf:Person . bibo:issn "00207276"; foaf:name "International Journal of Game Theory"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "HICSS2021.pdf"^^xsd:string . rdfs:label "HICSS2021.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #84858 \n\nPrivacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "Unanticipated accumulation and dissemination of accurate location information flows is the latest iteration of the privacy debate. This mixed-methods research contributes a grounded understanding of risk perceptions, enablers and barriers to privacy preserving\r\nbehaviour in a cyber-physical environment.\r\n\r\nWe conducted the first representative survey on internet privacy concerns, cyber and physical risk taking, privacy victimisation, usage of location sharing apps and transport choices in the UK with 466 participants. The responses segregated participants into four distinct, novel clusters (cyber risk takers, physical risk takers, transport innovators, and risk abstainers) with cross-validated prediction accuracy of 92%.\r\n\r\nIn the second part of the study, we qualitatively explored these clusters through 12 homogeneous focus groups with 6 participants each. The predominant themes of the groups matched their clusters with little overlap between the groups. The differences in risk perception and behaviours varied greatly between the clusters. Future transport systems, apps and websites that rely on location data therefore need a more personalised approach to information provision surrounding location sharing. Failing to recognise these differences could lead to reduced data sharing, riskier sharing behaviour or even total avoidance of new forms of technology in transport."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2021-01-05"; dct:isPartOf ; dct:publisher ; dct:subject , , , ; dct:title "Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.875.I57 Internet"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.888 World Wide Web"@en . dct:title "54th Hawaii International Conference on System Sciences (HICSS 2021)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Online"^^xsd:string . foaf:name "University of Hawaiʻi at Mānoa"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Borrion"^^xsd:string; foaf:givenName "Hervé"^^xsd:string; foaf:name "Hervé Borrion"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Becker"^^xsd:string; foaf:givenName "Ingolf"^^xsd:string; foaf:name "Ingolf Becker"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McGuire"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael McGuire"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ekblom"^^xsd:string; foaf:givenName "Paul"^^xsd:string; foaf:name "Paul Ekblom"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Posner"^^xsd:string; foaf:givenName "Rebecca"^^xsd:string; foaf:name "Rebecca Posner"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Islam"^^xsd:string; foaf:givenName "Tasmina"^^xsd:string; foaf:name "Tasmina Islam"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90653 \n\nA unifying type-theory for higher-order (amortized) cost analysis\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "This paper presents λ-amor, a new type-theoretic framework for amortized cost analysis of higher-order functional programs and shows that existing type systems for cost analysis can be embedded in it. λ-amor introduces a new modal type for representing potentials – costs that have been accounted for, but not yet incurred, which are central to amortized analysis. Additionally, λ-amor relies on standard type-theoretic concepts like affineness, refinement types and an indexed cost monad. λ-amor is proved sound using a rather simple logical relation. We embed two existing type systems for cost analysis in λ-amor showing that, despite its simplicity, λ-amor can simulate cost analysis for different evaluation strategies (call-by-name and call-by-value), in different styles (effect-based and coeffect-based), and with or without amortization. One of the embeddings also implies that λ-amor is relatively complete for all terminating PCF programs."^^xsd:string; bibo:authorList ; bibo:issue "POPL"; bibo:status , ; bibo:volume "5"; dct:creator , , , ; dct:date "2021-01-04"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A unifying type-theory for higher-order (amortized) cost analysis"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Association for Computing Machinery New York NY United States"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hoffmann"^^xsd:string; foaf:givenName "Jan"^^xsd:string; foaf:name "Jan Hoffmann"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Garg"^^xsd:string; foaf:givenName "Deepak"^^xsd:string; foaf:name "Deepak Garg"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gaboardi"^^xsd:string; foaf:givenName "Marco"^^xsd:string; foaf:name "Marco Gaboardi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rajani"^^xsd:string; foaf:givenName "Vineet"^^xsd:string; foaf:name "Vineet Rajani"^^xsd:string; rdf:type foaf:Person . bibo:issn "24751421"; foaf:name "Proceedings of the ACM on Programming Languages"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "RUSI-Kent-EIP-Cyber-insurance.pdf"^^xsd:string . rdfs:label "RUSI-Kent-EIP-Cyber-insurance.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #89042 \n\nCyber Security Incentives and the Role of Cyber Insurance\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Cyber Security Incentives and the Role of Cyber Insurance (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Security Incentives and the Role of Cyber Insurance (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Security Incentives and the Role of Cyber Insurance (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Security Incentives and the Role of Cyber Insurance (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Security Incentives and the Role of Cyber Insurance (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Security Incentives and the Role of Cyber Insurance (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "This paper outlines the opportunities of and challenges in using cyber insurance to incentivise cyber security practices. Findings are based\r\non a review of existing industry reports and academic research.\r\nThe paper forms part of an independent research project by RUSI and the University of Kent that provides actionable policy recommendations on how to incentivise cyber security through cyber insurance. They derive from a series of interviews and workshops with insurers, businesses, cyber security providers, government and other key stakeholders.\r\nThe current evidence about the ability of cyber insurance to improve cyber security practices is limited. While cyber insurers may be able\r\nto provide expertise to policyholders and increase their awareness of cyber risks, much of the existing evidence base is largely theoretical\r\nand there is still considerable scepticism from customers about the benefits of cyber insurance.\r\nThe uptake of cyber insurance, particularly by small to medium enterprises (SMEs), remains low. Existing research suggests that some of the overarching factors explaining this are: the high cost of policies and the difficulties insurers face in pricing premiums appropriately;\r\nconfusion over what types of incidents insurance policies cover (and the issue of ‘silent cyber’); and a lack of understanding of risks\r\nstemming from cyber incidents.\r\nThere is the potential for the cyber insurance market to learn from other insurance markets to increase uptake, although understanding the depth of these connections requires further enquiry.\r\nThe paper concludes by identifying several policy questions raised by the existing literature. These questions serve to guide the next stage of the project and to prompt new conversations about how cyber insurance might better incentivise cyber security practices."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2021-01-03"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Cyber Security Incentives and the Role of Cyber Insurance"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Royal United Services Institute for Defence and Security Studies"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Sullivan"^^xsd:string; foaf:givenName "James"^^xsd:string; foaf:name "James Sullivan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:name "RUSI Emerging Insights Paper"^^xsd:string; rdf:type bibo:Collection . rdfs:label "MPS2020.pdf"^^xsd:string . rdfs:label "MPS2020.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #84857 \n\nOR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Benchmarking digital watermarking algorithms is not an easy task because different applications of digital watermarking often have very different sets of requirements and trade-offs between conflicting requirements. While there have been some general-purpose digital watermarking benchmarking systems available, they normally do not support complicated benchmarking tasks and cannot be easily reconfigured to work with different watermarking algorithms and testing conditions. In this paper, we propose OR-Benchmark, an open and highly reconfigurable general-purpose digital watermarking benchmarking framework, which has the following two key features: 1) all the interfaces are public and general enough to support all watermarking applications and benchmarking tasks we can think of; 2) end users can easily extend the functionalities and freely configure what watermarking algorithms are tested, what system components are used, how the benchmarking process runs, and what results should be produced. We implemented a prototype of this framework as a MATLAB software package and demonstrate how it can be used in three typical use cases. The first two use cases show how easily we can define benchmarking profiles for some robust image watermarking algorithms. The third use case shows how OR-Benchmark can be configured to benchmark some image watermarking algorithms for content authentication and self-restoration, which cannot be easily supported by other digital watermarking benchmarking systems."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021-01-03"; dct:isPartOf ; dct:publisher ; dct:subject , , , ; dct:title "OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.575 Multimedia systems"@en . rdf:type skos:Concept; skos:prefLabel "TK5102.9 Signal processing" . rdf:type skos:Concept; skos:prefLabel "TK7885 Computer engineering. Computer hardware"@en . dct:title "3rd International Workshop on Multimedia Privacy and Security (MPS 2020)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Online"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ho"^^xsd:string; foaf:givenName "Anthony T.S."^^xsd:string; foaf:name "Anthony T.S. Ho"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Hui"^^xsd:string; foaf:name "Hui Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . rdfs:label "Chu2020_Constraints-on-Hebbian-and-STDP-learned-weights-of-a-spiking-neuron.pdf"^^xsd:string . rdfs:label "Chu2020_Constraints-on-Hebbian-and-STDP-learned-weights-of-a-spiking-neuron.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #85315 \n\nConstraints on Hebbian and STDP learned weights of a spiking neuron\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Constraints on Hebbian and STDP learned weights of a spiking neuron (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Constraints on Hebbian and STDP learned weights of a spiking neuron (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Constraints on Hebbian and STDP learned weights of a spiking neuron (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Constraints on Hebbian and STDP learned weights of a spiking neuron (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Constraints on Hebbian and STDP learned weights of a spiking neuron (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Constraints on Hebbian and STDP learned weights of a spiking neuron (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "We analyse mathematically the constraints on weights resulting from Hebbian and STDP learning rules applied to a spiking neuron with weight normalisation. In the case of pure Hebbian learning, we find that the normalised weights equal the promotion probabilities of weights up to correction terms that depend on the learning rate and are usually small. A similar relation can be derived for STDP algorithms, where the normalised weight values reflect a difference between the promotion and demotion probabilities of the weight. These relations are practically useful in that they allow checking for convergence of Hebbian and STDP algorithms. Another application is novelty detection. We demonstrate this using the MNIST dataset."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "135"; dc:hasVersion ; dct:creator , ; dct:date "2021-01-02"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Constraints on Hebbian and STDP learned weights of a spiking neuron"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chu"^^xsd:string; foaf:givenName "Dominique"^^xsd:string; foaf:name "Dominique Chu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nguyen"^^xsd:string; foaf:givenName "Huy Le"^^xsd:string; foaf:name "Huy Le Nguyen"^^xsd:string; rdf:type foaf:Person . bibo:issn "08936080"; foaf:name "Neural Networks"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #85287 \n\nTowards a Synthetic Benchmark to Assess VM Startup, Warmup, and Cold-Code Performance\n\n"; foaf:primaryTopic . rdf:_1 . bibo:authorList ; bibo:status ; dct:creator ; dct:date "2021-01-02"; dct:isPartOf ; dct:subject ; dct:title "Towards a Synthetic Benchmark to Assess VM Startup, Warmup, and Cold-Code Performance"^^xsd:string; rdf:type bibo:Article, ep:EPrint, ep:InternetEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90655 \n\nPermissive runtime information flow control in the presence of exceptions\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Information flow control (IFC) has been extensively studied as an approach to mitigate information leaks in applications. A vast majority of existing work in this area is based on static analysis. However, some applications, especially on the Web, are developed using dynamic languages like JavaScript where static analyses for IFC do not scale well. As a result, there has been a growing interest in recent years to develop dynamic or runtime information flow analysis techniques. In spite of the advances in the field, runtime information flow analysis has not been at the helm of information flow security, one of the reasons being that the analysis techniques and the security property related to them (non-interference) over-approximate information flows (particularly implicit flows), generating many false positives. In this paper, we present a sound and precise approach for handling implicit leaks at runtime. In particular, we present an improvement and enhancement of the so-called permissive-upgrade strategy, which is widely used to tackle implicit leaks in dynamic information flow control. We improve the strategy’s permissiveness and generalize it. Building on top of it, we present an approach to handle implicit leaks when dealing with complex features like unstructured control flow and exceptions in higher-order languages. We explain how we address the challenge of handling unstructured control flow using immediate post-dominator analysis. We prove that our approach is sound and precise."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "29"; dct:creator , , , ; dct:date "2021-01-01"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Permissive runtime information flow control in the presence of exceptions"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "IOS Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bichhawat"^^xsd:string; foaf:givenName "Abhishek"^^xsd:string; foaf:name "Abhishek Bichhawat"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hammer"^^xsd:string; foaf:givenName "Christian"^^xsd:string; foaf:name "Christian Hammer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Garg"^^xsd:string; foaf:givenName "Deepak"^^xsd:string; foaf:name "Deepak Garg"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rajani"^^xsd:string; foaf:givenName "Vineet"^^xsd:string; foaf:name "Vineet Rajani"^^xsd:string; rdf:type foaf:Person . bibo:issn "0926227X"; foaf:name "Journal of Computer Security"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "IEEE-ICDM-2021-Maia-post-review.pdf"^^xsd:string . rdfs:label "IEEE-ICDM-2021-Maia-post-review.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #91723 \n\nAn Ensemble of Naive Bayes Classifiers for Uncertain Categorical Data\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An Ensemble of Naive Bayes Classifiers for Uncertain Categorical Data (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An Ensemble of Naive Bayes Classifiers for Uncertain Categorical Data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Ensemble of Naive Bayes Classifiers for Uncertain Categorical Data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Ensemble of Naive Bayes Classifiers for Uncertain Categorical Data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Ensemble of Naive Bayes Classifiers for Uncertain Categorical Data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Ensemble of Naive Bayes Classifiers for Uncertain Categorical Data (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Coping with uncertainty is a very challenging issue in many real-world applications. However, conventional classification models usually assume there is no uncertainty in data at all. In order to fill this gap, there has been a growing number of studies addressing the problem of classification based on uncertain data. Although some methods resort to ignoring uncertainty or artificially removing it from data, it has been shown that predictive performance can be improved by actually incorporating information on uncertainty into classification models. This paper proposes an approach for building an ensemble of classifiers for uncertain categorical data based on biased random subspaces. Using Naive Bayes classifiers as base models, we have applied this approach to classify ageing-related genes based on real data, with uncertain features representing protein-protein interactions. Our experimental results show that models based on the proposed approach achieve better predictive performance than single Naive Bayes classifiers and conventional ensembles."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2021"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "An Ensemble of Naive Bayes Classifiers for Uncertain Categorical Data"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "21st IEEE International Conference on Data Mining (ICDM 2021)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "New Zealand (Virtual)"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Maia"^^xsd:string; foaf:givenName "M.R.H."^^xsd:string; foaf:name "M.R.H. Maia"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Plastino"^^xsd:string; foaf:givenName "A."^^xsd:string; foaf:name "A. Plastino"^^xsd:string; rdf:type foaf:Person . rdfs:label "VR Design_ManuscriptCorrections_Final.pdf"^^xsd:string . rdfs:label "VR Design_ManuscriptCorrections_Final.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #84044 \n\nA Reflection on Virtual Reality Design for Psychological, Cognitive & Behavioral Interventions: Design Needs, Opportunities & Challenges\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Reflection on Virtual Reality Design for Psychological, Cognitive & Behavioral Interventions: Design Needs, Opportunities & Challenges (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Reflection on Virtual Reality Design for Psychological, Cognitive & Behavioral Interventions: Design Needs, Opportunities & Challenges (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Reflection on Virtual Reality Design for Psychological, Cognitive & Behavioral Interventions: Design Needs, Opportunities & Challenges (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Reflection on Virtual Reality Design for Psychological, Cognitive & Behavioral Interventions: Design Needs, Opportunities & Challenges (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Reflection on Virtual Reality Design for Psychological, Cognitive & Behavioral Interventions: Design Needs, Opportunities & Challenges (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Reflection on Virtual Reality Design for Psychological, Cognitive & Behavioral Interventions: Design Needs, Opportunities & Challenges (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Despite the substantial research interest in using Virtual Reality (VR) in healthcare in general and in Psychological, Cognitive, and Behavioral (PC&B) interventions in specific, as well as emerging research supporting the efficacy of VR in healthcare, the design process of translating therapies into VR to meet the needs of critical stakeholders such as users and clinicians is rarely addressed. In this paper, we aim to shed light onto the design needs, opportunities and challenges in designing efficient and effective PC&B-VR interventions. Through analyzing the co-design processes of four user-centered PC&B-VR interventions, we examined how therapies were adapted into VR to meet stakeholders’ requirements, explored design elements for meaningful experiences, and investigated how the understanding of healthcare contexts contribute to the VR intervention design. This paper presents the HCI research community with design opportunities and challenges as well as future directions for PC&B-VR intervention design."^^xsd:string; bibo:authorList ; bibo:issue "9"; bibo:status , ; bibo:volume "37"; dc:hasVersion ; dct:creator , , , , ; dct:date "2021"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A Reflection on Virtual Reality Design for Psychological, Cognitive & Behavioral Interventions: Design Needs, Opportunities & Challenges"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . foaf:name "Taylor & Francis"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "She"^^xsd:string; foaf:givenName "Wan Jou"^^xsd:string; foaf:name "Wan Jou She"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Prigerson"^^xsd:string; foaf:givenName "Holly Gwen"^^xsd:string; foaf:name "Holly Gwen Prigerson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ang"^^xsd:string; foaf:givenName "Chee Siang"^^xsd:string; foaf:name "Chee Siang Ang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tabbaa"^^xsd:string; foaf:givenName "Luma"^^xsd:string; foaf:name "Luma Tabbaa"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Siriaraya"^^xsd:string; foaf:givenName "Panote"^^xsd:string; foaf:name "Panote Siriaraya"^^xsd:string; rdf:type foaf:Person . bibo:issn "10447318"; foaf:name "Int J of Human Computer Interaction"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "tranquilleBIT.pdf"^^xsd:string . rdfs:label "tranquilleBIT.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79002 \n\nEvaluating graphical manipulations in automatically laid out LineSets\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Evaluating graphical manipulations in automatically laid out LineSets (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating graphical manipulations in automatically laid out LineSets (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating graphical manipulations in automatically laid out LineSets (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating graphical manipulations in automatically laid out LineSets (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating graphical manipulations in automatically laid out LineSets (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating graphical manipulations in automatically laid out LineSets (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "This paper presents an empirical study to determine whether alterations to graphical features (colour and size) of automatically generated LineSets improve task performance. LineSets are used to visualise sets and networks. The increasingly common nature of such data suggests that having effective visualisations is important. Unlike many approaches to set and network visualisation, which often use concave or convex shapes to represent sets alongside graphs, LineSets use lines overlaid on a graph. LineSets have been shown to be advantageous over shape-based approaches. However, the graphical properties of LineSets have not been fully explored. Our results suggest that automatically drawn LineSets can be significantly improved for certain tasks through the considered use of colour alongside size variations applied to their graphical elements. In particular, we show that perceptually distinguishable colours, lines of varying width, and nodes of varying diameter lead to improved task performance in automatically laid-out LineSets."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "40"; dc:hasVersion ; dct:creator , , , ; dct:date "2021"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Evaluating graphical manipulations in automatically laid out LineSets"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . foaf:name "Taylor and Francis"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Tranquille"^^xsd:string; foaf:givenName "Dominique"^^xsd:string; foaf:name "Dominique Tranquille"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Stapleton"^^xsd:string; foaf:givenName "Gem"^^xsd:string; foaf:name "Gem Stapleton"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Burton"^^xsd:string; foaf:givenName "Jim"^^xsd:string; foaf:name "Jim Burton"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rodgers"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Rodgers"^^xsd:string; rdf:type foaf:Person . bibo:issn "0144929X"; foaf:name "Behaviour & Information Technology"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #85286 \n\nThe Shape of 6M Lines of Ruby\n\n"; foaf:primaryTopic . rdf:_1 . bibo:authorList ; bibo:status ; dct:creator ; dct:date "2020-12-30"; dct:isPartOf ; dct:subject ; dct:title "The Shape of 6M Lines of Ruby"^^xsd:string; rdf:type bibo:Article, ep:EPrint, ep:InternetEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "Lam_Preprint_DSP_Journal.pdf"^^xsd:string . rdfs:label "Lam_Preprint_DSP_Journal.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #85290 \n\nRobust acoustic scene classification using a multi-spectrogram encoder-decoder framework\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Robust acoustic scene classification using a multi-spectrogram encoder-decoder framework (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Robust acoustic scene classification using a multi-spectrogram encoder-decoder framework (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust acoustic scene classification using a multi-spectrogram encoder-decoder framework (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust acoustic scene classification using a multi-spectrogram encoder-decoder framework (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust acoustic scene classification using a multi-spectrogram encoder-decoder framework (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust acoustic scene classification using a multi-spectrogram encoder-decoder framework (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "This article proposes an encoder-decoder network model for Acoustic Scene Classification (ASC), the task of identifying the scene of an audio recording from its acoustic signature. We make use of multiple low-level spectrogram features at the front-end, transformed into higher level features through a well-trained CNN-DNN front-end encoder. The high-level features and their combination (via a trained feature combiner) are then fed into different decoder models comprising random forest regression, DNNs and a mixture of experts, for back-end classification. We conduct extensive experiments to evaluate the performance of this framework on various ASC datasets, including LITIS Rouen and IEEE AASP Challenge on Detection and Classification of Acoustic Scenes and Events (DCASE) 2016 Task 1, 2017 Task 1, 2018 Tasks 1A & 1B and 2019 Tasks 1A & 1B. The experimental results highlight two main contributions; the first is an effective method for high-level feature extraction from multi-spectrogram input via the novel CNN-DNN architecture encoder network, and the second is the proposed decoder which enables the framework to achieve competitive results on various datasets. The fact that a single framework is highly competitive for several different challenges is an indicator of its robustness for performing general ASC tasks."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , ; dct:date "2020-12-19"; dct:isPartOf , ; dct:publisher ; dct:title "Robust acoustic scene classification using a multi-spectrogram encoder-decoder framework"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Nguyen"^^xsd:string; foaf:givenName "Truc"^^xsd:string; foaf:name "Truc Nguyen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pham"^^xsd:string; foaf:givenName "Lam Dang"^^xsd:string; foaf:name "Lam Dang Pham"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mertins"^^xsd:string; foaf:givenName "Afred"^^xsd:string; foaf:name "Afred Mertins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . bibo:issn "10512004"; foaf:name "Digital Signal Processing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #89542 \n\nStochastic local search and parameters recommendation: a case study on flowshop problems\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:authorList ; bibo:status , ; dct:creator , , , ; dct:date "2020-12-17"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Stochastic local search and parameters recommendation: a case study on flowshop problems"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Wiley"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Pavelski"^^xsd:string; foaf:givenName "L"^^xsd:string; foaf:name "L Pavelski"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Delgado"^^xsd:string; foaf:givenName "Myriam"^^xsd:string; foaf:name "Myriam Delgado"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kessaci"^^xsd:string; foaf:givenName "M.E."^^xsd:string; foaf:name "M.E. Kessaci"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . bibo:issn "14753995"; foaf:name "International Transactions in Operational Research"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "DS-RA-2019-0043.R4_Proof_hi.pdf"^^xsd:string . rdfs:label "DS-RA-2019-0043.R4_Proof_hi.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82586 \n\nNeurocognition-inspired Design with Machine Learning\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Neurocognition-inspired Design with Machine Learning (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Neurocognition-inspired Design with Machine Learning (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Neurocognition-inspired Design with Machine Learning (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Neurocognition-inspired Design with Machine Learning (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Neurocognition-inspired Design with Machine Learning (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Neurocognition-inspired Design with Machine Learning (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 . bibo:abstract "Generating design via machine learning has been an on-going challenge in computer-aided design. Recently, deep learning methods have been applied to randomly generate images in fashion, furniture and product design. However, such deep generative methods usually require a large number of training images and human aspects are not taken into account in the design process. In this work, we seek a way to involve human cognitive factors through brain activity indicated by electroencephalographic measurements (EEG) in the generative process. We propose a neuroscience-inspired design with machine learning method where EEG is used to capture preferred design features. Such signals are used as a condition in generative adversarial networks (GAN). Firstly, we employ a recurrent neural network (LSTM - Long Short-Term Memory) as an encoder to extract EEG features from raw EEG signals; this data is recorded from subjects viewing several categories of images from ImageNet. Secondly, we train a GAN model conditioned on the encoded EEG features to generate design images. Thirdly, we use the model to generate design images from the subject’s EEG measured brain activity."^^xsd:string; bibo:authorList ; bibo:issue "e33"; bibo:status , ; bibo:volume "6"; dc:hasVersion ; dct:creator , , , , , , , ; dct:date "2020-12-17"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Neurocognition-inspired Design with Machine Learning"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "NK Decorative arts. Applied arts. Decoration and ornament"@en . rdf:type skos:Concept; skos:prefLabel "Q Science (General)"@en . foaf:name "Cambridge University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Guo"^^xsd:string; foaf:givenName "Yike"^^xsd:string; foaf:name "Yike Guo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Childs"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Childs"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Pan"^^xsd:string; foaf:name "Pan Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wei"^^xsd:string; foaf:givenName "Zhen"^^xsd:string; foaf:name "Zhen Wei"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Shuo"^^xsd:string; foaf:name "Shuo Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wu"^^xsd:string; foaf:givenName "Chao"^^xsd:string; foaf:name "Chao Wu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Peng"^^xsd:string; foaf:givenName "Danlin"^^xsd:string; foaf:name "Danlin Peng"^^xsd:string; rdf:type foaf:Person . foaf:name "Design Science"^^xsd:string; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #85285 \n\nThe Shape of 1.7M Lines of Code\n\n"; foaf:primaryTopic . rdf:_1 . bibo:authorList ; bibo:status ; dct:creator ; dct:date "2020-12-14"; dct:isPartOf ; dct:subject ; dct:title "The Shape of 1.7M Lines of Code"^^xsd:string; rdf:type bibo:Article, ep:EPrint, ep:InternetEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "bonheme20SemEval2020.pdf"^^xsd:string . rdfs:label "bonheme20SemEval2020.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "2020.semeval-1.102.pdf"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82204 \n\nSESAM at SemEval-2020 Task 8: Investigating the relationship between image and text in sentiment analysis of memes\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "SESAM at SemEval-2020 Task 8: Investigating the relationship between image and text in sentiment analysis of memes (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "SESAM at SemEval-2020 Task 8: Investigating the relationship between image and text in sentiment analysis of memes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SESAM at SemEval-2020 Task 8: Investigating the relationship between image and text in sentiment analysis of memes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SESAM at SemEval-2020 Task 8: Investigating the relationship between image and text in sentiment analysis of memes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SESAM at SemEval-2020 Task 8: Investigating the relationship between image and text in sentiment analysis of memes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SESAM at SemEval-2020 Task 8: Investigating the relationship between image and text in sentiment analysis of memes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "SESAM at SemEval-2020 Task 8: Investigating the relationship between image and text in sentiment analysis of memes (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SESAM at SemEval-2020 Task 8: Investigating the relationship between image and text in sentiment analysis of memes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SESAM at SemEval-2020 Task 8: Investigating the relationship between image and text in sentiment analysis of memes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SESAM at SemEval-2020 Task 8: Investigating the relationship between image and text in sentiment analysis of memes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SESAM at SemEval-2020 Task 8: Investigating the relationship between image and text in sentiment analysis of memes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "SESAM at SemEval-2020 Task 8: Investigating the relationship between image and text in sentiment analysis of memes (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "This paper presents our submission to task 8 (memotion analysis) of the SemEval 2020 competition. We explain the algorithms that were used to learn our models along with the process of tuning the algorithms and selecting the best model. Since meme analysis is a challenging task withtwo distinct modalities, we studied the impact of different multimodal representation strategies. The results of several approaches to dealing with multimodal data are therefore discussed in the paper. We found that alignment-based strategies did not perform well on memes. Our quantitative results also showed that images and text were uncorrelated. Fusion-based strategies did not show significant improvements and using one modality only (text or image) tends to lead to better results when applied with the predictive models that we used in our research."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion , ; dct:creator , ; dct:date "2020-12"; dct:isPartOf ; dct:subject ; dct:title "SESAM at SemEval-2020 Task 8: Investigating the relationship between image and text in sentiment analysis of memes"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "14th International Workshop on Semantic Evaluation (SemEval-2020)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Barcelona, Spain"^^xsd:string . foaf:familyName "Bonheme"^^xsd:string; foaf:givenName "Lisa"^^xsd:string; foaf:name "Lisa Bonheme"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grzes"^^xsd:string; foaf:givenName "Marek"^^xsd:string; foaf:name "Marek Grzes"^^xsd:string; rdf:type foaf:Person . rdfs:label "94Omid_Hajilou_-_PhD_Thesis_2020.pdf"^^xsd:string . rdfs:label "94Omid_Hajilou_-_PhD_Thesis_2020.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #85577 \n\nFace Perception and Recognition, on the Fringe of Human Awareness.\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Face Perception and Recognition, on the Fringe of Human Awareness. (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Face Perception and Recognition, on the Fringe of Human Awareness. (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Face Perception and Recognition, on the Fringe of Human Awareness. (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Face Perception and Recognition, on the Fringe of Human Awareness. (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Face Perception and Recognition, on the Fringe of Human Awareness. (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Face Perception and Recognition, on the Fringe of Human Awareness. (Other)"^^xsd:string . rdf:_1 . ; bibo:abstract "In Rapid Serial Visual Presentation (RSVP), we can present a large volume of information, on the fringe of awareness, whilst observing the brain's electrical signals using an Electroencephalogram (EEG). The vast majority of stimuli are not consciously perceived, but the salient ones breakthrough into awareness, enter into working memory and can be reported by the participant (Bowman, et al., 2013). Deception detection studies have successfully employed this countermeasure resistant fringe-P3 method, using letters, numbers and words (Bowman, Filetti, Alsufyani, Janssen, & Su, 2014), to differentiate between familiar and unfamiliar information. The inclusion of faces, and their application in Concealed Information Tests (CIT) have yet to be fully explored. In this thesis, we hypothesised that the fringe-P3 method could be successfully used to detect intrinsic salience of familiar faces, even when there was no task associated with the stimuli. Using experiments, we investigated the sensitivity of the ERP-based RSVP paradigm, to infer recognition of celebrity, as well as, lecturer faces, and performed statistical tests in the Time and Frequency domains, to differentiate between known and unknown faces, at group and subject levels. Furthermore, we used ground-truth data simulations to explore the viability of using online statistical tests, to focus experimental data collection efforts, on the critical stimulus with the highest significance, in order to improve statistical power (i.e. reduce the risk of Type II errors), without the inflation of Type I errors. As a result, we introduced new methods of analysis, and a two-part experimental design, where Part II's parameters are independently influenced by Part I's results, using online statistical tests. Finally, we applied our new findings in a concluding experiment, which explored a real-life scenario of revealing participants' familiarity with their lecturers, through the data captured from their brain. Our findings provide evidence that familiar faces are differentially perceived and processed by participants' brains, as compared to novel (unfamiliar) faces. Therefore, we propose our final experiment to be a workable solution for deception detection applications of crime compatriots (e.g. accomplices), using faces in RSVP-based EEG tests."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2020-12"; dct:isPartOf ; dct:issuer , ; dct:title "Face Perception and Recognition, on the Fringe of Human Awareness."^^xsd:string; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hajilou"^^xsd:string; foaf:givenName "Omid"^^xsd:string; foaf:name "Omid Hajilou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . rdfs:label "Knowl-Eng-Rev-J-2020-Nadine-post-review-final.pdf"^^xsd:string . rdfs:label "Knowl-Eng-Rev-J-2020-Nadine-post-review-final.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #87091 \n\nA study on the statistical evaluation of classifiers\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A study on the statistical evaluation of classifiers (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A study on the statistical evaluation of classifiers (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A study on the statistical evaluation of classifiers (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A study on the statistical evaluation of classifiers (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A study on the statistical evaluation of classifiers (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A study on the statistical evaluation of classifiers (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Statistical significance analysis, based on hypothesis tests, is a common approach for comparing classifiers. However, many studies oversimplify this analysis by simply checking the condition p-value < 0.05, ignoring important concepts such as the effect size and the statistical power of the test. This problem is so worrying that the American Statistical Association has taken a strong stand on the subject, noting that although the p-value is a useful statistical measure, it has been abusively used and misinterpreted. This work highlights problems caused by the misuse of hypothesis tests and shows how the effect size and the power of the test can provide important information for better decision-making. To investigate these issues, we perform empirical studies with different classifiers and 50 datasets, using the Student’s t-test and the Wilcoxon test to compare classifiers. The results show that an isolated p-value analysis can lead to wrong conclusions and that the evaluation of the effect size and the power of the test contributes to a more principled decision-making."^^xsd:string; bibo:authorList ; bibo:issue "e1"; bibo:status , ; bibo:volume "36"; dc:hasVersion ; dct:creator , , , ; dct:date "2020-11-27"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A study on the statistical evaluation of classifiers"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Cambridge University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Neumann"^^xsd:string; foaf:givenName "Nadine M."^^xsd:string; foaf:name "Nadine M. Neumann"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Plastino"^^xsd:string; foaf:givenName "Alexandre"^^xsd:string; foaf:name "Alexandre Plastino"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pinto Junior"^^xsd:string; foaf:givenName "Jony A."^^xsd:string; foaf:name "Jony A. Pinto Junior"^^xsd:string; rdf:type foaf:Person . bibo:issn "02698889"; foaf:name "Knowledge Engineering Review"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "why-current-statistical-approaches-to-ransomware-detection-fail.pdf"^^xsd:string . rdfs:label "why-current-statistical-approaches-to-ransomware-detection-fail.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82960 \n\nWhy Current Statistical Approaches to Ransomware Detection Fail\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Why Current Statistical Approaches to Ransomware Detection Fail (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Why Current Statistical Approaches to Ransomware Detection Fail (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Why Current Statistical Approaches to Ransomware Detection Fail (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Why Current Statistical Approaches to Ransomware Detection Fail (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Why Current Statistical Approaches to Ransomware Detection Fail (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Why Current Statistical Approaches to Ransomware Detection Fail (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The frequent use of basic statistical techniques to detect ransomware is a popular and intuitive strategy; statistical tests can be used to identify randomness, which in turn can indicate the presence of encryption and, by extension, a ransomware attack. However, common file formats such as images and compressed data can look random from the perspective of some of these tests. In this work, we investigate the current frequent use of statistical tests in the context of ransomware detection, primarily focusing on false positive rates. The main aim of our work is to show that the current over-dependence on simple statistical tests within anti-ransomware tools can cause serious issues with the reliability and consistency of ransomware detection in the form of frequent false classifications. We determined thresholds for five key statistics frequently used in detecting randomness, namely Shannon entropy, chi-square, arithmetic mean, Monte Carlo estimation for Pi and serial correlation coefficient. We obtained a large data set of 84,327 files comprising of images, compressed data and encrypted data. We then tested these thresholds (taken from a variety of previous publications in the literature where possible) against our dataset, showing that the rate of false positives is far beyond what could be considered acceptable. False positive rates were often above 50% and even above 90% on several occasions. False negative rates were also generally between 5% and 20%, numbers which are also far too high. As a direct result of these experiments, we determine that relying on these simple statistical approaches is not good enough to detect ransomware attacks consistently. We instead recommend the exploration of higher-order statistics such as skewness and kurtosis for future ransomware detection techniques."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "12472"; dc:hasVersion ; dct:creator , , ; dct:date "2020-11-25"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Why Current Statistical Approaches to Ransomware Detection Fail"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "23rd Information Security Conference"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Bali, Indonesia"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Arief"^^xsd:string; foaf:givenName "Budi"^^xsd:string; foaf:name "Budi Arief"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio C."^^xsd:string; foaf:name "Julio C. Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pont"^^xsd:string; foaf:givenName "Jamie"^^xsd:string; foaf:name "Jamie Pont"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "TSEC-Paper.pdf"^^xsd:string . rdfs:label "TSEC-Paper.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #84063 \n\nDesign Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "This paper presents a mapping framework for design factors and an implementation process for building credible Industrial Control Systems (ICS) security testbeds. The security and resilience of ICSs has become a critical concern to operators and governments following widely publicised cyber security events. The inability to apply conventional Information Technology security practice to ICSs further compounds challenges in adequately securing critical systems. To overcome these challenges, and do so without impacting live environments, testbeds are widely used for the exploration, development, and evaluation of security controls. However, how a testbed is designed and its attributes, can directly impact not only its viability but also its credibility. Combining systematic and thematic analysis, and the mapping of identified ICS security testbed design attributes, we propose a novel relationship map of credibility-supporting design factors (and their associated attributes) and a process implementation flow structure for ICS security testbeds. The framework and implementation process highlight the significance of demonstrating some design factors such as user/experimenter expertise, clearly defined testbed design objectives, simulation implementation approach, covered architectural components, core structural and functional characteristics covered, and evaluations to enhance confidence, trustworthiness and acceptance of ICS security testbeds as credible. These can streamline testbed requirement definition, improve design consistency and quality while reducing implementation costs."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2020-11-23"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . rdf:type skos:Concept; skos:prefLabel "TA Engineering (General). Civil engineering (General)"@en . foaf:name "Taylor & Francis"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Craggs"^^xsd:string; foaf:givenName "Barnaby"^^xsd:string; foaf:name "Barnaby Craggs"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Watson"^^xsd:string; foaf:givenName "Jeremy D. McK."^^xsd:string; foaf:name "Jeremy D. McK. Watson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ani"^^xsd:string; foaf:givenName "Uchenna D."^^xsd:string; foaf:name "Uchenna D. Ani"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Green"^^xsd:string; foaf:givenName "Benjamin"^^xsd:string; foaf:name "Benjamin Green"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "23742917"; foaf:name "Journal of Cyber Security Technology"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "pcbi.1008286.pdf"^^xsd:string . rdfs:label "pcbi.1008286.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82894 \n\nBreaking the Circularity in Circular Analyses: Simulations and Formal Treatment of the Flattened Average Approach\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Breaking the Circularity in Circular Analyses: Simulations and Formal Treatment of the Flattened Average Approach (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Breaking the Circularity in Circular Analyses: Simulations and Formal Treatment of the Flattened Average Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breaking the Circularity in Circular Analyses: Simulations and Formal Treatment of the Flattened Average Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breaking the Circularity in Circular Analyses: Simulations and Formal Treatment of the Flattened Average Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breaking the Circularity in Circular Analyses: Simulations and Formal Treatment of the Flattened Average Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breaking the Circularity in Circular Analyses: Simulations and Formal Treatment of the Flattened Average Approach (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Breaking the Circularity in Circular Analyses: Simulations and Formal Treatment of the Flattened Average Approach (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Breaking the Circularity in Circular Analyses: Simulations and Formal Treatment of the Flattened Average Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breaking the Circularity in Circular Analyses: Simulations and Formal Treatment of the Flattened Average Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breaking the Circularity in Circular Analyses: Simulations and Formal Treatment of the Flattened Average Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breaking the Circularity in Circular Analyses: Simulations and Formal Treatment of the Flattened Average Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breaking the Circularity in Circular Analyses: Simulations and Formal Treatment of the Flattened Average Approach (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "There has been considerable debate and concern as to whether there is a replication crisis in the scientific literature. A likely cause of poor replication is the multiple comparisons problem. An important way in which this problem can manifest in the M/EEG context is through post hoc tailoring of analysis windows (a.k.a. regions-of-interest, ROIs) to landmarks in the collected data. Post hoc tailoring of ROIs is used because it allows researchers to adapt to inter-experiment variability and discover novel differences that fall outside of windows defined by prior precedent, thereby reducing Type II errors. However, this approach can dramatically inflate Type I error rates. One way to avoid this problem is to tailor windows according to a contrast that is orthogonal (strictly parametrically orthogonal) to the contrast being tested. A key approach of this kind is to identify windows on a fully flattened average. On the basis of simulations, this approach has been argued to be safe for post hoc tailoring of analysis windows under many conditions. Here, we present further simulations and mathematical proofs to show exactly why the Fully Flattened Average approach is unbiased, providing a formal grounding to the approach, clarifying the limits of its applicability and resolving published misconceptions about the method. We also provide a statistical power analysis, which shows that, in specific contexts, the fully flattened average approach provides higher statistical power than Fieldtrip cluster inference. This suggests that the Fully Flattened Average approach will enable researchers to identify more effects from their data without incurring an inflation of the false positive rate."^^xsd:string; bibo:authorList ; bibo:issue "11"; bibo:status , ; bibo:volume "16"; dc:hasVersion , ; dct:creator , , , , ; dct:date "2020-11-23"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Breaking the Circularity in Circular Analyses: Simulations and Formal Treatment of the Flattened Average Approach"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "RC321 Neuroscience. Biological psychiatry. Neuropsychiatry"@en . foaf:name "Public Library of Science"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Litvak"^^xsd:string; foaf:givenName "Vladimir"^^xsd:string; foaf:name "Vladimir Litvak"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zoumpoulaki"^^xsd:string; foaf:givenName "Alexia"^^xsd:string; foaf:name "Alexia Zoumpoulaki"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hajilou"^^xsd:string; foaf:givenName "Omid"^^xsd:string; foaf:name "Omid Hajilou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Brooks"^^xsd:string; foaf:givenName "Joseph L"^^xsd:string; foaf:name "Joseph L Brooks"^^xsd:string; rdf:type foaf:Person . bibo:issn "1553734X"; foaf:name "PLoS Computational Biology"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "main.pdf"^^xsd:string . rdfs:label "main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "div-class-title-backjumping-is-exception-handling-div.pdf"^^xsd:string . rdfs:label "div-class-title-backjumping-is-exception-handling-div.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82447 \n\nBackjumping is Exception Handling\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Backjumping is Exception Handling (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Backjumping is Exception Handling (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Backjumping is Exception Handling (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Backjumping is Exception Handling (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Backjumping is Exception Handling (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Backjumping is Exception Handling (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Backjumping is Exception Handling (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Backjumping is Exception Handling (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Backjumping is Exception Handling (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Backjumping is Exception Handling (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Backjumping is Exception Handling (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Backjumping is Exception Handling (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "ISO Prolog provides catch and throw to realise the control flow of exception handling. This pearl demonstrates that catch and throw are inconspicuously amenable to the implementation of backjumping. In fact, they have precisely the semantics required: rewinding the search to a specific point, and carrying of a preserved term to that point. The utility of these properties is demonstrated through an implementation of graph colouring with backjumping and a backjumping SAT solver that applies Conflict Driven Clause Learning."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion , ; dct:creator , , ; dct:date "2020-11-16"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Backjumping is Exception Handling"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Cambridge Univerity Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Howe"^^xsd:string; foaf:givenName "Jacob M."^^xsd:string; foaf:name "Jacob M. Howe"^^xsd:string; rdf:type foaf:Person . foaf:familyName "King"^^xsd:string; foaf:givenName "Andy"^^xsd:string; foaf:name "Andy King"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Robbins"^^xsd:string; foaf:givenName "Ed"^^xsd:string; foaf:name "Ed Robbins"^^xsd:string; rdf:type foaf:Person . bibo:issn "14710684"; foaf:name "Theory and Practice of Logic Programming"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Cyber Abuse Impact on Adult Mental Health - AAM.pdf"^^xsd:string . rdfs:label "Cyber Abuse Impact on Adult Mental Health - AAM.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #83544 \n\nCyber Stalking, Cyber Harassment and Adult Mental Health: A Systematic Review\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Cyber Stalking, Cyber Harassment and Adult Mental Health: A Systematic Review (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Stalking, Cyber Harassment and Adult Mental Health: A Systematic Review (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Stalking, Cyber Harassment and Adult Mental Health: A Systematic Review (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Stalking, Cyber Harassment and Adult Mental Health: A Systematic Review (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Stalking, Cyber Harassment and Adult Mental Health: A Systematic Review (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Stalking, Cyber Harassment and Adult Mental Health: A Systematic Review (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "As Internet use increases, there is a growing risk of online harms, including cyber stalking and cyber harassment. However, there has been limited research investigating the impact of such online harms upon adults’ well-being. This paper engages in a systematic literature review concerning the mental health impact of online stalking and harassment for adult victims to further understand their experiences and the effects these have on their lives. Our research utilised the PRISMA technique to review papers published in eight online databases. A total of 1,204 articles were extracted, and ultimately 43 articles analysed. Forty-two of the reviewed articles reported that victims of cyber stalking and/or harassment experienced a multitude of harmful and detrimental consequences for their mental health including depression, anxiety, suicidal ideation and panic attacks. Victims recounted the lack of support they received from the criminal justice system, and their subsequent distrust of technology post abuse. Only one study found no relationship between cyber abuse victimisation and the well-being dimensions they examined. Our research highlights the need to devise practical solutions to tackle and minimise this victimisation. Furthermore, it underlines the necessity for adult education concerning safer technology use, as well as for researchers to be transparent regarding the platforms that victims have been abused on so we can better infer where and how exactly individuals need support to interact safely online."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2020-11-12"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Cyber Stalking, Cyber Harassment and Adult Mental Health: A Systematic Review"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Mary Ann Liebert"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Stevens"^^xsd:string; foaf:givenName "Francesca"^^xsd:string; foaf:name "Francesca Stevens"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Arief"^^xsd:string; foaf:givenName "Budi"^^xsd:string; foaf:name "Budi Arief"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R.C."^^xsd:string; foaf:name "Jason R.C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "21522715"; foaf:name "Cyberpsychology, Behavior, and Social Networking"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "09252879.pdf"^^xsd:string . rdfs:label "09252879.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #84855 \n\nThe World of Defacers: Looking through the Lens of Their Activities on Twitter\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "The World of Defacers: Looking through the Lens of Their Activities on Twitter (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The World of Defacers: Looking through the Lens of Their Activities on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The World of Defacers: Looking through the Lens of Their Activities on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The World of Defacers: Looking through the Lens of Their Activities on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The World of Defacers: Looking through the Lens of Their Activities on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The World of Defacers: Looking through the Lens of Their Activities on Twitter (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Many web-based attacks have been studied to understand how web hackers behave, but web site defacement attacks (malicious content manipulations of victim web sites) and defacers’ behaviors have received less attention from researchers. This paper fills this research gap via a computational data-driven analysis of a public database of defacers and defacement attacks and activities of 96 selected defacers who were active on Twitter. We conducted a comprehensive analysis of the data: an analysis of a friendship graph with 10,360 nodes, an analysis on how sentiments of defacers related to attack patterns, and a topical modelling based analysis to study what defacers discussed publicly on Twitter. Our analysis revealed a number of key findings: a modular and hierarchical clustering method can help discover interesting sub-communities of defacers; sentiment analysis can help categorize behaviors of defacers in terms of attack patterns; and topic modelling revealed some focus topics (politics, country-specific topics, and technical discussions) among defacers on Twitter and also geographic links of defacers sharing similar topics. We believe that these findings are useful for a better understanding of defacers' behaviors, which could help design and development of better solutions for detecting defacers and even preventing impeding defacement attacks."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "8"; dc:hasVersion ; dct:creator , , , ; dct:date "2020-11-09"; dct:isPartOf , ; dct:publisher ; dct:subject , , , ; dct:title "The World of Defacers: Looking through the Lens of Their Activities on Twitter"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76.I59 Interactive media, hypermedia"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.875.I57 Internet"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.888 World Wide Web"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Çelebi"^^xsd:string; foaf:givenName "Fatih V."^^xsd:string; foaf:name "Fatih V. Çelebi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Aslan"^^xsd:string; foaf:givenName "Çaǧri Burak"^^xsd:string; foaf:name "Çaǧri Burak Aslan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tian"^^xsd:string; foaf:givenName "Hao"^^xsd:string; foaf:name "Hao Tian"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . foaf:name "IEEE Access"^^xsd:string; rdf:type bibo:Collection . rdfs:label "technologies-08-00063-v2.pdf"^^xsd:string . rdfs:label "technologies-08-00063-v2.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #85289 \n\nIn-ear electrode EEG for practical SSVEP BCI\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "In-ear electrode EEG for practical SSVEP BCI (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "In-ear electrode EEG for practical SSVEP BCI (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "In-ear electrode EEG for practical SSVEP BCI (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "In-ear electrode EEG for practical SSVEP BCI (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "In-ear electrode EEG for practical SSVEP BCI (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "In-ear electrode EEG for practical SSVEP BCI (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Steady State Visual Evoked Potential (SSVEP) methods for brain–computer interfaces (BCI) are popular due to higher information transfer rate and easier setup with minimal training, compared to alternative methods. With precisely generated visual stimulus frequency, it is possible to translate brain signals into external actions or signals. Traditionally, SSVEP data is collected from the occipital region using electrodes with or without gel, normally mounted on a head cap. In this experimental study, we develop an in-ear electrode to collect SSVEP data for four different flicker frequencies and compare against occipital scalp electrode data. Data from five participants demonstrates the feasibility of in-ear electrode based SSVEP, significantly enhancing the practicability of wearable BCI applications."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "8"; dc:hasVersion ; dct:creator , , , ; dct:date "2020-11-05"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "In-ear electrode EEG for practical SSVEP BCI"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "MDPI"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Molefi"^^xsd:string; foaf:givenName "Emmanuel"^^xsd:string; foaf:name "Emmanuel Molefi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mouli"^^xsd:string; foaf:givenName "Surej"^^xsd:string; foaf:name "Surej Mouli"^^xsd:string; rdf:type foaf:Person . foaf:name "Technologies"^^xsd:string; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #83975 \n\nMPLR 2020: Proceedings of the 17th International Conference on Managed Programming Languages and Runtimes\n\n"; foaf:primaryTopic . rdf:_1 . ; bibo:editorList ; bibo:status , ; dct:date "2020-11-04"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "MPLR 2020: Proceedings of the 17th International Conference on Managed Programming Languages and Runtimes"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, ep:EPrint, ep:EdbookEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "SINCONF2020a.pdf"^^xsd:string . rdfs:label "SINCONF2020a.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #89476 \n\nWhen GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Collecting information about consumers and businesses from various sources, Credit reference agencies (CRAs) help many organizations such as financial institutions to assess creditworthiness of applicants and customers of their services. CRAs’ business model depends on processing a high volume of personal data including highly sensitive ones, which must be processed within the relevant legal frameworks in different countries they operate their business, e.g., the European Union’s new GDPR (General Data Protection Regulation). This paper reports a data-driven analysis of CRA- and GDPR-related discussions on Twitter. Our analysis covers the three largest multi-national CRAs: Equifax, Experian and TransUnion and we also looked at the UK’s data protection authority, ICO, and two UK-based privacy-advocating NGOs, Privacy International and Open Rights Group (ORG). We have analyzed public tweets of their official Twitter accounts and other public tweets talking about them. Our analysis revealed a very surprising lack of awareness of CRA- and GDPR-related data privacy issues within the general public and an astonishing lack of active communications of CRAs to the general public on relevant GDPR-related privacy issues: out of 39,549 collected tweets we identified only 153 relevant tweets (0.387%). This small number of tweets are dominated by mentions of security issues (%73.2), especially data breaches affecting CRAs, not data subject rights or privacy issues directly. Other tweets are mainly about complaints regarding inaccurate data in credit files and questions about how to exercise right to rectification, just two of many data subject rights defined in the GDPR."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2020-11-04"; dct:isPartOf ; dct:publisher ; dct:subject , , , , ; dct:title "When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences (General)"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.875.I57 Internet"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.888 World Wide Web"@en . dct:title "13th International Conference on Security of Information and Networks (SINCONF 2020)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Virtual"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Aydın"^^xsd:string; foaf:givenName "Kübra"^^xsd:string; foaf:name "Kübra Aydın"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bülbül"^^xsd:string; foaf:givenName "Abdullah"^^xsd:string; foaf:name "Abdullah Bülbül"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sağlam"^^xsd:string; foaf:givenName "Rahime Belen"^^xsd:string; foaf:name "Rahime Belen Sağlam"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . rdfs:label "SINCONF2020b.pdf"^^xsd:string . rdfs:label "SINCONF2020b.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #89479 \n\nTension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Since coming into effect in May 2018, the EU General Data Protection Regulation (GDPR) has raised serious concerns among users of public (permissionless) blockchain systems. Such concerns are triggered by a tension between some unique characteristics of public blockchain systems and some new data subject rights introduced in the GDPR, e.g., the data immutability and the “right to erasure” (a.k.a. “the right to be forgotten”). The aim of this work is to understand how service providers and developers behind public blockchain systems have communicated about such GDPR-related challenges to their users and how the users have perceived such GDPR-related issues. To this end, for 50 public blockchain systems whose corresponding cryptocurrency had a capital market size over $150 million, we analyzed relevant communications and discussions on the following three online channels: blog and forums posts, GitHub repositories, and discussions on Twitter. Our results show that service providers and developers of the selected public blockchain systems did not play an active role in GDPR-related online discussions on Twitter. They also did not communicate with their users about GDPR on their forums and blogs frequently, where we could identify only 56 posts out of 17,821 posts for the period we studied. Our study also reveals that only an extreme minority of the studied systems (4) mentioned GDPR in their GitHub repositories. Our work adds new evidence on the lack of transparency and active communications of the public blockchain sector on the challenging GDPR compliance issue of public blockchain systems."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2020-11-04"; dct:isPartOf ; dct:publisher ; dct:subject , , , , ; dct:title "Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences (General)"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.875.I57 Internet"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.888 World Wide Web"@en . dct:title "13th International Conference on Security of Information and Networks (SINCONF 2020)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Virtual"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Tetik"^^xsd:string; foaf:givenName "Hacı Yakup"^^xsd:string; foaf:name "Hacı Yakup Tetik"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bülbül"^^xsd:string; foaf:givenName "Abdullah"^^xsd:string; foaf:name "Abdullah Bülbül"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sağlam"^^xsd:string; foaf:givenName "Rahime Belen"^^xsd:string; foaf:name "Rahime Belen Sağlam"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chousein"^^xsd:string; foaf:givenName "Zeynep"^^xsd:string; foaf:name "Zeynep Chousein"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90817 \n\nThe Virtual Knowledge Graph System Ontop\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 . bibo:abstract "Ontop is a popular open-source virtual knowledge graph system that can expose heterogeneous data sources as a unified knowledge graph. Ontop has been widely used in a variety of research and industrial projects. In this paper, we describe the challenges, design choices, new features of the latest release of Ontop v4, summarizing the development efforts of the last 4 years."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "12507"; dct:creator , , , , , , , , , ; dct:date "2020-11-02"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "The Virtual Knowledge Graph System Ontop"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "The Semantic Web - ISWC 2020 - 19th International Semantic Web Conference, Athens, Greece, November 2-6, 2020, Proceedings, Part II"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Athens, Greece"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Kalayci"^^xsd:string; foaf:givenName "Elem G\\\"zel"^^xsd:string; foaf:name "Elem G\\\"zel Kalayci"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Corman"^^xsd:string; foaf:givenName "Julien"^^xsd:string; foaf:name "Julien Corman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Komla-Ebri"^^xsd:string; foaf:givenName "Sarah"^^xsd:string; foaf:name "Sarah Komla-Ebri"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Calvanese"^^xsd:string; foaf:givenName "Diego"^^xsd:string; foaf:name "Diego Calvanese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Xiao"^^xsd:string; foaf:givenName "Guohui"^^xsd:string; foaf:name "Guohui Xiao"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lanti"^^xsd:string; foaf:givenName "Davide"^^xsd:string; foaf:name "Davide Lanti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cogrel"^^xsd:string; foaf:givenName "Benjamin"^^xsd:string; foaf:name "Benjamin Cogrel"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ding"^^xsd:string; foaf:givenName "Linfang"^^xsd:string; foaf:name "Linfang Ding"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kontchakov"^^xsd:string; foaf:givenName "Roman"^^xsd:string; foaf:name "Roman Kontchakov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Botoeva"^^xsd:string; foaf:givenName "Elena"^^xsd:string; foaf:name "Elena Botoeva"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "The Semantic Web – ISWC 2020 - 19th International Semantic Web Conference"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90402 \n\nHuman action recognition using deep rule-based classifier\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "In recent years, numerous techniques have been proposed for human activity recognition (HAR) from images and videos. These techniques can be divided into two major categories: handcrafted and deep learning. Deep Learning-based models have produced remarkable results for HAR. However, these models have several shortcomings, such as the requirement for a massive amount of training data, lack of transparency, offline nature, and poor interpretability of their internal parameters. In this paper, a new approach for HAR is proposed, which consists of an interpretable, self-evolving, and self-organizing set of 0-order If...THEN rules. This approach is entirely data-driven, and non-parametric; thus, prototypes are identified automatically during the training process. To demonstrate the effectiveness of the proposed method, a set of high-level features is obtained using a pre-trained deep convolution neural network model, and a recently introduced deep rule-based classifier is applied for classification. Experiments are performed on a challenging benchmark dataset UCF50; results confirmed that the proposed approach outperforms state-of-the-art methods. In addition to this, an ablation study is conducted to demonstrate the efficacy of the proposed approach by comparing the performance of our DRB classifier with four state-of-the-art classifiers. This analysis revealed that the DRB classifier could perform better than state-of-the-art classifiers, even with limited training samples."^^xsd:string; bibo:authorList ; bibo:issue "41-42"; bibo:status , ; bibo:volume "79"; dct:creator , , , ; dct:date "2020-11-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Human action recognition using deep rule-based classifier"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen"^^xsd:string; foaf:name "Plamen Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sargano"^^xsd:string; foaf:givenName "Allah Bux"^^xsd:string; foaf:name "Allah Bux Sargano"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Habib"^^xsd:string; foaf:givenName "Zulfiqar"^^xsd:string; foaf:name "Zulfiqar Habib"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "13807501"; foaf:name "Multimedia Tools and Applications"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "160Robust_Communications_in_Erlang_by_Joseph_Richard_Harrison.pdf"^^xsd:string . rdfs:label "160Robust_Communications_in_Erlang_by_Joseph_Richard_Harrison.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #87484 \n\nRobust Communications in Erlang\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Robust Communications in Erlang (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Robust Communications in Erlang (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust Communications in Erlang (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust Communications in Erlang (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust Communications in Erlang (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Robust Communications in Erlang (Other)"^^xsd:string . rdf:_1 . , ; bibo:abstract "Erlang is a dynamically-typed functional and concurrent programming language lauded by its proponents for its relatively simple syntax, process isolation, and fault tolerance. The functional aspect has rich features like pattern matching and tail-call optimisation, while the concurrent aspect uses isolated processes and asynchronous message passing to share state between system components. The two meet with pattern matching on mailboxes, which allows for a process to pick a message from its mailbox - potentially out of order - based on its structure, value, type, or a mixture thereof. A strongly and dynamically typed language like Erlang can experience many kinds of runtime errors, such as ill-typed operands to arithmetic operators. The interaction between Erlang's type system and process mailboxes can lead to a more subtle runtime error which is harder to detect: orphan messages. As the types of messages are not checked either at compile time or runtime, a process can be sent a message which it will never receive. Essentially, non-trivial type discrepancies in Erlang programs can cause subtle bugs when communication is involved. These problems can be hard to detect and fix, with current solutions such as extensive testing and exhaustive model checking. This thesis reports on work to detect communication-related type discrepancies in Erlang programs. A fragment of the Core Erlang intermediate format is modelled formally so that we can reason about the out-of-order communication in Erlang systems, particularly the dependencies between sent messages when determining whether orphan messages exist. Afterwards, a sub-typing relation based on Erlang's type system is introduced to clearly define the notion of an orphan message, forming the foundation of a system for automatic detection via a mix of static analysis and runtime verification. This culminates in automatic tooling to detect certain cases of communication discrepancies via static analysis, and automatic instrumentation of concurrent programs to detect and recover from more complicated cases at runtime."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2020-11"; dct:isPartOf ; dct:issuer , ; dct:title "Robust Communications in Erlang"^^xsd:string; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Harrison"^^xsd:string; foaf:givenName "Joseph Richard"^^xsd:string; foaf:name "Joseph Richard Harrison"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Meng"^^xsd:string; foaf:name "Meng Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Thompson"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Thompson"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #91361 \n\nModelling Multiple Language Learning in a Developmental Cognitive Architecture\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "In this work, we model multiple natural language learning in a developmental neuroscience-inspired architecture. The ANNABELL model (Artificial Neural Network with Adaptive Behaviour Exploited for Language Learning), is a large-scale neural network, however, unlike most deep learning methods that solve natural language processing (NLP) tasks, it does not represent an empirical engineering solution for specific NLP problems; rather, its organisation complies with findings from cognitive neuroscience, particularly the multi-compartment working memory models. The system is appropriately trained to understand the level of cognitive development required for language acquisition and the robustness achieved in learning simultaneously four languages, using a corpus of text-based exchanges of developmental complexity. The selected languages, Greek, Italian and Albanian, besides English, differ significantly in structure and complexity. Initially, the system was validated in each language alone and was then compared with the open-ended cumulative training, in which languages are learned jointly, prior to querying with random language at random order. We aimed to assess if the model could learn the languages together to the same degree of skill as learning each apart. Moreover, we explored the generalisation skill in multilingual context questions and the ability to elaborate a short text of preschool literature. We verified if the system could follow a dialogue coherently and cohesively, keeping track of its previous answers and recalling them in subsequent queries. The results show that the architecture developed broad language processing functionalities, with satisfactory performances in each language trained singularly, maintaining high accuracies when they are acquired cumulatively."^^xsd:string; bibo:authorList ; bibo:status , ; dct:creator , , , , ; dct:date "2020-10-27"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Modelling Multiple Language Learning in a Developmental Cognitive Architecture"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Esposito"^^xsd:string; foaf:givenName "M."^^xsd:string; foaf:name "M. Esposito"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Golosio"^^xsd:string; foaf:givenName "B."^^xsd:string; foaf:name "B. Golosio"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cangelosi"^^xsd:string; foaf:givenName "A."^^xsd:string; foaf:name "A. Cangelosi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Giorgi"^^xsd:string; foaf:givenName "I."^^xsd:string; foaf:name "I. Giorgi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Masala"^^xsd:string; foaf:givenName "Giovanni Luca"^^xsd:string; foaf:name "Giovanni Luca Masala"^^xsd:string; rdf:type foaf:Person . bibo:issn "23798920"; foaf:name "IEEE Transactions on Cognitive and Developmental Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "paper.pdf"^^xsd:string . rdfs:label "paper.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #83710 \n\nEfficient Static Analysis of Marlowe Contracts\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Efficient Static Analysis of Marlowe Contracts (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Efficient Static Analysis of Marlowe Contracts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Efficient Static Analysis of Marlowe Contracts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Efficient Static Analysis of Marlowe Contracts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Efficient Static Analysis of Marlowe Contracts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Efficient Static Analysis of Marlowe Contracts (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "SMT solvers can verify properties automatically and efficiently, and they offer increasing\r\nflexibility on the ways those properties can be described. But it is hard to predict how those ways of describing the properties affect the computational cost of verifying them.\r\n\r\nIn this paper, we discuss what we learned while implementing and optimising the static analysis for Marlowe, a domain specific language for self-enforcing financial smart-contracts that can be deployed on a blockchain."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2020-10-26"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Efficient Static Analysis of Marlowe Contracts"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Steffen"^^xsd:string; foaf:givenName "Bernhard"^^xsd:string; foaf:name "Bernhard Steffen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lamela Seijas"^^xsd:string; foaf:givenName "Pablo"^^xsd:string; foaf:name "Pablo Lamela Seijas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Margaria"^^xsd:string; foaf:givenName "Tiziana"^^xsd:string; foaf:name "Tiziana Margaria"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Smith"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Smith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Thompson"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Thompson"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "International Symposium on Leveraging Applications of Formal Methods ISoLA 2020: Leveraging Applications of Formal Methods, Verification and Validation: Applications"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "niaa022.pdf"^^xsd:string . rdfs:label "niaa022.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #85600 \n\nEvent-related potentials reflect prediction errors and pop-out during comprehension of degraded speech\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Event-related potentials reflect prediction errors and pop-out during comprehension of degraded speech (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Event-related potentials reflect prediction errors and pop-out during comprehension of degraded speech (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Event-related potentials reflect prediction errors and pop-out during comprehension of degraded speech (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Event-related potentials reflect prediction errors and pop-out during comprehension of degraded speech (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Event-related potentials reflect prediction errors and pop-out during comprehension of degraded speech (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Event-related potentials reflect prediction errors and pop-out during comprehension of degraded speech (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Comprehension of degraded speech requires higher-order expectations informed by prior knowledge. Accurate top-down expectations of incoming degraded speech cause a subjective semantic ‘pop-out’ or conscious breakthrough experience. Indeed, the same stimulus can be perceived as meaningless when no expectations are made in advance. We investigated the event-related potential (ERP) correlates of these top-down expectations, their error signals and the subjective pop-out experience in healthy participants. We manipulated expectations in a word-pair priming degraded (noise-vocoded) speech task and investigated the role of top-down expectation with a between-groups attention manipulation. Consistent with the role of expectations in comprehension, repetition priming significantly enhanced perceptual intelligibility of the noisevocoded degraded targets for attentive participants. An early ERP was larger for mismatched (i.e. unexpected) targets than matched targets, indicative of an initial error signal not reliant on top-down expectations. Subsequently, a P3a-like ERP was larger to matched targets than mismatched targets only for attending participants—i.e. a pop-out effect—while a later ERP was larger for mismatched targets and did not significantly interact with attention. Rather than relying on complex post hoc interactions between prediction error and precision to explain this apredictive pattern, we consider our data to be consistent with prediction error minimization accounts for early stages of processing followed by Global Neuronal Workspace-like breakthrough and processing in service of task goals."^^xsd:string; bibo:authorList ; bibo:issue "1"; bibo:status , ; bibo:volume "2020"; dc:hasVersion ; dct:creator , , , , ; dct:date "2020-10-25"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Event-related potentials reflect prediction errors and pop-out during comprehension of degraded speech"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "RC321 Neuroscience. Biological psychiatry. Neuropsychiatry"@en . foaf:name "Oxford University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Cruse"^^xsd:string; foaf:givenName "Damian"^^xsd:string; foaf:name "Damian Cruse"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sokoliuk"^^xsd:string; foaf:givenName "Rodika"^^xsd:string; foaf:name "Rodika Sokoliuk"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wild"^^xsd:string; foaf:givenName "Conor J."^^xsd:string; foaf:name "Conor J. Wild"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Banellis"^^xsd:string; foaf:givenName "Leah"^^xsd:string; foaf:name "Leah Banellis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:name "Neuroscience of Consciousness"^^xsd:string; rdf:type bibo:Collection . rdfs:label "IEEE-EuroSP-2020-WACCO-Extremism.pdf"^^xsd:string . rdfs:label "IEEE-EuroSP-2020-WACCO-Extremism.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81140 \n\n#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The rapid expansion of cyberspace has greatly facilitated the strategic shift of traditional crimes to online platforms. This has included malicious actors, such as extremist organisations, making use of online networks to disseminate propaganda and incite violence through radicalising individuals. In this article, we seek to advance current research by exploring how supporters of extremist organisations craft and disseminate their content, and how posts from counter-extremism agencies compare to them. In particular, this study will apply computational techniques to analyse the narratives of various pro-extremist and counter-extremist Twitter accounts, and investigate how the psychological motivation behind the messages compares between pro-ISIS and counter-extremism narratives. Our findings show that pro-extremist accounts often use different strategies to disseminate content (such as the types of hashtags used) when compared to counter-extremist accounts across different types of organisations, including accounts of governments and NGOs. Through this study, we provide unique insights into both extremist and counter-extremist narratives on social media platforms. Furthermore, we define several avenues for discussion regarding the extent to which counter-messaging may be effective at diminishing the online influence of extremist and other criminal organisations."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2020-10-22"; dct:isPartOf ; dct:publisher ; dct:subject , , , , ; dct:title "#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "J Political Science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "2nd Workshop on Attackers and Cyber-Crime Operations (WACCO), at the IEEE European Symposium on Security and Privacy (Euro S&P)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Genoa, Italy"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Zahrah"^^xsd:string; foaf:givenName "Fatima"^^xsd:string; foaf:name "Fatima Zahrah"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Goldsmith"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Goldsmith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #83681 \n\nIrrationally Annoyed: The SIGPLAN Blog Post writing 30 Years of PL Research Out of Existence\n\n"; foaf:primaryTopic . rdf:_1 . bibo:authorList ; bibo:status ; dct:creator ; dct:date "2020-10-19"; dct:isPartOf ; dct:subject ; dct:title "Irrationally Annoyed: The SIGPLAN Blog Post writing 30 Years of PL Research Out of Existence"^^xsd:string; rdf:type bibo:Article, ep:EPrint, ep:InternetEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "FINAL VERSION.pdf"^^xsd:string . rdfs:label "FINAL VERSION.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82582 \n\nA Bayesian Updating Scheme for Pandemics: Estimating the Infection Dynamics of COVID-19\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Bayesian Updating Scheme for Pandemics: Estimating the Infection Dynamics of COVID-19 (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Bayesian Updating Scheme for Pandemics: Estimating the Infection Dynamics of COVID-19 (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Bayesian Updating Scheme for Pandemics: Estimating the Infection Dynamics of COVID-19 (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Bayesian Updating Scheme for Pandemics: Estimating the Infection Dynamics of COVID-19 (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Bayesian Updating Scheme for Pandemics: Estimating the Infection Dynamics of COVID-19 (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Bayesian Updating Scheme for Pandemics: Estimating the Infection Dynamics of COVID-19 (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 . bibo:abstract "Epidemic models play a key role in understanding and responding to the emerging COVID-19 pandemic. Widely used compartmental models are static and are of limited use to evaluate intervention strategies of combatting the pandemic. Applying the technology of data assimilation, we propose a Bayesian updating approach for estimating epidemiological parameters using observable information to assess the impacts of different intervention strategies. We adopt a concise renewal model and propose new parameters by disentangling the reduction of instantaneous reproduction number R_t into mitigation and suppression factors to quantify intervention impacts at a finer granularity. A data assimilation framework is developed to estimate these parameters including constructing an observation function and developing a Bayesian updating scheme. A statistical analysis framework is built to quantify the impacts of intervention strategies by monitoring the evolution of the estimated parameters. We reveal the intervention impacts in European countries and Wuhan and the resurgence risk in the United States."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "15"; dc:hasVersion ; dct:creator , , , , , , , ; dct:date "2020-10-15"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A Bayesian Updating Scheme for Pandemics: Estimating the Infection Dynamics of COVID-19"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Yang"^^xsd:string; foaf:givenName "Xian"^^xsd:string; foaf:name "Xian Yang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Shuo"^^xsd:string; foaf:name "Shuo Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Huang"^^xsd:string; foaf:givenName "Yuan"^^xsd:string; foaf:name "Yuan Huang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nadler"^^xsd:string; foaf:givenName "Philip"^^xsd:string; foaf:name "Philip Nadler"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Teng"^^xsd:string; foaf:givenName "Zhongzhao"^^xsd:string; foaf:name "Zhongzhao Teng"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Arcucci"^^xsd:string; foaf:givenName "Rossella"^^xsd:string; foaf:name "Rossella Arcucci"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Guo"^^xsd:string; foaf:givenName "Yike"^^xsd:string; foaf:name "Yike Guo"^^xsd:string; rdf:type foaf:Person . bibo:issn "1556603X"; foaf:name "IEEE Computational Intelligence Magazine"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "BRACIS-2020-Cagnini.pdf"^^xsd:string . rdfs:label "BRACIS-2020-Cagnini.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #84754 \n\nAn Evolutionary Algorithm for Learning Interpretable Ensembles of Classifiers\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An Evolutionary Algorithm for Learning Interpretable Ensembles of Classifiers (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An Evolutionary Algorithm for Learning Interpretable Ensembles of Classifiers (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Evolutionary Algorithm for Learning Interpretable Ensembles of Classifiers (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Evolutionary Algorithm for Learning Interpretable Ensembles of Classifiers (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Evolutionary Algorithm for Learning Interpretable Ensembles of Classifiers (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Evolutionary Algorithm for Learning Interpretable Ensembles of Classifiers (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "Ensembles of classifiers are a very popular type of method for performing classification, due to their usually high predictive accuracy. However, ensembles have two drawbacks. First, ensembles are usually considered a ‘black box’, non-interpretable type of classification model, mainly because typically there are a very large number of classifiers in the ensemble (and often each classifier in the ensemble is a black-box classifier by itself). This lack of interpretability is an important limitation in application domains where a model’s predictions should be carefully interpreted by users, like medicine, law, etc. Second, ensemble methods typically involve many hyper-parameters, and it is difficult for users to select the best settings for those hyper-parameters. In this work we propose an Evolutionary Algorithm (an Estimation of Distribution Algorithm) that addresses both these drawbacks. This algorithm optimizes the hyper-parameter settings of a small ensemble of 5 interpretable classifiers, which allows users to interpret each classifier. In our experiments, the ensembles learned by the proposed Evolutionary Algorithm achieved the same level of predictive accuracy as a well-known Random Forest ensemble, but with the benefit of learning interpretable models (unlike Random Forests)."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; bibo:volume "12319"; dc:hasVersion ; dct:creator , , ; dct:date "2020-10-13"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "An Evolutionary Algorithm for Learning Interpretable Ensembles of Classifiers"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Prati"^^xsd:string; foaf:givenName "Ronaldo C."^^xsd:string; foaf:name "Ronaldo C. Prati"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Barros"^^xsd:string; foaf:givenName "Rodrigo C."^^xsd:string; foaf:name "Rodrigo C. Barros"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cerri"^^xsd:string; foaf:givenName "Ricardo"^^xsd:string; foaf:name "Ricardo Cerri"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cagnini"^^xsd:string; foaf:givenName "Henry E. L."^^xsd:string; foaf:name "Henry E. L. Cagnini"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #84210 \n\nA systematic framework for categorising IoT device fingerprinting mechanisms\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "A systematic framework for categorising IoT device fingerprinting mechanisms (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A systematic framework for categorising IoT device fingerprinting mechanisms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A systematic framework for categorising IoT device fingerprinting mechanisms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A systematic framework for categorising IoT device fingerprinting mechanisms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A systematic framework for categorising IoT device fingerprinting mechanisms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A systematic framework for categorising IoT device fingerprinting mechanisms (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to fingerprint them, for example in order to detect if there are misbehaving or even malicious IoT devices in one’s network. However, there are many challenges faced in the task of fingerprinting IoT devices, mainly due to the huge variety of the devices involved. At the same time, the task can potentially be improved by applying machine learning techniques for better accuracy and efficiency. The aim of this paper is to provide a systematic categorisation of machine learning augmented techniques that can be used for fingerprinting IoT devices. This can serve as a baseline for comparing various IoT fingerprinting mechanisms, so that network administrators can choose one or more mechanisms that are appropriate for monitoring and maintaining their network. We carried out an extensive literature review of existing papers on fingerprinting IoT devices – paying close attention to those with machine learning features. This is followed by an extraction of important and comparable features among the mechanisms outlined in those papers. As a result, we came up with a key set of terminologies that are relevant both in the fingerprinting context and in the IoT domain. This enabled us to construct a framework called IDWork, which can be used for categorising existing IoT fingerprinting mechanisms in a way that will facilitate a coherent and fair comparison of these mechanisms. We found that the majority of the IoT fingerprinting mechanisms take a passive approach – mainly through network sniffing – instead of being intrusive and interactive with the device of interest. Additionally, a significant number of the surveyed mechanisms employ both static and dynamic approaches, in order to benefit from complementary features that can be more robust against certain attacks such as spoofing and replay attacks."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2020-10-10"; dct:isPartOf ; dct:subject ; dct:title "A systematic framework for categorising IoT device fingerprinting mechanisms"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "2nd Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things (AIChallengeIoT 2020)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "online"^^xsd:string . foaf:familyName "Feraudo"^^xsd:string; foaf:givenName "Angelo"^^xsd:string; foaf:name "Angelo Feraudo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Shahandashti"^^xsd:string; foaf:givenName "Siamak F."^^xsd:string; foaf:name "Siamak F. Shahandashti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Arief"^^xsd:string; foaf:givenName "Budi"^^xsd:string; foaf:name "Budi Arief"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Vassilakis"^^xsd:string; foaf:givenName "Vassilios G."^^xsd:string; foaf:name "Vassilios G. Vassilakis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yadav"^^xsd:string; foaf:givenName "Poonam"^^xsd:string; foaf:name "Poonam Yadav"^^xsd:string; rdf:type foaf:Person . rdfs:label "Garner_Incentive_Value_And_Spatial_Certainty_2020.pdf"^^xsd:string . rdfs:label "Garner_Incentive_Value_And_Spatial_Certainty_2020.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #83566 \n\nIncentive value and spatial certainty combine additively to determine visual priorities\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Incentive value and spatial certainty combine additively to determine visual priorities (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Incentive value and spatial certainty combine additively to determine visual priorities (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incentive value and spatial certainty combine additively to determine visual priorities (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incentive value and spatial certainty combine additively to determine visual priorities (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incentive value and spatial certainty combine additively to determine visual priorities (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incentive value and spatial certainty combine additively to determine visual priorities (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "How does the brain combine information predictive of the value of a visually guided task (incentive value) with information predictive of where task-relevant stimuli may occur (spatial certainty)? Human behavioural evidence indicates that these two predictions may be combined additively to bias visual selection (Additive Hypothesis), whereas neuroeconomic studies posit that they may be multiplicatively combined (Expected Value Hypothesis). We sought to adjudicate between these two alternatives. Participants viewed two coloured placeholders that specified the potential value of correctly identifying an imminent letter target if it appeared in that placeholder. Then, prior to the target’s presentation, an endogenous spatial cue was presented indicating the target’s more likely location. Spatial cues were parametricallymanipulated with regard to the information gained (in bits). Across two experiments, performance was better for targets appearing in high versus low value placeholders and better when targets appeared in validly cued locations. Interestingly, as shown with a Bayesian model selection approach, these effects did not interact, clearly supporting the Additive Hypothesis. Even when conditions were adjusted to increase the optimality of a multiplicative operation, support for it remained. These findings refute recent theories that expected value computations are the singular mechanism driving the deployment of endogenous spatial attention. Instead, incentive value and spatial certainty seem to act independently to influence visual selection."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2020-10-09"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Incentive value and spatial certainty combine additively to determine visual priorities"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "RC321 Neuroscience. Biological psychiatry. Neuropsychiatry"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Raymond"^^xsd:string; foaf:givenName "Jane"^^xsd:string; foaf:name "Jane Raymond"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Garner"^^xsd:string; foaf:givenName "Kelly"^^xsd:string; foaf:name "Kelly Garner"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . bibo:issn "19433921"; foaf:name "Attention, Perception, & Psychophysics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "ENEURO.0229-20.2020.full.pdf"^^xsd:string . rdfs:label "ENEURO.0229-20.2020.full.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #84690 \n\nStrategic and Non-Strategic Semantic Expectations Hierarchically Modulate Neural Processing\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Strategic and Non-Strategic Semantic Expectations Hierarchically Modulate Neural Processing (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Strategic and Non-Strategic Semantic Expectations Hierarchically Modulate Neural Processing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Strategic and Non-Strategic Semantic Expectations Hierarchically Modulate Neural Processing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Strategic and Non-Strategic Semantic Expectations Hierarchically Modulate Neural Processing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Strategic and Non-Strategic Semantic Expectations Hierarchically Modulate Neural Processing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Strategic and Non-Strategic Semantic Expectations Hierarchically Modulate Neural Processing (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Perception is facilitated by a hierarchy of expectations generated from context and prior knowledge. In auditory processing, violations of local (within-trial) expectations elicit a mismatch negativity (MMN), while violations of global (across-trial) expectations elicit a later positive component (P300). This result is taken as evidence of prediction errors ascending through the expectation hierarchy. However, in language comprehension, there is no evidence that violations of semantic expectations across local-global levels similarly elicit a sequence of hierarchical error signals, thus drawing into question the putative link between event-related potentials (ERPs) and prediction errors. We investigated the neural basis of such hierarchical expectations of semantics in a word-pair priming paradigm. By manipulating the overall proportion of related or unrelated word-pairs across the task, we created two global contexts that differentially encouraged strategic use of primes. Across two experiments, we replicated behavioral evidence of greater priming in the high validity context, reflecting strategic expectations of upcoming targets based on “global” context. In our preregistered EEG analyses, we observed a “local” prediction error ERP effect (i.e., semantic priming) ∼250 ms post-target, which, in exploratory analyses, was followed 100 ms later by a signal that interacted with the global context. However, the later effect behaved in an apredictive manner, i.e., was most extreme for fulfilled expectations, rather than violations. Our results are consistent with interpretations of early ERPs as reflections of prediction error and later ERPs as processes related to conscious access and in support of task demands."^^xsd:string; bibo:authorList ; bibo:issue "5"; bibo:status , ; bibo:volume "7"; dc:hasVersion ; dct:creator , , , ; dct:date "2020-10-06"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Strategic and Non-Strategic Semantic Expectations Hierarchically Modulate Neural Processing"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "Society for Neuroscience"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Cruse"^^xsd:string; foaf:givenName "Damian"^^xsd:string; foaf:name "Damian Cruse"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sokoliuk"^^xsd:string; foaf:givenName "Rodika"^^xsd:string; foaf:name "Rodika Sokoliuk"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Vidal-Gran"^^xsd:string; foaf:givenName "Consuelo"^^xsd:string; foaf:name "Consuelo Vidal-Gran"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . bibo:issn "23732822"; foaf:name "eNeuro"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "MobileHCI20.pdf"^^xsd:string . rdfs:label "MobileHCI20.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #83761 \n\nInvestigating Smartphones and AR Glasses for Pedestrian Navigation and their Effects in Spatial Knowledge Acquisition\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Investigating Smartphones and AR Glasses for Pedestrian Navigation and their Effects in Spatial Knowledge Acquisition (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Investigating Smartphones and AR Glasses for Pedestrian Navigation and their Effects in Spatial Knowledge Acquisition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating Smartphones and AR Glasses for Pedestrian Navigation and their Effects in Spatial Knowledge Acquisition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating Smartphones and AR Glasses for Pedestrian Navigation and their Effects in Spatial Knowledge Acquisition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating Smartphones and AR Glasses for Pedestrian Navigation and their Effects in Spatial Knowledge Acquisition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating Smartphones and AR Glasses for Pedestrian Navigation and their Effects in Spatial Knowledge Acquisition (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Abstract–Moving in a complex and changing environment (rapid expansion of cities, creation of new transport lines, etc.) requires more and more capacity for path determination and following. This paper presents a protocol of a user study under progress. Its aim is to compare an application on AR Glasses and Smartphone to help pedestrians to memorize path following recommended landmarks."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2020-10-05"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Investigating Smartphones and AR Glasses for Pedestrian Navigation and their Effects in Spatial Knowledge Acquisition"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . dct:title "22nd International Conference on Human- Computer Interaction with Mobile Devices and Services (MobileHCI'20)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Oldenburg, Germany"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Lakehal"^^xsd:string; foaf:givenName "Aymen"^^xsd:string; foaf:name "Aymen Lakehal"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Efstratiou"^^xsd:string; foaf:givenName "Christos"^^xsd:string; foaf:name "Christos Efstratiou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Christophe"^^xsd:string; foaf:givenName "Kolski"^^xsd:string; foaf:name "Kolski Christophe"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nicolaou"^^xsd:string; foaf:givenName "Pavlos"^^xsd:string; foaf:name "Pavlos Nicolaou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lepreux"^^xsd:string; foaf:givenName "Sophie"^^xsd:string; foaf:name "Sophie Lepreux"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90181 \n\nA self-training hierarchical prototype-based approach for semi-supervised classification\n\n"; foaf:primaryTopic . rdf:_1 . bibo:abstract "This paper introduces a novel self-training hierarchical prototype-based approach for semi-supervised classification. The proposed approach firstly identifies meaningful prototypes from labelled samples at multiple levels of granularity and, then, self-organizes a highly transparent, multi-layered recognition model by arranging them in a form of pyramidal hierarchies. After this, the learning model continues to self-evolve its structure and self-expand its knowledge base to incorporate new patterns recognized from unlabelled samples by exploiting the pseudo-label technique. Thanks to its prototype-based nature, the overall computational process of the proposed approach is highly explainable and traceable. Experimental studies with various benchmark image recognition problems demonstrate the state-of-the-art performance of the proposed approach, showing its strong capability to mine key information from unlabelled data for classification."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "535"; dct:creator ; dct:date "2020-10-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A self-training hierarchical prototype-based approach for semi-supervised classification"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "00200255"; foaf:name "Information Sciences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "1-s2.0-S2468067220300225-main.pdf"^^xsd:string . rdfs:label "1-s2.0-S2468067220300225-main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81314 \n\nDIY Hybrid SSVEP-P300 LED Stimuli for BCI Platform Using EMOTIV EEG Headset\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "DIY Hybrid SSVEP-P300 LED Stimuli for BCI Platform Using EMOTIV EEG Headset (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "DIY Hybrid SSVEP-P300 LED Stimuli for BCI Platform Using EMOTIV EEG Headset (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "DIY Hybrid SSVEP-P300 LED Stimuli for BCI Platform Using EMOTIV EEG Headset (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "DIY Hybrid SSVEP-P300 LED Stimuli for BCI Platform Using EMOTIV EEG Headset (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "DIY Hybrid SSVEP-P300 LED Stimuli for BCI Platform Using EMOTIV EEG Headset (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "DIY Hybrid SSVEP-P300 LED Stimuli for BCI Platform Using EMOTIV EEG Headset (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "DIY Hybrid SSVEP-P300 LED Stimuli for BCI Platform Using EMOTIV EEG Headset (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "DIY Hybrid SSVEP-P300 LED Stimuli for BCI Platform Using EMOTIV EEG Headset (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "DIY Hybrid SSVEP-P300 LED Stimuli for BCI Platform Using EMOTIV EEG Headset (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "DIY Hybrid SSVEP-P300 LED Stimuli for BCI Platform Using EMOTIV EEG Headset (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "DIY Hybrid SSVEP-P300 LED Stimuli for BCI Platform Using EMOTIV EEG Headset (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "DIY Hybrid SSVEP-P300 LED Stimuli for BCI Platform Using EMOTIV EEG Headset (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "A fully customisable chip-on board (COB) LED design to evoke two brain responses simultaneously (steady state visual evoked potential (SSVEP) and transient evoked potential, P300) is discussed in this paper. Considering different possible modalities in brain-computer interfacing (BCI), SSVEP is widely accepted as it requires a lesser number of electroencephalogram (EEG) electrodes and minimal training time. The aim of this work was to produce a hybrid BCI hardware platform to evoke SSVEP and P300 precisely with reduced fatigue and improved classification performance. The system comprises of four independent radial green visual stimuli controlled individually by a 32-bit microcontroller platform to evoke SSVEP and four red LEDs flashing at random intervals to generate P300 events. The system can also record the P300 event timestamps that can be used in classification, to improve the accuracy and reliability. The hybrid stimulus was tested for real-time classification accuracy by controlling a LEGO robot to move in four directions."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "8"; dc:hasVersion , ; dct:creator , ; dct:date "2020-10-01"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "DIY Hybrid SSVEP-P300 LED Stimuli for BCI Platform Using EMOTIV EEG Headset"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . rdf:type skos:Concept; skos:prefLabel "TK7885 Computer engineering. Computer hardware"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mouli"^^xsd:string; foaf:givenName "Surej"^^xsd:string; foaf:name "Surej Mouli"^^xsd:string; rdf:type foaf:Person . bibo:issn "24680672"; foaf:name "HardwareX"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "ESANN-2020-Pomsuwan.pdf"^^xsd:string . rdfs:label "ESANN-2020-Pomsuwan.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #83340 \n\nAdapting random forests to cope with heavily censored datasets in survival analysis\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Adapting random forests to cope with heavily censored datasets in survival analysis (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Adapting random forests to cope with heavily censored datasets in survival analysis (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Adapting random forests to cope with heavily censored datasets in survival analysis (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Adapting random forests to cope with heavily censored datasets in survival analysis (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Adapting random forests to cope with heavily censored datasets in survival analysis (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Adapting random forests to cope with heavily censored datasets in survival analysis (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "We address a survival analysis task where the goal is to predict the time passed until a subject is diagnosed with an age-related\r\ndisease. The main challenge is that subjects’ data are very often censored, i.e., their time to diagnosis is only partly known. We propose a new Random Forest variant to cope with censored data, and evaluate it in experiments predicting the time to diagnosis of 8 age-related diseases, for data from the English Longitudinal Study of Ageing (ELSA) database. In these experiments, the proposed Random Forest variant, in general, outperformed a well-known Random Forest variant for censored data."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2020-10"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Adapting random forests to cope with heavily censored datasets in survival analysis"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "2020 European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2020)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Bruges, Belgium"^^xsd:string . foaf:name "dblp"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pomsuwan"^^xsd:string; foaf:givenName "Tossapol"^^xsd:string; foaf:name "Tossapol Pomsuwan"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #91413 \n\nDeep feature embedding and hierarchical classification for audio scene classification\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "In this work, we propose an approach that features deep feature embedding learning and hierarchical classification with triplet loss function for Acoustic Scene Classification (ASC). In the one hand, a deep convolutional neural network is firstly trained to learn a feature embedding from scene audio signals. Via the trained convolutional neural network, the learned embedding embeds an input into the embedding feature space and transforms it into a high-level feature vector for representation. In the other hand, in order to exploit the structure of the scene categories, the original scene classification problem is structured into a hierarchy where similar categories are grouped into meta-categories. Then, hierarchical classification is accomplished using deep neural network classifiers associated with triplet loss function. Our experiments show that the proposed system achieves good performance on both the DCASE 2018 Task 1A and 1B datasets, resulting in accuracy gains of 15.6% and 16.6% absolute over the DCASE 2018 baseline on Task 1A and 1B, respectively."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , , ; dct:date "2020-09-28"; dct:isPartOf ; dct:subject ; dct:title "Deep feature embedding and hierarchical classification for audio scene classification"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "2020 International Joint Conference on Neural Networks (IJCNN)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Glasgow, UK"^^xsd:string . foaf:familyName "Mertins"^^xsd:string; foaf:givenName "Alfred"^^xsd:string; foaf:name "Alfred Mertins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pham"^^xsd:string; foaf:givenName "Lam Dang"^^xsd:string; foaf:name "Lam Dang Pham"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . rdfs:label "1904.08337.pdf"^^xsd:string . rdfs:label "1904.08337.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #83104 \n\nOn Resolving Non-determinism in Choreographies\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "On Resolving Non-determinism in Choreographies (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "On Resolving Non-determinism in Choreographies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On Resolving Non-determinism in Choreographies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On Resolving Non-determinism in Choreographies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On Resolving Non-determinism in Choreographies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On Resolving Non-determinism in Choreographies (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Choreographies specify multiparty interactions via message passing. A realisation of a choreography is a composition of independent processes that behave as specified by the choreography. Existing relations of correctness/completeness between choreographies and realisations are based on models where choices are non-deterministic. Resolving non-deterministic choices into deterministic choices (e.g., conditional statements) is necessary to correctly characterise the relationship between choreographies and their implementations with concrete programming languages. We introduce a notion of realisability for choreographies - called whole-spectrum implementation - where choices are still non-deterministic in choreographies, but are deterministic in their implementations. Our notion of whole spectrum implementation rules out deterministic implementations of roles that, no matter which context they are placed in, will never follow one of the branches of a non-deterministic choice. We give a type discipline for checking whole-spectrum implementations. As a case study, we analyse the POP protocol under the lens of whole-spectrum implementation."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "16"; dc:hasVersion ; dct:creator , , ; dct:date "2020-09-24"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "On Resolving Non-determinism in Choreographies"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "International Federation of Computational Logic (IfCoLog)"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Melgratti"^^xsd:string; foaf:givenName "Hernán"^^xsd:string; foaf:name "Hernán Melgratti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tuosto"^^xsd:string; foaf:givenName "Emilio"^^xsd:string; foaf:name "Emilio Tuosto"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bocchi"^^xsd:string; foaf:givenName "Laura"^^xsd:string; foaf:name "Laura Bocchi"^^xsd:string; rdf:type foaf:Person . bibo:issn "18605974"; foaf:name "Logical Methods in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Effective-Incident-Comms-C&S2020-Nurse-KAR.pdf"^^xsd:string . rdfs:label "Effective-Incident-Comms-C&S2020-Nurse-KAR.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82836 \n\nA Framework for Effective Corporate Communication after Cyber Security Incidents\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Framework for Effective Corporate Communication after Cyber Security Incidents (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Framework for Effective Corporate Communication after Cyber Security Incidents (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Framework for Effective Corporate Communication after Cyber Security Incidents (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Framework for Effective Corporate Communication after Cyber Security Incidents (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Framework for Effective Corporate Communication after Cyber Security Incidents (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Framework for Effective Corporate Communication after Cyber Security Incidents (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "A major cyber security incident can represent a cyber crisis for an organisation, in particular because of the associated risk of substantial reputational damage. As the likelihood of falling victim to a cyberattack has increased over time, so too has the need to understand exactly what is effective corporate communication after an attack, and how best to engage the concerns of customers, partners and other stakeholders. This research seeks to tackle this problem through a critical, multi-faceted investigation into the efficacy of crisis communication and public relations following a data breach. It does so by drawing on academic literature, obtained through a systematic literature review, and real-world case studies. Qualitative data analysis is used to interpret and structure the results, allowing for the development of a new, comprehensive framework for corporate communication to support companies in their preparation and response to such events. The validity of this framework is demonstrated by its evaluation through interviews with senior industry professionals, as well as a critical assessment against relevant practice and research. The framework is further refined based on these evaluations, and an updated version defined. This research represents the first grounded, comprehensive and evaluated proposal for characterising effective corporate communication after cyber security incidents."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2020-09-19"; dct:isPartOf , ; dct:publisher ; dct:subject , , , , ; dct:title "A Framework for Effective Corporate Communication after Cyber Security Incidents"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences (General)"@en . rdf:type skos:Concept; skos:prefLabel "HF5351 Business"@en . rdf:type skos:Concept; skos:prefLabel "HF Commerce"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Knight"^^xsd:string; foaf:givenName "Richard"^^xsd:string; foaf:name "Richard Knight"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "01674048"; foaf:name "Computers & Security"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "IEEE-SSCI-CIEL-2020-Ribeiro.pdf"^^xsd:string . rdfs:label "IEEE-SSCI-CIEL-2020-Ribeiro.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #85186 \n\nA New Random Forest Method for Longitudinal Data Classification Using a Lexicographic Bi-Objective Approach\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A New Random Forest Method for Longitudinal Data Classification Using a Lexicographic Bi-Objective Approach (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A New Random Forest Method for Longitudinal Data Classification Using a Lexicographic Bi-Objective Approach (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A New Random Forest Method for Longitudinal Data Classification Using a Lexicographic Bi-Objective Approach (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A New Random Forest Method for Longitudinal Data Classification Using a Lexicographic Bi-Objective Approach (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A New Random Forest Method for Longitudinal Data Classification Using a Lexicographic Bi-Objective Approach (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A New Random Forest Method for Longitudinal Data Classification Using a Lexicographic Bi-Objective Approach (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2020-09-18"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A New Random Forest Method for Longitudinal Data Classification Using a Lexicographic Bi-Objective Approach"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "2020 IEEE Symposium Series on Computational Intelligence (SSCI 2020)"^^xsd:string; rdf:type bibo:Conference . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ribeiro"^^xsd:string; foaf:givenName "C.E."^^xsd:string; foaf:name "C.E. Ribeiro"^^xsd:string; rdf:type foaf:Person . foaf:name "Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence (SSCI 2020), Article 223"^^xsd:string; rdf:type bibo:Collection . rdfs:label "Accepted Article.pdf"^^xsd:string . rdfs:label "Accepted Article.pdf_nocoversheet"^^xsd:string . rdfs:label "Supporting Information for Accepted Article.pdf"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82922 \n\nPredicting the antimicrobial efficacy of hydrogen bonded, self‐associating amphiphiles\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Predicting the antimicrobial efficacy of hydrogen bonded, self‐associating amphiphiles (PDF)"^^xsd:string . cc:license ; dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Predicting the antimicrobial efficacy of hydrogen bonded, self‐associating amphiphiles (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Predicting the antimicrobial efficacy of hydrogen bonded, self‐associating amphiphiles (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Predicting the antimicrobial efficacy of hydrogen bonded, self‐associating amphiphiles (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting the antimicrobial efficacy of hydrogen bonded, self‐associating amphiphiles (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting the antimicrobial efficacy of hydrogen bonded, self‐associating amphiphiles (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting the antimicrobial efficacy of hydrogen bonded, self‐associating amphiphiles (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting the antimicrobial efficacy of hydrogen bonded, self‐associating amphiphiles (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting the antimicrobial efficacy of hydrogen bonded, self‐associating amphiphiles (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting the antimicrobial efficacy of hydrogen bonded, self‐associating amphiphiles (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting the antimicrobial efficacy of hydrogen bonded, self‐associating amphiphiles (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting the antimicrobial efficacy of hydrogen bonded, self‐associating amphiphiles (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 ; rdf:_11 ; rdf:_12 . bibo:abstract "Herein, we report 50 structurally related supramolecular self‐associating amphiphilic (SSA) salts and related compounds. These SSAs are shown to act as antimicrobial agents, active against model Gram‐positive (Methicillin‐Resistant Staphylococcus aureus ) and/or Gram‐negative ( Escherichia coli ) bacteria of clinical interest. Through a combination of solution state, gas phase, solid state and in silico measurements we determine 14 different physicochemical parameters for each of these 50 structurally related compounds. These parameter sets are then used to identify molecular structure – physicochemical property – antimicrobial activity relationships for our model Gram‐negative and Gram‐positive bacteria, while simultaneously providing insight towards the elucidation of SSA mode of antimicrobial action."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , , , , , , ; dct:date "2020-09-15"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Predicting the antimicrobial efficacy of hydrogen bonded, self‐associating amphiphiles"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasSupplemental ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "QD Chemistry"@en . rdf:type skos:Concept; skos:prefLabel "QR Microbiology"@en . foaf:name "Wiley"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ng"^^xsd:string; foaf:givenName "Kendrick K. L."^^xsd:string; foaf:name "Kendrick K. L. Ng"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Allen"^^xsd:string; foaf:givenName "Nyasha"^^xsd:string; foaf:name "Nyasha Allen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Boles"^^xsd:string; foaf:givenName "Jessica E."^^xsd:string; foaf:name "Jessica E. Boles"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ellaby"^^xsd:string; foaf:givenName "Rebecca J."^^xsd:string; foaf:name "Rebecca J. Ellaby"^^xsd:string; rdf:type foaf:Person . foaf:familyName "White"^^xsd:string; foaf:givenName "Lisa J."^^xsd:string; foaf:name "Lisa J. White"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Williams"^^xsd:string; foaf:givenName "George T."^^xsd:string; foaf:name "George T. Williams"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wilson"^^xsd:string; foaf:givenName "B."^^xsd:string; foaf:name "B. Wilson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chu"^^xsd:string; foaf:givenName "Dominique"^^xsd:string; foaf:name "Dominique Chu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mulvihill"^^xsd:string; foaf:givenName "Daniel P."^^xsd:string; foaf:name "Daniel P. Mulvihill"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Shepherd"^^xsd:string; foaf:givenName "H.J."^^xsd:string; foaf:name "H.J. Shepherd"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hiscock"^^xsd:string; foaf:givenName "Jennifer R."^^xsd:string; foaf:name "Jennifer R. Hiscock"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Blackholly"^^xsd:string; foaf:givenName "Laura R."^^xsd:string; foaf:name "Laura R. Blackholly"^^xsd:string; rdf:type foaf:Person . bibo:issn "18607179"; foaf:name "ChemMedChem"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "systems-08-00031-v2.pdf"^^xsd:string . rdfs:label "systems-08-00031-v2.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82852 \n\nIntelligence without Representation: A Historical Perspective\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Intelligence without Representation: A Historical Perspective (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Intelligence without Representation: A Historical Perspective (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Intelligence without Representation: A Historical Perspective (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Intelligence without Representation: A Historical Perspective (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Intelligence without Representation: A Historical Perspective (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Intelligence without Representation: A Historical Perspective (Other)"^^xsd:string . rdf:_1 . bibo:abstract "This paper reflects on a seminal work in the history of AI and representation: Rodney Brooks’ 1991 paper Intelligence without Representation. Brooks advocated the removal of explicit representations and engineered environments from the domain of his robotic intelligence experimentation, in favour of an evolutionary-inspired approach using layers of reactive behaviour that operated independently of each other. Brooks criticised the current progress in AI research and believed that removing complex representation from AI would help address problematic areas in modelling the mind. His belief was that we should develop artificial intelligence by being guided by evolutionary development of our own intelligence, and that his approach mirrored how our own intelligence functions. Thus the field of behaviour-based robotics emerged. This paper offers a historical analysis of Brooks’ behaviour-based robotics approach and its impact in artificial intelligence and cognitive theory at the time, as well as in modern-day approaches to AI."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "8"; dc:hasVersion ; dct:creator ; dct:date "2020-09-15"; dct:isPartOf , ; dct:publisher ; dct:subject , , , , ; dct:title "Intelligence without Representation: A Historical Perspective"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.17 History of computing"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "TA168 Systems engineering"@en . foaf:name "MDPI"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Jordanous"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Jordanous"^^xsd:string; rdf:type foaf:Person . foaf:name "Systems"^^xsd:string; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90813 \n\nVerifying Strategic Abilities of Neural-symbolic Multi-agent Systems\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "We investigate the problem of verifying the strategic properties of multi-agent systems equipped with machine learning-based perception units. We introduce a novel model of agents comprising both a perception system implemented via feed-forward neural networks and an action selection mechanism implemented via traditional control logic. We define the verification problem for these systems against a bounded fragment of alternating-time temporal logic. We translate the verification problem on bounded traces into the feasibility problem of mixed integer linear programs and show the soundness and completeness of the translation. We show that the lower bound of the verification problem is PSPACE and the upper bound is coNEXPTIME. We present a tool implementing the compilation and evaluate the experimental results obtained on a complex scenario of multiple aircraft operating a recently proposed prototype for air-traffic collision avoidance."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , , ; dct:date "2020-09-12"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Verifying Strategic Abilities of Neural-symbolic Multi-agent Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "17th International Conference on Principles of Knowledge Representation and Reasoning (KR2020)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Rhodes, Greece"^^xsd:string . foaf:name "International Joint Conferences on Artificial Intelligence Organization"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Lomuscio"^^xsd:string; foaf:givenName "Alessio"^^xsd:string; foaf:name "Alessio Lomuscio"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kouvaros"^^xsd:string; foaf:givenName "Panagiotis"^^xsd:string; foaf:name "Panagiotis Kouvaros"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Akintunde"^^xsd:string; foaf:givenName "Michael E."^^xsd:string; foaf:name "Michael E. Akintunde"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Botoeva"^^xsd:string; foaf:givenName "Elena"^^xsd:string; foaf:name "Elena Botoeva"^^xsd:string; rdf:type foaf:Person . bibo:issn "23341033"; foaf:name "Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #82405 \n\nA Review of the Use and Utility of Industrial Network-Based Open Source Simulators: Functionality, Security, and Policy Viewpoints\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "A Review of the Use and Utility of Industrial Network-Based Open Source Simulators: Functionality, Security, and Policy Viewpoints (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Review of the Use and Utility of Industrial Network-Based Open Source Simulators: Functionality, Security, and Policy Viewpoints (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Review of the Use and Utility of Industrial Network-Based Open Source Simulators: Functionality, Security, and Policy Viewpoints (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Review of the Use and Utility of Industrial Network-Based Open Source Simulators: Functionality, Security, and Policy Viewpoints (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Review of the Use and Utility of Industrial Network-Based Open Source Simulators: Functionality, Security, and Policy Viewpoints (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Review of the Use and Utility of Industrial Network-Based Open Source Simulators: Functionality, Security, and Policy Viewpoints (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Simulation can provide a useful means to understand issues linked to industrial network operations. For transparent, collaborative, cost-effective solutions development, and to attract the broadest interest base, simulation is critical and Open Source suggested, because it costs less to access, install, and use. This study contributes new insights from security and functionality characteristics metrics to underscore the use and effectiveness of Open Source simulators. Several Open Source simulators span applications in communications and wireless sensor networks, industrial control systems, and Industrial Internet of Things. Some drivers for their use span; supported licence types, programming languages, operating systems platforms, user interface types, documentation and communication types, citations, code commits, and number of contributors. Research in these simulators is built around performance and optimisation relative to flexibility, scalability, mobility, and active user support. No single simulator addresses all these conceivable characteristics. In addition to modelling contexts that match real-world scenarios and issues, an effective Open Source simulator needs to demonstrate credibility, which can be gained partly through actively engaging experts from interdisciplinary teams along with user contributions integrated under tight editorial controls. Government-led policies and regulations are also necessary to support their wider awareness and more productive use for real-world purposes."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2020-09-09"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "A Review of the Use and Utility of Industrial Network-Based Open Source Simulators: Functionality, Security, and Policy Viewpoints"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "SAGE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Cook"^^xsd:string; foaf:givenName "Al"^^xsd:string; foaf:name "Al Cook"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Watson"^^xsd:string; foaf:givenName "Jeremy McKendrick"^^xsd:string; foaf:name "Jeremy McKendrick Watson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Carr"^^xsd:string; foaf:givenName "Madeline"^^xsd:string; foaf:name "Madeline Carr"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ani"^^xsd:string; foaf:givenName "Uchenna Daniel"^^xsd:string; foaf:name "Uchenna Daniel Ani"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "15485129"; foaf:name "Journal of Defense Modeling and Simulation"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "OLD_TEMPLATE___Ubicomp__An_Automated_Mobile_Game_based_Screening_Tool_for_Patients_with_Alcohol_Dependence.pdf"^^xsd:string . rdfs:label "OLD_TEMPLATE___Ubicomp__An_Automated_Mobile_Game_based_Screening_Tool_for_Patients_with_Alcohol_Dependence.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82472 \n\nAn Automated Mobile Game-based Screening Tool for Patients with Alcohol Dependence\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An Automated Mobile Game-based Screening Tool for Patients with Alcohol Dependence (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Automated Mobile Game-based Screening Tool for Patients with Alcohol Dependence (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Automated Mobile Game-based Screening Tool for Patients with Alcohol Dependence (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Automated Mobile Game-based Screening Tool for Patients with Alcohol Dependence (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Automated Mobile Game-based Screening Tool for Patients with Alcohol Dependence (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An Automated Mobile Game-based Screening Tool for Patients with Alcohol Dependence (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "Traditional methods for screening and diagnosis of alcohol dependence are typically administered by trained clinicians in medical settings and often rely on interview responses. These self-reports can be unintentionally or deliberately false, and misleading answers can, in turn, lead to inaccurate assessment and diagnosis. In this study, we examine the use of user-game interaction patterns on mobile games to develop an automated diagnostic and screening tool for alcohol-dependent patients. Our approach relies on the capture of interaction patterns during gameplay, while potential patients engage with popular mobile games on smartphones. The captured signals include gameplay performance, touch gestures, and device motion, with the intention of identifying patients with alcohol dependence. We evaluate the classification performance of various supervised learning algorithms on data collected from 40 patients and 40 age-matched healthy adults. The results show that patients with alcohol dependence can be automatically identified accurately using the ensemble of touch, device motion, and gameplay performance features on 3-minute samples (accuracy=0.95, sensitivity=0.95, and specificity=0.95). The present findings provide strong evidence suggesting the potential use of user-game interaction metrics on existing mobile games as discriminant features for developing an implicit measure to identify alcohol dependence conditions. In addition to supporting healthcare professionals in clinical decision-making, the game-based self-screening method could be used as a novel strategy to promote alcohol dependence screening, especially outside of clinical settings."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "4"; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2020-09-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "An Automated Mobile Game-based Screening Tool for Patients with Alcohol Dependence"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Asawathaweeboon"^^xsd:string; foaf:givenName "Burachai"^^xsd:string; foaf:name "Burachai Asawathaweeboon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dickens"^^xsd:string; foaf:givenName "Luke"^^xsd:string; foaf:name "Luke Dickens"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Efstratiou"^^xsd:string; foaf:givenName "Christos"^^xsd:string; foaf:name "Christos Efstratiou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ang"^^xsd:string; foaf:givenName "Chee Siang"^^xsd:string; foaf:name "Chee Siang Ang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sharma"^^xsd:string; foaf:givenName "Dinkar"^^xsd:string; foaf:name "Dinkar Sharma"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Intarasirisawat"^^xsd:string; foaf:givenName "Jittrapol"^^xsd:string; foaf:name "Jittrapol Intarasirisawat"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sriburapar"^^xsd:string; foaf:givenName "Naranchaya"^^xsd:string; foaf:name "Naranchaya Sriburapar"^^xsd:string; rdf:type foaf:Person . foaf:name "Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"^^xsd:string; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90404 \n\nAutonomous Learning Multiple-Model zero-order classifier for heart sound classification\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "This paper proposes a new extended zero-order Autonomous Learning Multiple-Model (ALMMo-0*) neuro-fuzzy approach in order to classify different heart disorders through sounds. ALMMo-0* is build upon the recently introduced ALMMo-0. In this paper ALMMo-0 is extended by adding a pre-processing structure which improves the performance of the proposed method. ALMMo-0* has as a learning engine composed of hierarchical a massively parallel set of 0-order fuzzy rules, which are able to self-adapt and provide transparent and human understandable IF ... THEN representation. The heart sound recordings considered in the analysis were sourced from several contributors around the world. Data were collected from both clinical and nonclinical environment, and from healthy and pathological patients. Differently from mainstream machine learning approaches, ALMMo-0* is able to learn from unseen data. The main goal of the proposed method is to provide highly accurate models with high transparency, interpretability, and explainability for heart disorder diagnosis. Experiments demonstrated that the proposed neuro-fuzzy-based modeling is an efficient framework for these challenging classification tasks surpassing its state-of-the-art competitors in terms of classification accuracy. Additionally, ALMMo-0* produced transparent AnYa type fuzzy rules, which are human interpretable, and may help specialists to provide more accurate diagnosis. Medical doctors can easily identify abnormal heart sounds by comparing a patient’s sample with the identified prototypes from abnormal samples by ALMMo-0*."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "94"; dct:creator , , ; dct:date "2020-09-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Autonomous Learning Multiple-Model zero-order classifier for heart sound classification"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Soares"^^xsd:string; foaf:givenName "Eduardo"^^xsd:string; foaf:name "Eduardo Soares"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen"^^xsd:string; foaf:name "Plamen Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "15684946"; foaf:name "Applied Soft Computing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "brb3.1814.pdf"^^xsd:string . rdfs:label "brb3.1814.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82754 \n\nUsing machine-learning approach to distinguish patients with methamphetamine dependence from healthy subjects in a virtual reality environment\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Using machine-learning approach to distinguish patients with methamphetamine dependence from healthy subjects in a virtual reality environment (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Using machine-learning approach to distinguish patients with methamphetamine dependence from healthy subjects in a virtual reality environment (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using machine-learning approach to distinguish patients with methamphetamine dependence from healthy subjects in a virtual reality environment (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using machine-learning approach to distinguish patients with methamphetamine dependence from healthy subjects in a virtual reality environment (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using machine-learning approach to distinguish patients with methamphetamine dependence from healthy subjects in a virtual reality environment (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using machine-learning approach to distinguish patients with methamphetamine dependence from healthy subjects in a virtual reality environment (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Background: The aim of this study was to evaluate whether machine learning (ML) can be used to distinguish patients with methamphetamine dependence from healthy controls by using their surface electroencephalography (EEG) and galvanic skin response (GSR) in a drug-simulated virtual reality (VR) environment. Methods: A total of 333 participants with methamphetamine (METH) dependence and 332 healthy control subjects were recruited between January 2018 and January 2019. EEG (five electrodes) and GSR signals were collected under four VR environments: one neutral scenario and three METH-simulated scenarios. Three ML classification techniques were evaluated: random forest (RF), support vector machine (SVM), and logistic regression (LR). Results: The MANOVA showed no interaction effects among the two subject groups and the 4 VR scenarios. Taking patient groups as the main effect, the METH user group had significantly lower GSR, lower EEG power in delta (p < .001), and alpha bands (p < .001) than healthy subjects. The EEG power of beta band (p < .001) and gamma band (p < .001) was significantly higher in METH group than the control group. Taking the VR scenarios (Neutral versus METH‐VR) as the main effects, the GSR, EEG power in delta, theta, and alpha bands in neutral scenario were significantly higher than in the METH‐VR scenario (p < .001). The LR algorithm showed the highest specificity and sensitivity in distinguishing methamphetamine‐dependent patients from healthy controls. Conclusion: The study shows the potential of using machine learning to distinguish methamphetamine-dependent patients from healthy subjects by using EEG and GSR data. The LR algorithm shows the best performance comparing with SVM and RF algorithm."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2020-08-29"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Using machine-learning approach to distinguish patients with methamphetamine dependence from healthy subjects in a virtual reality environment"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science (General)"@en . foaf:name "Wiley"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ding"^^xsd:string; foaf:givenName "Xinfang"^^xsd:string; foaf:name "Xinfang Ding"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Yuanhui"^^xsd:string; foaf:name "Yuanhui Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Dai"^^xsd:string; foaf:name "Dai Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Liu"^^xsd:string; foaf:givenName "Xiuyun"^^xsd:string; foaf:name "Xiuyun Liu"^^xsd:string; rdf:type foaf:Person . bibo:issn "21623279"; foaf:name "Brain and Behavior"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "EMBC2020_LIN.pdf"^^xsd:string . rdfs:label "EMBC2020_LIN.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #83026 \n\nA normalisation approach improves the performance of inter-subject sEMG-based hand gesture recognition with a ConvNet\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A normalisation approach improves the performance of inter-subject sEMG-based hand gesture recognition with a ConvNet (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A normalisation approach improves the performance of inter-subject sEMG-based hand gesture recognition with a ConvNet (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A normalisation approach improves the performance of inter-subject sEMG-based hand gesture recognition with a ConvNet (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A normalisation approach improves the performance of inter-subject sEMG-based hand gesture recognition with a ConvNet (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A normalisation approach improves the performance of inter-subject sEMG-based hand gesture recognition with a ConvNet (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A normalisation approach improves the performance of inter-subject sEMG-based hand gesture recognition with a ConvNet (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Recently, the subject-specific surface electromyography (sEMG)-based gesture classification with deep learning algorithms has been widely researched. However, it is not practical to obtain the training data by requiring a user to perform hand gestures many times in real life. This problem can be alleviated to a certain extent if sEMG from many other subjects could be used to train the classifier. In this paper, we propose a normalisation approach that allows implementing real-time subject-independent sEMG based hand gesture classification without training the deep learning algorithm subject specifically. We hypothesed that the amplitude ranges of sEMG across channels between forearm muscle contractions for a hand gesture recorded in the same condition do not vary significantly within each individual. Therefore, the min-max normalisation is applied to source domain data but the new maximum and minimum values of each channel used to restrict the amplitude range are calculated from a trial cycle of a new user (target domain) and assigned by the class label. A convolutional neural network (ConvNet) trained with the normalised data achieved an average 87.03 accuracy on our G. dataset (12 gestures) and 94.53 on M. dataset (7 gestures) by using the leave-one-subject-out cross-validation."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2020-08-27"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "A normalisation approach improves the performance of inter-subject sEMG-based hand gesture recognition with a ConvNet"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science (General)"@en . dct:title "2020 42nd Annual International Conference of the IEEE Engineering in Medicine Biology Society (EMBC)"^^xsd:string; rdf:type bibo:Conference . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Wilde"^^xsd:string; foaf:givenName "Philippe"^^xsd:string; foaf:name "Philippe De Wilde"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ramaswamy"^^xsd:string; foaf:givenName "Palaniappan"^^xsd:string; foaf:name "Palaniappan Ramaswamy"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lin"^^xsd:string; foaf:givenName "Yuzhou"^^xsd:string; foaf:name "Yuzhou Lin"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #91414 \n\nRobust Deep Learning Framework For Predicting Respiratory Anomalies and Diseases\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "This paper presents a robust deep learning framework developed to detect respiratory diseases from recordings of respiratory sounds. The complete detection process firstly involves front end feature extraction where recordings are transformed into spectrograms that convey both spectral and temporal information. Then a back-end deep learning model classifies the features into classes of respiratory disease or anomaly. Experiments, conducted over the ICBHI benchmark dataset of respiratory sounds, evaluate the ability of the framework to classify sounds. Two main contributions are made in this paper. Firstly, we provide an extensive analysis of how factors such as respiratory cycle length, time resolution, and network architecture, affect final prediction accuracy. Secondly, a novel deep learning based framework is proposed for detection of respiratory diseases and shown to perform extremely well compared to state of the art methods."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , , , ; dct:date "2020-08-27"; dct:isPartOf ; dct:subject ; dct:title "Robust Deep Learning Framework For Predicting Respiratory Anomalies and Diseases"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "R858 Computer applications to medicine. Medical informatics. Medical information technology" . dct:title "2020 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Montreal, Canada"^^xsd:string . foaf:familyName "Nguyen"^^xsd:string; foaf:givenName "Truc"^^xsd:string; foaf:name "Truc Nguyen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pham"^^xsd:string; foaf:givenName "Lam Dang"^^xsd:string; foaf:name "Lam Dang Pham"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . rdfs:label "09175783.pdf"^^xsd:string . rdfs:label "09175783.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #83024 \n\nInvestigating into segmentation methods for diagnosis of respiratory diseases using adventitious respiratory sounds\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Investigating into segmentation methods for diagnosis of respiratory diseases using adventitious respiratory sounds (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Investigating into segmentation methods for diagnosis of respiratory diseases using adventitious respiratory sounds (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating into segmentation methods for diagnosis of respiratory diseases using adventitious respiratory sounds (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating into segmentation methods for diagnosis of respiratory diseases using adventitious respiratory sounds (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating into segmentation methods for diagnosis of respiratory diseases using adventitious respiratory sounds (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating into segmentation methods for diagnosis of respiratory diseases using adventitious respiratory sounds (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Respiratory condition has received a great amount of attention nowadays since respiratory diseases recently become the globally leading causes of death. Traditionally, stethoscope is applied in early diagnosis but it requires clinician with extensive training experience to provide accurate diagnosis. Accordingly, a subjective and fast diagnosing solution of respiratory diseases is highly demanded. Adventitious respiratory sounds (ARSs), such as crackle, are mainly concerned during diagnosis since they are indication of various respiratory diseases. Therefore, the characteristics of crackle are informative and valuable regarding to develop a computerised approach for pathology-based diagnosis. In this work, we propose a framework combining random forest classifier and Empirical Mode Decomposition (EMD) method focusing on a multi-classification task of identifying subjects in 6 respiratory conditions (healthy, bronchiectasis, bronchiolitis, COPD, pneumonia and URTI). Specifically, 14 combinations of respiratory sound segments were compared and we found segmentation plays an important role in classifying different respiratory conditions. The classifier with best performance (accuracy = 0.88, precision = 0.91, recall = 0.87, specificity = 0.91, F1-score = 0.81) was trained with features extracted from the combination of early inspiratory phase and entire inspiratory phase. To our best knowledge, we are the first to address the challenging multi-classification problem."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2020-08-27"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Investigating into segmentation methods for diagnosis of respiratory diseases using adventitious respiratory sounds"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . dct:title "2020 42nd Annual International Conference of the IEEE Engineering in Medicine Biology Society (EMBC)"^^xsd:string; rdf:type bibo:Conference . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wu"^^xsd:string; foaf:givenName "Liqun"^^xsd:string; foaf:name "Liqun Wu"^^xsd:string; rdf:type foaf:Person . rdfs:label "Evol-Intelligence-J-2020-Basgalupp-Subm-and-Accept.pdf"^^xsd:string . rdfs:label "Evol-Intelligence-J-2020-Basgalupp-Subm-and-Accept.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82547 \n\nAn extensive experimental evaluation of automated machine learning methods for recommending classification algorithms\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An extensive experimental evaluation of automated machine learning methods for recommending classification algorithms (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An extensive experimental evaluation of automated machine learning methods for recommending classification algorithms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An extensive experimental evaluation of automated machine learning methods for recommending classification algorithms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An extensive experimental evaluation of automated machine learning methods for recommending classification algorithms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An extensive experimental evaluation of automated machine learning methods for recommending classification algorithms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An extensive experimental evaluation of automated machine learning methods for recommending classification algorithms (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "This paper presents an experimental comparison among four automated machine learning (AutoML) methods for recommending the best classification algorithm for a given input dataset. Three of these methods are based on evolutionary algorithms (EAs), and the other is Auto-WEKA, a well-known AutoML method based on the combined algorithm selection and hyper-parameter optimisation (CASH) approach. The EA-based methods build classification algorithms from a single machine learning paradigm: either decision-tree induction, rule induction, or Bayesian network classification. Auto-WEKA combines algorithm selection and hyper-parameter optimisation to recommend classification algorithms from multiple paradigms. We performed controlled experiments where these four AutoML methods were given the same runtime limit for different values of this limit. In general, the difference in predictive accuracy of the three best AutoML methods was not statistically significant. However, the EA evolving decision-tree induction algorithms has the advantage of producing algorithms that generate interpretable classification models and that are more scalable to large datasets, by comparison with many algorithms from other learning paradigms that can be recommended by Auto-WEKA. We also observed that Auto-WEKA has shown meta-overfitting, a form of overfitting at the meta-learning level, rather than at the base-learning level."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "14"; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2020-08-19"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "An extensive experimental evaluation of automated machine learning methods for recommending classification algorithms"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Pappa"^^xsd:string; foaf:givenName "G.L."^^xsd:string; foaf:name "G.L. Pappa"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Sá"^^xsd:string; foaf:givenName "A.G.C."^^xsd:string; foaf:name "A.G.C. de Sá"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Barros"^^xsd:string; foaf:givenName "R.C."^^xsd:string; foaf:name "R.C. Barros"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "A.A."^^xsd:string; foaf:name "A.A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Basgalupp"^^xsd:string; foaf:givenName "M.P."^^xsd:string; foaf:name "M.P. Basgalupp"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Carvalho"^^xsd:string; foaf:givenName "A.C.P.L.F."^^xsd:string; foaf:name "A.C.P.L.F. de Carvalho"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mantovani"^^xsd:string; foaf:givenName "R.G."^^xsd:string; foaf:name "R.G. Mantovani"^^xsd:string; rdf:type foaf:Person . bibo:issn "18645909"; foaf:name "Evolutionary Intelligence"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "EW2020 final.pdf"^^xsd:string . rdfs:label "EW2020 final.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82515 \n\nMachine-checked natural semantics for Core Erlang: exceptions and side effects\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Machine-checked natural semantics for Core Erlang: exceptions and side effects (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Machine-checked natural semantics for Core Erlang: exceptions and side effects (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine-checked natural semantics for Core Erlang: exceptions and side effects (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine-checked natural semantics for Core Erlang: exceptions and side effects (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine-checked natural semantics for Core Erlang: exceptions and side effects (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine-checked natural semantics for Core Erlang: exceptions and side effects (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "This research is part of a wider project that aims to investigate and reason about the correctness of scheme-based source code transformations of Erlang programs. In order to formally reason about the definition of a programming language and the software built using it, we need a mathematically rigorous description of that language. In this paper, we present an extended natural semantics for Core Erlang based on our previous formalisation implemented with the Coq Proof Assistant. This extension includes the concepts of exceptions and side effects, moreover, some modifications and updates are also discussed. Then we describe theorems about the properties of this formalisation (e.g. determinism), formal expression evaluation and equivalence examples. These equivalences can be interpreted as simple local refactorings."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2020-08-19"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Machine-checked natural semantics for Core Erlang: exceptions and side effects"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "19th ACM SIGPLAN International Workshop on Erlang"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Jersey City, USA / Online"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bereczky"^^xsd:string; foaf:givenName "Péter"^^xsd:string; foaf:name "Péter Bereczky"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Horpácsi"^^xsd:string; foaf:givenName "Dániel"^^xsd:string; foaf:name "Dániel Horpácsi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Thompson"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Thompson"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81977 \n\nScaling Up Delta Debugging of Type Errors\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Scaling Up Delta Debugging of Type Errors (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Scaling Up Delta Debugging of Type Errors (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Scaling Up Delta Debugging of Type Errors (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Scaling Up Delta Debugging of Type Errors (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Scaling Up Delta Debugging of Type Errors (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Scaling Up Delta Debugging of Type Errors (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "Type error messages of compilers of statically typed functional languages are often inaccurate, making type error debugging hard. Many solutions to the problem have been proposed, but most have been evaluated only with short programs, that is, of fewer than 30 lines. In this paper we note that our own tool for delta debugging type errors scales poorly for large programs. In response we present a new tool that applies a new algorithm for segmenting a large program before the delta debugging algorithm is applied. We propose a framework for quantifying the quality of type error debuggers and apply it to our new tool demonstrating substantial improvement."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2020-08-18"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Scaling Up Delta Debugging of Type Errors"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "21st International Symposium on Trends in Functional Programming"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Krakow, Poland"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Byrski"^^xsd:string; foaf:givenName "Aleksander"^^xsd:string; foaf:name "Aleksander Byrski"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hughes"^^xsd:string; foaf:givenName "John"^^xsd:string; foaf:name "John Hughes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sharrad"^^xsd:string; foaf:givenName "Joanna"^^xsd:string; foaf:name "Joanna Sharrad"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chitil"^^xsd:string; foaf:givenName "Olaf"^^xsd:string; foaf:name "Olaf Chitil"^^xsd:string; rdf:type foaf:Person . rdfs:label "core_erlang_paper.pdf"^^xsd:string . rdfs:label "core_erlang_paper.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82503 \n\nA Proof Assistant Based Formalisation of a Subset of Sequential Core Erlang\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Proof Assistant Based Formalisation of a Subset of Sequential Core Erlang (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Proof Assistant Based Formalisation of a Subset of Sequential Core Erlang (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Proof Assistant Based Formalisation of a Subset of Sequential Core Erlang (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Proof Assistant Based Formalisation of a Subset of Sequential Core Erlang (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Proof Assistant Based Formalisation of a Subset of Sequential Core Erlang (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Proof Assistant Based Formalisation of a Subset of Sequential Core Erlang (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "We present a proof-assistant-based formalisation of a subset of Erlang, intended to serve as a base for proving refactorings correct. After discussing how we reused concepts from related work, we show the syntax and semantics of our formal description, including the abstractions involved (e.g. the concept of a closure). We also present essential properties of the formalisation (e.g. determinism) along with the summary of their machine-checked proofs. Finally, we prove expression pattern equivalences which can be interpreted as simple local refactorings."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "12222"; dc:hasVersion ; dct:creator , , ; dct:date "2020-08-17"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "A Proof Assistant Based Formalisation of a Subset of Sequential Core Erlang"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "International Symposium on Trends in Functional Programming"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Krakow, Poland"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hughes"^^xsd:string; foaf:givenName "John"^^xsd:string; foaf:name "John Hughes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Byrski"^^xsd:string; foaf:givenName "Aleksander"^^xsd:string; foaf:name "Aleksander Byrski"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bereczky"^^xsd:string; foaf:givenName "Péter"^^xsd:string; foaf:name "Péter Bereczky"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Horpacsi"^^xsd:string; foaf:givenName "Daniel"^^xsd:string; foaf:name "Daniel Horpacsi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Thompson"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Thompson"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Diagrams2020WMStudyFinal.pdf"^^xsd:string . rdfs:label "Diagrams2020WMStudyFinal.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81488 \n\nWell-matchedness in Euler and Linear Diagrams\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Well-matchedness in Euler and Linear Diagrams (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Well-matchedness in Euler and Linear Diagrams (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Well-matchedness in Euler and Linear Diagrams (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Well-matchedness in Euler and Linear Diagrams (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Well-matchedness in Euler and Linear Diagrams (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Well-matchedness in Euler and Linear Diagrams (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "A key feature of diagrams is well-matchedness, referred to as iconicity in philosophy. A well-matched diagram has a structural resemblance to its semantics and is believed to be an effective representation. In this paper, we view well-matchedness as a feature of diagrams' meaning carriers { syntactic relationships that convey meaning. Each meaning carrier may or may not structurally resemble, i.e. be well-matched to, its semantics. This paper provides the first empirical study that evaluates the impact of well-matched meaning carriers on effectiveness in Euler diagrams and linear diagrams. There are two key take-away messages: using only well-matched meaning carriers led to the best task performance and using both well-matched and non-well-matched meaning carriers in a single diagram should be approached with caution."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "12169"; dc:hasVersion ; dct:creator , , , ; dct:date "2020-08-17"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Well-matchedness in Euler and Linear Diagrams"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "Diagrams 2020: 11th International Conference on the Theory and Application of Diagrams"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Tallinn, Estonia"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Blake"^^xsd:string; foaf:givenName "Andrew"^^xsd:string; foaf:name "Andrew Blake"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Touloumis"^^xsd:string; foaf:givenName "Anestis"^^xsd:string; foaf:name "Anestis Touloumis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Stapleton"^^xsd:string; foaf:givenName "Gem"^^xsd:string; foaf:name "Gem Stapleton"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rodgers"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Rodgers"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "LamelaSeijas2020_Chapter_MarloweImplementingAndAnalysin.pdf"^^xsd:string . rdfs:label "LamelaSeijas2020_Chapter_MarloweImplementingAndAnalysin.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82483 \n\nMarlowe: Implementing and Analysing Financial Contracts on Blockchain\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Marlowe: Implementing and Analysing Financial Contracts on Blockchain (PDF)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Marlowe: Implementing and Analysing Financial Contracts on Blockchain (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Marlowe: Implementing and Analysing Financial Contracts on Blockchain (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Marlowe: Implementing and Analysing Financial Contracts on Blockchain (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Marlowe: Implementing and Analysing Financial Contracts on Blockchain (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Marlowe: Implementing and Analysing Financial Contracts on Blockchain (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Marlowe: Implementing and Analysing Financial Contracts on Blockchain (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . , , , , , , ; bibo:abstract "Marlowe is a DSL for financial contracts. We describe the implementation of Marlowe on the Cardano blockchain, and the Marlowe Playground web-based development and simulation environment.\r\n\r\nContracts in Marlowe can be exhaustively analysed prior to running them, thus providing strong guarantees to participants in the contract. The Marlowe system itself has been formally verified using the Isabelle theorem prover, establishing such properties as the conservation of money."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2020-08-07"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Marlowe: Implementing and Analysing Financial Contracts on Blockchain"^^xsd:string; ep:hasDocument , , , , , , ; ep:hasOther ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Lamela Seijas"^^xsd:string; foaf:givenName "Pablo"^^xsd:string; foaf:name "Pablo Lamela Seijas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sala"^^xsd:string; foaf:givenName "Massimiliano"^^xsd:string; foaf:name "Massimiliano Sala"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nemish"^^xsd:string; foaf:givenName "Alexander"^^xsd:string; foaf:name "Alexander Nemish"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bracciali"^^xsd:string; foaf:givenName "Andrea"^^xsd:string; foaf:name "Andrea Bracciali"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Smith"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Smith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Camp"^^xsd:string; foaf:givenName "L. Jean"^^xsd:string; foaf:name "L. Jean Camp"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rønne"^^xsd:string; foaf:givenName "Peter B."^^xsd:string; foaf:name "Peter B. Rønne"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bernhard"^^xsd:string; foaf:givenName "Matthew"^^xsd:string; foaf:name "Matthew Bernhard"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Maurushat"^^xsd:string; foaf:givenName "Alana"^^xsd:string; foaf:name "Alana Maurushat"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Matsuo"^^xsd:string; foaf:givenName "Shin'ichiro"^^xsd:string; foaf:name "Shin'ichiro Matsuo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Thompson"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Thompson"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Financial Cryptography and Data Security"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "1-s2.0-S2213158220302096-main.pdf"^^xsd:string . rdfs:label "1-s2.0-S2213158220302096-main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82407 \n\nBedside EEG predicts longitudinal behavioural changes in disorders of consciousness\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Bedside EEG predicts longitudinal behavioural changes in disorders of consciousness (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Bedside EEG predicts longitudinal behavioural changes in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bedside EEG predicts longitudinal behavioural changes in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bedside EEG predicts longitudinal behavioural changes in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bedside EEG predicts longitudinal behavioural changes in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bedside EEG predicts longitudinal behavioural changes in disorders of consciousness (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Bedside EEG predicts longitudinal behavioural changes in disorders of consciousness (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Bedside EEG predicts longitudinal behavioural changes in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bedside EEG predicts longitudinal behavioural changes in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bedside EEG predicts longitudinal behavioural changes in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bedside EEG predicts longitudinal behavioural changes in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bedside EEG predicts longitudinal behavioural changes in disorders of consciousness (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "Providing an accurate prognosis for prolonged disorder of consciousness (pDOC) patients remains a clinical challenge. Large cross-sectional studies have demonstrated the diagnostic and prognostic value of functional brain networks measured using high-density electroencephalography (hdEEG). Nonetheless, the prognostic value of these neural measures has yet to be assessed by longitudinal follow-up. We address this gap by assessing the utility of hdEEG to prognosticate long-term behavioural outcome, employing longitudinal data collected from a cohort of patients assessed systematically with resting hdEEG and the Coma Recovery Scale-Revised (CRS-R) at the bedside over a period of two years. We used canonical correlation analysis to relate clinical (including CRS-R scores combined with demographic variables) and hdEEG variables to each other. This analysis revealed that the patient’s age, and the hdEEG theta band power and alpha band connectivity, contributed most significantly to the relationship between hdEEG and clinical variables. Further, we found that hdEEG measures recorded at the time of assessment augmented clinical measures in predicting CRS-R scores at the next assessment. Moreover, the rate of hdEEG change not only predicted later changes in CRS-R scores, but also outperformed clinical measures in terms of prognostic power. Together, these findings suggest that improvements in functional brain networks precede changes in behavioural awareness in pDOC. We demonstrate here that bedside hdEEG assessments conducted at specialist nursing homes are feasible, have clinical utility, and can complement clinical knowledge and systematic behavioural assessments to inform prognosis and care."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "28"; dc:hasVersion , ; dct:creator , , , , , , ; dct:date "2020-08-05"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Bedside EEG predicts longitudinal behavioural changes in disorders of consciousness"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hutchinson"^^xsd:string; foaf:givenName "Peter J.A."^^xsd:string; foaf:name "Peter J.A. Hutchinson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pickard"^^xsd:string; foaf:givenName "John D."^^xsd:string; foaf:name "John D. Pickard"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Menon"^^xsd:string; foaf:givenName "David K."^^xsd:string; foaf:name "David K. Menon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Allanson"^^xsd:string; foaf:givenName "Judith"^^xsd:string; foaf:name "Judith Allanson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Roberts"^^xsd:string; foaf:givenName "Neil"^^xsd:string; foaf:name "Neil Roberts"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bareham"^^xsd:string; foaf:givenName "Corinne A."^^xsd:string; foaf:name "Corinne A. Bareham"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chennu"^^xsd:string; foaf:givenName "Srivas"^^xsd:string; foaf:name "Srivas Chennu"^^xsd:string; rdf:type foaf:Person . foaf:name "NeuroImage: Clinical"^^xsd:string; rdf:type bibo:Collection . rdfs:label "Aldraimli et al._(PublishedVersion)14062020.pdf"^^xsd:string . rdfs:label "Aldraimli et al._(PublishedVersion)14062020.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81709 \n\nMachine Learning Prediction of Susceptibility to Visceral Fat Associated Diseases\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Machine Learning Prediction of Susceptibility to Visceral Fat Associated Diseases (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Machine Learning Prediction of Susceptibility to Visceral Fat Associated Diseases (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine Learning Prediction of Susceptibility to Visceral Fat Associated Diseases (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine Learning Prediction of Susceptibility to Visceral Fat Associated Diseases (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine Learning Prediction of Susceptibility to Visceral Fat Associated Diseases (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine Learning Prediction of Susceptibility to Visceral Fat Associated Diseases (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "Classifying subjects into risk categories is a common challenge in medical research. Machine Learning (ML) methods are widely used in the areas of risk prediction and classification. The primary objective of such algorithms is to use several features to predict dichotomous responses (e.g., healthy/at risk). Similar to statistical inference modelling, ML modelling is subject to the problem of class imbalance and is affected by the majority class, increasing the false-negative rate. In this study, we built and evaluated thirty-six ML models to classify approximately 4300 female and 4100 male participants from the UK Biobank into three categorical risk statuses based on discretised visceral adipose tissue (VAT) measurements from magnetic resonance imaging. We also examined the effect of sampling techniques on the models when dealing with class imbalance. The sampling techniques used had a significant impact on the classification and resulted in an improvement in risk status prediction by facilitating an increase in the information contained within each variable. Based on domain expert criteria the best three classification models for the female and male cohort visceral fat prediction were identified. The Area Under Receiver Operator Characteristic curve of the models tested (with external data) was 0.78 to 0.89 for females and 0.75 to 0.86 for males. These encouraging results will be used to guide further development of models to enable prediction of VAT value. This will be useful to identify individuals with excess VAT volume who are at risk of developing metabolic disease ensuring relevant lifestyle interventions can be appropriately targeted."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "10"; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2020-07-30"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Machine Learning Prediction of Susceptibility to Visceral Fat Associated Diseases"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Dwek"^^xsd:string; foaf:givenName "M.V."^^xsd:string; foaf:name "M.V. Dwek"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Thomas"^^xsd:string; foaf:givenName "E.L."^^xsd:string; foaf:name "E.L. Thomas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chaussalet"^^xsd:string; foaf:givenName "T.J."^^xsd:string; foaf:name "T.J. Chaussalet"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bell"^^xsd:string; foaf:givenName "J.D."^^xsd:string; foaf:name "J.D. Bell"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Parkinson"^^xsd:string; foaf:givenName "J."^^xsd:string; foaf:name "J. Parkinson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Soria"^^xsd:string; foaf:givenName "D."^^xsd:string; foaf:name "D. Soria"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Aldraimli"^^xsd:string; foaf:givenName "M."^^xsd:string; foaf:name "M. Aldraimli"^^xsd:string; rdf:type foaf:Person . bibo:issn "21907188"; foaf:name "Health and Technology"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "CUI-2020-Chatbots-GDPR.pdf"^^xsd:string . rdfs:label "CUI-2020-Chatbots-GDPR.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81313 \n\nIs your chatbot GDPR compliant? Open issues in agent design\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Is your chatbot GDPR compliant? Open issues in agent design (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Is your chatbot GDPR compliant? Open issues in agent design (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Is your chatbot GDPR compliant? Open issues in agent design (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Is your chatbot GDPR compliant? Open issues in agent design (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Is your chatbot GDPR compliant? Open issues in agent design (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Is your chatbot GDPR compliant? Open issues in agent design (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Conversational agents open the world to new opportunities for human interaction and ubiquitous engagement. As their conversational abilities and knowledge has improved, these agents have begun to have access to an increasing variety of personally identifiable information and intimate details on their user base. This access raises crucial questions in light of regulations as robust as the General Data Protection Regulation (GDPR). This paper explores some of these questions, with the aim of defining relevant open issues in conversational agent design. We hope that this work can provoke further research into building agents that are effective at user interaction, but also respectful of regulations and user privacy."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2020-07-22"; dct:isPartOf ; dct:publisher ; dct:subject , , , , ; dct:title "Is your chatbot GDPR compliant? Open issues in agent design"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences (General)"@en . rdf:type skos:Concept; skos:prefLabel "K Law"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "2nd International Conference on Conversational User Interfaces (CUI)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Bilbao, Spain"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Belen Sağlam"^^xsd:string; foaf:givenName "Rahime"^^xsd:string; foaf:name "Rahime Belen Sağlam"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . rdfs:label "Applied-Intelligence-2020-da-Silva-post-reviews.pdf"^^xsd:string . rdfs:label "Applied-Intelligence-2020-da-Silva-post-reviews.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82231 \n\nPrioritizing positive feature values: a new hierarchical feature selection method\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Prioritizing positive feature values: a new hierarchical feature selection method (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Prioritizing positive feature values: a new hierarchical feature selection method (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Prioritizing positive feature values: a new hierarchical feature selection method (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Prioritizing positive feature values: a new hierarchical feature selection method (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Prioritizing positive feature values: a new hierarchical feature selection method (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Prioritizing positive feature values: a new hierarchical feature selection method (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "In this work, we address the problem of feature selection for the classification task in hierarchical and sparse feature spaces, which characterise many real-world applications nowadays. A binary feature space is deemed hierarchical when its binary features are related via generalization-specialization relationships, and is considered sparse when in general the instances contain much fewer “positive” than “negative” feature values. In any given instance, a feature value is deemed positive (negative) when the property associated with the feature has been (has not been) observed for that instance. Although there are many methods for the traditional feature selection problem in the literature, the proper treatment to hierarchical feature structures is still a \r\n challenge. Hence, we introduce a novel hierarchical feature selection method that follows the lazy learning paradigm – selecting a feature subset tailored for each instance in the test set. Our strategy prioritizes the selection of features with positive values, since they tend to be more informative – the presence of a relatively rare property is usually a piece of more relevant information than the absence of that property. Experiments on different application domains have shown that the proposed method outperforms previous hierarchical feature selection methods and also traditional methods in terms of predictive accuracy, selecting smaller feature subsets in general."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2020-07-20"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Prioritizing positive feature values: a new hierarchical feature selection method"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "da Silva"^^xsd:string; foaf:givenName "Pablo Nasciemento"^^xsd:string; foaf:name "Pablo Nasciemento da Silva"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Plastino"^^xsd:string; foaf:givenName "Alexandre"^^xsd:string; foaf:name "Alexandre Plastino"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . bibo:issn "0924669X"; foaf:name "Applied Intelligence"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "CS-2020-cyber-insurance-cr.pdf"^^xsd:string . rdfs:label "CS-2020-cyber-insurance-cr.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80965 \n\nThe Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Cyber insurance is a key component in risk management, intended to transfer risks and support business recovery in the event of a cyber incident. As cyber insurance is still a new concept in practice and research, there are many unanswered questions regarding the data and economic models that drive it, the coverage options and pricing of premiums, and its more procedural policy-related aspects. This paper aims to address some of these questions by focusing on the key types of data which are used by cyber-insurance practitioners, particularly for decision-making in the insurance underwriting and claim processes. We further explore practitioners' perceptions of the challenges they face in gathering and using data, and identify gaps where further data is required. We draw our conclusions from a qualitative study by conducting a focus group with a range of cyber-insurance professionals (including underwriters, actuaries, claims specialists, breach responders, and cyber operations specialists) and provide valuable contributions to existing knowledge. These insights include examples of key data types which contribute to the calculation of premiums and decisions on claims, the identification of challenges and gaps at various stages of data gathering, and initial perspectives on the development of a pre-competitive dataset for the cyber insurance industry. We believe an improved understanding of data gathering and usage in cyber insurance, and of the current challenges faced, can be invaluable for informing future research and practice."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , ; dct:date "2020-07-14"; dct:isPartOf ; dct:publisher ; dct:subject , , , ; dct:title "The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "HF Commerce"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "CyberSA 2020"^^xsd:string; rdf:type bibo:Conference . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Agrafiotis"^^xsd:string; foaf:givenName "Ioannis"^^xsd:string; foaf:name "Ioannis Agrafiotis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Goldsmith"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Goldsmith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Axon"^^xsd:string; foaf:givenName "Louise"^^xsd:string; foaf:name "Louise Axon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Erola"^^xsd:string; foaf:givenName "Arnau"^^xsd:string; foaf:name "Arnau Erola"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Creese"^^xsd:string; foaf:givenName "Sadie"^^xsd:string; foaf:name "Sadie Creese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #89541 \n\nHierarchical Dependency Constrained Averaged One-Dependence Estimators Classifiers for Hierarchical Feature Spaces.\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Hierarchical Dependency Constrained Averaged One-Dependence Estimators Classifiers for Hierarchical Feature Spaces. (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Hierarchical Dependency Constrained Averaged One-Dependence Estimators Classifiers for Hierarchical Feature Spaces. (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2020-07-13"; dct:isPartOf , ; dct:subject ; dct:title "Hierarchical Dependency Constrained Averaged One-Dependence Estimators Classifiers for Hierarchical Feature Spaces."^^xsd:string; ep:hasAccepted ; ep:hasDocument , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "10th International Conference on Probabilistic Graphic Models (PGM 2020)"^^xsd:string; rdf:type bibo:Conference . foaf:familyName "Wan"^^xsd:string; foaf:givenName "Cen"^^xsd:string; foaf:name "Cen Wan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:name "PMLR (Proceedings of Machine Learning Research) 138"^^xsd:string; rdf:type bibo:Collection . rdfs:label "Petricek2020_Article_ComputingAndProgrammingInConte.pdf"^^xsd:string . rdfs:label "Petricek2020_Article_ComputingAndProgrammingInConte.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82634 \n\nComputing and Programming in Context — Introduction\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Computing and Programming in Context — Introduction (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Computing and Programming in Context — Introduction (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Computing and Programming in Context — Introduction (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Computing and Programming in Context — Introduction (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Computing and Programming in Context — Introduction (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Computing and Programming in Context — Introduction (Other)"^^xsd:string . rdf:_1 . bibo:abstract "In a society where computers have become ubiquitous, it is necessary to develop a broader understanding of the nature of computing and programming, not just from a technical viewpoint but also from a historical and philosophical perspective. Computers and computer programs do not exist in a vacuum. Instead, they are a part of a rich socio-technological context that provides ways for understanding computers and reasoning about programs. This includes not only formal logic, mathematics, sciences, and technology but also cognitive sciences and sociology. The focus of this special issue is on questions that arise when we consider computing and programming in a wider context. In particular, the papers in this special issue explore the interplay between computing or programming and mathematics, formal logic, sciences, technology, and society."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator ; dct:date "2020-07-09"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Computing and Programming in Context — Introduction"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Petricek"^^xsd:string; foaf:givenName "Tomas"^^xsd:string; foaf:name "Tomas Petricek"^^xsd:string; rdf:type foaf:Person . bibo:issn "22105433"; foaf:name "Philosophy & Technology"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "DAPPS2020.pdf"^^xsd:string . rdfs:label "DAPPS2020.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81277 \n\nA Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "After the European Union's new General Data Protection Regulation (GDPR) became applicable in May 2018,concerns about the legal compliance of public blockchain systems with rights guaranteed by GDPR have emerged, e.g., on the \"right to be forgotten\". In order to better understand how the blockchain sector sees the challenges raised by GDPR and how such their communications could influence their users, this paper reports our data-driven analysis of GDPR-related public online communications of blockchain developers and service providers.Our analysis covers 314 public blockchain systems, and two different online communication channels: legal documents including privacy policies, T&C (Terms and Conditions) documents and other similar legal documents published on systems’ official websites and public tweets of their official Twitter accounts.Our analysis revealed that only a minority (86/314≈27.5%)of the investigated blockchain systems had covered GDPR at least once using one or both communication channels. Among the 86systems, only 27 systems (8.6%) had at least one legal document that actually talks about GDPR for the corresponding blockchain system. We noticed a systematic lack of detail about why and how the GDPR compliance issue was addressed, and most systems made questionable statements about GDPR compliance. There sults are surprising considering that the GDPR was enacted in 2016 and has been in effect since May 2018."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2020-07-08"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "K Law (General)"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.5 Computer networks"@en . dct:title "IEEE DAPPS 2020 (2nd IEEE International Conference on Decentralized Applications and Infrastructures)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Oxford, UK"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Aslan"^^xsd:string; foaf:givenName "Çağrı B."^^xsd:string; foaf:name "Çağrı B. Aslan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pogrebna"^^xsd:string; foaf:givenName "Ganna"^^xsd:string; foaf:name "Ganna Pogrebna"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dickson"^^xsd:string; foaf:givenName "Lisa"^^xsd:string; foaf:name "Lisa Dickson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sağlam"^^xsd:string; foaf:givenName "Rahime Belen"^^xsd:string; foaf:name "Rahime Belen Sağlam"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #83683 \n\nIs This Noise, or Does This Mean Something? #benchmarking\n\n"; foaf:primaryTopic . rdf:_1 . bibo:authorList ; bibo:status ; dct:creator ; dct:date "2020-07-07"; dct:isPartOf ; dct:subject ; dct:title "Is This Noise, or Does This Mean Something? #benchmarking"^^xsd:string; rdf:type bibo:Article, ep:EPrint, ep:InternetEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "main.pdf"^^xsd:string . rdfs:label "main.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81001 \n\nReducing Bit-Vector Polynomials to SAT using Gröbner Bases\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Reducing Bit-Vector Polynomials to SAT using Gröbner Bases (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reducing Bit-Vector Polynomials to SAT using Gröbner Bases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reducing Bit-Vector Polynomials to SAT using Gröbner Bases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reducing Bit-Vector Polynomials to SAT using Gröbner Bases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reducing Bit-Vector Polynomials to SAT using Gröbner Bases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Reducing Bit-Vector Polynomials to SAT using Gröbner Bases (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "We address the satisfiability of systems of polynomial equations over bit-vectors. Instead of conventional bit-blasting, we exploit word-level inference to translate these systems into non-linear pseudo-boolean constraints. We derive the pseudo-booleans by simulating bit assignments through the addition of (linear) polynomials and applying a strong form of propagation by computing Gröbner bases. By handling bit assignments symbolically, the number of Gröbner basis calculations, along with the number of assignments, is reduced. The final Gröbner basis yields expressions for the bit-vectors in terms of the symbolic bits, together with non-linear pseudo-boolean constraints on the symbolic variables, modulo a power of two. The pseudo-booleans can be solved by translation into classical linear pseudo-boolean constraints (without a modulo) or by encoding them as propositional formulae, for which a novel translation process is described."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; bibo:volume "12178"; dct:creator , , ; dct:date "2020-07-05"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Reducing Bit-Vector Polynomials to SAT using Gröbner Bases"^^xsd:string; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Evans"^^xsd:string; foaf:givenName "Neil"^^xsd:string; foaf:name "Neil Evans"^^xsd:string; rdf:type foaf:Person . foaf:familyName "King"^^xsd:string; foaf:givenName "Andy"^^xsd:string; foaf:name "Andy King"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pulina"^^xsd:string; foaf:givenName "Lusa"^^xsd:string; foaf:name "Lusa Pulina"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Martina"^^xsd:string; foaf:givenName "Seidl"^^xsd:string; foaf:name "Seidl Martina"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Seed"^^xsd:string; foaf:givenName "Thomas"^^xsd:string; foaf:name "Thomas Seed"^^xsd:string; rdf:type foaf:Person . rdfs:label "FGCS_Revised (3).pdf"^^xsd:string . rdfs:label "FGCS_Revised (3).pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81860 \n\nMalicious Changeload for the Resilience Evaluation of Self-adaptive Authorisation Infrastructures\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Malicious Changeload for the Resilience Evaluation of Self-adaptive Authorisation Infrastructures (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Malicious Changeload for the Resilience Evaluation of Self-adaptive Authorisation Infrastructures (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Malicious Changeload for the Resilience Evaluation of Self-adaptive Authorisation Infrastructures (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Malicious Changeload for the Resilience Evaluation of Self-adaptive Authorisation Infrastructures (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Malicious Changeload for the Resilience Evaluation of Self-adaptive Authorisation Infrastructures (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Malicious Changeload for the Resilience Evaluation of Self-adaptive Authorisation Infrastructures (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Self-adaptive systems are able to modify their behaviour and/or structure in response to changes that occur to the system, its environment, or even its goals. In terms of authorisation infrastructures, self-adaptation has shown to be a promising solution for enforcing access control policies and subject access privileges when mitigating insider threat. This paper describes the resilience evaluation of a self-adaptive authorisation infrastructure by simulating a case study related to insider threats. As part of this evaluation, a malicious changeload has been formally defined in order to describe scenarios of abuse in access control. This malicious changeload was then used to stimulate self-adaptation within a federated authorisation infrastructure. \r\nThe evaluation confirmed the resilience of a self-adaptive authorisation infrastructure in handling abuse of access under repeatable conditions by consistently mitigating abuse under normal and high loads. The evaluation has also shown that self-adaptation had a minimal impact on the authorisation infrastructure, even when adapting authorisation policies while mitigating abuse of access."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "113"; dc:hasVersion ; dct:creator , ; dct:date "2020-07-01"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Malicious Changeload for the Resilience Evaluation of Self-adaptive Authorisation Infrastructures"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bailey"^^xsd:string; foaf:givenName "Christopher"^^xsd:string; foaf:name "Christopher Bailey"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Lemos"^^xsd:string; foaf:givenName "Rogério"^^xsd:string; foaf:name "Rogério de Lemos"^^xsd:string; rdf:type foaf:Person . bibo:issn "0167739X"; foaf:name "Future Generation Computer Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90183 \n\nHighly interpretable hierarchical deep rule-based classifier\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "Pioneering the traditional fuzzy rule-based (FRB) systems, deep rule-based (DRB) classifiers are able to offer both human-level performance and transparent system structure on image classification problems by integrating zero-order fuzzy rule base with a multi-layer image-processing architecture that is typical for deep learning. Nonetheless, it is frequently observed that the inner structure of DRB can become over sophisticated and not interpretable for humans when applied to large-scale, complex problems. To tackle the issue, one feasible solution is to construct a tree structural classification model by aggregating the possibly huge number of prototypes identified from data into a much smaller number of more descriptive and highly abstract ones. Therefore, in this paper, we present a novel hierarchical deep rule-based (H-DRB) approach that is capable of summarizing the less descriptive raw prototypes into highly generalized ones and self-arranging them into a hierarchical prototype-based structure according to their descriptive abilities. By doing so, H-DRB can offer high-level performance and, most importantly, full transparency and human-interpretability on various problems including large-scale ones. The proposed concept and generical principles are verified through numerical experiments based on a wide variety of popular benchmark image sets. Numerical results demonstrate that the promise of H-DRB."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "92"; dct:creator , ; dct:date "2020-07-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Highly interpretable hierarchical deep rule-based classifier"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P."^^xsd:string; foaf:name "Plamen P. Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "15684946"; foaf:name "Applied Soft Computing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Towards a Quantum Software Modeling Language.pdf"^^xsd:string . rdfs:label "Towards a Quantum Software Modeling Language.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80774 \n\nTowards a Quantum Software Modeling Language\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Towards a Quantum Software Modeling Language (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards a Quantum Software Modeling Language (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards a Quantum Software Modeling Language (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards a Quantum Software Modeling Language (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards a Quantum Software Modeling Language (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Towards a Quantum Software Modeling Language (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "We set down the principles behind a modeling language for quantum software. We present a minimal set of extensions to the well-known Unified Modeling Language (UML) that allows it to effectively model quantum software. These extensions are separate and independent of UML as a whole. As such they can be used to extend any other software modeling language, or as a basis for a completely new language. We argue that these extensions are both necessary and sufficient to model, abstractly, any piece of quantum software. Finally, we provide a small set of examples that showcase the effectiveness of the extension set."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2020-07"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Towards a Quantum Software Modeling Language"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "IEEE/ACM 42nd International Conference on Software Engineering Workshops"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Seoul, Republic of Korea"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Pérez-Delgado"^^xsd:string; foaf:givenName "Carlos A"^^xsd:string; foaf:name "Carlos A Pérez-Delgado"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Perez-Gonzalez"^^xsd:string; foaf:givenName "Hector G"^^xsd:string; foaf:name "Hector G Perez-Gonzalez"^^xsd:string; rdf:type foaf:Person . rdfs:label "Bonkhoff Author accepted copy of 2nd Brain paper.pdf"^^xsd:string . rdfs:label "Bonkhoff Author accepted copy of 2nd Brain paper.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81216 \n\nBringing Proportional Recovery into Proportion: Bayesian Modelling of Post-Stroke Motor Impairment\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Bringing Proportional Recovery into Proportion: Bayesian Modelling of Post-Stroke Motor Impairment (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Bringing Proportional Recovery into Proportion: Bayesian Modelling of Post-Stroke Motor Impairment (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bringing Proportional Recovery into Proportion: Bayesian Modelling of Post-Stroke Motor Impairment (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bringing Proportional Recovery into Proportion: Bayesian Modelling of Post-Stroke Motor Impairment (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bringing Proportional Recovery into Proportion: Bayesian Modelling of Post-Stroke Motor Impairment (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bringing Proportional Recovery into Proportion: Bayesian Modelling of Post-Stroke Motor Impairment (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 . bibo:abstract "Accurate predictions of motor impairment after stroke are of cardinal importance for the patient, clinician, and health care system. More than ten years ago, the proportional recovery rule was introduced by promising just that: high-fidelity predictions of recovery following stroke based only on the initially lost motor function, at least for a specific fraction of patients. However, emerging evidence suggests that this recovery rule is subject to various confounds and may apply less universally than previously assumed. Here, we systematically revisited stroke outcome predictions by applying strategies to avoid confounds and fitting hierarchical Bayesian models. We jointly analyzed n=385 post-stroke trajectories from six separate studies – one of the currently largest overall datasets of upper limb motor recovery. We addressed confounding ceiling effects by introducing a subset approach and ensured correct model estimation through synthetic data simulations. Subsequently, we used model comparisons to assess the underlying nature of recovery within our empirical recovery data. The first model comparison, relying on the conventional fraction of patients called fitters, pointed to a combination of proportional to lost function and constant recovery. Proportional to lost here describes the original notion of proportionality, indicating greater recovery in case of a more severe initial impairment. This combination explained only 32% of the variance in recovery, which is in stark contrast to previous reports of >80%. When instead analyzing the complete spectrum of subjects, fitters and non-fitters, a combination of proportional to spared function and constant recovery was favoured, implying a more significant improvement in case of more preserved function. Explained variance was at 53%.\r\n\r\nTherefore, our quantitative findings suggest that motor recovery post-stroke may exhibit some characteristics of proportionality. However, the variance explained was substantially reduced compared to what has previously been reported. This finding motivates future research moving beyond solely behavior scores to explain stroke recovery and establish robust and discriminating single-subject predictions."^^xsd:string; bibo:authorList ; bibo:issue "7"; bibo:status , ; bibo:volume "143"; dc:hasVersion ; dct:creator , , , , , , , , , ; dct:date "2020-06-29"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Bringing Proportional Recovery into Proportion: Bayesian Modelling of Post-Stroke Motor Impairment"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "RC321 Neuroscience. Biological psychiatry. Neuropsychiatry"@en . foaf:name "Oxford University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Guggisberg"^^xsd:string; foaf:givenName "Adrian"^^xsd:string; foaf:name "Adrian Guggisberg"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hawe"^^xsd:string; foaf:givenName "Rachel"^^xsd:string; foaf:name "Rachel Hawe"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bzdok"^^xsd:string; foaf:givenName "Danilo"^^xsd:string; foaf:name "Danilo Bzdok"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bonkhoff"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Bonkhoff"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grefkes"^^xsd:string; foaf:givenName "Christian"^^xsd:string; foaf:name "Christian Grefkes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fink"^^xsd:string; foaf:givenName "Gereon"^^xsd:string; foaf:name "Gereon Fink"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hope"^^xsd:string; foaf:givenName "Thomas M.H."^^xsd:string; foaf:name "Thomas M.H. Hope"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rehme"^^xsd:string; foaf:givenName "Anne"^^xsd:string; foaf:name "Anne Rehme"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dukelow"^^xsd:string; foaf:givenName "Sean"^^xsd:string; foaf:name "Sean Dukelow"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . bibo:issn "00068950"; foaf:name "Brain"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "dataflow-effect-monads.pdf"^^xsd:string . rdfs:label "dataflow-effect-monads.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81880 \n\nData-flow analyses as effects and graded monads\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Data-flow analyses as effects and graded monads (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Data-flow analyses as effects and graded monads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data-flow analyses as effects and graded monads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data-flow analyses as effects and graded monads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data-flow analyses as effects and graded monads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data-flow analyses as effects and graded monads (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 . ; bibo:abstract "In static analysis, two frameworks have been studied extensively: monotone data-flow analysis and type-and-effect systems. Whilst both are seen as general analysis frameworks, their relationship has remained unclear. Here we show that monotone data-flow analyses can be encoded as effect systems in a uniform way, via algebras of transfer functions. This helps to answer questions about the most appropriate structure for general effect algebras, especially with regards capturing control-flow precisely. Via the perspective of capturing data-flow analyses, we show the recent suggestion of using effect quantales is not general enough as it excludes non-distributive analyses e.g., constant propagation. By rephrasing the McCarthy transformation, we then model monotone data-flow effects via graded monads. This provides a model of data-flow analyses that can be used to reason about analysis correctness at the semantic level, and to embed data-flow analyses into type systems."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; bibo:volume "167"; dc:hasVersion ; dct:creator , , ; dct:date "2020-06-28"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Data-flow analyses as effects and graded monads"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 9 Formal systems, logics"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Dagstuhl"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ivašković"^^xsd:string; foaf:givenName "Andrej"^^xsd:string; foaf:name "Andrej Ivašković"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ariola"^^xsd:string; foaf:givenName "Zena M."^^xsd:string; foaf:name "Zena M. Ariola"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mycroft"^^xsd:string; foaf:givenName "Alan"^^xsd:string; foaf:name "Alan Mycroft"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Orchard"^^xsd:string; foaf:givenName "Dominic"^^xsd:string; foaf:name "Dominic Orchard"^^xsd:string; rdf:type foaf:Person . foaf:name "5th International Conference on Formal Structures for Computation and Deduction (FSCD 2020)"^^xsd:string; rdf:type bibo:Collection . rdfs:label "Santos-GECCO2020_preprint.pdf"^^xsd:string . rdfs:label "Santos-GECCO2020_preprint.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81040 \n\nExploratory Path Planning for Mobile Robots in Dynamic Environments with Ant Colony Optimization\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Exploratory Path Planning for Mobile Robots in Dynamic Environments with Ant Colony Optimization (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Exploratory Path Planning for Mobile Robots in Dynamic Environments with Ant Colony Optimization (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Exploratory Path Planning for Mobile Robots in Dynamic Environments with Ant Colony Optimization (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Exploratory Path Planning for Mobile Robots in Dynamic Environments with Ant Colony Optimization (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Exploratory Path Planning for Mobile Robots in Dynamic Environments with Ant Colony Optimization (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Exploratory Path Planning for Mobile Robots in Dynamic Environments with Ant Colony Optimization (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "In the path planning task for autonomous mobile robots, robots should be able to plan their trajectory to leave the start position and reach the goal, safely. There are several path planning approaches for mobile robots in the literature. Ant Colony Optimization algorithms have been investigated for this problem, giving promising results. In this paper, we propose the Max-Min Ant System for Dynamic Path Planning algorithm for the exploratory path planning task for autonomous mobile robots based on topological maps. A topological map is an environment representation whose focus is the main reference points of the environment and their connections. Based on this representation, the path can be composed by a sequence of state/actions pairs, which facilitates the navigability of the path, with no need to have the information of the complete map. The proposed algorithm was evaluated in static and dynamic envi- ronments, showing promising results in both of them. Experiments in dynamic environments show the adaptability of our proposal."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2020-06-25"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Exploratory Path Planning for Mobile Robots in Dynamic Environments with Ant Colony Optimization"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "Genetic and Evolutionary Computation Conference (GECCO ’20)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Cancun, Mexico"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Toledo"^^xsd:string; foaf:givenName "Claudio"^^xsd:string; foaf:name "Claudio Toledo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Johnson"^^xsd:string; foaf:givenName "Colin G."^^xsd:string; foaf:name "Colin G. Johnson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando E.B."^^xsd:string; foaf:name "Fernando E.B. Otero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Osorio"^^xsd:string; foaf:givenName "Fernando"^^xsd:string; foaf:name "Fernando Osorio"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Santos"^^xsd:string; foaf:givenName "Valeria"^^xsd:string; foaf:name "Valeria Santos"^^xsd:string; rdf:type foaf:Person . rdfs:label "Coulborn_Frontiers_in_Human_Neuroscience_published.pdf"^^xsd:string . rdfs:label "Coulborn_Frontiers_in_Human_Neuroscience_published.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82811 \n\nEffect of tDCS Over the Right Inferior Parietal Lobule on Mind-Wandering Propensity\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Effect of tDCS Over the Right Inferior Parietal Lobule on Mind-Wandering Propensity (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Effect of tDCS Over the Right Inferior Parietal Lobule on Mind-Wandering Propensity (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Effect of tDCS Over the Right Inferior Parietal Lobule on Mind-Wandering Propensity (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Effect of tDCS Over the Right Inferior Parietal Lobule on Mind-Wandering Propensity (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Effect of tDCS Over the Right Inferior Parietal Lobule on Mind-Wandering Propensity (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Effect of tDCS Over the Right Inferior Parietal Lobule on Mind-Wandering Propensity (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . ; bibo:abstract "Mind-wandering is associated with switching our attention to internally directed thoughts and is by definition an intrinsic, self-generated cognitive function. Interestingly, previous research showed that it may be possible to modulate its propensity externally, with transcranial direct current stimulation (tDCS) targeting different regions in the default mode and executive control networks (ECNs). However, these studies used highly heterogeneous montages (targeting the dorsolateral prefrontal cortex (DLPFC), the right inferior parietal lobule (IPL), or both concurrently), often showed contradicting results, and in many cases failed to replicate. Our study aimed to establish whether tDCS of the default mode network (DMN), via targeting the right IPL alone, could modulate mind-wandering propensity using a within-subjects double-blind, counterbalanced design. Participants completed sustained attention to response task (SART) interspersed with thought-probes to capture their subjective reports of mind-wandering before and after receiving anodal, cathodal, or sham tDCS over the right IPL (with the reference over the left cheek). We found evidence for the lack of an effect of stimulation on subjective reports of mind-wandering (JZS-BF01 = 5.19), as well as on performance on the SART task (errors (JZS-BF01 = 6.79) and reaction time (JZS-BF01 = 5.94). Overall, we failed to replicate previous reports of successful modulations of mind-wandering propensity with tDCS over the IPL, instead of providing evidence in support of the lack of an effect. This and other recent unsuccessful replications call into question whether it is indeed possible to externally modulate spontaneous or self-generated cognitive processes."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2020-06-18"; dct:isPartOf , ; dct:publisher ; dct:title "Effect of tDCS Over the Right Inferior Parietal Lobule on Mind-Wandering Propensity"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Frontiers Media"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Fernández-Espejo"^^xsd:string; foaf:givenName "Davinia"^^xsd:string; foaf:name "Davinia Fernández-Espejo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Coulborn"^^xsd:string; foaf:givenName "Sean"^^xsd:string; foaf:name "Sean Coulborn"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Miall"^^xsd:string; foaf:givenName "Chris"^^xsd:string; foaf:name "Chris Miall"^^xsd:string; rdf:type foaf:Person . foaf:familyName ""^^xsd:string; foaf:givenName ""^^xsd:string; foaf:name " "^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . bibo:issn "16625161"; foaf:name "Frontiers in Human Neuroscience"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90815 \n\nEfficient Verification of ReLU-Based Neural Networks via Dependency Analysis\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "We introduce an efficient method for the verification of ReLU-based feed-forward neural networks. We derive an automated procedure that exploits dependency relations between the ReLU nodes, thereby pruning the search tree that needs to be considered by MILP-based formulations of the verification problem. We augment the resulting algorithm with methods for input domain splitting and symbolic interval propagation. We present Venus, the resulting verification toolkit, and evaluate it on the ACAS collision avoidance networks and models trained on the MNIST and CIFAR-10 datasets. The experimental results obtained indicate considerable gains over the present state-of-the-art tools."^^xsd:string; bibo:authorList ; bibo:issue "04"; bibo:presentedAt ; bibo:status , ; bibo:volume "34"; dct:creator , , , , ; dct:date "2020-06-16"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Efficient Verification of ReLU-Based Neural Networks via Dependency Analysis"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "The Thirty-Fourth AAAI Conference on Artificial Intelligence, AAAI 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, IAAI 2020, The Tenth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2020"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "New York, USA"^^xsd:string . foaf:name "AAAI Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Misener"^^xsd:string; foaf:givenName "Ruth"^^xsd:string; foaf:name "Ruth Misener"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kronqvist"^^xsd:string; foaf:givenName "Jan"^^xsd:string; foaf:name "Jan Kronqvist"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lomuscio"^^xsd:string; foaf:givenName "Alessio"^^xsd:string; foaf:name "Alessio Lomuscio"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Botoeva"^^xsd:string; foaf:givenName "Elena"^^xsd:string; foaf:name "Elena Botoeva"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kouvaros"^^xsd:string; foaf:givenName "Panagiotis"^^xsd:string; foaf:name "Panagiotis Kouvaros"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #91356 \n\nEditorial: Language Representation and Learning in Cognitive and Artificial Intelligence Systems\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:authorList ; bibo:status , ; bibo:volume "7"; dct:creator , , , ; dct:date "2020-06-16"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Editorial: Language Representation and Learning in Cognitive and Artificial Intelligence Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Frontiers Media"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Cangelosi"^^xsd:string; foaf:givenName "Angelo"^^xsd:string; foaf:name "Angelo Cangelosi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Golosio"^^xsd:string; foaf:givenName "Bruno"^^xsd:string; foaf:name "Bruno Golosio"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Esposito"^^xsd:string; foaf:givenName "Massimo"^^xsd:string; foaf:name "Massimo Esposito"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Masala"^^xsd:string; foaf:givenName "Giovanni Luca"^^xsd:string; foaf:name "Giovanni Luca Masala"^^xsd:string; rdf:type foaf:Person . bibo:issn "22969144"; foaf:name "Frontiers in Robotics and AI"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #81728 \n\nBreath shield for Topcon Triton\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Breath shield for Topcon Triton (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Breath shield for Topcon Triton (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breath shield for Topcon Triton (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breath shield for Topcon Triton (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breath shield for Topcon Triton (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breath shield for Topcon Triton (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Drawing demonstrating the breath shield design for the Topcon Triton ophthalmologist machine."^^xsd:string; bibo:authorList ; bibo:status ; dct:creator , ; dct:date "2020-06-16"; dct:isPartOf ; dct:subject ; dct:title "Breath shield for Topcon Triton"^^xsd:string; ep:hasDocument , , , , , ; ep:hasOther ; rdf:type bibo:Article, ep:DesignEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science (General)"@en . foaf:familyName "Knox"^^xsd:string; foaf:givenName "Daniel"^^xsd:string; foaf:name "Daniel Knox"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Greenhow"^^xsd:string; foaf:givenName "Keith"^^xsd:string; foaf:name "Keith Greenhow"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81701 \n\nBacS: A blockchain-based access control scheme in distributed internet of things\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "BacS: A blockchain-based access control scheme in distributed internet of things (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "BacS: A blockchain-based access control scheme in distributed internet of things (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "BacS: A blockchain-based access control scheme in distributed internet of things (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "BacS: A blockchain-based access control scheme in distributed internet of things (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "BacS: A blockchain-based access control scheme in distributed internet of things (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "BacS: A blockchain-based access control scheme in distributed internet of things (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "Distributed Internet of Things (Distributed IoT) is a large-scale, heterogeneous, dynamic distributed architecture environment which is gradually formed based on Internet of Things (IoT) technology. In order to cope with the large number access requirements for IoT data brought by application expansion, the data of IoT devices are usually stored in the management server (DMS) of current domain, and adopt a centralized access control mechanism to user. This centrally approach can easily cause data to be tampered with and leaked. Moreover, registering different identities when user accesses different domains increases the difficulty to manage his identities. Therefore, this paper proposes a blockchain-based access control scheme called BacS for Distributed IoT. In BacS, firstly, we use account address of the node in blockchain as the identity to access DMS, redefine the access control permission of data of devices and store on blockchain. Then we design processes of authorization, authorization revocation, access control and audit in BacS. Finally, we use a lightweight symmetric encryption algorithm (SEA) to achieve privacy-preserving for Distributed IoT system. We build a credible experimental model on Ethereum private chain, results show that BacS is feasible and effective that it can achieve secure access in Distributed IoT environment while protecting privacy."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2020-06-12"; dct:isPartOf , ; dct:publisher ; dct:subject , , , , , ; dct:title "BacS: A blockchain-based access control scheme in distributed internet of things"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "TA168 Systems engineering"@en . rdf:type skos:Concept; skos:prefLabel "TK5101 Telecommunications"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.875.I57 Internet"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.888 World Wide Web"@en . rdf:type skos:Concept; skos:prefLabel "ZA4045 Electronic information resources"@en . rdf:type skos:Concept; skos:prefLabel "ZA4450 Databases"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Tan"^^xsd:string; foaf:givenName "Liang"^^xsd:string; foaf:name "Liang Tan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "He"^^xsd:string; foaf:givenName "Chen"^^xsd:string; foaf:name "Chen He"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Shi"^^xsd:string; foaf:givenName "Na"^^xsd:string; foaf:name "Na Shi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Xu"^^xsd:string; foaf:givenName "Junli"^^xsd:string; foaf:name "Junli Xu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Xu"^^xsd:string; foaf:givenName "Hao"^^xsd:string; foaf:name "Hao Xu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yang"^^xsd:string; foaf:givenName "Ciaxia"^^xsd:string; foaf:name "Ciaxia Yang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lu"^^xsd:string; foaf:givenName "Yang"^^xsd:string; foaf:name "Yang Lu"^^xsd:string; rdf:type foaf:Person . bibo:issn "19366442"; foaf:name "Peer-to-Peer Networking and Applications"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "ICWSM-2020-JNL.pdf"^^xsd:string . rdfs:label "ICWSM-2020-JNL.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80660 \n\nBehind the Mask: A Computational Study of Anonymous' Presence on Twitter\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Behind the Mask: A Computational Study of Anonymous' Presence on Twitter (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Behind the Mask: A Computational Study of Anonymous' Presence on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behind the Mask: A Computational Study of Anonymous' Presence on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behind the Mask: A Computational Study of Anonymous' Presence on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behind the Mask: A Computational Study of Anonymous' Presence on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behind the Mask: A Computational Study of Anonymous' Presence on Twitter (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The hacktivist group Anonymous is unusual in its public-facing nature. Unlike other cybercriminal groups, which rely on secrecy and privacy for protection, Anonymous is prevalent on the social media site, Twitter. In this paper we re-examine some key findings reported in previous small-scale qualitative studies of the group using a large-scale computational analysis of Anonymous' presence on Twitter. We specifically refer to reports which reject the group's claims of leaderlessness, and indicate a fracturing of the group after the arrests of prominent members in 2011-2013. In our research, we present the first attempts to use machine learning to identify and analyse the presence of a network of over 20,000 Anonymous accounts spanning from 2008-2019 on the Twitter platform. In turn, this research utilises social network analysis (SNA) and centrality measures to examine the distribution of influence within this large network, identifying the presence of a small number of highly influential accounts. Moreover, we present the first study of tweets from some of the identified key influencer accounts and, through the use of topic modelling, demonstrate a similarity in overarching subjects of discussion between these prominent accounts. These findings provide robust, quantitative evidence to support the claims of smaller-scale, qualitative studies of the Anonymous collective."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2020-06-09"; dct:isPartOf ; dct:subject , , , , ; dct:title "Behind the Mask: A Computational Study of Anonymous' Presence on Twitter"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "HM Sociology"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "14th International AAAI Conference on Web and Social Media (ICWSM)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Georgia, U.S."^^xsd:string . foaf:familyName "Jones"^^xsd:string; foaf:givenName "Keenan"^^xsd:string; foaf:name "Keenan Jones"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . rdfs:label "s10817-020-09559-8.pdf"^^xsd:string . rdfs:label "s10817-020-09559-8.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82103 \n\nProof-Producing Synthesis of CakeML from Monadic HOL Functions\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Proof-Producing Synthesis of CakeML from Monadic HOL Functions (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Proof-Producing Synthesis of CakeML from Monadic HOL Functions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Proof-Producing Synthesis of CakeML from Monadic HOL Functions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Proof-Producing Synthesis of CakeML from Monadic HOL Functions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Proof-Producing Synthesis of CakeML from Monadic HOL Functions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Proof-Producing Synthesis of CakeML from Monadic HOL Functions (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "We introduce an automatic method for producing stateful ML programs together with proofs of correctness from monadic functions in HOL. Our mechanism supports references, exceptions, and I/O operations, and can generate functions manipulating local state, which can then be encapsulated for use in a pure context. We apply this approach to several non-trivial examples, including the instruction encoder and register allocator of the otherwise pure CakeML compiler, which now benefits from better runtime performance. This development has been carried out in the HOL4 theorem prover."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2020-06-06"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Proof-Producing Synthesis of CakeML from Monadic HOL Functions"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ho"^^xsd:string; foaf:givenName "Son"^^xsd:string; foaf:name "Son Ho"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tan"^^xsd:string; foaf:givenName "Yong Kiam"^^xsd:string; foaf:name "Yong Kiam Tan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Abrahamsson"^^xsd:string; foaf:givenName "Oskar"^^xsd:string; foaf:name "Oskar Abrahamsson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Norrish"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Norrish"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kumar"^^xsd:string; foaf:givenName "Ramana"^^xsd:string; foaf:name "Ramana Kumar"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Myreen"^^xsd:string; foaf:givenName "Magnus O."^^xsd:string; foaf:name "Magnus O. Myreen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kanabar"^^xsd:string; foaf:givenName "Hrutvik"^^xsd:string; foaf:name "Hrutvik Kanabar"^^xsd:string; rdf:type foaf:Person . bibo:issn "01687433"; foaf:name "Journal of Automated Reasoning"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Fil.pdf"^^xsd:string . rdfs:label "Fil.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80477 \n\nMinimal spiking neuron for solving multi-label classification tasks\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Minimal spiking neuron for solving multi-label classification tasks (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Minimal spiking neuron for solving multi-label classification tasks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Minimal spiking neuron for solving multi-label classification tasks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Minimal spiking neuron for solving multi-label classification tasks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Minimal spiking neuron for solving multi-label classification tasks (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Minimal spiking neuron for solving multi-label classification tasks (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "The Multi-Spike Tempotron (MST) is a powerful single spiking neuron model that can solve complex supervised classification tasks. While powerful, it is also internally complex, computationally expensive to evaluate, and not suitable for neuromorphic hardware. Here we aim to understand whether it is possible to simplify the MST model, while retaining its ability to learn and to process information. To this end, we introduce a family of Generalised Neuron Models (GNM) which are a special case of the Spike Response Model and much simpler and cheaper to simulate than the MST. We find that over a wide range of parameters the GNM can learn at least as well as the MST. We identify the temporal autocorrelation of the membrane potential as the single most important ingredient of the GNM which enables it to classify multiple spatio-temporal patterns. We also interpret the GNM as a chemical system, thus conceptually bridging computation by neural networks with molecular information processing. We conclude the paper by proposing alternative training approaches for the GNM including error trace learning and error backpropagation."^^xsd:string; bibo:authorList ; bibo:issue "7"; bibo:status , ; bibo:volume "32"; dc:hasVersion ; dct:creator , ; dct:date "2020-06-05"; dct:isPartOf , ; dct:publisher ; dct:title "Minimal spiking neuron for solving multi-label classification tasks"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "MIT Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chu"^^xsd:string; foaf:givenName "Dominique"^^xsd:string; foaf:name "Dominique Chu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fil"^^xsd:string; foaf:givenName "Jakub"^^xsd:string; foaf:name "Jakub Fil"^^xsd:string; rdf:type foaf:Person . bibo:issn "08997667"; foaf:name "Neural Computation"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Cybersecurity20-Cyber-risk-at-the-edge.pdf"^^xsd:string . rdfs:label "Cybersecurity20-Cyber-risk-at-the-edge.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81278 \n\nCyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 . bibo:abstract "Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0, with a specific focus on the mitigation of cyber risks. An analytical framework is presented, based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new technologies. This paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning (AI/ML) and real-time intelligence for predictive cyber risk analytics. The system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the edge. This enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when AI/ML technologies are migrated to the periphery of IoT networks."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , , ; dct:date "2020-06-02"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology (General)"@en . foaf:name "SpringerOpen"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Page"^^xsd:string; foaf:givenName "Kevin"^^xsd:string; foaf:name "Kevin Page"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Maddox"^^xsd:string; foaf:givenName "La'Treall"^^xsd:string; foaf:name "La'Treall Maddox"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Santos"^^xsd:string; foaf:givenName "Omar"^^xsd:string; foaf:name "Omar Santos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Burnap"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Burnap"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Radanliev"^^xsd:string; foaf:givenName "Petar"^^xsd:string; foaf:name "Petar Radanliev"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Montalvo"^^xsd:string; foaf:givenName "Rafael Mantilla"^^xsd:string; foaf:name "Rafael Mantilla Montalvo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Roure"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David De Roure"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:name "Cybersecurity"^^xsd:string; rdf:type bibo:Collection . rdfs:label "GECCO-2020-de-Sa.pdf"^^xsd:string . rdfs:label "GECCO-2020-de-Sa.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #82232 \n\nA robust experimental evaluation of automated multi-label classification methods\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A robust experimental evaluation of automated multi-label classification methods (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A robust experimental evaluation of automated multi-label classification methods (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A robust experimental evaluation of automated multi-label classification methods (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A robust experimental evaluation of automated multi-label classification methods (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A robust experimental evaluation of automated multi-label classification methods (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A robust experimental evaluation of automated multi-label classification methods (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Automated Machine Learning (AutoML) has emerged to deal with the selection and configuration of algorithms for a given learning task. With the progression of AutoML, several effective methods were introduced, especially for traditional classification and regression problems. Apart from the AutoML success, several issues remain open. One issue, in particular, is the lack of ability of AutoML methods to deal with different types of data. Based on this scenario, this paper approaches AutoML for multi-label classification (MLC) problems. In MLC, each example can be simultaneously associated to several class labels, unlike the standard classification task, where an example is associated to just one class label. In this work, we provide a general comparison of five automated multi-label classification methods - two evolutionary methods, one Bayesian optimization method, one random search and one greedy search - on 14 datasets and three designed search spaces. Overall, we observe that the most prominent method is the one based on a canonical grammar-based genetic programming (GGP) search method, namely Auto-MEKAGGP. Auto-MEKAGGP presented the best average results in our comparison and was statistically better than all the other methods in different search spaces and evaluated measures, except when compared to the greedy search method."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2020-06-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A robust experimental evaluation of automated multi-label classification methods"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "2020 Genetic and Evolutionary Computation Conference (GECCO’20),"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Cancun, Mexico"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Pimenta"^^xsd:string; foaf:givenName "Cristiano G."^^xsd:string; foaf:name "Cristiano G. Pimenta"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pappa"^^xsd:string; foaf:givenName "Gisele L."^^xsd:string; foaf:name "Gisele L. Pappa"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Sá"^^xsd:string; foaf:givenName "Alex G. C."^^xsd:string; foaf:name "Alex G. C. de Sá"^^xsd:string; rdf:type foaf:Person . foaf:name "Proceedings of the 2020 Genetic and Evolutionary Computation Conference (GECCO’20)"^^xsd:string; rdf:type bibo:Collection . rdfs:label "Mohamed-GECCO2020_preprint.pdf"^^xsd:string . rdfs:label "Mohamed-GECCO2020_preprint.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81041 \n\nA Multiobjective Optimization Approach for Market Timing\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Multiobjective Optimization Approach for Market Timing (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Multiobjective Optimization Approach for Market Timing (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Multiobjective Optimization Approach for Market Timing (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Multiobjective Optimization Approach for Market Timing (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Multiobjective Optimization Approach for Market Timing (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Multiobjective Optimization Approach for Market Timing (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "The introduction of electronic exchanges was a crucial point in history as it heralded the arrival of algorithmic trading. Designers of such systems face a number of issues, one of which is deciding when to buy or sell a given security on a financial market. Although Genetic Algorithms (GA) have been the most widely used to tackle this issue, Particle Swarm Optimization (PSO) has seen much lower adoption within the domain. In two previous works, the authors adapted PSO algorithms to tackle market timing and address the shortcomings of the previous approaches both with GA and PSO. The majority of work done to date on market timing tackled it as a single objective optimization problem, which limits its suitability to live trading as designers of such strategies will realistically pursue multiple objectives such as maximizing profits, minimizing exposure to risk and using the shortest strategies to improve execution speed. In this paper, we adapt both a GA and PSO to tackle market timing as a multiobjective optimization problem and provide an in depth discussion of our results and avenues of future research."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2020-06"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "A Multiobjective Optimization Approach for Market Timing"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "Genetic and Evolutionary Computation Conference (GECCO ’20)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Cancun, Mexico"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando E.B."^^xsd:string; foaf:name "Fernando E.B. Otero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mohamed"^^xsd:string; foaf:givenName "Ismail"^^xsd:string; foaf:name "Ismail Mohamed"^^xsd:string; rdf:type foaf:Person . rdfs:label "Behavioural_Subtyping_in_Process_Algebra.gz"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #21936 \n\nBehavioural Subtyping in Process Algebra\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Behavioural Subtyping in Process Algebra (Other)"^^xsd:string . rdf:_1 . bibo:abstract "Subtyping relations embody a notion of substitutability, and are an important tool in formal methods. The downward simulation relation is well-known and widely used as a subtyping and refinement relation for state-based approaches, but there is no single relation which is widely accepted to be the subtyping relation for the behavioural setting; however, there are several candidate relations. Developments such as the multi-viewpoint specification method of RM-ODP encourage the use of several different formal methods in a single project. Thus, it becomes important to obtain implementations of a single notion of subtyping in several different paradigms. In this thesis, we attempt to find a process algebraic relation which corresponds to the state-based subtyping relation, downward simulation. While trying to achieve this, we define a translation between a state-based notation and a process algebra, and we uncover some of the similarities and differences between these two specification paradigms. In particular, we investigate the meaning of undefined behaviour in each setting. When a state-based specification does not define an operation, the intent is that the system's behaviour is unspecified (not well-defined) if that operation is invoked. In a process algebra with refusals semantics, however, a process is implicitly specified to refuse any action it is not specified to accept, and such a refusal constitutes well-defined behaviour. As part of our translation, we devise a method of representing the unspecified behaviour of the state-based world in a process definition. Finally, we use our translation to prove that the presence of subtyping between a pair of state-based specifications implies reduction between their LOTOS translations, but that the presence of reduction does not imply subtyping. We conclude that reduction itself does not correspond to state-based subtyping, but that any relation which does must be based on a stronger semantics than reduction, such as bisimulation semantics."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status , ; dct:creator ; dct:date "2020-05-28"; dct:isPartOf ; dct:issuer , ; dct:subject ; dct:title "Behavioural Subtyping in Process Algebra"^^xsd:string; ep:hasDocument ; ep:hasOther ; owl:sameAs ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:hasPart ; foaf:name "University of Kent at Canterbury"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "Computing Laboratory, University of Kent at Canterbury"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Briscoe-Smith"^^xsd:string; foaf:givenName "C."^^xsd:string; foaf:name "C. Briscoe-Smith"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "s41598-020-64843-2.pdf"^^xsd:string . rdfs:label "s41598-020-64843-2.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81206 \n\nFleeting Perceptual Experience and the Possibility of Recalling Without Seeing\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Fleeting Perceptual Experience and the Possibility of Recalling Without Seeing (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Fleeting Perceptual Experience and the Possibility of Recalling Without Seeing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fleeting Perceptual Experience and the Possibility of Recalling Without Seeing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fleeting Perceptual Experience and the Possibility of Recalling Without Seeing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fleeting Perceptual Experience and the Possibility of Recalling Without Seeing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fleeting Perceptual Experience and the Possibility of Recalling Without Seeing (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Fleeting Perceptual Experience and the Possibility of Recalling Without Seeing (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Fleeting Perceptual Experience and the Possibility of Recalling Without Seeing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fleeting Perceptual Experience and the Possibility of Recalling Without Seeing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fleeting Perceptual Experience and the Possibility of Recalling Without Seeing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fleeting Perceptual Experience and the Possibility of Recalling Without Seeing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fleeting Perceptual Experience and the Possibility of Recalling Without Seeing (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "We explore an intensely debated problem in neuroscience, psychology and philosophy: the degree to which the “phenomenological consciousness” of the experience of a stimulus is separable from the “access consciousness” of its reportability. Specifically, it has been proposed that these two measures are dissociated from one another in one, or both directions. However, even if it was agreed that reportability and experience were doubly dissociated, the limits of dissociation logic mean we would not be able to conclusively separate the cognitive processes underlying the two. We take advantage of computational modelling and recent advances in state-trace analysis to assess this dissociation in an attentional/experiential blink paradigm. These advances in state-trace analysis make use of Bayesian statistics to quantify the evidence for and against a dissociation. Further evidence is obtained by linking our finding to a prominent model of the attentional blink – the Simultaneous Type/Serial Token model. Our results show evidence for a dissociation between experience and reportability, whereby participants appear able to encode stimuli into working memory with little, if any, conscious experience of them. This raises the possibility of a phenomenon that might be called sight-blind recall, which we discuss in the context of the current experience/reportability debate."^^xsd:string; bibo:authorList ; bibo:issue "8540"; bibo:status , ; bibo:volume "10"; dc:hasVersion , ; dct:creator , , , ; dct:date "2020-05-22"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Fleeting Perceptual Experience and the Possibility of Recalling Without Seeing"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "RC321 Neuroscience. Biological psychiatry. Neuropsychiatry"@en . foaf:name "Nature Publishing Group"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Pincham"^^xsd:string; foaf:givenName "Hannah"^^xsd:string; foaf:name "Hannah Pincham"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gootjes-Dreesbach"^^xsd:string; foaf:givenName "Ellis Luise"^^xsd:string; foaf:name "Ellis Luise Gootjes-Dreesbach"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jones"^^xsd:string; foaf:givenName "William"^^xsd:string; foaf:name "William Jones"^^xsd:string; rdf:type foaf:Person . bibo:issn "20452322"; foaf:name "Scientific Reports"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "Sedation Modulates Frontotemporal Predictive Coding Circuits.pdf"^^xsd:string . rdfs:label "Sedation Modulates Frontotemporal Predictive Coding Circuits.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80568 \n\nSedation Modulates Frontotemporal Predictive Coding Circuits and the Double Surprise Acceleration Effect\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Sedation Modulates Frontotemporal Predictive Coding Circuits and the Double Surprise Acceleration Effect (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Sedation Modulates Frontotemporal Predictive Coding Circuits and the Double Surprise Acceleration Effect (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sedation Modulates Frontotemporal Predictive Coding Circuits and the Double Surprise Acceleration Effect (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sedation Modulates Frontotemporal Predictive Coding Circuits and the Double Surprise Acceleration Effect (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sedation Modulates Frontotemporal Predictive Coding Circuits and the Double Surprise Acceleration Effect (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sedation Modulates Frontotemporal Predictive Coding Circuits and the Double Surprise Acceleration Effect (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Sedation Modulates Frontotemporal Predictive Coding Circuits and the Double Surprise Acceleration Effect (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sedation Modulates Frontotemporal Predictive Coding Circuits and the Double Surprise Acceleration Effect (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sedation Modulates Frontotemporal Predictive Coding Circuits and the Double Surprise Acceleration Effect (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sedation Modulates Frontotemporal Predictive Coding Circuits and the Double Surprise Acceleration Effect (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sedation Modulates Frontotemporal Predictive Coding Circuits and the Double Surprise Acceleration Effect (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Sedation Modulates Frontotemporal Predictive Coding Circuits and the Double Surprise Acceleration Effect (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 ; rdf:_11 ; rdf:_12 ; rdf:_13 . bibo:abstract "Two important theories in cognitive neuroscience are predictive coding and the global workspace theory. A key research task is to understand how these two theories relate to one another, and particularly, how the brain transitions from a predictive early state to the eventual engagement of a brain-scale state (the global workspace). To address this question, we present a source-localisation of EEG responses evoked by the local-global task – an experimental paradigm that engages a predictive hierarchy, which encompasses the global workspace. The results of our source reconstruction suggest three-phases of processing. The first phase involves the sensory (here auditory) regions of the superior temporal lobe and predicts sensory regularities over a short timeframe (as per the local effect). The third phase is brain-scale, involving inferior frontal, as well as inferior and superior parietal regions; consistent with a global neuronal workspace (as per the global effect). Crucially, our analysis suggests that there is an intermediate (second) phase, involving modulatory interactions between inferior frontal and superior temporal regions. Furthermore, sedation with propofol reduces modulatory interactions in the second phase. This selective effect is consistent with a predictive coding explanation of sedation, with propofol acting on descending predictions of the precision of prediction errors; thereby constraining access to the global neuronal workspace."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion , ; dct:creator , , , , , , , , , , , , ; dct:date "2020-05-19"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Sedation Modulates Frontotemporal Predictive Coding Circuits and the Double Surprise Acceleration Effect"^^xsd:string; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "QP Physiology (Living systems)"@en . foaf:name "Oxford University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Aviles"^^xsd:string; foaf:givenName "Alberto"^^xsd:string; foaf:name "Alberto Aviles"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Adapa"^^xsd:string; foaf:givenName "Ram"^^xsd:string; foaf:name "Ram Adapa"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Litvak"^^xsd:string; foaf:givenName "Vladimir"^^xsd:string; foaf:name "Vladimir Litvak"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bekinschtein"^^xsd:string; foaf:givenName "Tristan A."^^xsd:string; foaf:name "Tristan A. Bekinschtein"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Shirazibeheshti"^^xsd:string; foaf:givenName "Amirali"^^xsd:string; foaf:name "Amirali Shirazibeheshti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Witon"^^xsd:string; foaf:givenName "Adrien"^^xsd:string; foaf:name "Adrien Witon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "David Lopez"^^xsd:string; foaf:givenName "Jose"^^xsd:string; foaf:name "Jose David Lopez"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Menon"^^xsd:string; foaf:givenName "David K."^^xsd:string; foaf:name "David K. Menon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cooke"^^xsd:string; foaf:givenName "Jennifer"^^xsd:string; foaf:name "Jennifer Cooke"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Friston"^^xsd:string; foaf:givenName "Karl"^^xsd:string; foaf:name "Karl Friston"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chennu"^^xsd:string; foaf:givenName "Srivas"^^xsd:string; foaf:name "Srivas Chennu"^^xsd:string; rdf:type foaf:Person . bibo:issn "10473211"; foaf:name "Cerebral Cortex"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "posterJordanousLangroudiLi.pdf"^^xsd:string . rdfs:label "posterJordanousLangroudiLi.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81490 \n\nMusic Emotion Capture: Ethical issues around emotion-based music generation\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Music Emotion Capture: Ethical issues around emotion-based music generation (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Music Emotion Capture: Ethical issues around emotion-based music generation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Music Emotion Capture: Ethical issues around emotion-based music generation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Music Emotion Capture: Ethical issues around emotion-based music generation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Music Emotion Capture: Ethical issues around emotion-based music generation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Music Emotion Capture: Ethical issues around emotion-based music generation (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "People’s emotions are not always detectable, e.g. if a person has difficulties/lack of skills in expressing emotions, or if people are geographically separated/communicating online). Brain-computer interfaces (BCI) could enhance non-verbal communication of emotion, particularly in detecting and responding to users’ emotions e.g. music therapy, interactive software. Our pilot study Music Emotion Capture 1 detects, models and sonifies people’s emotions based on their real-time emotional state, measured by mapping EEG feedback onto a valence-arousal emotional model 2 based on [3]. Though many practical applications emerge, the work raises several ethical questions, which need careful consideration. This poster discusses these ethical issues. Are the work’s benefits (e.g. improved user experiences; music therapy; increased emotion communication abilities; enjoyable applications) important enough to justify navigating the ethical issues that arise? (e.g. privacy issues; control of representation of/reaction to users’ emotional state; consequences of detection errors; the loop of using emotion to generate music and music affecting the emotion, with the human in the process as an “intruder”).\r\n\r\n1 Langroudi, G., Jordanous, A., & Li, L. (2018). Music Emotion Capture: emotion-based generation of music using EEG. Emotion Modelling and Detection in Social Media and Online Interaction symposium @ AISB 2018, Liverpool. 2 Paltoglou, G., & Thelwall, M. (2012). Seeing stars of valence and arousal in blog posts. IEEE Transactions on Affective Computing, 4(1) [3] Russell, J.A. (1980). ‘A circumplex model of affect’, Journal of Personality and Social Psychology, 39"^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2020-05-15"; dct:isPartOf ; dct:subject , , , , , ; dct:title "Music Emotion Capture: Ethical issues around emotion-based music generation"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "M Music"@en . rdf:type skos:Concept; skos:prefLabel "Q180.55.M67 Research - Moral and ethical aspects" . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76.I59 Interactive media, hypermedia"@en . rdf:type skos:Concept; skos:prefLabel "QA76.87 Neural computers, neural networks"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "Brain. Cognition. Emotion. Music."^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Canterbury, UK (online)"^^xsd:string . foaf:familyName "Jordanous"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Jordanous"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Langroudi"^^xsd:string; foaf:givenName "George"^^xsd:string; foaf:name "George Langroudi"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90814 \n\nFormal Verification of Neural Agents in Non-deterministic Environments\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "We introduce a model for agent-environment systems where the agents are implemented via feed-forward ReLU neural networks and the environment is non-deterministic. We study the verification problem of such systems against CTL properties. We show that verifying these systems against reachability properties is undecidable. We introduce a bounded fragment of CTL, show its usefulness in identifying shallow bugs in the system, and prove that the verification problem against specifications in bounded CTL is in coNEXPTIME and PSPACE-hard. We present a novel parallel algorithm for MILP-based verification of agent-environment systems, present an implementation, and report the experimental results obtained against a variant of the VerticalCAS use-case."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , , ; dct:date "2020-05-09"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Formal Verification of Neural Agents in Non-deterministic Environments"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "19th International Conference on Autonomous Agents and Multiagent Systems, AAMAS '20, Auckland, New Zealand, May 9-13, 2020"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Auckland, New Zealand"^^xsd:string . foaf:name "International Foundation for Autonomous Agents and Multiagent Systems"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Akintunde"^^xsd:string; foaf:givenName "Michael E."^^xsd:string; foaf:name "Michael E. Akintunde"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lomuscio"^^xsd:string; foaf:givenName "Alessio"^^xsd:string; foaf:name "Alessio Lomuscio"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kouvaros"^^xsd:string; foaf:givenName "Panagiotis"^^xsd:string; foaf:name "Panagiotis Kouvaros"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Botoeva"^^xsd:string; foaf:givenName "Elena"^^xsd:string; foaf:name "Elena Botoeva"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90652 \n\nA type-theory for higher-order amortized analysis\n\n"; foaf:primaryTopic . rdf:_1 . bibo:abstract "Verification of worst-case bounds (on the resource usage of programs) is an important problem in computer science. The usefulness of such verification depends on the precision of the underlying analysis. For precision, sometimes it is useful to consider the average cost over a sequence of operations, instead of separately considering the cost of each individual operation. This kind of an analysis is often referred to as amortized resource analysis. Typically, programs that optimize their internal state to reduce the cost of future executions benefit from such approaches. Analyzing resource usage of a standard functional (FIFO) queue implemented using two functional (LIFO) lists is a classic example of amortized analysis. In this thesis we present λamor, a type-theory for amortized resource analysis of higher-order functional programs. A typical amortized analysis works by storing a ghost state called the potential with data structures. The key idea underlying amortized analysis is to show that, the available potential with the program is sufficient to account for the resource usage of that program. Verification in λamor is based on internalizing this idea into a type theory. We achieve this by providing a general type-theoretic construct to represent potential at the level of types and then building an affine type-theory around it. With λamor we show that, type-theoretic amortized analysis can be performed using well understood concepts from sub-structural and modal type theories. Yet, it yields an extremely expressive framework which can be used for resource analysis of higher-order programs, both in a strict and lazy setting. We show embeddings of two very different styles (one based on effects and the other on coeffects) of type-theoretic resource analysis frameworks into λamor. We show that λamor is sound (using a logical relations model) and complete for cost analysis of PCF programs (using one of the embeddings). Next, we apply ideas from λamor to develop another type theory (called λcg) for a very different domain – Information Flow Control (IFC). λcg uses a similar typetheoretic construct (which λamor uses for the potential) to represent confidentiality label (the ghost state for IFC). Finally, we abstract away from the specific ghost states (potential and confidentiality label) and describe how to develop a type-theory for a general ghost state with a monoidal structure."^^xsd:string; bibo:authorList ; bibo:status ; dct:creator ; dct:date "2020-05-08"; dct:isPartOf ; dct:issuer , ; dct:subject ; dct:title "A type-theory for higher-order amortized analysis"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:hasPart ; foaf:name "Saarland University, Saarbr\\\"cken, Germany"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "Faculty of Mathematics and Computer Science, Saarland University, Saarbr\\\"cken, Germany"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Rajani"^^xsd:string; foaf:givenName "Vineet"^^xsd:string; foaf:name "Vineet Rajani"^^xsd:string; rdf:type foaf:Person . rdfs:label "DHR-author-accepted-manuscript (2).pdf"^^xsd:string . rdfs:label "DHR-author-accepted-manuscript (2).pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80886 \n\nTechnology, Cyberstalking and Domestic Homicide: Informing Prevention and Response Strategies\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Technology, Cyberstalking and Domestic Homicide: Informing Prevention and Response Strategies (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Technology, Cyberstalking and Domestic Homicide: Informing Prevention and Response Strategies (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Technology, Cyberstalking and Domestic Homicide: Informing Prevention and Response Strategies (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Technology, Cyberstalking and Domestic Homicide: Informing Prevention and Response Strategies (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Technology, Cyberstalking and Domestic Homicide: Informing Prevention and Response Strategies (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Technology, Cyberstalking and Domestic Homicide: Informing Prevention and Response Strategies (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "An emerging concern in relation to the importance of technology and social media in everyday life relates to their ability to facilitate online and offline stalking, domestic violence and escalation to homicide. However, there has been little empirical research, or policing and policy attention to this domain. This study examined the extent to which there was evidence of the role of technology and cyberstalking in domestic homicide cases based on analysis of 41 Domestic Homicide Review (DHR) documents, made available by the Home Office (UK). Three interviews were also conducted with victims or family members of domestic homicide in the UK. It aimed to develop a deeper understanding of the role of technology in facilitating these forms of victimisation to inform further development of investigative practice, risk assessment and safeguarding procedures. Key themes identified by the thematic analysis undertaken related to behavioural and psychological indicators of cyberstalking, evidence of the role of technology in escalation to homicide, and the digital capabilities of law enforcement. Overall, the results indicated that: (1) there was evidence of technology and social media playing a facilitating role in these behaviours, (2) the digital footprints of victims and perpetrators were often overlooked in police investigations and the DHR process, and (3) determining the involvement of technology in such cases is important for risk assessment and earlier intervention to prevent escalation of behaviour to domestic homicide. It also indicates the importance of further developing evidencebased approaches to preventing and responding for victims, the police and other practitioners."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2020-05-04"; dct:isPartOf , ; dct:publisher ; dct:title "Technology, Cyberstalking and Domestic Homicide: Informing Prevention and Response Strategies"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Taylor & Francis"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Todd"^^xsd:string; foaf:givenName "Chris"^^xsd:string; foaf:name "Chris Todd"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bryce"^^xsd:string; foaf:givenName "Joanne"^^xsd:string; foaf:name "Joanne Bryce"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N. L."^^xsd:string; foaf:name "Virginia N. L. Franqueira"^^xsd:string; rdf:type foaf:Person . bibo:issn "10439463"; foaf:name "Policing and Society"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "2001.10274v2.pdf"^^xsd:string . rdfs:label "2001.10274v2.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #84635 \n\nUnifying graded and parameterised monads\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Unifying graded and parameterised monads (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Unifying graded and parameterised monads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Unifying graded and parameterised monads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Unifying graded and parameterised monads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Unifying graded and parameterised monads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Unifying graded and parameterised monads (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Monads are a useful tool for structuring effectful features of computation such as state, non-determinism, and continuations. In the last decade, several generalisations of monads have been suggested which provide a more fine-grained model of effects by replacing the single type constructor of a monad with an indexed family of constructors. Most notably, graded monads (indexed by a monoid) model effect systems and parameterised monads (indexed by pairs of pre- and post-conditions) model program logics. This paper studies the relationship between these two generalisations of monads via a third generalisation. This third generalisation, which we call category-graded monads, arises by generalising a view of monads as a particular special case of lax functors. A category-graded monad provides a family of functors T f indexed by morphisms f of some other category. This allows certain compositions of effects to be ruled out (in the style of a program logic) as well as an abstract description of effects (in the style of an effect system). Using this as a basis, we show how graded and parameterised monads can be unified, studying their similarities and differences along the way."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2020-05-01"; dct:isPartOf , ; dct:title "Unifying graded and parameterised monads"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . dct:title "Proceedings Eighth Workshop on Mathematically Structured Functional Programming, MSFP@ETAPS 2020"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Dublin, Ireland"^^xsd:string . foaf:familyName "Eades"^^xsd:string; foaf:givenName "Harley"^^xsd:string; foaf:name "Harley Eades"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wadler"^^xsd:string; foaf:givenName "Philip"^^xsd:string; foaf:name "Philip Wadler"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Orchard"^^xsd:string; foaf:givenName "Dominic"^^xsd:string; foaf:name "Dominic Orchard"^^xsd:string; rdf:type foaf:Person . foaf:name "Proceedings Eighth Workshop on Mathematically Structured Functiona Programming, MSFP@ETAPS 2020, Dublin, Ireland, 25th April 2020"^^xsd:string; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #73238 \n\nComparing enrichment analysis and machine learning for identifying gene properties that discriminate between gene classes\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Biologists very often use enrichment methods based on statistical hypothesis tests to identify gene properties that are significantly over-represented in a given set of genes of interest, by comparison with a ‘background’ set of genes. These enrichment methods, although based on rigorous statistical foundations, are not always the best single option to identify patterns in biological data. In many cases, one can also use classification algorithms from the machine-learning field. Unlike enrichment methods, classification algorithms are designed to maximize measures of predictive performance and are capable of analysing combinations of gene properties, instead of one property at a time. In practice, however, the majority of studies use either enrichment or classification methods (rather than both), and there is a lack of literature discussing the pros and cons of both types of method. The goal of this paper is to compare and contrast enrichment and classification methods, offering two contributions. First, we discuss the (to some extent complementary) advantages and disadvantages of both types of methods for identifying gene properties that discriminate between gene classes. Second, we provide a set of high-level recommendations for using enrichment and classification methods. Overall, by highlighting the strengths and the weaknesses of both types of methods we argue that both should be used in bioinformatics analyses."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "21"; dct:creator , , , ; dct:date "2020-05"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Comparing enrichment analysis and machine learning for identifying gene properties that discriminate between gene classes"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "Oxford University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palmer"^^xsd:string; foaf:givenName "Daniel"^^xsd:string; foaf:name "Daniel Palmer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Magalhaes"^^xsd:string; foaf:givenName "João Pedro"^^xsd:string; foaf:name "João Pedro de Magalhaes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fabris"^^xsd:string; foaf:givenName "Fabio"^^xsd:string; foaf:name "Fabio Fabris"^^xsd:string; rdf:type foaf:Person . bibo:issn "14774054"; foaf:name "Briefings in Bioinformatics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "IEEE-TCCB-2020-Pablo-Accepted.pdf"^^xsd:string . rdfs:label "IEEE-TCCB-2020-Pablo-Accepted.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81027 \n\nA Novel Feature Selection Method for Uncertain Features: An Application to the Prediction of Pro-/Anti- Longevity Genes\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Novel Feature Selection Method for Uncertain Features: An Application to the Prediction of Pro-/Anti- Longevity Genes (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Novel Feature Selection Method for Uncertain Features: An Application to the Prediction of Pro-/Anti- Longevity Genes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Novel Feature Selection Method for Uncertain Features: An Application to the Prediction of Pro-/Anti- Longevity Genes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Novel Feature Selection Method for Uncertain Features: An Application to the Prediction of Pro-/Anti- Longevity Genes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Novel Feature Selection Method for Uncertain Features: An Application to the Prediction of Pro-/Anti- Longevity Genes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Novel Feature Selection Method for Uncertain Features: An Application to the Prediction of Pro-/Anti- Longevity Genes (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Understanding the ageing process is a very challenging problem for biologists. To help in this task, there has been a growing use of classification methods (from machine learning) to learn models that predict whether a gene influences the process of ageing or promotes longevity. One type of predictive feature often used for learning such classification models is Protein-Protein Interaction (PPI) features. One important property of PPI features is their uncertainty, i.e., a given feature (PPI annotation) is often associated with a confidence score, which is usually ignored by conventional classification methods. Hence, we propose the Lazy Feature Selection for Uncertain Features (LFSUF) method, which is tailored for coping with the uncertainty in PPI confidence scores. In addition, following the lazy learning paradigm, LFSUF selects features for each instance to be classified, making the feature selection process more flexible. We show that our LFSUF method achieves better predictive accuracy when compared to other feature selection methods that either do not explicitly take PPI confidence scores into account or deal with uncertainty globally rather than using a per-instance approach. Also, we interpret the results of the classification process using the features selected by LFSUF, showing that the number of selected features is significantly reduced, assisting the interpretability of the results. The datasets used in the experiments and the program code of the LFSUF method are freely available on the web at http://github.com/pablonsilva/FSforUncertainFeatureSpaces."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2020-04-20"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A Novel Feature Selection Method for Uncertain Features: An Application to the Prediction of Pro-/Anti- Longevity Genes"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Plastino"^^xsd:string; foaf:givenName "Alexandre"^^xsd:string; foaf:name "Alexandre Plastino"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Da Silva"^^xsd:string; foaf:givenName "Pablo Nascimento"^^xsd:string; foaf:name "Pablo Nascimento Da Silva"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fabris"^^xsd:string; foaf:givenName "Fabio"^^xsd:string; foaf:name "Fabio Fabris"^^xsd:string; rdf:type foaf:Person . bibo:issn "15455963"; foaf:name "IEEE/ACM Transactions on Computational Biology and Bioinformatics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "09069949.pdf"^^xsd:string . rdfs:label "09069949.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81881 \n\nOn the unbearable lightness of FIPS 140-2 randomness tests\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "On the unbearable lightness of FIPS 140-2 randomness tests (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "On the unbearable lightness of FIPS 140-2 randomness tests (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the unbearable lightness of FIPS 140-2 randomness tests (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the unbearable lightness of FIPS 140-2 randomness tests (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the unbearable lightness of FIPS 140-2 randomness tests (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the unbearable lightness of FIPS 140-2 randomness tests (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Random number generation is critical to many applications. Gaming, gambling, and particularly cryptography all require random numbers that are uniform and unpredictable. For testing whether supposedly random sources feature particular characteristics commonly found in random sequences, batteries of statistical tests are used. These are fundamental tools in the evaluation of random number generators and form part of the pathway to certification of secure systems implementing them. Although there have been previous studies into this subject becker2013stealthy, RNG manufacturers and vendors continue to use statistical tests known to be of dubious reliability, in their RNG verification processes. Our research shows that FIPS-140-2 cannot identify adversarial biases effectively, even very primitive ones. Concretely, this work illustrates the inability of the FIPS 140 family of tests to detect bias in three obviously flawed PRNGs. Deprecated by official standards, these tests are nevertheless still widely used, for example in hardware-level self-test schemes incorporated into the design of many True RNGs (TRNGs). They are also popular with engineers and cryptographers for quickly assessing the randomness characteristics of security primitives and protocols, and even with manufacturers aiming to market the randomness features of their products to potential customers. In the following, we present three biased-by-design RNGs to show in explicit detail how simple, glaringly obvious biases are not detected by any of the FIPS 140-2 tests. One of these RNGs is backdoored, leaking key material, while others suffer from significantly reduced unpredictability in their output sequences. To make our point even more straightforward, we show how files containing images can also fool the FIPS 140 family of tests. We end with a discussion on the security issues affecting an interesting and active project to create a randomness beacon. Their authors only tested the quality of their randomness with the FIPS 140 family of tests, and we will show how this has led them to produce predictable output that, albeit passing FIPS fails other randomness tests quite catastrophically."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2020-04-17"; dct:isPartOf , ; dct:publisher ; dct:title "On the unbearable lightness of FIPS 140-2 randomness tests"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hurley-Smith"^^xsd:string; foaf:givenName "Darren"^^xsd:string; foaf:name "Darren Hurley-Smith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Patsakis"^^xsd:string; foaf:givenName "Constantinos"^^xsd:string; foaf:name "Constantinos Patsakis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio C."^^xsd:string; foaf:name "Julio C. Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . bibo:issn "15566013"; foaf:name "IEEE Transactions on Information Forensics and Security"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "tacas_with_orcid.pdf"^^xsd:string . rdfs:label "tacas_with_orcid.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80188 \n\nMind the Gap: Bit-vector Interpolation recast over Linear Integer Arithmetic\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Mind the Gap: Bit-vector Interpolation recast over Linear Integer Arithmetic (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Mind the Gap: Bit-vector Interpolation recast over Linear Integer Arithmetic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Mind the Gap: Bit-vector Interpolation recast over Linear Integer Arithmetic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Mind the Gap: Bit-vector Interpolation recast over Linear Integer Arithmetic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Mind the Gap: Bit-vector Interpolation recast over Linear Integer Arithmetic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Mind the Gap: Bit-vector Interpolation recast over Linear Integer Arithmetic (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "Much of an interpolation engine for bit-vector (BV) arithmetic can be constructed by observing that BV arithmetic can be modeled with linear integer arithmetic (LIA). Two BV formulae can thus be translated into two LIA formulae and then an interpolation engine for LIA used to derive an interpolant, albeit one expressed in LIA. The construction is completed by back-translating the LIA interpolant into a BV formula whose models coincide with those of the LIA interpolant. This paper develops a back-translation algorithm showing, for the first time, how back-translation can be universally applied, whatever the LIA interpolant. This avoids the need for deriving a BV interpolant by bit-blasting the BV formulae, as a backup process when back-translation fails. The new back-translation process relies on a novel geometric technique, called gapping, the correctness and practicality of which are demonstrated."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "12078"; dc:hasVersion ; dct:creator , ; dct:date "2020-04-17"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Mind the Gap: Bit-vector Interpolation recast over Linear Integer Arithmetic"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "26th International Conference, TACAS 2020"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Dublin, Ireland"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Okudono"^^xsd:string; foaf:givenName "Takamasa"^^xsd:string; foaf:name "Takamasa Okudono"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Biere"^^xsd:string; foaf:givenName "Armin"^^xsd:string; foaf:name "Armin Biere"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Parker"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Parker"^^xsd:string; rdf:type foaf:Person . foaf:familyName "King"^^xsd:string; foaf:givenName "Andy"^^xsd:string; foaf:name "Andy King"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "EuroUSEC-2020-Journalists-IoT-Risks.pdf"^^xsd:string . rdfs:label "EuroUSEC-2020-Journalists-IoT-Risks.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80999 \n\nSecurity should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Journalists have long been the targets of both physical and cyber-attacks from well-resourced adversaries. Internet of Things (IoT) devices are arguably a new avenue of threat towards journalists through both targeted and generalised cyber-physical exploitation. This study comprises three parts: First, we interviewed 11 journalists and surveyed 5 further journalists, to determine the extent to which journalists perceive threats through the IoT, particularly via consumer IoT devices. Second, we surveyed 34 cyber security experts to establish if and how lay-people can combat IoT threats. Third, we compared these findings to assess journalists' knowledge of threats, and whether their protective mechanisms would be effective against experts' depictions and predictions of IoT threats. Our results indicate that journalists generally are unaware of IoT-related risks and are not adequately protecting themselves; this considers cases where they possess IoT devices, or where they enter IoT-enabled environments (e.g., at work or home). Expert recommendations spanned both immediate and long-term mitigation methods, including practical actions that are technical and socio-political in nature. However, all proposed individual mitigation methods are likely to be short-term solutions, with 26 of 34 (76.5%) of cyber security experts responding that within the next five years it will not be possible for the public to opt-out of interaction with the IoT."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2020-04-12"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences (General)"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "5th European Workshop on Usable Security (EuroUSEC 2020)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Genova, Italy"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Flechais"^^xsd:string; foaf:givenName "Ivan"^^xsd:string; foaf:name "Ivan Flechais"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Shere"^^xsd:string; foaf:givenName "Anjuli R. K."^^xsd:string; foaf:name "Anjuli R. K. Shere"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #84610 \n\nPose Estimation from Electromyographical Data using Convolutional Neural Networks\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "This work demonstrates the effectiveness of Convolutional Neural Networks in the task of pose estimation from Electromyographical (EMG) data. The Ninapro DB5 dataset was used to train the model to predict the hand pose from EMG data. The models predict the hand pose with an error rate of 4.6 for the EMG model, and 3.6 when accelerometry data is included. This shows that hand pose can be effectively estimated from EMG data, which can be enhanced with accelerometry data."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , , ; dct:date "2020-04-10"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Pose Estimation from Electromyographical Data using Convolutional Neural Networks"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "2020 42nd Annual International Conference of the IEEE Engineering in Medicine Biology Society (EMBC)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Montreal, Quebec, Canada"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ayling"^^xsd:string; foaf:givenName "Robin"^^xsd:string; foaf:name "Robin Ayling"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Johnson"^^xsd:string; foaf:givenName "Colin G."^^xsd:string; foaf:name "Colin G. Johnson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . bibo:issn "23757477"; foaf:name "2020 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC)"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "1-s2.0-S2666281720300184-main.pdf"^^xsd:string . rdfs:label "1-s2.0-S2666281720300184-main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79313 \n\nTowards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Digital forensic practitioners are increasingly facing examinations which are both complex in nature and structure. Throughout this process, during the examination and analysis phases, the practitioner is constantly drawing logical inferences which will be reflected in the reporting of results. Therefore, it is important to expose how all the elements of an investigation fit together to allow review and scrutiny, and to support associated parties to understand the components within it. This paper proposes the use of ‘Structured Argumentation’ as a valuable and flexible ingredient of the practitioners’ thinking toolbox. It explores this approach using three case examples which allow discussion of the benefits and application of structured argumentation to real world contexts. We argue that, despite requiring a short learning curve, structured argumentation is a practical method which promotes accessibility of findings facilitating communication between technical and legal parties, peer review, logical reconstruction, jury interpretation, and error detection."^^xsd:string; bibo:authorList ; bibo:issue "Suppl."; bibo:status , ; bibo:volume "32"; dc:hasVersion , ; dct:creator , ; dct:date "2020-04"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Horsman"^^xsd:string; foaf:givenName "Graeme"^^xsd:string; foaf:name "Graeme Horsman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N.L."^^xsd:string; foaf:name "Virginia N.L. Franqueira"^^xsd:string; rdf:type foaf:Person . bibo:issn "17422876"; foaf:name "Forensic Science International: Digital Investigation"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "submit-ccnc2020DCedited.pdf"^^xsd:string . rdfs:label "submit-ccnc2020DCedited.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81365 \n\nA User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "We present a user-centric and decentralized digital identity system that allows anyone to easily benefit from an enriched digital identity made of multi-purpose and multi-origin attributes. It increases usability by the elimination of user passwords. It also makes this digital identity highly trustworthy both for the user (in terms of privacy and sovereignty) and the service provider who requires highly certified information about the user being enrolled to and/or authenticated on its services. We built our system based on the Universal Authentication Framework specified by the FIDO Alliance and the data model proposed by the W3C Verifiable Credentials WG. The whole system has been implemented in a banking scenario."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2020-03-26"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework"^^xsd:string; ep:hasDocument , , , , , ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Las Vagas"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Wazan"^^xsd:string; foaf:givenName "Ahmad Samer"^^xsd:string; foaf:name "Ahmad Samer Wazan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Oglaza"^^xsd:string; foaf:givenName "Arnaud"^^xsd:string; foaf:name "Arnaud Oglaza"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Barrere"^^xsd:string; foaf:givenName "Francois"^^xsd:string; foaf:name "Francois Barrere"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Benzekri"^^xsd:string; foaf:givenName "Abdelmalek"^^xsd:string; foaf:name "Abdelmalek Benzekri"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chadwick"^^xsd:string; foaf:givenName "David W."^^xsd:string; foaf:name "David W. Chadwick"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Venant"^^xsd:string; foaf:givenName "Remi"^^xsd:string; foaf:name "Remi Venant"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Laborde"^^xsd:string; foaf:givenName "Romain"^^xsd:string; foaf:name "Romain Laborde"^^xsd:string; rdf:type foaf:Person . bibo:issn "23319860"; foaf:name "2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "main.pdf"^^xsd:string . rdfs:label "main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80588 \n\nBounded verification of message-passing concurrency in Go using Promela and Spin\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Bounded verification of message-passing concurrency in Go using Promela and Spin (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Bounded verification of message-passing concurrency in Go using Promela and Spin (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bounded verification of message-passing concurrency in Go using Promela and Spin (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bounded verification of message-passing concurrency in Go using Promela and Spin (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bounded verification of message-passing concurrency in Go using Promela and Spin (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Bounded verification of message-passing concurrency in Go using Promela and Spin (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "This paper describes a static verification framework for the message-passing fragment of the Go programming language. Our framework extracts models that over-approximate the message-passing behaviour of a program. These models, or behavioural types, are encoded in Promela, hence can be efficiently verified with Spin. We improve on previous works by verifying programs that include communication-related parameters that are unknown at compile-time, i.e., programs that spawn a parameterised number of threads or that create channels with a parameterised capacity. These programs are checked via a bounded verification approach with bounds provided by the user."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2020-03-13"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Bounded verification of message-passing concurrency in Go using Promela and Spin"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "12th Workshop on Programming Language Approaches to Concurrency- & Communication-cEntric Software"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Dublin, Ireland"^^xsd:string . foaf:name "EPTCS"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Lange"^^xsd:string; foaf:givenName "Julien"^^xsd:string; foaf:name "Julien Lange"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dilley"^^xsd:string; foaf:givenName "Nicolas"^^xsd:string; foaf:name "Nicolas Dilley"^^xsd:string; rdf:type foaf:Person . foaf:name "PLACES 2020"^^xsd:string; rdf:type bibo:Collection . rdfs:label "paper.pdf"^^xsd:string . rdfs:label "paper.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81976 \n\nType Debugging with Counter-Factual Type Error Messages Using an Existing Type Checker\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Type Debugging with Counter-Factual Type Error Messages Using an Existing Type Checker (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Type Debugging with Counter-Factual Type Error Messages Using an Existing Type Checker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Type Debugging with Counter-Factual Type Error Messages Using an Existing Type Checker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Type Debugging with Counter-Factual Type Error Messages Using an Existing Type Checker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Type Debugging with Counter-Factual Type Error Messages Using an Existing Type Checker (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Type Debugging with Counter-Factual Type Error Messages Using an Existing Type Checker (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The cause of a type error can be very difficult to find for the Hindley-Milner type system. Consequently many solutions have been proposed, but they are hardly used in practice. Here we propose a new solution that provides counter-factual type error messages; these messages state what types specific subexpressions in a program should have (in contrast to the types they actually have) to remove a type error. Such messages are easy-to-understand, because\r\nprogramers are already familiar with them. Furthermore, our solution is easy-to-implement, because it reuses an existing type checker as a subroutine. We transform an ill-typed program into a well-typed program with additional λ-bound variables. The types of these λ-bound variables yield actual and counter-factual type information. That type information plus intended types added as type annotations direct the search of the type debugger."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2020-03-08"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Type Debugging with Counter-Factual Type Error Messages Using an Existing Type Checker"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "IFL 2019: 31st Symposium on Implementation and Application of Functional Languages"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Singapore"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Sharrad"^^xsd:string; foaf:givenName "Joanna"^^xsd:string; foaf:name "Joanna Sharrad"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tsushima"^^xsd:string; foaf:givenName "Kanae"^^xsd:string; foaf:name "Kanae Tsushima"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chitil"^^xsd:string; foaf:givenName "Olaf"^^xsd:string; foaf:name "Olaf Chitil"^^xsd:string; rdf:type foaf:Person . rdfs:label "An economic analysis of ransomware and its welfare consequences.pdf"^^xsd:string . rdfs:label "An economic analysis of ransomware and its welfare consequences.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80658 \n\nAn economic analysis of ransomware and its welfare consequences\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An economic analysis of ransomware and its welfare consequences (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An economic analysis of ransomware and its welfare consequences (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An economic analysis of ransomware and its welfare consequences (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An economic analysis of ransomware and its welfare consequences (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An economic analysis of ransomware and its welfare consequences (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An economic analysis of ransomware and its welfare consequences (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "We present in this work an economic analysis of ransomware, a relatively new form of cyber-enabled extortion. We look at how the illegal gains of the criminals will depend on the strategies they use, examining uniform pricing and price discrimination. We also explore the welfare costs to society of such strategies. In addition, we present the results of a pilot survey which demonstrate proof of concept in evaluating the costs of ransomware attacks. We discuss at each stage whether the different strategies we analyse have been encountered already in existing malware, and the likelihood of them being implemented in the future. We hope this work will provide some useful insights for predicting how ransomware may evolve in the future."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "7"; dc:hasVersion ; dct:creator , , ; dct:date "2020-03-04"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "An economic analysis of ransomware and its welfare consequences"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "Royal Society"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Cartwright"^^xsd:string; foaf:givenName "E."^^xsd:string; foaf:name "E. Cartwright"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cartwright"^^xsd:string; foaf:givenName "A."^^xsd:string; foaf:name "A. Cartwright"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "J."^^xsd:string; foaf:name "J. Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . bibo:issn "20545703"; foaf:name "Royal Society Open Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "SEAMS-ICSE-SEAMS-73.pdf"^^xsd:string . rdfs:label "SEAMS-ICSE-SEAMS-73.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80988 \n\nHuman in the Loop: What is the Point of no Return?\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Human in the Loop: What is the Point of no Return? (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Human in the Loop: What is the Point of no Return? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human in the Loop: What is the Point of no Return? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human in the Loop: What is the Point of no Return? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human in the Loop: What is the Point of no Return? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human in the Loop: What is the Point of no Return? (Other)"^^xsd:string . rdf:_1 . bibo:abstract "The main goal of any feedback control system is essentially to remove humans from the loop.\r\nThis has always been the goal in the engineering of control systems.\r\nThe MAPE-K loop is the embodiment of a feedback control loop in self-adaptive software systems, but the complete removal of humans from the control loop has not been thoroughly debated.\r\nOne of the reasons is that, software systems are social-technical systems, and as such, humans need to be considered right from the inception of such systems, otherwise their deployment is bound to fail.\r\nHowever, as software self-adaptation progresses, enabling to place higher assurances on the deployment of these systems to the point humans become dispensable, some ethical questions need to be raised.\r\nSimilar questions have been raised in past when the first automatic systems became intrinsic to the industrial fabric. The difference between then and now is that then the impact was confined to portions of the society, but now the implications are much wider, if we consider, in particular, software systems that are able to change themselves. If humans are not aware of those changes, and their implications, humans cease to be in tune with the system they are operating, and inevitably accidents will ensue. The point of no return in self-adaptive software systems refers to the moment in their technical maturity when any human involvement with the operation of a system is perceived to create more harm than benefit. Confronted with this situation, software engineers need start asking themselves some basic ethical questions. Do we really need to consider humans as an integral part of self-adaptive software systems? If humans are removed from the control loop, what kind of assurances will be needed for society to accept such systems?"^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator ; dct:date "2020-03-04"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Human in the Loop: What is the Point of no Return?"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2020)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Seoul, South Korea"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "de Lemos"^^xsd:string; foaf:givenName "Rogério"^^xsd:string; foaf:name "Rogério de Lemos"^^xsd:string; rdf:type foaf:Person . rdfs:label "tyaa004.pdf"^^xsd:string . rdfs:label "tyaa004.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79587 \n\nData Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Security practitioners working in Security Operations Centres (SOCs) are responsible for detecting and mitigating malicious computer-network activity. This work requires both automated tools that detect and prevent attacks, and data-presentation tools that can present pertinent network-security monitoring information to practitioners in an efficient and comprehensible manner. In recent years, advances have been made in the development of visual approaches to data presentation, with some uptake of advanced security visualization tools in SOCs. Sonification, in which data is represented as sound, is said to have potential as an approach that could work alongside existing visual data-presentation approaches to address some of the unique challenges faced by SOCs. For example, sonification has been shown to enable peripheral monitoring of processes, which could aid practitioners multitasking in busy SOCs. The perspectives of security practitioners on incorporating sonification into their actual working environments have not yet been examined, however. The aim of this paper therefore is to address this gap by exploring attitudes to using sonification in SOCs, and identifying the data-presentation approaches currently used. We report on the results of a study consisting of an online survey (N=20) and interviews (N=21) with security practitioners working in a range of different SOCs. Our contributions are (1) a refined appreciation of the contexts in which sonification could aid in SOC working practice, (2) an understanding of the areas in which sonification may not be beneficial or may even be problematic, (3) an analysis of the critical requirements for the design of sonification systems and their integration into the SOC setting, and (4) evidence of the visual data-presentation techniques currently used and identification of how sonification might work alongside and address challenges to using them. Our findings clarify insights into the potential benefits and challenges of introducing sonification to support work in this vital security-monitoring environment. Participants saw potential value in using sonification systems to aid in anomaly-detection tasks in SOCs (such as retrospective hunting), as well as in situations in which peripheral monitoring is desirable: while multitasking with multiple work tasks, or while outside of the SOC."^^xsd:string; bibo:authorList ; bibo:issue "1"; bibo:status , ; bibo:volume "6"; dc:hasVersion , ; dct:creator , , , , ; dct:date "2020-02-28"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Oxford University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Goldsmith"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Goldsmith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Alahmadi"^^xsd:string; foaf:givenName "Bushra"^^xsd:string; foaf:name "Bushra Alahmadi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Creese"^^xsd:string; foaf:givenName "Sadie"^^xsd:string; foaf:name "Sadie Creese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Axon"^^xsd:string; foaf:givenName "Louise"^^xsd:string; foaf:name "Louise Axon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R.C."^^xsd:string; foaf:name "Jason R.C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "20572085"; foaf:name "Journal of Cybersecurity"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90182 \n\nA self‐adaptive synthetic over‐sampling technique for imbalanced classification\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Traditionally, in supervised machine learning, (a significant) part of the available data (usually 50%-80%) is used for training and the rest—for validation. In many problems, however, the data are highly imbalanced in regard to different classes or does not have good coverage of the feasible data space which, in turn, creates problems in validation and usage phase. In this paper, we propose a technique for synthesizing feasible and likely data to help balance the classes as well as to boost the performance in terms of confusion matrix as well as overall. The idea, in a nutshell, is to synthesize data samples in close vicinity to the actual data samples specifically for the less represented (minority) classes. This has also implications to the so-called fairness of machine learning. In this paper, we propose a specific method for synthesizing data in a way to balance the classes and boost the performance, especially of the minority classes. It is generic and can be applied to different base algorithms, for example, support vector machines, k-nearest neighbour classifiers deep neural, rule-based classifiers, decision trees, and so forth. The results demonstrated that (a) a significantly more balanced (and fair) classification results can be achieved and (b) that the overall performance as well as the performance per class measured by confusion matrix can be boosted. In addition, this approach can be very valuable for the cases when the number of actual available labelled data is small which itself is one of the problems of the contemporary machine learning."^^xsd:string; bibo:authorList ; bibo:issue "6"; bibo:status , ; bibo:volume "35"; dct:creator , , ; dct:date "2020-02-23"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A self‐adaptive synthetic over‐sampling technique for imbalanced classification"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Wiley"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P."^^xsd:string; foaf:name "Plamen P. Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Soares"^^xsd:string; foaf:givenName "Eduardo A."^^xsd:string; foaf:name "Eduardo A. Soares"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "08848173"; foaf:name "International Journal of Intelligent Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Selective_Forwarding_Attack_on_IoT_Home_Security_Kits.pdf"^^xsd:string . rdfs:label "Selective_Forwarding_Attack_on_IoT_Home_Security_Kits.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #75895 \n\nSelective Forwarding Attack on IoT Home Security Kits\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Selective Forwarding Attack on IoT Home Security Kits (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Selective Forwarding Attack on IoT Home Security Kits (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Selective Forwarding Attack on IoT Home Security Kits (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Selective Forwarding Attack on IoT Home Security Kits (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Selective Forwarding Attack on IoT Home Security Kits (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Selective Forwarding Attack on IoT Home Security Kits (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Efforts have been made to improve the security of the Internet of Things (IoT) devices, but there remain some vulnerabilities and misimplementations. This paper describes a new threat to home security devices in which an attacker can disable all functionality of a device, but to the device’s owner, everything still appears to be operational. We targeted home security devices because their security is critical as people may rely on them to protect their homes. In particular, we exploited a feature called “heartbeat”, which is exchanged between the devices and the cloud in order to check that the devices are still connected. Even though network traffic was encrypted, we successfully identified the heartbeats due to their fixed size and periodic nature. Thereafter, we established a man-in-the-middle attack between the device and the cloud and selectively forwarded heartbeats while filtering out other traffic. As a result, the device appears to be still connected (because the heartbeat traffic is being allowed through), while in reality the device’s functionality is disabled (because non-heartbeat traffic is being filtered out). We applied this exploit on a set of six devices, and five were found to be vulnerable. Consequently, an intruder can use this exploit to disable a home security device and break into a house without the awareness of the owner. We carried out a responsible disclosure exercise with the manufacturers of the affected devices, but the response has been limited. This shows that IoT security is still not taken completely seriously and many threats are still undiscovered. Finally, we provide some recommendations on how to detect and prevent the threats posed by insecure IoT devices, which ironically include IoT home security kits."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2020-02-22"; dct:isPartOf , ; dct:publisher ; dct:title "Selective Forwarding Attack on IoT Home Security Kits"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "2nd International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Luxembourg City, Luxembourg,"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hariri"^^xsd:string; foaf:givenName "Ali"^^xsd:string; foaf:name "Ali Hariri"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Giannelos"^^xsd:string; foaf:givenName "Nicolas"^^xsd:string; foaf:name "Nicolas Giannelos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Arief"^^xsd:string; foaf:givenName "Budi"^^xsd:string; foaf:name "Budi Arief"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90179 \n\nParticle Swarm Optimized Autonomous Learning Fuzzy System\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The antecedent and consequent parts of a first-order evolving intelligent system (EIS) determine the validity of the learning results and overall system performance. Nonetheless, the state-of-the-art techniques mostly stress on the novelty from the system identification point of view but pay less attention to the optimality of the learned parameters. Using the recently introduced autonomous learning multiple model (ALMMo) system as the implementation basis, this article introduces a particle swarm-based approach for the EIS optimization. The proposed approach is able to simultaneously optimize the antecedent and consequent parameters of ALMMo and effectively enhance the system performance by iteratively searching for optimal solutions in the problem spaces. In addition, the proposed optimization approach does not adversely influence the ``one pass'' learning ability of ALMMo. Once the optimization process is complete, ALMMo can continue to learn from new data to incorporate unseen data patterns recursively without full retraining. The experimental studies with a number of real-world benchmark problems validate the proposed concept and general principles. It is also verified that the proposed optimization approach can be applied to other types of EISs with similar operating mechanisms."^^xsd:string; bibo:authorList ; bibo:status , ; dct:creator , , ; dct:date "2020-02-20"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Particle Swarm Optimized Autonomous Learning Fuzzy System"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Shen"^^xsd:string; foaf:givenName "Qiang"^^xsd:string; foaf:name "Qiang Shen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P."^^xsd:string; foaf:name "Plamen P. Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "21682267"; foaf:name "IEEE Transactions on Cybernetics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "rsif.2019.0819.pdf"^^xsd:string . rdfs:label "rsif.2019.0819.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #70473 \n\nHidden patterns of codon usage bias across kingdoms\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Hidden patterns of codon usage bias across kingdoms (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Hidden patterns of codon usage bias across kingdoms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Hidden patterns of codon usage bias across kingdoms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Hidden patterns of codon usage bias across kingdoms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Hidden patterns of codon usage bias across kingdoms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Hidden patterns of codon usage bias across kingdoms (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "The genetic code encodes 20 amino acids using 64 nucleotide triplets or codons. 18 of the 20 amino acids are encoded by multiple synonymous codons which are used in organismal genomes in a biased fashion. Codon bias arises because evolutionary selection favours particular nucleotide sequences over others encoding the same amino acid sequence. Despite many existing hypotheses, there is no current consensus on what the evolutionary drivers are. Using ideas from stochastic thermodynamics we derive from first principles a mathematical model describing the statistics of codon usage bias and apply it to extensive genomic data. Our main conclusions include the following findings: (1) Codon usage cannot be explained solely by selection pressures that act on the genome-wide frequency of codons, but also includes pressures that act at the level of individual genes. (2) Codon usage is not only biased in the usage frequency of nucleotide triplets but also in how they are distributed across mRNAs. (3) A new model-based measure of codon usage bias that extends existing measures by taking into account both codon frequency and codon distribution reveals distinct, amino acid specific patterns of selection in distinct branches of the tree of life."^^xsd:string; bibo:authorList ; bibo:issue "163"; bibo:status , ; bibo:volume "17"; dc:hasVersion ; dct:creator , , , , ; dct:date "2020-02-19"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Hidden patterns of codon usage bias across kingdoms"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "Royal Society"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Kalfon"^^xsd:string; foaf:givenName "Jeremie"^^xsd:string; foaf:name "Jeremie Kalfon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chu"^^xsd:string; foaf:givenName "Dominique"^^xsd:string; foaf:name "Dominique Chu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fabio"^^xsd:string; foaf:givenName "de Lima-Hedayioglu"^^xsd:string; foaf:name "de Lima-Hedayioglu Fabio"^^xsd:string; rdf:type foaf:Person . foaf:familyName "von der Haar"^^xsd:string; foaf:givenName "Tobias"^^xsd:string; foaf:name "Tobias von der Haar"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Deng"^^xsd:string; foaf:givenName "Yun"^^xsd:string; foaf:name "Yun Deng"^^xsd:string; rdf:type foaf:Person . bibo:issn "17425689"; foaf:name "Journal of the Royal Society Interface"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #80313 \n\nThe Art, Science, and Engineering of Programming\n\n"; foaf:primaryTopic . rdf:_1 . ; bibo:editorList ; bibo:issue "3"; bibo:status ; bibo:volume "4"; dct:date "2020-02-17"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "The Art, Science, and Engineering of Programming"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, ep:EPrint, ep:EdjournalEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "AOSA"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . bibo:issn "24737321"; foaf:name "The Art, Science, and Engineering of Programming"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "CC2020_paper_9.pdf"^^xsd:string . rdfs:label "CC2020_paper_9.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80484 \n\nRole-Based Perceptions of Computer Participants in Human-Computer Co-Creativity\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Role-Based Perceptions of Computer Participants in Human-Computer Co-Creativity (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Role-Based Perceptions of Computer Participants in Human-Computer Co-Creativity (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Role-Based Perceptions of Computer Participants in Human-Computer Co-Creativity (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Role-Based Perceptions of Computer Participants in Human-Computer Co-Creativity (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Role-Based Perceptions of Computer Participants in Human-Computer Co-Creativity (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Role-Based Perceptions of Computer Participants in Human-Computer Co-Creativity (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "The purpose of this ongoing research is to better un- derstand the potential contributions that computers can play in sit- uations where people interact with computers towards creative pur- suits and goals. Past research has provided sets of definitions of dif- ferent roles that a computer plays in human-computer creative col- laboration. Thus far, we look into the advantages and limitations of having such roles. In particular, this paper contributes an analysis and categorisation of the coverage of existing role classifications for computational participants in co-creativity. This analysis is comple- mented by a comparative review of the use of roles to understand and structure creative collaboration between people only (i.e. without any computational participants involved). Our wider project investigates whether these defined sets of roles are a. adequate and b. helpful for understanding the perception of computational contributions in co-creativity, with a study planned to investigate the roles of current systems in practice. This project considers both co-creative computer systems that currently exist, and systems that could potentially exist in the future. Our goal is to reach a point where the perception of what is possible in human-computer co-creative collaboration is en- abled and boosted (but not constrained) by a definitive set of roles."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2020-02-12"; dct:isPartOf ; dct:publisher ; dct:subject , , , ; dct:title "Role-Based Perceptions of Computer Participants in Human-Computer Co-Creativity"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76.I59 Interactive media, hypermedia"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "7th Computational Creativity Symposium at AISB 2020"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "London"^^xsd:string . foaf:name "AISB"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Kantosalo"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Kantosalo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jordanous"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Jordanous"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #80296 \n\nMATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "MATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data (Archive (ZIP))"^^xsd:string . rdf:type bibo:Document, ep:Document; rdfs:label "MATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "MATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "MATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "MATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "MATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "MATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "This is a research prototype system developed using MATLAB to demonstrate the automatic detection of vehicle convoys based on ANPR (Automated Number Plate Recognition) data. It was originally developed at the University of Surrey as part of an Innovate UK funded project POLARBEAR (https://gtr.ukri.org/projects?ref=101949). The IPRs are being transferred to the University of Kent in 2020."^^xsd:string; bibo:authorList ; bibo:status ; dct:creator , ; dct:date "2020-02-12"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "MATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data"^^xsd:string; ep:hasDocument , , , , , , ; ep:hasOther ; rdf:type bibo:Article, ep:EPrint, ep:SoftwareEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . foaf:name "NA"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Yuan"^^xsd:string; foaf:givenName "Haiyue"^^xsd:string; foaf:name "Haiyue Yuan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . rdfs:label "CompSec2020.pdf"^^xsd:string . rdfs:label "CompSec2020.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80266 \n\nAll about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "CAPTCHAs are security mechanisms that try to prevent automated abuse of computer services. Many CAPTCHAs have been proposed but most have known security flaws against advanced attacks. In order to avoid a kind of oracle attacks in which the attacker learns about ground truth labels via active interactions with the CAPTCHA service as an oracle, Kwon and Cha proposed a new CAPTCHA scheme that employ uncertainties and trap images to generate adaptive CAPTCHA challenges, which we call “Uncertainty and Trap Strengthened CAPTCHA” (UTS-CAPTCHA) in this paper. Adaptive CAPTCHA challenges are used widely (either explicitly or implicitly) but the role of such adaptive mechanisms in the security of CAPTCHAs has received little attention from researchers. In this paper we present a statistical fundamental design flaw of UTS-CAPTCHA. This flaw leaks information regarding ground truth labels of images used. Exploiting this flaw, an attacker can use the UTS-CAPTCHA service as an oracle, and perform several different statistical learning-based attacks against UTS-CAPTCHA, increasing any reasonable initial success rate up to 100% according to our theoretical estimation and experimental simulations. Based on our proposed attacks, we discuss how the fundamental idea behind our attacks may be generalized to attack other CAPTCHA schemes and propose a new principle and a number of concrete guidelines for designing new CAPTCHA schemes in the future."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "92"; dc:hasVersion ; dct:creator , , ; dct:date "2020-02-10"; dct:isPartOf , ; dct:publisher ; dct:subject , , , , ; dct:title "All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.875.I57 Internet"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.888 World Wide Web"@en . rdf:type skos:Concept; skos:prefLabel "TK7882.P3 Pattern recognition systems"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hernández-Castro"^^xsd:string; foaf:givenName "Carlos Javier"^^xsd:string; foaf:name "Carlos Javier Hernández-Castro"^^xsd:string; rdf:type foaf:Person . foaf:familyName "R-Moreno"^^xsd:string; foaf:givenName "María D."^^xsd:string; foaf:name "María D. R-Moreno"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . bibo:issn "01674048"; foaf:name "Computers & Security"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90647 \n\nOn the expressiveness and semantics of information flow types\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "Information Flow Control (IFC) is a form of dependence analysis that tracks and prohibits dependence of public outputs on secret inputs. Such a dependence analysis is often carried out using a type system. IFC type systems can track dependence (via confidentiality labels) at varying levels of granularity. On one extreme, there are fine-grained type systems that track dependence at the level of individual values. They label individual values. On the other extreme, there are coarse-grained type systems that track dependence at the level of entire computations. These type systems do not label individual values but instead label entire sub-computations. An important foundational question is one of the relative expressiveness of these two classes of IFC type systems. In this paper we show that, despite the glaring differences in how they track dependence, the two classes of type systems are actually equally expressive. We do this by showing translations from FG, a fine-grained IFC type system derived from SLAM (In Proceedings of the ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL) (1998)), to SLIO∗, a coarse-grained IFC type system derived from HLIO (In Proceedings of the ACM SIGPLAN International Conference on Functional Programming (ICFP) (2015)), and vice-versa. The translation from SLIO∗ to FG is straightforward since FG tracks dependence at a granularity finer than SLIO∗ does. However, the translation from FG to SLIO∗ is quite involved and relies extensively on label quantification. We further examine the reason for this complexity using a slight variant of SLIO∗, called CG, to which FG can be translated more easily. As a separate, more foundational contribution we show how to extend logical relation models of information flow to languages with higher-order state. Specifically, we build world-indexed (Kripke) logical relations for FG, SLIO∗ and CG, which we use to prove these type systems sound and also to prove the translations between them correct."^^xsd:string; bibo:authorList ; bibo:issue "1"; bibo:status , ; bibo:volume "28"; dct:creator , ; dct:date "2020-02-04"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "On the expressiveness and semantics of information flow types"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "IOS Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Garg"^^xsd:string; foaf:givenName "Deepak"^^xsd:string; foaf:name "Deepak Garg"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rajani"^^xsd:string; foaf:givenName "Vineet"^^xsd:string; foaf:name "Vineet Rajani"^^xsd:string; rdf:type foaf:Person . bibo:issn "18758924"; foaf:name "Journal of Computer Security"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Alberto_Evidence_Accum_Submitted_Draft.pdf"^^xsd:string . rdfs:label "Alberto_Evidence_Accum_Submitted_Draft.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77074 \n\nOn the limits of evidence accumulation of the preconscious percept\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "On the limits of evidence accumulation of the preconscious percept (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "On the limits of evidence accumulation of the preconscious percept (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the limits of evidence accumulation of the preconscious percept (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the limits of evidence accumulation of the preconscious percept (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the limits of evidence accumulation of the preconscious percept (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the limits of evidence accumulation of the preconscious percept (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "When a stimulus is repeated the memory representation for that stimulus is strengthened and performance in memory tests increases. To what extent this effect requires that each exposure elicits a fully-fledged conscious percept? In two Rapid Serial Visual Presentation (RSVP) experiments we explored whether the memory representations for words would accumulate evidence trough repeated exposure when none of those presentations induced a conscious percept. Participants were instructed to identify repeated items inserted in different RSVP streams and we isolated the first instance that an item was consciously perceived as repeating. The results showed that the probability of detecting a repetition for the first time was constant across repetitions. This effect signals a limit to the evidence accumulation process through repeated exposure. We discuss whether conscious perception modulates the decay of memory representations with below-threshold items resulting in extremely fleeting memory representations."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "195"; dc:hasVersion ; dct:creator , , ; dct:date "2020-02"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "On the limits of evidence accumulation of the preconscious percept"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "RC321 Neuroscience. Biological psychiatry. Neuropsychiatry"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Wyble"^^xsd:string; foaf:givenName "Brad"^^xsd:string; foaf:name "Brad Wyble"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Aviles"^^xsd:string; foaf:givenName "Alberto"^^xsd:string; foaf:name "Alberto Aviles"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . bibo:issn "00100277"; foaf:name "Cognition"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "08972601.pdf"^^xsd:string . rdfs:label "08972601.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80213 \n\nTowards a Framework for Capturing Interpretability of Hierarchical Fuzzy Systems - A Participatory Design Approach\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Towards a Framework for Capturing Interpretability of Hierarchical Fuzzy Systems - A Participatory Design Approach (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Towards a Framework for Capturing Interpretability of Hierarchical Fuzzy Systems - A Participatory Design Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards a Framework for Capturing Interpretability of Hierarchical Fuzzy Systems - A Participatory Design Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards a Framework for Capturing Interpretability of Hierarchical Fuzzy Systems - A Participatory Design Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards a Framework for Capturing Interpretability of Hierarchical Fuzzy Systems - A Participatory Design Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards a Framework for Capturing Interpretability of Hierarchical Fuzzy Systems - A Participatory Design Approach (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Hierarchical fuzzy systems (HFSs) have been shown to have the potential to improve the interpretability of fuzzy logic systems (FLSs). However, challenges remain, such as: \"How can we measure their interpretability?\", \"How can we make an informed assessment of how HFSs should be designed to enhance interpretability?\". The challenges of measuring the interpretability of HFSs include issues such as their topological structure, the number of layers, the meaning of intermediate variables, and so on. In this paper, an initial framework to measure the interpretability of HFSs is proposed, combined with a participatory user design process to create a specific instance of the framework for an application context. This approach enables the subjective views of a range of practitioners, experts in the design and creation of FLSs, to be taken into account in shaping the design of a generic framework for measuring interpretability in HFSs. This design process and framework are demonstrated through two classification application examples, showing the ability of the resulting index to appropriately capture interpretability as perceived by system design experts."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2020-01-28"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Towards a Framework for Capturing Interpretability of Hierarchical Fuzzy Systems - A Participatory Design Approach"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Pourabdollah"^^xsd:string; foaf:givenName "Amir"^^xsd:string; foaf:name "Amir Pourabdollah"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Razak"^^xsd:string; foaf:givenName "Tajul Rosli"^^xsd:string; foaf:name "Tajul Rosli Razak"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Garibaldi"^^xsd:string; foaf:givenName "Jonathan M."^^xsd:string; foaf:name "Jonathan M. Garibaldi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Soria"^^xsd:string; foaf:givenName "Daniele"^^xsd:string; foaf:name "Daniele Soria"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wagner"^^xsd:string; foaf:givenName "Christian"^^xsd:string; foaf:name "Christian Wagner"^^xsd:string; rdf:type foaf:Person . bibo:issn "10636706"; foaf:name "IEEE Transactions on Fuzzy Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "phishcatch2019.pdf"^^xsd:string . rdfs:label "phishcatch2019.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #75746 \n\nCatching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs)\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs) (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs) (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs) (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs) (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs) (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs) (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The emergence of online services in our daily lives has been accompanied by a range of malicious attempts to trick individuals into performing undesired actions, often to the benefit of the adversary. The most popular medium of these attempts is phishing attacks, particularly through emails and websites. In order to defend against such attacks, there is an urgent need for automated mechanisms to identify this malevolent content before it reaches users. Machine learning techniques have gradually become the standard for such classification problems. However, identifying common measurable features of phishing content (e.g., in emails) is notoriously difficult. To address this problem, we engage in a novel study into a phishing content classifier based on a recurrent neural network (RNN), which identifies such features without human input. At this stage, we scope our research to emails, but our approach can be extended to apply to websites. Our results show that the proposed system outperforms state-of-the-art tools. Furthermore, our classifier is efficient and takes into account only the text and, in particular, the textual structure of the email. Since these features are rarely considered in email classification, we argue that our classifier can complement existing classifiers with high information gain."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "11897"; dc:hasVersion ; dct:creator , , ; dct:date "2020-01-25"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs)"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "20th World Conference on Information Security Applications (WISA 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Jeju Island, South Korea"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Agrafiotis"^^xsd:string; foaf:givenName "Ioannis"^^xsd:string; foaf:name "Ioannis Agrafiotis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Halgas"^^xsd:string; foaf:givenName "Lukas"^^xsd:string; foaf:name "Lukas Halgas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "Creative_Autonomy_in_a_Simple_Interactive_Music_System (1).pdf"^^xsd:string . rdfs:label "Creative_Autonomy_in_a_Simple_Interactive_Music_System (1).pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79402 \n\nCreative Autonomy in a Simple Interactive Music System\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Creative Autonomy in a Simple Interactive Music System (XML Word Processing Document (DOCX))"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Creative Autonomy in a Simple Interactive Music System (Other)"^^xsd:string . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Creative Autonomy in a Simple Interactive Music System (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Creative Autonomy in a Simple Interactive Music System (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Creative Autonomy in a Simple Interactive Music System (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Creative Autonomy in a Simple Interactive Music System (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Creative Autonomy in a Simple Interactive Music System (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Creative Autonomy in a Simple Interactive Music System (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Interactive music systems always exhibit an amount of autonomy in the creative process. The capacity to generate material that is primary, contextual and novel to the outcome is proposed here as the bare minimum for creative autonomy in these systems. Assumptions are evaluated using Video Interactive VST Orchestra, a system that generates music through sound processing in interplay with a user. The system accepts audio and video live inputs — a camera and a microphone that capture the interplay of a musician, typically. Mapping of the variance in the musician’s physical motion to the sound processing allows identifying salience in the interaction and the system as autonomous. A case study is presented to provide evidence of creative autonomy in this simple, yet highly effective system."^^xsd:string; bibo:authorList ; bibo:issue "2"; bibo:status , ; bibo:volume "49"; dc:hasVersion , ; dct:creator , ; dct:date "2020-01-21"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Creative Autonomy in a Simple Interactive Music System"^^xsd:string; ep:hasAccepted , ; ep:hasDocument , , , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "M Music"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Taylor & Francis"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Johnson"^^xsd:string; foaf:givenName "Colin G."^^xsd:string; foaf:name "Colin G. Johnson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Paolizzo"^^xsd:string; foaf:givenName "Fabio"^^xsd:string; foaf:name "Fabio Paolizzo"^^xsd:string; rdf:type foaf:Person . bibo:issn "09298215"; foaf:name "Journal of New Music Research"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "EAIETSS2020.pdf"^^xsd:string . rdfs:label "EAIETSS2020.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79945 \n\nHuman-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More?\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Proactive password checkers have been widely used to persuade users to select stronger passwords by providing machine-generated strength ratings of passwords. If such ratings do not match human-generated ratings of human users, there can be a loss of trust in PPCs. In order to study the effectiveness of PPCs, it would be useful to investigate how human users perceive such machine- and human-generated ratings in terms of their trust, which has been rarely studied in the literature. To fill this gap, we report a large-scale crowdsourcing study with over 1,000 workers. The participants were asked to choose which of the two ratings they trusted more. The passwords were selected based on a survey of over 100 human password experts. The results revealed that participants exhibited four distinct behavioral patterns when the passwords were hidden, and many changed their behaviors significantly after the passwords were disclosed, suggesting their reported trust was influenced by their own judgments."^^xsd:string; bibo:authorList ; bibo:issue "e1"; bibo:status , ; bibo:volume "18"; dc:hasVersion ; dct:creator , , , ; dct:date "2020-01-20"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More?"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . foaf:name "EAI"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Yuan"^^xsd:string; foaf:givenName "Haiyue"^^xsd:string; foaf:name "Haiyue Yuan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rusconi"^^xsd:string; foaf:givenName "Patrice"^^xsd:string; foaf:name "Patrice Rusconi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Alqahtani"^^xsd:string; foaf:givenName "Saeed Ibrahim"^^xsd:string; foaf:name "Saeed Ibrahim Alqahtani"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . bibo:issn "20329393"; foaf:name "EAI Endorsed Transactions on Security and Safety"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Theor-Comp-Sci-J-2019-Xavier-unformatted.pdf"^^xsd:string . rdfs:label "Theor-Comp-Sci-J-2019-Xavier-unformatted.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79330 \n\nAn evolutionary algorithm for automated machine learning focusing on classifier ensembles: an improved algorithm and extended results\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An evolutionary algorithm for automated machine learning focusing on classifier ensembles: an improved algorithm and extended results (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An evolutionary algorithm for automated machine learning focusing on classifier ensembles: an improved algorithm and extended results (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An evolutionary algorithm for automated machine learning focusing on classifier ensembles: an improved algorithm and extended results (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An evolutionary algorithm for automated machine learning focusing on classifier ensembles: an improved algorithm and extended results (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An evolutionary algorithm for automated machine learning focusing on classifier ensembles: an improved algorithm and extended results (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An evolutionary algorithm for automated machine learning focusing on classifier ensembles: an improved algorithm and extended results (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "A large number of classification algorithms have been proposed in the machine learning literature. These algorithms have different pros and cons, and no algorithm is the best for all datasets. Hence, a challenging problem consists of choosing the best classification algorithm with its best hyper-parameter settings for a given input dataset. In the last few years, Automated Machine Learning (Auto-ML) has emerged as a promising approach for tackling this problem, by doing a heuristic search in a large space of candidate classification algorithms and their hyper-parameter settings. In this work we propose an improved version of our previous Evolutionary Algorithm (EA) – more precisely, an Estimation of Distribution Algorithm – for the Auto-ML task of automatically selecting the best classifier ensemble and its best hyper-parameter settings for an input dataset. The new version of this EA was compared against its previous version, as well as against a random forest algorithm (a strong ensemble algorithm) and a version of the well-known Auto-ML method Auto-WEKA adapted to search in the same space of classifier ensembles as the proposed EA. In general, in experiments with 21 datasets, the new EA version obtained the best results among all methods in terms of four popular predictive accuracy measures: error rate, precision, recall and F-measure."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "805"; dc:hasVersion ; dct:creator , , , , ; dct:date "2020-01-18"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "An evolutionary algorithm for automated machine learning focusing on classifier ensembles: an improved algorithm and extended results"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Feitosa-Neto"^^xsd:string; foaf:givenName "Antonio"^^xsd:string; foaf:name "Antonio Feitosa-Neto"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ludermir"^^xsd:string; foaf:givenName "Teresa B."^^xsd:string; foaf:name "Teresa B. Ludermir"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Xavier-Junior"^^xsd:string; foaf:givenName "João C."^^xsd:string; foaf:name "João C. Xavier-Junior"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Barreto"^^xsd:string; foaf:givenName "Cephas A.S."^^xsd:string; foaf:name "Cephas A.S. Barreto"^^xsd:string; rdf:type foaf:Person . bibo:issn "03043975"; foaf:name "Theoretical Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "KYC - CCNC2020.pdf"^^xsd:string . rdfs:label "KYC - CCNC2020.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80303 \n\nKnow Your Customer: Opening a new bank account online using UAAF\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Know Your Customer: Opening a new bank account online using UAAF (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Know Your Customer: Opening a new bank account online using UAAF (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Know Your Customer: Opening a new bank account online using UAAF (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Know Your Customer: Opening a new bank account online using UAAF (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Know Your Customer: Opening a new bank account online using UAAF (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Know Your Customer: Opening a new bank account online using UAAF (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "Universal Authentication and Authorization Framework is a user-centric, privacy by design and decentralized system that allows anyone to easily benefit from a reliable digital identity made of multi-purpose and multi-origin attributes. In this article, we present the implementation of this framework in the context of online banking. We demonstrate how it can facilitate enforcing Know Your Customer when opening a new bank account online by allowing users to combine verifiable identity attributes issued by different organizations."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2020-01-10"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Know Your Customer: Opening a new bank account online using UAAF"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . dct:title "2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Las Vagas"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Wazan"^^xsd:string; foaf:givenName "Ahmad Samer"^^xsd:string; foaf:name "Ahmad Samer Wazan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Oglaza"^^xsd:string; foaf:givenName "Arnaud"^^xsd:string; foaf:name "Arnaud Oglaza"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Barrere"^^xsd:string; foaf:givenName "Francois"^^xsd:string; foaf:name "Francois Barrere"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Benzekri"^^xsd:string; foaf:givenName "Abdelmalek"^^xsd:string; foaf:name "Abdelmalek Benzekri"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chadwick"^^xsd:string; foaf:givenName "David W."^^xsd:string; foaf:name "David W. Chadwick"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Venant"^^xsd:string; foaf:givenName "Remi"^^xsd:string; foaf:name "Remi Venant"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Laborde"^^xsd:string; foaf:givenName "Romain"^^xsd:string; foaf:name "Romain Laborde"^^xsd:string; rdf:type foaf:Person . bibo:issn "23319852"; foaf:name "2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #76648 \n\nFrom Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues (Other)"^^xsd:string . rdf:type bibo:Image, ep:Document; rdfs:label "From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues (Image (PNG))"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "In today's highly connected cyber-physical world, people are constantly disclosing personal and sensitive data to different organizations and other people through the use of online and physical services. Such data disclosure activities can lead to unexpected privacy issues. However, there is a general lack of tools that help to improve users' awareness of such privacy issues and to make more informed decisions on their data disclosure activities in wider contexts. To fill this gap, this paper presents a novel user-centric, data-flow graph based semantic model, which can show how a given user's personal and sensitive data are disclosed to different entities and how different types of privacy issues can emerge from such data disclosure activities. The model enables both manual and automatic analysis of privacy issues, therefore laying the theoretical foundation of building data-driven and user-centric software tools for people to better manage their data disclosure activities in the cyber-physical world."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2020-01-10"; dct:isPartOf , ; dct:publisher ; dct:subject , , , ; dct:title "From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , ; ep:hasOther ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "HF5351 Business"@en . rdf:type skos:Concept; skos:prefLabel "QA 9 Formal systems, logics"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "HICSS 2020 (53rd Hawaii International Conference on System Sciences)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Hawaii, USA"^^xsd:string . foaf:name "University of Hawaii at Manoa"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lu"^^xsd:string; foaf:givenName "Yang"^^xsd:string; foaf:name "Yang Lu"^^xsd:string; rdf:type foaf:Person . foaf:name "Scholar Space"^^xsd:string; rdf:type bibo:Collection . rdfs:label "Future developments in standardisation of cyber risk in the IoT - author final.pdf"^^xsd:string . rdfs:label "Future developments in standardisation of cyber risk in the IoT - author final.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79403 \n\nFuture developments in standardisation of cyber risk in the Internet of Things (IoT)\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Future developments in standardisation of cyber risk in the Internet of Things (IoT) (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Future developments in standardisation of cyber risk in the Internet of Things (IoT) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Future developments in standardisation of cyber risk in the Internet of Things (IoT) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Future developments in standardisation of cyber risk in the Internet of Things (IoT) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Future developments in standardisation of cyber risk in the Internet of Things (IoT) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Future developments in standardisation of cyber risk in the Internet of Things (IoT) (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 . bibo:abstract "In this research article, we explore the use of a design process for adapting existing cyber risk assessment standards to allow the calculation of economic impact from IoT cyber risk. The paper presents a new model that includes a design process with new risk assessment vectors, specific for IoT cyber risk. To design new risk assessment vectors for IoT, the study applied a range of methodologies, including literature review, empirical study and comparative study, followed by theoretical analysis and grounded theory. An epistemological framework emerges from applying the constructivist grounded theory methodology to draw on knowledge from existing cyber risk frameworks, models and methodologies. This framework presents the current gaps in cyber risk standards and policies, and defines the design principles of future cyber risk impact assessment. The core contribution of the article therefore, being the presentation of a new model for impact assessment of IoT cyber risk."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "2"; dc:hasVersion ; dct:creator , , , , , , , , ; dct:date "2020-01-08"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Future developments in standardisation of cyber risk in the Internet of Things (IoT)"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Madox"^^xsd:string; foaf:givenName "La'Treall"^^xsd:string; foaf:name "La'Treall Madox"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Santos"^^xsd:string; foaf:givenName "Omar"^^xsd:string; foaf:name "Omar Santos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Burnap"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Burnap"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Montalvo"^^xsd:string; foaf:givenName "Rafael Mantilla"^^xsd:string; foaf:name "Rafael Mantilla Montalvo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Maple"^^xsd:string; foaf:givenName "Carsten"^^xsd:string; foaf:name "Carsten Maple"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Roure"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David De Roure"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Radanliev"^^xsd:string; foaf:givenName "Petar"^^xsd:string; foaf:name "Petar Radanliev"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cannady"^^xsd:string; foaf:givenName "Stacy"^^xsd:string; foaf:name "Stacy Cannady"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "25233971"; foaf:name "SN Applied Sciences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #79931 \n\nAnalysing the overfit of the auto-sklearn automated machine learning tool.\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "With the ever-increasing number of pre-processing and classification algorithms, manually selecting the best algorithm and their best hyper-parameter settings (i.e. the best classification workflow) is a daunting task. Automated Machine Learning (Auto-ML) methods have been recently proposed to tackle this issue. Auto-ML tools aim to automatically choose the best classification workflow for a given dataset. In this work we analyse the predictive accuracy and overfit of the state-of-the-art auto-sklearn tool, which iteratively builds a classification ensemble optimised for the user’s dataset. This work has 3 contributions. First, we measure 3 types of auto-sklearn’s overfit, involving the differences of predictive accuracies measured on different data subsets: two parts of the training set (for learning and internal validation of the model) and the hold-out test set used for final evaluation. Second, we analyse the distribution of types of classification models selected by auto-sklearn across all 17 datasets. Third, we measure correlations between predictive accuracies on different data subsets and different types of overfitting. Overall, substantial degrees of overfitting were found in several datasets, and decision tree ensembles were the most frequently selected types of models."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , ; dct:date "2020-01-03"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Analysing the overfit of the auto-sklearn automated machine learning tool."^^xsd:string; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "5th International Conference on Machine Learning, Optimization and Data Science (LOD 2019)"^^xsd:string; rdf:type bibo:Conference . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Fabris"^^xsd:string; foaf:givenName "Fabio"^^xsd:string; foaf:name "Fabio Fabris"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:name "Lecture Notes in Computer Science 11943"^^xsd:string; rdf:type bibo:Collection . rdfs:label "trust-management-in-vehicular-ad-hoc-networks-and-internet-of-vehicles_-current-trends-and-future-research-directions.pdf"^^xsd:string . rdfs:label "trust-management-in-vehicular-ad-hoc-networks-and-internet-of-vehicles_-current-trends-and-future-research-directions.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77167 \n\nTrust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles: Current Trends and Future Research Directions\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Trust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles: Current Trends and Future Research Directions (PDF)"^^xsd:string . rdf:type bibo:Document, ep:Document; rdfs:label "Trust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles: Current Trends and Future Research Directions (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Trust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles: Current Trends and Future Research Directions (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Trust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles: Current Trends and Future Research Directions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Trust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles: Current Trends and Future Research Directions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Trust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles: Current Trends and Future Research Directions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Trust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles: Current Trends and Future Research Directions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Trust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles: Current Trends and Future Research Directions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Trust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles: Current Trends and Future Research Directions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Trust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles: Current Trends and Future Research Directions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Trust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles: Current Trends and Future Research Directions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Trust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles: Current Trends and Future Research Directions (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Vehicular ad-hoc network (VANET) and internet-of-vehicles (IoV) are complex networks which provide a unique platform for vehicles to communicate and exchange critical information (such as collision avoidance warnings) with each other in an intelligent manner. Thus, the information disseminated in the network should be authentic and originated from legitimate vehicles. Creating a trusted environment in the network can enable the vehicles to identify and revoke malicious ones. Trust is an important concept in VANET and IoV to achieve security in the network, where every vehicle equipped with an appropriate trust model can evaluate the trustworthiness of the received information and its sender. This chapter discusses trust in both VANET and IoV and identifies various trust models developed for VANET and IoV. The contribution of this chapter is threefold. First, the authors present a detailed taxonomy of trust models in VANET and IoV. Second, they provide current trends in the domain of trust management specifically for VANET and IoV, and finally, they provide various open research directions."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2020-01"; dct:isPartOf ; dct:publisher ; dct:title "Trust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles: Current Trends and Future Research Directions"^^xsd:string; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; ep:hasSupplemental ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "IGI Global"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Adnane"^^xsd:string; foaf:givenName "Asma"^^xsd:string; foaf:name "Asma Adnane"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kerrache"^^xsd:string; foaf:givenName "Chaker Abdelaziz"^^xsd:string; foaf:name "Chaker Abdelaziz Kerrache"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ahmad"^^xsd:string; foaf:givenName "Farhan"^^xsd:string; foaf:name "Farhan Ahmad"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kurugollu"^^xsd:string; foaf:givenName "Fatih"^^xsd:string; foaf:name "Fatih Kurugollu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N. L."^^xsd:string; foaf:name "Virginia N. L. Franqueira"^^xsd:string; rdf:type foaf:Person . rdfs:label "ICISSP_2020_48_CR.pdf"^^xsd:string . rdfs:label "ICISSP_2020_48_CR.pdf_nocoversheet"^^xsd:string . rdfs:label "ICISSP_2020_48.pdf"^^xsd:string . rdfs:label "ICISSP_2020_48.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80445 \n\nUsing Eyetracker to Find Ways to Mitigate Ransomware\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Using Eyetracker to Find Ways to Mitigate Ransomware (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Using Eyetracker to Find Ways to Mitigate Ransomware (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Eyetracker to Find Ways to Mitigate Ransomware (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Eyetracker to Find Ways to Mitigate Ransomware (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Eyetracker to Find Ways to Mitigate Ransomware (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Eyetracker to Find Ways to Mitigate Ransomware (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Using Eyetracker to Find Ways to Mitigate Ransomware (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Eyetracker to Find Ways to Mitigate Ransomware (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Eyetracker to Find Ways to Mitigate Ransomware (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Eyetracker to Find Ways to Mitigate Ransomware (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Eyetracker to Find Ways to Mitigate Ransomware (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Using Eyetracker to Find Ways to Mitigate Ransomware (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Ransomware is a form of malware designed to prevent access to data by either locking out the victims from their system or encrypting some or all of their files until a ransom has been paid to the attacker. Victims would know that they had been hit by ransomware because a ransom demand (splash screen) would be displayed on their compromised device. This study aims to identify key user interface features of ransomware splash screens and see how these features affect victims’ likelihood to pay, and how this information may be used to create more effective countermeasures to mitigate the threat of ransomware. We devised an experiment that contained three broad types of splash screens (Text, Time-Sensitive Counter, and Other). A total of nine splash screens were shown to each participant, from which data on the participants’ eye behaviour were collected. After each splash screen, participants were also asked a set of questions that would help describe their experience and be cross-referenced with the eye tracking data to aid analysis. Our experiment collected quantitative eye tracker data and qualitative data regarding willingness to pay from 25 participants. Several key components of the splash screens such as the text, logo, images, and technical information were analysed. Comments from the participants on whether they would pay the ransom or not, and the reasons behind their decision were also recorded. We found that there is no clear indication that one type of splash screen would have a higher chance of success with regard to ransom payment. Our study revealed that there are some characteristics in splash screens that would strongly discourage some victims from paying. Further investigation will be carried out in this direction, in order to design and develop more effective countermeasures to ransomware."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion , ; dct:creator , , , ; dct:date "2020"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Using Eyetracker to Find Ways to Mitigate Ransomware"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "6th International Conference on Information Systems Security and Privacy (ICISSP)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Valletta, Malta"^^xsd:string . foaf:name "Scitepress"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Periam"^^xsd:string; foaf:givenName "Andy"^^xsd:string; foaf:name "Andy Periam"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Arief"^^xsd:string; foaf:givenName "Budi"^^xsd:string; foaf:name "Budi Arief"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cetin"^^xsd:string; foaf:givenName "Orcun"^^xsd:string; foaf:name "Orcun Cetin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio C."^^xsd:string; foaf:name "Julio C. Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . rdfs:label "GPEM2018-Revised.pdf"^^xsd:string . rdfs:label "GPEM2018-Revised.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #75949 \n\nApplications of Genetic Programming to Finance and Economics: Past, Present, Future\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Applications of Genetic Programming to Finance and Economics: Past, Present, Future (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Applications of Genetic Programming to Finance and Economics: Past, Present, Future (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Applications of Genetic Programming to Finance and Economics: Past, Present, Future (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Applications of Genetic Programming to Finance and Economics: Past, Present, Future (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Applications of Genetic Programming to Finance and Economics: Past, Present, Future (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Applications of Genetic Programming to Finance and Economics: Past, Present, Future (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "While the origins of Genetic Programming (GP) stretch back over fifty years, the field of GP was invigorated by John Koza’s popularisation of the methodology in the 1990s. A particular feature of the GP literature since then has been a strong interest in the application of GP to real-world problem domains. One application domain which has attracted significant attention is that of finance and economics, with several hundred papers from this subfield being listed in the Genetic Programming Bibliography. In this article we outline why finance and economics has been a popular application area for GP and briefly indicate the wide span of this work. However, despite this research effort there is relatively scant evidence of the usage of GP by the mainstream finance community in academia or industry. We speculate why this may be the case, describe what is needed to make this research more relevant from a finance perspective, and suggest some future directions for the application of GP in finance and economics."^^xsd:string; bibo:authorList ; bibo:issue "1-2"; bibo:status , ; bibo:volume "21"; dc:hasVersion ; dct:creator , , ; dct:date "2020"; dct:isPartOf , ; dct:publisher ; dct:title "Applications of Genetic Programming to Finance and Economics: Past, Present, Future"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Brabazon"^^xsd:string; foaf:givenName "Anthony"^^xsd:string; foaf:name "Anthony Brabazon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "O’Neill"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael O’Neill"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kampouridis"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Kampouridis"^^xsd:string; rdf:type foaf:Person . bibo:issn "13892576"; foaf:name "Genetic Programming and Evolvable Machines"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "NBR_author_accepted_version.pdf"^^xsd:string . rdfs:label "NBR_author_accepted_version.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #84806 \n\nI tried a bunch of things: The dangers of unexpected overfitting in classification of brain data\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "I tried a bunch of things: The dangers of unexpected overfitting in classification of brain data (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "I tried a bunch of things: The dangers of unexpected overfitting in classification of brain data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "I tried a bunch of things: The dangers of unexpected overfitting in classification of brain data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "I tried a bunch of things: The dangers of unexpected overfitting in classification of brain data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "I tried a bunch of things: The dangers of unexpected overfitting in classification of brain data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "I tried a bunch of things: The dangers of unexpected overfitting in classification of brain data (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "Machine learning has enhanced the abilities of neuroscientists to interpret information collected through EEG, fMRI, and MEG data. With these powerful techniques comes the danger of overfitting of hyperparameters which can render results invalid. We refer to this problem as ‘overhyping’ and show that it is pernicious despite commonly used precautions. Overhyping occurs when analysis decisions are made after observing analysis outcomes and can produce results that are partially or even completely spurious. It is commonly assumed that cross-validation is an effective protection against overfitting or overhyping, but this is not actually true. In this article, we show that spurious results can be obtained on random data by modifying hyperparameters in seemingly innocuous ways, despite the use of cross-validation. We recommend a number of techniques for limiting overhyping, such as lock boxes, blind analyses, pre-registrations, and nested cross-validation. These techniques, are common in other fields that use machine learning, including computer science and physics. Adopting similar safeguards is critical for ensuring the robustness of machine-learning techniques in the neurosciences."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "119"; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2020"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "I tried a bunch of things: The dangers of unexpected overfitting in classification of brain data"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Callahan-Flintoft"^^xsd:string; foaf:givenName "Chloe"^^xsd:string; foaf:name "Chloe Callahan-Flintoft"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Collins"^^xsd:string; foaf:givenName "John"^^xsd:string; foaf:name "John Collins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jones"^^xsd:string; foaf:givenName "William"^^xsd:string; foaf:name "William Jones"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wyble"^^xsd:string; foaf:givenName "Brad"^^xsd:string; foaf:name "Brad Wyble"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Powell"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Powell"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hosseini"^^xsd:string; foaf:givenName "Mahan"^^xsd:string; foaf:name "Mahan Hosseini"^^xsd:string; rdf:type foaf:Person . bibo:issn "01497634"; foaf:name "Neuroscience & Biobehavioral Reviews"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Quantum_Leap_TOPS_Submission_FINAL.pdf"^^xsd:string . rdfs:label "Quantum_Leap_TOPS_Submission_FINAL.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81957 \n\nQuantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators (Other)"^^xsd:string . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Random numbers are essential for cryptography and scientific simulation. Generating truly random numbers for cryptography can be a slow and expensive process. Quantum physics offers a variety of promising solutions to this challenge, proposing sources of entropy that may be genuinely unpredictable, based on the inherent randomness of certain physical phenomena. These properties have been employed to design Quantum Random Number Generators (QRNGs), some of which are commercially available. In this work, we present the first published analysis of the Quantis family of QRNGs (excluding AIS-31 models), designed and manufactured by ID Quantique (IDQ). Our study also includes Comscire’s PQ32MU QRNG, and two online services: the Australian National University’s (ANU) QRNG, and the Humboldt Physik generator. Each QRNG is analysed using five batteries of statistical tests: Dieharder, National Institute of Standards and Technology (NIST) SP800-22, Ent, Tuftests and TestU01, as part of our thorough examination of their output. Our analysis highlights issues with current certification schemes, which largely rely on NIST SP800-22 and Diehard tests of randomness. We find that more recent tests of randomness identify issues in the output of QRNG, highlighting the need for mandatory post-processing even for low-security usage of random numbers sourced from QRNGs."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "23"; dc:hasVersion , ; dct:creator , ; dct:date "2020"; dct:isPartOf , ; dct:subject , ; dct:title "Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:familyName "Hurley-Smith"^^xsd:string; foaf:givenName "Darren"^^xsd:string; foaf:name "Darren Hurley-Smith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio"^^xsd:string; foaf:name "Julio Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . bibo:issn "24712566"; foaf:name "ACM Transactions on Privacy and Security"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "10.1007_s00034-019-01203-0.pdf"^^xsd:string . rdfs:label "10.1007_s00034-019-01203-0.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #75276 \n\nTime-Frequency Feature Fusion for Noise-Robust Audio Event Classification\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Time-Frequency Feature Fusion for Noise-Robust Audio Event Classification (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Time-Frequency Feature Fusion for Noise-Robust Audio Event Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Time-Frequency Feature Fusion for Noise-Robust Audio Event Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Time-Frequency Feature Fusion for Noise-Robust Audio Event Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Time-Frequency Feature Fusion for Noise-Robust Audio Event Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Time-Frequency Feature Fusion for Noise-Robust Audio Event Classification (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "This paper explores the use of three different two-dimensional time-frequency features for audio event classification with deep neural network back-end classifiers. The evaluations use spectrogram, cochleogram and constant-Q transform based images for classification of 50 classes of audio events in varying levels of acoustic background noise, revealing interesting performance patterns with respect to noise level, feature image type and classifier. Evidence is obtained that two well-performing features, the spectrogram and cochleogram, make use of information that is potentially complementary in the input features. Feature fusion is thus explored for each pair of features, as well as for all tested features. Results indicate that a fusion of spectrogram and cochleogram information is particularly beneficial, yielding an impressive 50-class accuracy of over 96% in 0dB SNR, and exceeding 99% accuracy in 10dB SNR and above. Meanwhile the cochleogram image feature is found to perform well in extreme noise cases of -5dB and -10dB SNR."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "39"; dc:hasVersion ; dct:creator , , , , ; dct:date "2020"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Time-Frequency Feature Fusion for Noise-Robust Audio Event Classification"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Song"^^xsd:string; foaf:givenName "Yan"^^xsd:string; foaf:name "Yan Song"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian"^^xsd:string; foaf:name "Ian McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ramaswamy"^^xsd:string; foaf:givenName "Palaniappan"^^xsd:string; foaf:name "Palaniappan Ramaswamy"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Xie"^^xsd:string; foaf:givenName "Zhi-Peng"^^xsd:string; foaf:name "Zhi-Peng Xie"^^xsd:string; rdf:type foaf:Person . bibo:issn "0278081X"; foaf:name "Circuits, Systems, and Signal Processing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "Miao2019_Article_ANewTimeFrequencyAttentionTens.pdf"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77646 \n\nA New Time–Frequency Attention Tensor Network for Language Identification\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "A New Time–Frequency Attention Tensor Network for Language Identification (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A New Time–Frequency Attention Tensor Network for Language Identification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A New Time–Frequency Attention Tensor Network for Language Identification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A New Time–Frequency Attention Tensor Network for Language Identification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A New Time–Frequency Attention Tensor Network for Language Identification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A New Time–Frequency Attention Tensor Network for Language Identification (Other)"^^xsd:string . cc:license ; dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "A New Time–Frequency Attention Tensor Network for Language Identification (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A New Time–Frequency Attention Tensor Network for Language Identification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A New Time–Frequency Attention Tensor Network for Language Identification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A New Time–Frequency Attention Tensor Network for Language Identification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A New Time–Frequency Attention Tensor Network for Language Identification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A New Time–Frequency Attention Tensor Network for Language Identification (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "In this paper, we aim to improve traditional DNN x-vector language identification (LID) performance by employing Wide Residual Networks (WRN) as a powerful feature extractor which we combine with a novel frequency attention network (F-ATN). Compared with conventional time attention, our method learns discriminative weights for different frequency bands to generate weighted means and standard deviations for utterance-level classification. This mechanism enables the architecture to direct attention to important frequency bands rather than important time frames, as in traditional time attention (T-ATN) methods. Furthermore, we then introduce a cross-layer frequency attention tensor network (CLF-ATN) which exploits information from different layers to recapture frame-level language characteristics that have been dropped by aggressive frequency pooling in lower layers. This effectively restores fine-grained discriminative language details. Finally, we explore the joint fusion of frame-level and frequency-band attention in a time-frequency attention network (TF-ATN). Experimental results show firstly that WRN can significantly outperform a traditional DNN x-vector implementation. Secondly, the proposed frequency attention method is more effective than time attention and thirdly that frequency-time score fusion can yield further improvement. Finally, extensive experiments on CLF-ATN demonstrate that it is able to improve discrimination by regaining dropped fine-grained frequency information, particularly for low dimension frequency features."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "39"; dc:hasVersion , ; dct:creator , , ; dct:date "2020"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A New Time–Frequency Attention Tensor Network for Language Identification"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Yan"^^xsd:string; foaf:givenName "Yonghong"^^xsd:string; foaf:name "Yonghong Yan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Miao"^^xsd:string; foaf:givenName "Xiaoxiao"^^xsd:string; foaf:name "Xiaoxiao Miao"^^xsd:string; rdf:type foaf:Person . bibo:issn "0278081X"; foaf:name "Circuits, Systems, and Signal Processing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #81430 \n\nModular Relaxed Dependencies in Weak Memory Concurrency\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "We present a denotational semantics for weak memory concurrency that avoids thin-air reads, provides data-race free programs with sequentially consistent semantics (DRF-SC), and supports a compositional refinement relation for validating optimisations. Our semantics identifies false program dependencies that might be removed by compiler optimisation, and leaves in place just the dependencies necessary to rule out thin-air reads. We show that our dependency calculation can be used to rule out thin-air reads in any axiomatic concurrency model, in particular C++. We present a tool that automatically evaluates litmus tests, show that we can augment C++ to fix the thin-air problem, and we prove that our augmentation is compatible with the previously used compilation mappings over key processor architectures. We argue that our dependency calculation offers a practical route to fixing the longstanding problem of thin-air reads in the C++ specification."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "12075"; dct:creator , , , , , ; dct:date "2020"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Modular Relaxed Dependencies in Weak Memory Concurrency"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "29th European Symposium on Programming, ESOP 2020"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Dublin, Ireland"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Paviotti"^^xsd:string; foaf:givenName "Marco"^^xsd:string; foaf:name "Marco Paviotti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Paradis"^^xsd:string; foaf:givenName "Anouk"^^xsd:string; foaf:name "Anouk Paradis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cooksey"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Cooksey"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wright"^^xsd:string; foaf:givenName "Daniel"^^xsd:string; foaf:name "Daniel Wright"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Batty"^^xsd:string; foaf:givenName "Mark"^^xsd:string; foaf:name "Mark Batty"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Owens"^^xsd:string; foaf:givenName "Scott"^^xsd:string; foaf:name "Scott Owens"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Wyble Ragnaroc Author Accepted Copy.pdf"^^xsd:string . rdfs:label "Wyble Ragnaroc Author Accepted Copy.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #81591 \n\nUnderstanding visual attention with RAGNAROC: A Reflexive Attention Gradient through Neural AttRactOr Competition\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Understanding visual attention with RAGNAROC: A Reflexive Attention Gradient through Neural AttRactOr Competition (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Understanding visual attention with RAGNAROC: A Reflexive Attention Gradient through Neural AttRactOr Competition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding visual attention with RAGNAROC: A Reflexive Attention Gradient through Neural AttRactOr Competition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding visual attention with RAGNAROC: A Reflexive Attention Gradient through Neural AttRactOr Competition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding visual attention with RAGNAROC: A Reflexive Attention Gradient through Neural AttRactOr Competition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding visual attention with RAGNAROC: A Reflexive Attention Gradient through Neural AttRactOr Competition (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "A quintessential challenge for any perceptual system is the need to focus on task-relevant information without being blindsided by unexpected, yet important information. The human visual system incorporates several solutions to this challenge, one of which is a reflexive covert attention system that is rapidly responsive to both the physical salience and the task-relevance of new information. This paper presents a model that simulates behavioral and neural correlates of reflexive attention as the product of brief neural attractor states that are formed across the visual hierarchy when attention is engaged. Such attractors emerge from an attentional gradient distributed over a population of topographically organized neurons and serve to focus processing at one or more locations in the visual field, while inhibiting the processing of lower priority information. The model moves towards a resolution of key debates about the nature of reflexive attention, such as whether it is parallel or serial, and whether suppression effects are distributed in a spatial surround, or selectively at the location of distractors. Most importantly, the model develops a framework for understanding the neural mechanisms of visual attention as a spatiotopic decision process within a hierarchy and links them to observable correlates such as accuracy, reaction time, and the N2pc and PD components of the EEG. This last contribution is the most crucial for repairing the disconnect that exists between our understanding of behavioral and neural correlates of attention."^^xsd:string; bibo:authorList ; bibo:issue "6"; bibo:status , ; bibo:volume "127"; dc:hasVersion ; dct:creator , , , , , ; dct:date "2020"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Understanding visual attention with RAGNAROC: A Reflexive Attention Gradient through Neural AttRactOr Competition"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF41 Psychology and philosophy" . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "American Psychological Association"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chen"^^xsd:string; foaf:givenName "Hui"^^xsd:string; foaf:name "Hui Chen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Callahan-Flintoft"^^xsd:string; foaf:givenName "Chloe"^^xsd:string; foaf:name "Chloe Callahan-Flintoft"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wyble"^^xsd:string; foaf:givenName "Brad"^^xsd:string; foaf:name "Brad Wyble"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sarkar"^^xsd:string; foaf:givenName "Aakash"^^xsd:string; foaf:name "Aakash Sarkar"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marinov"^^xsd:string; foaf:givenName "Toma"^^xsd:string; foaf:name "Toma Marinov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . bibo:issn "0033295X"; foaf:name "Psychological Review"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "CompEd2019-WG3-Report-final(1).pdf"^^xsd:string . rdfs:label "CompEd2019-WG3-Report-final(1).pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79481 \n\nFactors Affecting the Adoption of Peer Instruction in Computing Courses\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Factors Affecting the Adoption of Peer Instruction in Computing Courses (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Factors Affecting the Adoption of Peer Instruction in Computing Courses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Factors Affecting the Adoption of Peer Instruction in Computing Courses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Factors Affecting the Adoption of Peer Instruction in Computing Courses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Factors Affecting the Adoption of Peer Instruction in Computing Courses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Factors Affecting the Adoption of Peer Instruction in Computing Courses (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "Peer Instruction (PI) as defined by Mazur, and variations on this pedagogic technique, have been in use in computing courses for about a decade. Despite dozens of educational research publications documenting positive learning effects, improved retention, student acceptance, and effectiveness for large classes; PI does not appear to be widely adopted for computing courses. This paper reports on a three-way investigation into this apparent contradiction. First, the authors reflect on their own adoption, practice, experience, and abandonment of the use of PI in computing courses. Second, we surveyed the literature regarding the use of PI in computing courses and present a summary of the research findings, variations, and extensions to PI used in computing courses. Third, a survey of computing instructors was conducted to gauge the attitude toward PI in computing courses. To add context, this report considers publications documenting usage of PI in STEM courses, and the adoption of other pedagogic techniques in computing. Particular effort was made to identify the reasons computing instructors don’t adopt PI. This report also includes advice to instructors considering adopting PI in computing courses."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2019-12-31"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Factors Affecting the Adoption of Peer Instruction in Computing Courses"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "LB2300 Higher Education"@en . dct:title "CompEd '19: ACM Global Computing Education Conference 2019"^^xsd:string; rdf:type bibo:Conference . foaf:name "Association of Computing Machinery"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bouvier"^^xsd:string; foaf:givenName "Dennis"^^xsd:string; foaf:name "Dennis Bouvier"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lovellette"^^xsd:string; foaf:givenName "Ellie"^^xsd:string; foaf:name "Ellie Lovellette"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chetty"^^xsd:string; foaf:givenName "Jacqueline"^^xsd:string; foaf:name "Jacqueline Chetty"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Matta"^^xsd:string; foaf:givenName "John"^^xsd:string; foaf:name "John Matta"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bai"^^xsd:string; foaf:givenName "Jing"^^xsd:string; foaf:name "Jing Bai"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wan"^^xsd:string; foaf:givenName "Jia"^^xsd:string; foaf:name "Jia Wan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kurkovsky"^^xsd:string; foaf:givenName "Stanislav"^^xsd:string; foaf:name "Stanislav Kurkovsky"^^xsd:string; rdf:type foaf:Person . rdfs:label "IEEE_CHADWICK_LAYOUT_FINAL.pdf"^^xsd:string . rdfs:label "IEEE_CHADWICK_LAYOUT_FINAL.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80304 \n\nImproved Identity Management with Verifiable Credentials and FIDO\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Improved Identity Management with Verifiable Credentials and FIDO (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Improved Identity Management with Verifiable Credentials and FIDO (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improved Identity Management with Verifiable Credentials and FIDO (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improved Identity Management with Verifiable Credentials and FIDO (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improved Identity Management with Verifiable Credentials and FIDO (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improved Identity Management with Verifiable Credentials and FIDO (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "We describe how FIDO and W3C VCs can overcome the problems of existing identity management systems. We describe our conceptual\r\nmodel and architecture, and the protocol we used by extending FIDO’s UAF in order to provide both strong authentication and strong authorization. We built a pilot implementation for U.K. NHS patients to validate our implementation. Patients were able to use a mobile phone with a fingerprint reader to access restricted NHS sites in order to make and cancel appointments and order repeat\r\nprescription drugs. Our initial user trials with 10 U.K. NHS patients found the system to be easy to use, and fingerprints to be preferable to using usernames and passwords for authentication."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "3"; dc:hasVersion ; dct:creator , , , , , ; dct:date "2019-12-31"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Improved Identity Management with Verifiable Credentials and FIDO"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Wazan"^^xsd:string; foaf:givenName "Ahmad Samer"^^xsd:string; foaf:name "Ahmad Samer Wazan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Oglaza"^^xsd:string; foaf:givenName "Arnaud"^^xsd:string; foaf:name "Arnaud Oglaza"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chadwick"^^xsd:string; foaf:givenName "David W."^^xsd:string; foaf:name "David W. Chadwick"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nijjar"^^xsd:string; foaf:givenName "Manreet"^^xsd:string; foaf:name "Manreet Nijjar"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Venant"^^xsd:string; foaf:givenName "Remi"^^xsd:string; foaf:name "Remi Venant"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Laborde"^^xsd:string; foaf:givenName "Romain"^^xsd:string; foaf:name "Romain Laborde"^^xsd:string; rdf:type foaf:Person . bibo:issn "24712825"; foaf:name "IEEE Communications Standards"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Bioinformatics-J-2019-Fabris-online.pdf"^^xsd:string . rdfs:label "Bioinformatics-J-2019-Fabris-online.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "btz887.pdf"^^xsd:string . rdfs:label "btz887.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79932 \n\nUsing deep learning to associate human genes with age-related diseases\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Using deep learning to associate human genes with age-related diseases (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Using deep learning to associate human genes with age-related diseases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using deep learning to associate human genes with age-related diseases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using deep learning to associate human genes with age-related diseases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using deep learning to associate human genes with age-related diseases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using deep learning to associate human genes with age-related diseases (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Using deep learning to associate human genes with age-related diseases (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using deep learning to associate human genes with age-related diseases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using deep learning to associate human genes with age-related diseases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using deep learning to associate human genes with age-related diseases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using deep learning to associate human genes with age-related diseases (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Using deep learning to associate human genes with age-related diseases (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Motivation: One way to identify genes possibly associated with ageing is to build a classification model (from the machine learning field) capable of classifying genes as associated with multiple age-related diseases. To build this model, we use a pre-compiled list of human genes associated with age-related diseases and apply a novel Deep Neural Network (DNN) method to find associations between gene descriptors (e.g. Gene Ontology terms, protein–protein interaction data and biological pathway information) and age-related diseases. Results: The novelty of our new DNN method is its modular architecture, which has the capability of combining several sources of biological data to predict which ageing-related diseases a gene is associated with (if any). Our DNN method achieves better predictive performance than standard DNN approaches, a Gradient Boosted Tree classifier (a strong baseline method) and a Logistic Regression classifier. Given the DNN model produced by our method, we use two approaches to identify human genes that are not known to be associated with age-related diseases according to our dataset. First, we investigate genes that are close to other disease-associated genes in a complex multi-dimensional feature space learned by the DNN algorithm. Second, using the class label probabilities output by our DNN approach, we identify genes with a high probability of being associated with age-related diseases according to the model. We provide evidence of these putative associations retrieved from the DNN model with literature support. The source code and datasets can be found at: https://github.com/fabiofabris/Bioinfo2019."^^xsd:string; bibo:authorList ; bibo:issue "7"; bibo:status , ; bibo:volume "36"; dc:hasVersion , ; dct:creator , , , , ; dct:date "2019-12-17"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Using deep learning to associate human genes with age-related diseases"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Oxford University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Fabris"^^xsd:string; foaf:givenName "Fabio"^^xsd:string; foaf:name "Fabio Fabris"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palmer"^^xsd:string; foaf:givenName "Daniel"^^xsd:string; foaf:name "Daniel Palmer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Magalhaes"^^xsd:string; foaf:givenName "Joao Pedro"^^xsd:string; foaf:name "Joao Pedro de Magalhaes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Salama"^^xsd:string; foaf:givenName "Khalid M."^^xsd:string; foaf:name "Khalid M. Salama"^^xsd:string; rdf:type foaf:Person . bibo:issn "13674803"; foaf:name "Bioinformatics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "ENTER2020@eRTR2019.pdf"^^xsd:string . rdfs:label "ENTER2020@eRTR2019.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79517 \n\nSegmenting travelers based on responses to nudging for information disclosure\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Segmenting travelers based on responses to nudging for information disclosure (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Segmenting travelers based on responses to nudging for information disclosure (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Segmenting travelers based on responses to nudging for information disclosure (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Segmenting travelers based on responses to nudging for information disclosure (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Segmenting travelers based on responses to nudging for information disclosure (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Segmenting travelers based on responses to nudging for information disclosure (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Digital technologies shape travel environments. Noticing online privacy issues, consumers can hold distinct attitudes towards disclosing personal information to service providers. We conducted a panel survey to gauge travelers’ willingness to share personal information with service providers, provided with different types of nudges. Based on the results of clustering analysis, two segments were identified: travelers who are reasonably willing to share (Privacy Rationalists) and those who are reluctant to share (Privacy Pessimists). This study provides empirical evidence of privacy segmentations in the travel context, which has not been reported before and thus deserves more attention from both researchers and practitioners."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "17"; dc:hasVersion ; dct:creator , , , ; dct:date "2019-12-13"; dct:isPartOf , ; dct:publisher ; dct:subject , , , ; dct:title "Segmenting travelers based on responses to nudging for information disclosure"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.875.I57 Internet"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.888 World Wide Web"@en . foaf:name "e-Review of Tourism Research"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ioannou"^^xsd:string; foaf:givenName "Athina"^^xsd:string; foaf:name "Athina Ioannou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tussyadiah"^^xsd:string; foaf:givenName "Iis"^^xsd:string; foaf:name "Iis Tussyadiah"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lu"^^xsd:string; foaf:givenName "Yang"^^xsd:string; foaf:name "Yang Lu"^^xsd:string; rdf:type foaf:Person . bibo:issn "19415842"; foaf:name "e-Review of Tourism Research"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90191 \n\nA hierarchical prototype-based approach for classification\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "In this paper, a novel hierarchical prototype-based approach for classification is proposed. This approach is able to perceive the data space and derive the multimodal distributions from streaming data at different levels of granularity in an online manner, based on which it further identifies meaningful prototypes to self-organize and self-evolve its hierarchical structure for classification. Thanks to the prototype-based nature, the system structure of the proposed classifier is highly transparent, and its learning process is of “one pass” type and computationally lean. Its decision-making process follows the “nearest prototype” principle and is fully explainable. The proposed approach is capable of presenting the learned knowledge from data in an easy-to-interpret prototype-based hierarchical form to users, and is an attractive tool for solving large-scale, complex real-world problems. Numerical examples based on various benchmark problems justify the validity and effectiveness of the proposed concept and general principles."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "505"; dct:creator , ; dct:date "2019-12-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A hierarchical prototype-based approach for classification"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ding"^^xsd:string; foaf:givenName "Weiping"^^xsd:string; foaf:name "Weiping Ding"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "00200255"; foaf:name "Information Sciences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Desen-TOSEM.pdf"^^xsd:string . rdfs:label "Desen-TOSEM.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77232 \n\nDesen: Specification of Sociotechnical Systems via Patterns of Regulation and Control\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Desen: Specification of Sociotechnical Systems via Patterns of Regulation and Control (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Desen: Specification of Sociotechnical Systems via Patterns of Regulation and Control (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Desen: Specification of Sociotechnical Systems via Patterns of Regulation and Control (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Desen: Specification of Sociotechnical Systems via Patterns of Regulation and Control (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Desen: Specification of Sociotechnical Systems via Patterns of Regulation and Control (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Desen: Specification of Sociotechnical Systems via Patterns of Regulation and Control (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "We address the problem of engineering a sociotechnical system (STS) with respect to its stakeholders’ requirements. We motivate a two-tier STS conception comprising a technical tier that provides control mechanisms and describes what actions are allowed by the software components, and a social tier that characterizes the stakeholders’ expectations of each other in terms of norms. We adopt agents as computational entities, each representing a different stakeholder. Unlike previous approaches, our framework, Desen, incorporates the social dimension into the formal verification process. Thus, Desen supports agents potentially violating applicable norms—a consequence of their autonomy. In addition to requirements verification, Desen supports refinement of STS specifications via design patterns to meet stated requirements. We evaluate Desen at three levels. We illustrate how Desen carries out refinement via the application of patterns on a hospital emergency scenario. We show via a human-subject study that a design process based on our patterns is helpful for participants who are inexperienced in conceptual modeling and norms. We provide an agent-based environment to simulate the hospital emergency scenario to compare STS specifications (including participant solutions from the human-subject study) with metrics indicating social welfare and norm compliance, and other domain dependent metrics."^^xsd:string; bibo:authorList ; bibo:issue "1"; bibo:status , ; bibo:volume "29"; dc:hasVersion ; dct:creator , , ; dct:date "2019-12"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Desen: Specification of Sociotechnical Systems via Patterns of Regulation and Control"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76.E95 Expert Systems (Intelligent Knowledge Based Systems) "@en . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ajmeri"^^xsd:string; foaf:givenName "Nirav"^^xsd:string; foaf:name "Nirav Ajmeri"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Singh"^^xsd:string; foaf:givenName "Munindar P."^^xsd:string; foaf:name "Munindar P. Singh"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kafalı"^^xsd:string; foaf:givenName "Özgur"^^xsd:string; foaf:name "Özgur Kafalı"^^xsd:string; rdf:type foaf:Person . bibo:issn "1049331X"; foaf:name "ACM Transactions on Software Engineering and Methodology"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "harris19comparing.pdf"^^xsd:string . rdfs:label "harris19comparing.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #75472 \n\nComparing Explanations between Random Forests and Artificial Neural Networks\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Comparing Explanations between Random Forests and Artificial Neural Networks (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Comparing Explanations between Random Forests and Artificial Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Comparing Explanations between Random Forests and Artificial Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Comparing Explanations between Random Forests and Artificial Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Comparing Explanations between Random Forests and Artificial Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Comparing Explanations between Random Forests and Artificial Neural Networks (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "The decisions made by machines are increasingly comparable in predictive performance to those made by humans, but these decision making processes are often concealed as black boxes. Additional techniques are required to extract understanding, and one such category are explanation methods. This research compares the explanations of two popular forms of artificial intelligence; neural networks and random forests. Researchers in either field often have divided opinions on transparency, and comparing explanations may discover similar ground truths between models. Similarity can help to encourage trust in predictive accuracy alongside transparent structure and unite the respective research fields. This research explores a variety of simulated and real-world datasets that ensure fair applicability to both learning algorithms. A new heuristic explanation method that extends an existing technique is introduced, and our results show that this is somewhat similar to the other methods examined whilst also offering an alternative perspective towards least-important features."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2019-11-28"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Comparing Explanations between Random Forests and Artificial Neural Networks"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.87 Neural computers, neural networks"@en . dct:title "2019 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Bari, Italy"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Harris"^^xsd:string; foaf:givenName "Lee"^^xsd:string; foaf:name "Lee Harris"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grzes"^^xsd:string; foaf:givenName "Marek"^^xsd:string; foaf:name "Marek Grzes"^^xsd:string; rdf:type foaf:Person . rdfs:label "IEEEAccess2019.pdf"^^xsd:string . rdfs:label "IEEEAccess2019.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79178 \n\nTowards Improved Steganalysis: When Cover Selection is Used in Steganography\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Towards Improved Steganalysis: When Cover Selection is Used in Steganography (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Towards Improved Steganalysis: When Cover Selection is Used in Steganography (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Improved Steganalysis: When Cover Selection is Used in Steganography (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Improved Steganalysis: When Cover Selection is Used in Steganography (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Improved Steganalysis: When Cover Selection is Used in Steganography (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Improved Steganalysis: When Cover Selection is Used in Steganography (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "This paper proposes an improved steganalytic method when cover selection is used in steganography. We observed that the covers selected by existing cover selection methods normally have different characteristics from normal ones, and propose a steganalytic method to capture such differences. As a result, the detection accuracy of steganalysis is increased. In our method, we consider a number of images collected from one or more target (suspected but not known) users, and use an unsupervised learning algorithm such as $k$ -means to adapt the performance of a pre-trained classifier towards the cover selection operation of the target user(s). The adaptation is done via pseudo-labels from the suspected images themselves, thus allowing the re-trained classifier more aligned with the cover selection operation of the target user(s). We give experimental results to show that our method can indeed help increase the detection accuracy, especially when the percentage of stego images is between 0.3 and 0.7."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "7"; dc:hasVersion ; dct:creator , , ; dct:date "2019-11-22"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Towards Improved Steganalysis: When Cover Selection is Used in Steganography"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.575 Multimedia systems"@en . rdf:type skos:Concept; skos:prefLabel "TK5101 Telecommunications"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Zichi"^^xsd:string; foaf:name "Zichi Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhang"^^xsd:string; foaf:givenName "Xinpeng"^^xsd:string; foaf:name "Xinpeng Zhang"^^xsd:string; rdf:type foaf:Person . bibo:issn "21693536"; foaf:name "IEEE Access"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "BCS_SGAI_2019.pdf"^^xsd:string . rdfs:label "BCS_SGAI_2019.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #78198 \n\nStepwise Evolutionary Learning using Deep Learned Guidance Functions\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Stepwise Evolutionary Learning using Deep Learned Guidance Functions (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Stepwise Evolutionary Learning using Deep Learned Guidance Functions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Stepwise Evolutionary Learning using Deep Learned Guidance Functions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Stepwise Evolutionary Learning using Deep Learned Guidance Functions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Stepwise Evolutionary Learning using Deep Learned Guidance Functions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Stepwise Evolutionary Learning using Deep Learned Guidance Functions (Other)"^^xsd:string . rdf:_1 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "This paper explores how Learned Guidance Functions (LGFs)— a pre-training method used to smooth search landscapes—can be used as a fitness function for evolutionary algorithms. A new form of LGF is introduced, based on deep neural network learning, and it is shown how this can be used as a fitness function. This is applied to a test problem: unscrambling the Rubik’s Cube. Comparisons are made with a previous LGF approach based on random forests, and with a baseline approach based on traditional error-based fitness."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "11927"; dc:hasVersion ; dct:creator ; dct:date "2019-11-19"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Stepwise Evolutionary Learning using Deep Learned Guidance Functions"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.87 Neural computers, neural networks"@en . dct:title "39th SGAI International Conference on Artificial Intelligence, AI 2019"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Cambridge, United Kingdom"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bramer"^^xsd:string; foaf:givenName "Max"^^xsd:string; foaf:name "Max Bramer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Petridis"^^xsd:string; foaf:givenName "Miltos"^^xsd:string; foaf:name "Miltos Petridis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Johnson"^^xsd:string; foaf:givenName "Colin G."^^xsd:string; foaf:name "Colin G. Johnson"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Artificial Intelligence"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "SGAI_Short_Paper_297_Shahroz_Nadeem.pdf"^^xsd:string . rdfs:label "SGAI_Short_Paper_297_Shahroz_Nadeem.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77170 \n\nWVD: A New Synthetic Dataset for Video-based Violence Detection\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "WVD: A New Synthetic Dataset for Video-based Violence Detection (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "WVD: A New Synthetic Dataset for Video-based Violence Detection (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "WVD: A New Synthetic Dataset for Video-based Violence Detection (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "WVD: A New Synthetic Dataset for Video-based Violence Detection (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "WVD: A New Synthetic Dataset for Video-based Violence Detection (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "WVD: A New Synthetic Dataset for Video-based Violence Detection (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "Violence detection is becoming increasingly relevant in many areas such as for automatic content filtering, video surveillance and law enforcement. Existing datasets and methods discriminate between violent and non-violent scenes based on very abstract definitions of violence. Available datasets, such as \"Hockey Fight\" and \"Movies\", only contain fight versus non-fight videos; no weapons are discriminated in them. In this paper, we focus explicitly on weapon-based fighting sequences and propose a new dataset based on the popular action-adventure video game Grand Theft Auto-V (GTA-V). This new dataset is called \"Weapon Violence Dataset\" (WVD). The choice for a virtual dataset follows a trend which allows creating and labelling as sophisticated and large volume, yet realistic, datasets as possible. Furthermore, WVD also avoids the drawbacks of access to real data and potential implications. To the best of our knowledge no similar dataset, that captures weapon-based violence, exists. The paper evaluates the proposed dataset by utilising local feature descriptors using an SVM classifier. The extracted features are aggregated using the Bag of Visual Word (BoVW) technique to classify weapon-based violence videos. Our results indicate that SURF achieves\r\nthe best performance."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "11927"; dc:hasVersion ; dct:creator , , , ; dct:date "2019-11-19"; dct:isPartOf , ; dct:publisher ; dct:title "WVD: A New Synthetic Dataset for Video-based Violence Detection"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "AI-2019 39th SGAI International Conference on Artificial Intelligence"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Cambridge, United Kingdom"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bramer"^^xsd:string; foaf:givenName "Max"^^xsd:string; foaf:name "Max Bramer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Petridis"^^xsd:string; foaf:givenName "Miltos"^^xsd:string; foaf:name "Miltos Petridis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kurugollu"^^xsd:string; foaf:givenName "Fatih"^^xsd:string; foaf:name "Fatih Kurugollu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nadeem"^^xsd:string; foaf:givenName "Muhammad Shahroz"^^xsd:string; foaf:name "Muhammad Shahroz Nadeem"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N. L."^^xsd:string; foaf:name "Virginia N. L. Franqueira"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhai"^^xsd:string; foaf:givenName "Xiaojun"^^xsd:string; foaf:name "Xiaojun Zhai"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Artificial Intelligence"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "ovchinnik-AI-2019_preprint.pdf"^^xsd:string . rdfs:label "ovchinnik-AI-2019_preprint.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77372 \n\nMonotonicity Detection and Enforcement in Longitudinal Classification\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Monotonicity Detection and Enforcement in Longitudinal Classification (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Monotonicity Detection and Enforcement in Longitudinal Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Monotonicity Detection and Enforcement in Longitudinal Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Monotonicity Detection and Enforcement in Longitudinal Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Monotonicity Detection and Enforcement in Longitudinal Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Monotonicity Detection and Enforcement in Longitudinal Classification (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "Longitudinal datasets contain repeated measurements of the same variables at different points in time, which can be used by researchers to discover useful knowledge based on the changes of the data over time. Monotonic relations often occur in real-world data and need to be preserved in data mining models in order for the models to be acceptable by users. We propose a new methodology for detecting monotonic relations in longitudinal datasets and applying them in longitudinal classification model construction. Two different approaches were used to detect monotonic relations and include them into the classification task. The proposed approaches are evaluated using data from the English Lon- gitudinal Study of Ageing (ELSA) with 10 different age-related diseases used as class variables to be predicted. A gradient boosting algorithm (XGBoost) is used for constructing classification models in two scenarios: enforcing and not enforcing the constraints. The results show that enforcement of monotonicity constraints can consistently improve the predictive accuracy of the constructed models. The produced models are fully monotonic according to the monotonicity constraints, which can have a positive impact on model acceptance in real world applications."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "11927"; dc:hasVersion ; dct:creator , , ; dct:date "2019-11-19"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Monotonicity Detection and Enforcement in Longitudinal Classification"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "39th SGAI International Conference on Artificial Intelligence, AI 2019"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Cambridge, United Kingdom"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Petridis"^^xsd:string; foaf:givenName "Miltos"^^xsd:string; foaf:name "Miltos Petridis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bramer"^^xsd:string; foaf:givenName "Max"^^xsd:string; foaf:name "Max Bramer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando E.B."^^xsd:string; foaf:name "Fernando E.B. Otero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ovchinnik"^^xsd:string; foaf:givenName "Sergey"^^xsd:string; foaf:name "Sergey Ovchinnik"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Artificial Intelligence"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "full-text.pdf"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80945 \n\nSecurity and privacy solutions for smart healthcare systems\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Security and privacy solutions for smart healthcare systems (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Security and privacy solutions for smart healthcare systems (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Security and privacy solutions for smart healthcare systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Security and privacy solutions for smart healthcare systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Security and privacy solutions for smart healthcare systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Security and privacy solutions for smart healthcare systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Security and privacy solutions for smart healthcare systems (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "Smart healthcare can benefit patients and care providers. However, several challenges exist related to security and privacy. Security solutions have been developed to protect e-health users and medical databases however systematic guidelines and implementation are not rolled out in smart healthcare systems. Smart healthcare systems have specific demands when addressing security and privacy issues. From the conceptual perspective, we explored research activities related to authentication, access control, and de-identification and focus especially on key functions and features."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2019-11-15"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Security and privacy solutions for smart healthcare systems"^^xsd:string; ep:hasDocument , , , , , , ; ep:hasPublished ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "R858 Computer applications to medicine. Medical informatics. Medical information technology" . rdf:type skos:Concept; skos:prefLabel "T Technology (General)"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Lytras"^^xsd:string; foaf:givenName "Miltiadis"^^xsd:string; foaf:name "Miltiadis Lytras"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sarirete"^^xsd:string; foaf:givenName "Akila"^^xsd:string; foaf:name "Akila Sarirete"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sinnott"^^xsd:string; foaf:givenName "Richard O."^^xsd:string; foaf:name "Richard O. Sinnott"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lu"^^xsd:string; foaf:givenName "Yang"^^xsd:string; foaf:name "Yang Lu"^^xsd:string; rdf:type foaf:Person . rdfs:label "Paper24.pdf"^^xsd:string . rdfs:label "Paper24.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #76942 \n\nA Roadmap for Improving the Impact of Anti-Ransomware Research\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Roadmap for Improving the Impact of Anti-Ransomware Research (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Roadmap for Improving the Impact of Anti-Ransomware Research (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Roadmap for Improving the Impact of Anti-Ransomware Research (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Roadmap for Improving the Impact of Anti-Ransomware Research (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Roadmap for Improving the Impact of Anti-Ransomware Research (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Roadmap for Improving the Impact of Anti-Ransomware Research (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . rdf:_1 ; rdf:_2 ; rdf:_3 . , , ; bibo:abstract "Ransomware is a type of malware which restricts access to a victim’s computing resources and demands a ransom in order to restore access. This is a continually growing and costly threat across the globe, therefore efforts have been made both in academia and industry to develop techniques that can help to detect and recover from ransomware attacks. This paper aims to provide an overview of the current landscape of Windows-based anti-ransomware tools and techniques, using a clear, simple and consistent terminology in terms of Data Sources, Processing and Actions. We extensively analysed relevant literature so that, to the best of our knowledge, we had at the time covered all approaches taken to detect and recover from ransomware attacks. We grouped these techniques according to their main features as a way to understand the landscape. We then selected 15 existing anti-ransomware tools both to examine how they fit into this landscape and to compare them by aggregating their accuracy and overhead – two of the most important selection criteria of these tools – as reported by the tools’ respective authors. We were able to determine popular solutions and unexplored gaps that could lead to promising areas of anti-ransomware development. From there, we propose two novel detection techniques, namely serial byte correlation and edit distance. This paper serves as a much needed roadmap of knowledge and ideas to systematise the current landscape of anti-ransomware tools."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "11875"; dc:hasVersion ; dct:creator , , , , ; dct:date "2019-11-13"; dct:isPartOf , ; dct:publisher ; dct:title "A Roadmap for Improving the Impact of Anti-Ransomware Research"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "NordSec 2019: The 24th Nordic Conference on Secure IT Systems"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Aalborg, Denmark"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Rafnsson"^^xsd:string; foaf:givenName "Willard"^^xsd:string; foaf:name "Willard Rafnsson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pont"^^xsd:string; foaf:givenName "Jamie"^^xsd:string; foaf:name "Jamie Pont"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hansen"^^xsd:string; foaf:givenName "René Rydhof"^^xsd:string; foaf:name "René Rydhof Hansen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Brierley"^^xsd:string; foaf:givenName "Calvin"^^xsd:string; foaf:name "Calvin Brierley"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Arief"^^xsd:string; foaf:givenName "Budi"^^xsd:string; foaf:name "Budi Arief"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Askarov"^^xsd:string; foaf:givenName "Aslan"^^xsd:string; foaf:name "Aslan Askarov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio C."^^xsd:string; foaf:name "Julio C. Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Abu Oun"^^xsd:string; foaf:givenName "Osama"^^xsd:string; foaf:name "Osama Abu Oun"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #78608 \n\nBCI controlled robotic arm as assistance to the rehabilitation of neurologically disabled patients\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "BCI controlled robotic arm as assistance to the rehabilitation of neurologically disabled patients (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "BCI controlled robotic arm as assistance to the rehabilitation of neurologically disabled patients (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "BCI controlled robotic arm as assistance to the rehabilitation of neurologically disabled patients (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "BCI controlled robotic arm as assistance to the rehabilitation of neurologically disabled patients (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "BCI controlled robotic arm as assistance to the rehabilitation of neurologically disabled patients (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "BCI controlled robotic arm as assistance to the rehabilitation of neurologically disabled patients (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Purpose: Brain–computer interface (BCI)-controlled assistive robotic systems have been developed with increasing success with the aim to rehabilitation of patients after brain injury to increase independence and quality of life. While such systems may use surgically implanted invasive sensors, non-invasive alternatives can be better suited due to the ease of use, reduced cost, improvements in accuracy and reliability with the advancement of the technology and practicality of use. The consumer-grade BCI devices are often capable of integrating multiple types of signals, including Electroencephalogram (EEG) and Electromyogram (EMG) signals. Materials and Methods: This paper summarizes the development of a portable and cost-efficient BCI-controlled assistive technology using a non-invasive BCI headset “OpenBCI” and an open source robotic arm, U-Arm, to accomplish tasks related to rehabilitation, such as access to resources, adaptability or home use. The resulting system used a combination of EEG and EMG sensor readings to control the arm. To avoid risks of injury while the device is being used in clinical settings, appropriate measures were incorporated into the software control of the arm. A short survey was used following the system usability scale (SUS), to measure the usability of the technology to be trialed in clinical settings. Results: From the experimental results, it was found that EMG is a very reliable method for assistive technology control, provided that the user specific EMG calibration is done. With the EEG, even though the results were promising, due to insufficient detection of the signal, the controller was not adequate to be used within a neurorehabilitation environment. The survey indicated that the usability of the system is not a barrier for moving the system into clinical trials. Implication on rehabilitation: For the rehabilitation of patients suffering from neurological disabilities (particularly those suffering from varying degrees of paralysis), it is necessary to develop technology that bypasses the limitations of their condition. For example, if a patient is unable to walk due to the unresponsiveness in their motor neurons, technology can be developed that used an alternate input to move an exoskeleton, which enables the patient to walk again with the assistance of the exoskeleton. This research focuses on neuro-rehabilitation within the framework of the NHS at the Kent and Canterbury Hospital in UK. The hospital currently does not have any system in place for self-driven rehabilitation and instead relies on traditional rehabilitation methods through assistance from physicians and exercise regimens to maintain muscle movement. This paper summarises the development of a portable and cost-efficient BCI controlled assistive technology using a non-invasive BCI headset “OpenBCI” and an open source robotic arm, U-Arm, to accomplish tasks related to rehabilitation, such as access to resources, adaptability or home use. The resulting system used a combination of EEG and EMG sensor readings to control the arm, which could perform a number of different tasks such as picking/placing objects or assist users in eating."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2019-11-11"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "BCI controlled robotic arm as assistance to the rehabilitation of neurologically disabled patients"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Taylor & Francis"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Casey"^^xsd:string; foaf:givenName "Anthony"^^xsd:string; foaf:name "Anthony Casey"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sakel"^^xsd:string; foaf:givenName "Mohamed"^^xsd:string; foaf:name "Mohamed Sakel"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Azhar"^^xsd:string; foaf:givenName "Hannan"^^xsd:string; foaf:name "Hannan Azhar"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grzes"^^xsd:string; foaf:givenName "Marek"^^xsd:string; foaf:name "Marek Grzes"^^xsd:string; rdf:type foaf:Person . bibo:issn "17483107"; foaf:name "Disability and Rehabilitation: Assistive Technology"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Dependsys2019b.pdf"^^xsd:string . rdfs:label "Dependsys2019b.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #76678 \n\nA Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "The focus on cyber security as an interaction between technical elements and humans has typically confined consideration of the latter to practical issues of implementation, conventionally those of `human performance factors' of vigilance etc., 'raising awareness' and/or 'incentivization' of people and organizations to participate and adapt their behavior. But this is far too narrow a view that seriously constrains the ability of cyber security as a whole to adapt and evolve to keep up with adaptive, innovative attackers in a rapidly-changing technological, business and social landscape, in which personal preferences of users are also dynamically evolving. While there is isolated research across different research areas, we noticed the lack of a \\emph{holistic} framework combining a range of applicable theoretical concepts (e.g., cultural co-evolution such as technological arms races, opportunity management, behavioral and business models) and technological solutions on reducing human-related risks in the cyber security and cybercrime ecosystems, which involve multiple groups of human actors including offenders, victims, preventers and promoters. This paper reports our ongoing work in developing such a socio-technical framework 1) to allow a more comprehensive understanding of human-related risks within cyber security and cybercrime ecosystems and 2) to support the design of more effective approaches to engaging individuals and organizations in the reduction of such risks. We are in the process of instantiating this framework to encourage behavioral changes in two use cases that capture diverse and complicated socio-technical interactions in cyber-physical systems."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "1123"; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2019-11-05"; dct:isPartOf , ; dct:publisher ; dct:subject , , , ; dct:title "A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasOther ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "HM Sociology"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . dct:title "DependSys 2019: 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Guangzhou, China"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Borrion"^^xsd:string; foaf:givenName "Hervé"^^xsd:string; foaf:name "Hervé Borrion"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Becker"^^xsd:string; foaf:givenName "Ingolf"^^xsd:string; foaf:name "Ingolf Becker"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McGuire"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael McGuire"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ekblom"^^xsd:string; foaf:givenName "Paul"^^xsd:string; foaf:name "Paul Ekblom"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Posner"^^xsd:string; foaf:givenName "Rebecca"^^xsd:string; foaf:name "Rebecca Posner"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Islam"^^xsd:string; foaf:givenName "Tasmina"^^xsd:string; foaf:name "Tasmina Islam"^^xsd:string; rdf:type foaf:Person . bibo:issn "18650929"; foaf:name "Communications in Computer and Information Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Dependsys2019a.pdf"^^xsd:string . rdfs:label "Dependsys2019a.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #76677 \n\nFrom Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework (PDF)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Although there are privacy-enhancing tools designed to protect users' online privacy, it is surprising to see a lack of user-centric solutions allowing privacy control based on the joint assessment of privacy risks and benefits, due to data disclosure to \\emph{multiple} platforms. In this paper, we propose a conceptual framework to fill the gap: aiming at the user-centric privacy protection, we show the framework can not only assess privacy risks in using online services but also the added values earned from data disclosure. Through following a human-in-the-loop approach, it is expected the framework provides a personalized solution via preference learning, continuous privacy assessment, behavior monitoring and nudging. Finally, we describe a case study towards \"leisure travelers\" and several future areas to be studied in the ongoing project."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "1123"; dc:hasVersion ; dct:creator , , , ; dct:date "2019-11-05"; dct:isPartOf , ; dct:publisher ; dct:subject , , , ; dct:title "From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasOther ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . rdf:type skos:Concept; skos:prefLabel "TK7885 Computer engineering. Computer hardware"@en . dct:title "DependSys 2019: 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Guangzhou, China"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ioannou"^^xsd:string; foaf:givenName "Athina"^^xsd:string; foaf:name "Athina Ioannou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tussyadiah"^^xsd:string; foaf:givenName "Iis"^^xsd:string; foaf:name "Iis Tussyadiah"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lu"^^xsd:string; foaf:givenName "Yang"^^xsd:string; foaf:name "Yang Lu"^^xsd:string; rdf:type foaf:Person . bibo:issn "18650929"; foaf:name "Communications in Computer and Information Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90192 \n\nLocal optimality of self-organising neuro-fuzzy inference systems\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Optimality of the premise, IF part is critical to a zero-order evolving intelligent system (EIS) because this part determines the validity of the learning results and overall system performance. Nonetheless, a systematic analysis of optimality has not been done yet in the state-of-the-art works. In this paper, we use the recently introduced self-organising neuro-fuzzy inference system (SONFIS) as an example of typical zero-order EISs and analyse the local optimality of its solutions. The optimality problem is firstly formulated in a mathematical form, and detailed optimality analysis is conducted. The conclusion is that SONFIS does not generate a locally optimal solution in its original form. Then, an optimisation method is proposed for SONFIS, which helps the system to attain local optimality in a few iterations using historical data. Numerical examples presented in this paper demonstrate the validity of the optimality analysis and the effectiveness of the proposed optimisation method. In addition, it is further verified numerically that the proposed concept and general principles can be applied to other types of zero-order EISs with similar operating mechanisms."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "503"; dct:creator , , ; dct:date "2019-11-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Local optimality of self-organising neuro-fuzzy inference systems"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen"^^xsd:string; foaf:name "Plamen Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rong"^^xsd:string; foaf:givenName "Hai-Jun"^^xsd:string; foaf:name "Hai-Jun Rong"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "00200255"; foaf:name "Information Sciences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "main.pdf"^^xsd:string . rdfs:label "main.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "10.1007%2Fs10703-017-0314-7.pdf"^^xsd:string . rdfs:label "10.1007%2Fs10703-017-0314-7.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #64181 \n\nIncrementally Closing Octagons\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Incrementally Closing Octagons (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incrementally Closing Octagons (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incrementally Closing Octagons (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incrementally Closing Octagons (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incrementally Closing Octagons (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Incrementally Closing Octagons (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incrementally Closing Octagons (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incrementally Closing Octagons (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incrementally Closing Octagons (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incrementally Closing Octagons (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Incrementally Closing Octagons (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Incrementally Closing Octagons (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The octagon abstract domain is a widely used numeric abstract domain expressing relational information between variables whilst being both computationally efficient and simple to implement. Each element of the domain is a system of constraints where each constraint takes the restricted form ±xi±xj≤c. A key family of operations for the octagon domain are closure algorithms, which check satisfiability and provide a normal form for octagonal constraint systems. We present new quadratic incremental algorithms for closure, strong closure and integer closure and proofs of their correctness. We highlight the benefits and measure the performance of these new algorithms."^^xsd:string; bibo:authorList ; bibo:issue "2"; bibo:status , ; bibo:volume "54"; dc:hasVersion , ; dct:creator , , ; dct:date "2019-11"; dct:isPartOf , ; dct:publisher ; dct:title "Incrementally Closing Octagons"^^xsd:string; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chawdhary"^^xsd:string; foaf:givenName "Aziem"^^xsd:string; foaf:name "Aziem Chawdhary"^^xsd:string; rdf:type foaf:Person . foaf:familyName "King"^^xsd:string; foaf:givenName "Andy"^^xsd:string; foaf:name "Andy King"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Robbins"^^xsd:string; foaf:givenName "Ed"^^xsd:string; foaf:name "Ed Robbins"^^xsd:string; rdf:type foaf:Person . bibo:issn "09259856"; foaf:name "Formal Methods in System Design"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "58Transformation of cryptographic primitives - provable security and proof prese.pdf"^^xsd:string . rdfs:label "58Transformation of cryptographic primitives - provable security and proof prese.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #78724 \n\nTransformation of cryptographic primitives: provable security and proof presentation\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Transformation of cryptographic primitives: provable security and proof presentation (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Transformation of cryptographic primitives: provable security and proof presentation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transformation of cryptographic primitives: provable security and proof presentation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transformation of cryptographic primitives: provable security and proof presentation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transformation of cryptographic primitives: provable security and proof presentation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transformation of cryptographic primitives: provable security and proof presentation (Other)"^^xsd:string . rdf:_1 . , ; bibo:abstract "We analyse transformations between cryptographic primitives and, for each transformation, we do two studies: its provable security (proving that if the original cryptographic primitive is secure, then the transformed cryptographic primitive is also secure); its proof presentation (exploring improved ways of presenting the proof). Our contributions divide into two sets: security proofs (sometimes new proofs and sometimes variants of known proofs); proof presentations (inspired by our security proofs) and extraction of lessons learned from them."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2019-11"; dct:isPartOf ; dct:issuer , ; dct:title "Transformation of cryptographic primitives: provable security and proof presentation"^^xsd:string; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Boiten"^^xsd:string; foaf:givenName "Eerke"^^xsd:string; foaf:name "Eerke Boiten"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gaspar"^^xsd:string; foaf:givenName "Jaime"^^xsd:string; foaf:name "Jaime Gaspar"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Thompson"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Thompson"^^xsd:string; rdf:type foaf:Person . rdfs:label "3Y7CKfyKtPwmqu2Q7m6xIA.pdf"^^xsd:string . rdfs:label "3Y7CKfyKtPwmqu2Q7m6xIA.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #75142 \n\nLock Picking in the Era of Internet of Things\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Lock Picking in the Era of Internet of Things (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Lock Picking in the Era of Internet of Things (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Lock Picking in the Era of Internet of Things (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Lock Picking in the Era of Internet of Things (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Lock Picking in the Era of Internet of Things (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Lock Picking in the Era of Internet of Things (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Smart locks are a recent development in the Internet of Things that aim to modernise traditional keybased padlock systems. They allow users to operate the lock with their smartphone instead of carrying around a physical key. Typically, smart locks have a cloud system for sharing access with other people, which makes them ideal for schemes such as communal lockers or bike sharing. One of the smart locks available on the market is that produced by Master Lock. They are an established brand, and unlike many of the single product companies that have provided insecure offerings, Master Lock have so far shown that their locks are reasonably secure and resistant to known attacks such as shimming, fuzzing, and replay attacks. This paper provides a security analysis of the Master Lock Bluetooth padlock. More importantly, it reveals that there were several security vulnerabilities, including a serious one in the Application Programming Interface used by Master Lock to provide a crucial feature for managing access. We carried out a responsible disclosure exercise to Master Lock, but communication proved to be quite a challenge. In the end we managed to establish contact, and as a result the most serious vulnerabilities have now been patched. This indicates that responsible disclosure is a valuable exercise, but we still need better report-and-response mechanisms."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2019-10-31"; dct:isPartOf ; dct:publisher ; dct:title "Lock Picking in the Era of Internet of Things"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)"^^xsd:string; rdf:type bibo:Conference . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Lord"^^xsd:string; foaf:givenName "Sam"^^xsd:string; foaf:name "Sam Lord"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Knight"^^xsd:string; foaf:givenName "Edward"^^xsd:string; foaf:name "Edward Knight"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Arief"^^xsd:string; foaf:givenName "Budi"^^xsd:string; foaf:name "Budi Arief"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90193 \n\nAn Odometer-Free Approach for Unmanned Ground-Based Vehicle Simultaneous Localization and Mapping\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "Simultaneous localization and mapping (SLAM) in unknown GPS-denied environments is a very challenging problem due to the complex environment factors and the lack of prior knowledge of such environments. The performance of standard SLAM methods is dependent on odometer measurements, which, however, are unlikely to be reliable in a challenging operating environment. In this paper, a novel odometer-free approach is introduced for unmanned ground-based vehicle (UGV) to perform SLAM using only LIDAR/SONAR scans in the form of discrete point clouds. The proposed odometer-free SLAM (OF-SLAM) approach can precisely align successive sensor scans without involving other auxiliary information, e.g., odometer readings. By converting the accurately aligned point clouds into continuous local grid maps using kernel tricks, OF-SLAM creates a dynamically updating global map of the surrounding environment and further accurately localizes the UGV on the map. Simulation experiments verify the validity and effectiveness of OF-SLAM and demonstrate the proposed approach as an attractive alternative for UGV to perform SLAM and explore complex unknown environments."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , ; dct:date "2019-10-26"; dct:isPartOf ; dct:subject ; dct:title "An Odometer-Free Approach for Unmanned Ground-Based Vehicle Simultaneous Localization and Mapping"^^xsd:string; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "IEEE Nuclear Science Symposium and Medical Imaging Conference 2019"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Manchester UK"^^xsd:string . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Muhammad Aurangzeb"^^xsd:string; foaf:name "Muhammad Aurangzeb Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #77491 \n\nDLS 2019: Proceedings of the 15th ACM SIGPLAN International Symposium on Dynamic Languages\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . , ; bibo:editorList ; bibo:status , ; dct:date "2019-10-20"; dct:isPartOf ; dct:publisher ; dct:title "DLS 2019: Proceedings of the 15th ACM SIGPLAN International Symposium on Dynamic Languages"^^xsd:string; rdf:type bibo:Article, ep:EPrint, ep:EdbookEPrint; rdfs:seeAlso . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Fumero"^^xsd:string; foaf:givenName "Juan"^^xsd:string; foaf:name "Juan Fumero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "mplr19-aumayr-et-al-asynchronous-snapshots-of-actor-systems-for-latency-sensitive-applications.pdf"^^xsd:string . rdfs:label "mplr19-aumayr-et-al-asynchronous-snapshots-of-actor-systems-for-latency-sensitive-applications.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77490 \n\nAsynchronous Snapshots of Actor Systems for Latency-Sensitive Applications\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Asynchronous Snapshots of Actor Systems for Latency-Sensitive Applications (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Asynchronous Snapshots of Actor Systems for Latency-Sensitive Applications (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Asynchronous Snapshots of Actor Systems for Latency-Sensitive Applications (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Asynchronous Snapshots of Actor Systems for Latency-Sensitive Applications (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Asynchronous Snapshots of Actor Systems for Latency-Sensitive Applications (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Asynchronous Snapshots of Actor Systems for Latency-Sensitive Applications (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "The actor model is popular for many types of server applications. Efficient snapshotting of applications is crucial in the deployment of pre-initialized applications or moving running applications to different machines, e.g for debugging purposes. A key issue is that snapshotting blocks all other operations. In modern latency-sensitive applications, stopping the application to persist its state needs to be avoided, because users may not tolerate the increased request latency. In order to minimize the impact of snapshotting on request latency, our approach persists the application’s state asynchronously by capturing partial heaps, completing snapshots step by step. Additionally, our solution is transparent and supports arbitrary object graphs. We prototyped our snapshotting approach on top of the Truffle/Graal platform and evaluated it with the Savina benchmarks and the Acme Air microservice application. When performing a snapshot every thousand Acme Air requests, the number of slow requests ( 0.007% of all requests) with latency above 100ms increases by 5.43%. Our Savina microbenchmark results detail how different utilization patterns impact snapshotting cost. To the best of our knowledge, this is the first system that enables asynchronous snapshotting of actor applications, i.e. without stop-the-world synchronization, and thereby minimizes the impact on latency. We thus believe it enables new deployment and debugging options for actor systems."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2019-10-20"; dct:isPartOf ; dct:publisher ; dct:title "Asynchronous Snapshots of Actor Systems for Latency-Sensitive Applications"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "16th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Athens, Greece"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Mössenböck"^^xsd:string; foaf:givenName "Hanspeter"^^xsd:string; foaf:name "Hanspeter Mössenböck"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gonzalez Boix"^^xsd:string; foaf:givenName "Elisa"^^xsd:string; foaf:name "Elisa Gonzalez Boix"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Aumayr"^^xsd:string; foaf:givenName "Dominik"^^xsd:string; foaf:name "Dominik Aumayr"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "vmil19-gariano-et-al-which-of-my-transient-type-checks-are-not-almost-free.pdf"^^xsd:string . rdfs:label "vmil19-gariano-et-al-which-of-my-transient-type-checks-are-not-almost-free.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77492 \n\nWhich of My Transient Type Checks Are Not (Almost) Free?\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Which of My Transient Type Checks Are Not (Almost) Free? (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Which of My Transient Type Checks Are Not (Almost) Free? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Which of My Transient Type Checks Are Not (Almost) Free? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Which of My Transient Type Checks Are Not (Almost) Free? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Which of My Transient Type Checks Are Not (Almost) Free? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Which of My Transient Type Checks Are Not (Almost) Free? (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "One form of type checking used in gradually typed language is transient type checking: whenever an object ‘flows’ through code with a type annotation, the object is dynamically checked to ensure it has the methods required by the annotation. Just-in-time compilation and optimisation in virtual machines can eliminate much of the overhead of run-time transient type checks. Unfortunately this optimisation is not uniform: some type checks will significantly decrease, or even increase, a program’s performance. In this paper, we refine the so called “Takikawa” protocol, and use it to identify which type annotations have the greatest effects on performance. In particular, we show how graphing the performance of such benchmarks when varying which type annotations are present in the source code can be used to discern potential patterns in performance. We demonstrate our approach by testing the Moth virtual machine: for many of the benchmarks where Moth’s transient type checking impacts performance, we have been able to identify one or two specific type annotations that are the likely cause. Without these type annotations, the performance impact of transient type checking becomes negligible. Using our technique programmers can optimise programs by removing expensive type checks, and VM engineers can identify new opportunities for compiler optimisation."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2019-10-20"; dct:isPartOf , ; dct:publisher ; dct:title "Which of My Transient Type Checks Are Not (Almost) Free?"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "11th ACM SIGPLAN International Workshop on Virtual Machines and Intermediate Languages"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Athens, Greece"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Gariano"^^xsd:string; foaf:givenName "Isaac Oscar"^^xsd:string; foaf:name "Isaac Oscar Gariano"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Noble"^^xsd:string; foaf:givenName "James"^^xsd:string; foaf:name "James Noble"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Homer"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Homer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Roberts"^^xsd:string; foaf:givenName "Richard"^^xsd:string; foaf:name "Richard Roberts"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . foaf:name "VMIL 2019 Proceedings of the 11th ACM SIGPLAN International Workshop on Virtual Machines and Intermediate Languages"^^xsd:string; rdf:type bibo:Collection . rdfs:label "embc2_camera_ready.pdf"^^xsd:string . rdfs:label "embc2_camera_ready.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73784 \n\nFusion of End-to-End Deep Learning Models for Sequence-to-Sequence Sleep Staging\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Fusion of End-to-End Deep Learning Models for Sequence-to-Sequence Sleep Staging (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Fusion of End-to-End Deep Learning Models for Sequence-to-Sequence Sleep Staging (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fusion of End-to-End Deep Learning Models for Sequence-to-Sequence Sleep Staging (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fusion of End-to-End Deep Learning Models for Sequence-to-Sequence Sleep Staging (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fusion of End-to-End Deep Learning Models for Sequence-to-Sequence Sleep Staging (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fusion of End-to-End Deep Learning Models for Sequence-to-Sequence Sleep Staging (Other)"^^xsd:string . rdf:_1 . , , , , ; bibo:abstract "Sleep staging, a process of identifying the sleep stages associated with polysomnography (PSG) epochs, plays an important role in sleep monitoring and diagnosing sleep disorders. We present in this work a model fusion approach to automate this task. The fusion model is composed of two base sleep-stage classifiers, SeqSleepNet and DeepSleepNet, both of which are state-of-the-art end-to-end deep learning models complying to the sequence-to-sequence sleep staging scheme. In addition, in the light of ensemble methods, we reason and demonstrate that these two networks form a good ensemble of models due to their high diversity. Experiments show that the fusion approach is able to preserve the strength of the base networks in the fusion model, leading to consistent performance gains over the two base networks. The fusion model obtain the best modelling results we have observed so far on the Montreal Archive of Sleep Studies (MASS) dataset with 200 subjects, achieving an overall accuracy of 88.0%, a macro F1-score of 84.3%, and a Cohen’s kappa of 0.828."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator ; dct:date "2019-10-07"; dct:isPartOf , ; dct:publisher ; dct:title "Fusion of End-to-End Deep Learning Models for Sequence-to-Sequence Sleep Staging"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Berlin, Germany"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Koch"^^xsd:string; foaf:givenName "Philipp"^^xsd:string; foaf:name "Philipp Koch"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Vos"^^xsd:string; foaf:givenName "Maarten"^^xsd:string; foaf:name "Maarten De Vos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mertins"^^xsd:string; foaf:givenName "Alfred"^^xsd:string; foaf:name "Alfred Mertins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chén"^^xsd:string; foaf:givenName "Oliver Y."^^xsd:string; foaf:name "Oliver Y. Chén"^^xsd:string; rdf:type foaf:Person . bibo:issn "1557170X"; foaf:name "2019 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "EMBC19_1764_FI.pdf"^^xsd:string . rdfs:label "EMBC19_1764_FI.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73782 \n\nA Recurrent Neural Network for Hand Gesture Recognition based on Accelerometer Data\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Recurrent Neural Network for Hand Gesture Recognition based on Accelerometer Data (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Recurrent Neural Network for Hand Gesture Recognition based on Accelerometer Data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Recurrent Neural Network for Hand Gesture Recognition based on Accelerometer Data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Recurrent Neural Network for Hand Gesture Recognition based on Accelerometer Data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Recurrent Neural Network for Hand Gesture Recognition based on Accelerometer Data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Recurrent Neural Network for Hand Gesture Recognition based on Accelerometer Data (Other)"^^xsd:string . rdf:_1 . , , , , , ; bibo:abstract "For many applications, hand gesture recognition systems that rely on biosignal data exclusively are mandatory. Usually, theses systems have to be affordable, reliable as well as mobile. The hand is moved due to muscle contractions that cause motions of the forearm skin. Theses motions can be captured with cheap and reliable accelerometers placed around the forearm. Since accelerometers can also be integrated into mobile systems easily, the possibility of a robust hand gesture recognition based on accelerometer signals is evaluated in this work. For this, a neural network architecture consisting of two different kinds of recurrent neural network (RNN) cells is proposed. Experiments on three databases reveal that this relatively small network outperforms by far state-of-the-art hand gesture recognition approaches that rely on multi-modal data. The combination of accelerometer data and an RNN forms a robust hand gesture classification system, i.e., the performance of the network does not vary a lot between subjects and it is outstanding for amputees. Furthermore, the proposed network uses only 5 ms short windows to classify the hand gestures. Consequently, this approach allows for a quick, and potentially delay-free hand gesture detection."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator ; dct:date "2019-10-07"; dct:isPartOf , ; dct:publisher ; dct:title "A Recurrent Neural Network for Hand Gesture Recognition based on Accelerometer Data"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Berlin, Germany"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Koch"^^xsd:string; foaf:givenName "Philipp"^^xsd:string; foaf:name "Philipp Koch"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Böhme"^^xsd:string; foaf:givenName "Martina"^^xsd:string; foaf:name "Martina Böhme"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Maass"^^xsd:string; foaf:givenName "Marco"^^xsd:string; foaf:name "Marco Maass"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dreier"^^xsd:string; foaf:givenName "Mark"^^xsd:string; foaf:name "Mark Dreier"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mertins"^^xsd:string; foaf:givenName "Alfred"^^xsd:string; foaf:name "Alfred Mertins"^^xsd:string; rdf:type foaf:Person . bibo:issn "15584615"; foaf:name "Engineering in Medicine and Biology Society (EMBC), Annual International Conference of the IEEE"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "C3ISP Gateway-v1.0.pdf"^^xsd:string . rdfs:label "C3ISP Gateway-v1.0.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #74547 \n\nEnabling Privacy-preserving Sharing of Cyber Threat Information in the Cloud\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Enabling Privacy-preserving Sharing of Cyber Threat Information in the Cloud (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Enabling Privacy-preserving Sharing of Cyber Threat Information in the Cloud (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling Privacy-preserving Sharing of Cyber Threat Information in the Cloud (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling Privacy-preserving Sharing of Cyber Threat Information in the Cloud (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling Privacy-preserving Sharing of Cyber Threat Information in the Cloud (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling Privacy-preserving Sharing of Cyber Threat Information in the Cloud (Other)"^^xsd:string . rdf:_1 . , , , ; bibo:abstract "Network threats often come from multiple sources and affect a variety of domains. Collaborative sharing and analysis of Cyber Threat Information (CTI) can greatly improve the prediction and prevention of cyber-attacks. However, CTI data containing sensitive and confidential information can cause privacy exposure and disclose security risks, which will deter organisations from sharing their CTI data. To address these concerns, the consortium of the EU H2020 project entitled Collaborative and Confidential Information Sharing and Analysis for Cyber Protection (C3ISP) has designed and implemented a framework (i.e. C3ISP Framework) as a service for cyber threat management. This paper focuses on the design and development of an API Gateway, which provides a bridge between end-users and their data sources, and the C3ISP Framework. It facilitates end-users to retrieve their CTI data, regulate data sharing agreements in order to sanitise the data, share the data with privacy-preserving means, and invoke collaborative analysis for attack prediction and prevention. In this paper, we report on the implementation of the API Gateway and experiments performed. The results of these experiments show the efficiency of our gateway design, and the benefits for the end-users who use it to access the C3ISP Framework."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator ; dct:date "2019-10-03"; dct:isPartOf , ; dct:publisher ; dct:title "Enabling Privacy-preserving Sharing of Cyber Threat Information in the Cloud"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chadwick"^^xsd:string; foaf:givenName "David W."^^xsd:string; foaf:name "David W. Chadwick"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ziembicka"^^xsd:string; foaf:givenName "Joanna"^^xsd:string; foaf:name "Joanna Ziembicka"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Lemos"^^xsd:string; foaf:givenName "Rogerio"^^xsd:string; foaf:name "Rogerio de Lemos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fan"^^xsd:string; foaf:givenName "Wenjun"^^xsd:string; foaf:name "Wenjun Fan"^^xsd:string; rdf:type foaf:Person . foaf:name "IEEE International Conference on Cyber Security and Cloud Computing"^^xsd:string; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "3360572.pdf"^^xsd:string . rdfs:label "3360572.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #76575 \n\nReliable and Fast DWARF-Based Stack Unwinding\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Reliable and Fast DWARF-Based Stack Unwinding (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Reliable and Fast DWARF-Based Stack Unwinding (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliable and Fast DWARF-Based Stack Unwinding (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliable and Fast DWARF-Based Stack Unwinding (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliable and Fast DWARF-Based Stack Unwinding (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliable and Fast DWARF-Based Stack Unwinding (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Reliable and Fast DWARF-Based Stack Unwinding (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Reliable and Fast DWARF-Based Stack Unwinding (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliable and Fast DWARF-Based Stack Unwinding (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliable and Fast DWARF-Based Stack Unwinding (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliable and Fast DWARF-Based Stack Unwinding (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reliable and Fast DWARF-Based Stack Unwinding (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Debug information, usually encoded in the DWARF format, is a hidden and obscure component of our computing infrastructure. Debug information is obviously used by debuggers, but it also plays a key role in program analysis tools, and, most surprisingly, it can be relied upon by the runtime of high-level programming languages. For instance the C++ runtime leverages DWARF stack unwind tables to implement exceptions!Alas, generating debug information adds significant burden to compiler implementations, and the debug information itself can be pervaded by subtle bugs, making the whole infrastructure unreliable. Additionally,interpreting the debug tables is a time-consuming task and, for some applications as sampling profilers, it turns out to be a performance bottleneck.In this paper we focus on the DWARF.eh_frame table, that enables stack unwinding in absence of frame-pointers. We will describe two techniques to perform validation and synthesis of the DWARF stack unwinding tables, and their implementation for the x86_64 architecture. The validation tool has proven effective for compiler and inline assembly testing, while the synthesis tool can generate DWARF unwind tables for arbitrary binaries lacking debug information. Additionally, we report on a technique to precompile unwind tables into native x86_64 code, which we have implemented and integrated into libunwind, resulting in 11x-25xDWARF-based unwind speedups."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "3"; dc:hasVersion , ; dct:creator , , ; dct:date "2019-10-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Reliable and Fast DWARF-Based Stack Unwinding"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Association for Computing Machinery"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bastian"^^xsd:string; foaf:givenName "Théophile"^^xsd:string; foaf:name "Théophile Bastian"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zappa Nardelli"^^xsd:string; foaf:givenName "Francesco"^^xsd:string; foaf:name "Francesco Zappa Nardelli"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kell"^^xsd:string; foaf:givenName "Stephen"^^xsd:string; foaf:name "Stephen Kell"^^xsd:string; rdf:type foaf:Person . foaf:name "Proceedings of the ACM on Programming Languages"^^xsd:string; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #80312 \n\nThe Art, Science, and Engineering of Programming\n\n"; foaf:primaryTopic . rdf:_1 . ; bibo:editorList ; bibo:issue "2"; bibo:status ; bibo:volume "4"; dct:date "2019-09-30"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "The Art, Science, and Engineering of Programming"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, ep:EPrint, ep:EdjournalEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "AOSA"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . bibo:issn "24737321"; foaf:name "The Art, Science, and Engineering of Programming"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Performance_Evaluation_of_Manifold_Algorithms_on_a_P300_Paradigm_based_Online_BCI_Dataset final.pdf"^^xsd:string . rdfs:label "Performance_Evaluation_of_Manifold_Algorithms_on_a_P300_Paradigm_based_Online_BCI_Dataset final.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79906 \n\nPerformance Evaluation of Manifold Algorithms on a P300 Paradigm Based Online BCI Dataset\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Performance Evaluation of Manifold Algorithms on a P300 Paradigm Based Online BCI Dataset (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Performance Evaluation of Manifold Algorithms on a P300 Paradigm Based Online BCI Dataset (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Performance Evaluation of Manifold Algorithms on a P300 Paradigm Based Online BCI Dataset (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Performance Evaluation of Manifold Algorithms on a P300 Paradigm Based Online BCI Dataset (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Performance Evaluation of Manifold Algorithms on a P300 Paradigm Based Online BCI Dataset (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Performance Evaluation of Manifold Algorithms on a P300 Paradigm Based Online BCI Dataset (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 ; rdf:_2 ; rdf:_3 . , , ; bibo:abstract "Healthcare field is highly benefited by incorporating BCI for detection and diagnosis of some health related detriment as well as rehabilitation and restoration of certain disabilities. An EEG dataset acquired from 15 high-functioning ASD patients, while they were undergoing a P300 experiment in a virtual reality platform, was analysed in this paper using three algorithms. Performance of Bayes Linear Discriminant Analysis (BLDA) was predominant over Convolutional Neural Network (CNN) and Random Undersampling (RUS) Boosting. BLDA rendered 73% overall accuracy in predicting target and the best accuracy for each subject using CNN or BLDA yielded an overall accuracy of 76%."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2019-09-25"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Performance Evaluation of Manifold Algorithms on a P300 Paradigm Based Online BCI Dataset"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Neves"^^xsd:string; foaf:givenName "Nuno"^^xsd:string; foaf:name "Nuno Neves"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gupta"^^xsd:string; foaf:givenName "Cota Navin"^^xsd:string; foaf:name "Cota Navin Gupta"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Henriques"^^xsd:string; foaf:givenName "Jorge"^^xsd:string; foaf:name "Jorge Henriques"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Carvalho"^^xsd:string; foaf:givenName "Paolo de"^^xsd:string; foaf:name "Paolo de Carvalho"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chatterjee"^^xsd:string; foaf:givenName "Bipra"^^xsd:string; foaf:name "Bipra Chatterjee"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ramaswamy"^^xsd:string; foaf:givenName "Palaniappan"^^xsd:string; foaf:name "Palaniappan Ramaswamy"^^xsd:string; rdf:type foaf:Person . foaf:name "Proceedings of XV Mediterranean Conference on Medical and Biological Engineering and Computing – MEDICON 2019"^^xsd:string; rdf:type bibo:Collection . rdfs:label "1706.02559.pdf"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "Measurement-Driven.pdf"^^xsd:string . rdfs:label "Measurement-Driven.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #78089 \n\nMeasurement-driven analog of adiabatic quantum computation for frustration-free Hamiltonians\n\n"; foaf:primaryTopic . dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Measurement-driven analog of adiabatic quantum computation for frustration-free Hamiltonians (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Measurement-driven analog of adiabatic quantum computation for frustration-free Hamiltonians (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Measurement-driven analog of adiabatic quantum computation for frustration-free Hamiltonians (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Measurement-driven analog of adiabatic quantum computation for frustration-free Hamiltonians (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Measurement-driven analog of adiabatic quantum computation for frustration-free Hamiltonians (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Measurement-driven analog of adiabatic quantum computation for frustration-free Hamiltonians (Other)"^^xsd:string . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Measurement-driven analog of adiabatic quantum computation for frustration-free Hamiltonians (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Measurement-driven analog of adiabatic quantum computation for frustration-free Hamiltonians (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Measurement-driven analog of adiabatic quantum computation for frustration-free Hamiltonians (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Measurement-driven analog of adiabatic quantum computation for frustration-free Hamiltonians (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Measurement-driven analog of adiabatic quantum computation for frustration-free Hamiltonians (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Measurement-driven analog of adiabatic quantum computation for frustration-free Hamiltonians (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "The adiabatic quantum algorithm has drawn intense interest as a potential approach to accelerating optimization tasks using quantum computation. The algorithm is most naturally realized in systems which support Hamiltonian evolution rather than discrete gates. We explore an alternative approach in which slowly varying measurements are used to mimic adiabatic evolution. We show that, for certain Hamiltonians, which remain frustration free all along the adiabatic path, the necessary measurements can be implemented through the measurement of random terms from the Hamiltonian. This offers a potentially more viable method of realizing adiabatic evolution in gate-based quantum computer architectures."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "100"; dc:hasVersion , ; dct:creator , , , ; dct:date "2019-09-23"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Measurement-driven analog of adiabatic quantum computation for frustration-free Hamiltonians"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QC174.12 Quantum theory"@en . foaf:name "American Physical Society"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Benjamin"^^xsd:string; foaf:givenName "Simon C."^^xsd:string; foaf:name "Simon C. Benjamin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fitzsimons"^^xsd:string; foaf:givenName "Joseph F."^^xsd:string; foaf:name "Joseph F. Fitzsimons"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pérez-Delgado"^^xsd:string; foaf:givenName "Carlos A"^^xsd:string; foaf:name "Carlos A Pérez-Delgado"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhao"^^xsd:string; foaf:givenName "Liming"^^xsd:string; foaf:name "Liming Zhao"^^xsd:string; rdf:type foaf:Person . bibo:issn "24699926"; foaf:name "Physical Review A"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #76899 \n\nThe Social and Psychological Impact of Cyberattacks\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "The Social and Psychological Impact of Cyberattacks (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The Social and Psychological Impact of Cyberattacks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Social and Psychological Impact of Cyberattacks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Social and Psychological Impact of Cyberattacks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Social and Psychological Impact of Cyberattacks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Social and Psychological Impact of Cyberattacks (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "Cyber-attacks have become as commonplace as the Internet itself. Each year, industry reports, media outlets and academic articles highlight this increased prevalence, spanning both the amount and variety of attacks and cybercrimes. In this article, we seek to further advance discussions on cyber threats, cognitive vulnerabilities and cyberpsychology through a critical reflection on the social and psychological aspects related to cyber-attacks. In particular, we are interested in understanding how members of the public perceive and engage with risk and how they are impacted during and after a cyber-attack has occurred. This research focuses on key cognitive issues relevant to comprehending public reactions to malicious cyber events including risk perception, protection motivation, culture, and attacker characteristics (e.g., attacker identity, target identity and scale of attack). To consider the applicability of our findings, we investigate two significant cyber-attacks over the last few years, namely the WannaCry attack of 2017 and the Lloyds Banking Group attack in the same year."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2019-09-21"; dct:isPartOf ; dct:publisher ; dct:subject , , , ; dct:title "The Social and Psychological Impact of Cyberattacks"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "HV Social pathology. Social and public welfare"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Academic Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bada"^^xsd:string; foaf:givenName "Maria"^^xsd:string; foaf:name "Maria Bada"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Benson"^^xsd:string; foaf:givenName "Vladlena"^^xsd:string; foaf:name "Vladlena Benson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McAlaney"^^xsd:string; foaf:givenName "John"^^xsd:string; foaf:name "John McAlaney"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #91418 \n\nA robust framework for acoustic scene classification\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Acoustic scene classification (ASC) using front-end timefrequency features and back-end neural network classifiers has\r\ndemonstrated good performance in recent years. However a profusion of systems has arisen to suit different tasks and datasets, utilising different feature and classifier types. This paper aims at a robust framework that can explore and utilise a range of different time-frequency features and neural networks,\r\neither singly or merged, to achieve good classification performance. In particular, we exploit three different types of frontend time-frequency feature; log energy Mel filter, Gammatone filter and constant Q transform. At the back-end we evaluate effective a two-stage model that exploits a Convolutional\r\nNeural Network for pre-trained feature extraction, followed by Deep Neural Network classifiers as a post-trained feature adaptation model and classifier. We also explore the use of a data augmentation technique for these features that effectively generates a variety of intermediate data, reinforcing model learning abilities, particularly for marginal cases. We assess performance on the DCASE2016 dataset, demonstrating good classification accuracies exceeding 90%, significantly outperforming the DCASE2016 baseline and highly competitive compared to state-of-the-art systems."^^xsd:string; bibo:authorList ; bibo:status , ; dct:creator , , , ; dct:date "2019-09-20"; dct:isPartOf ; dct:title "A robust framework for acoustic scene classification"^^xsd:string; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pham"^^xsd:string; foaf:givenName "Lam Dang"^^xsd:string; foaf:name "Lam Dang Pham"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . rdfs:label "fcz017.pdf"^^xsd:string . rdfs:label "fcz017.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "fcz017.pdf"^^xsd:string . rdfs:label "fcz017.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #76439 \n\nLongitudinal assessments highlight long-term behavioural recovery in disorders of consciousness\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Longitudinal assessments highlight long-term behavioural recovery in disorders of consciousness (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Longitudinal assessments highlight long-term behavioural recovery in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Longitudinal assessments highlight long-term behavioural recovery in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Longitudinal assessments highlight long-term behavioural recovery in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Longitudinal assessments highlight long-term behavioural recovery in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Longitudinal assessments highlight long-term behavioural recovery in disorders of consciousness (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Longitudinal assessments highlight long-term behavioural recovery in disorders of consciousness (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Longitudinal assessments highlight long-term behavioural recovery in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Longitudinal assessments highlight long-term behavioural recovery in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Longitudinal assessments highlight long-term behavioural recovery in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Longitudinal assessments highlight long-term behavioural recovery in disorders of consciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Longitudinal assessments highlight long-term behavioural recovery in disorders of consciousness (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "Accurate diagnosis and prognosis of disorders of consciousness is complicated by the variability amongst patients’ trajectories. However, the majority of research and scientific knowledge in this field is based on cross-sectional studies. The translational gap in applying this knowledge to inform clinical management can only be bridged by research that systematically examines follow-up. Here, we present findings from a novel longitudinal study of the long-term recovery trajectory of 39 patients, repeatedly assessed using the Coma Recovery Scale – Revised once every 3 months for 2 years, generating 185 assessments. Despite the expected inter-patient variability, there was a statistically significant improvement in behaviour over time. Further, improvements began approximately 22 months after injury. Individual variation in the trajectory of recovery was influenced by initial diagnosis. Patients with an initial diagnosis of unresponsive wakefulness state, who progressed to the minimally conscious state, did so at a median of 485 days following onset – later than 12-month period after which current guidelines propose permanence. While current guidelines are based on the expectation that patients with traumatic brain injury show potential for recovery over longer periods than those with non-traumatic injury, we did not observe any differences between trajectories in these two subgroups. However, age was a significant predictor, with younger patients showing more promising recovery. Also, progressive increases in arousal contributed exponentially to improvements in behavioural awareness, especially in minimally conscious patients. These findings highlight the importance of indexing arousal when measuring awareness, and the potential for interventions to regulate arousal to aid long-term behavioural recovery in disorders of consciousness."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion , ; dct:creator , , , , , , ; dct:date "2019-09-19"; dct:isPartOf , ; dct:publisher ; dct:title "Longitudinal assessments highlight long-term behavioural recovery in disorders of consciousness"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Oxford University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bareham"^^xsd:string; foaf:givenName "Corinne"^^xsd:string; foaf:name "Corinne Bareham"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Allanson"^^xsd:string; foaf:givenName "Judith"^^xsd:string; foaf:name "Judith Allanson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Menon"^^xsd:string; foaf:givenName "David K."^^xsd:string; foaf:name "David K. Menon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Roberts"^^xsd:string; foaf:givenName "Neil"^^xsd:string; foaf:name "Neil Roberts"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pickard"^^xsd:string; foaf:givenName "John D."^^xsd:string; foaf:name "John D. Pickard"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hutchinson"^^xsd:string; foaf:givenName "Peter J. A."^^xsd:string; foaf:name "Peter J. A. Hutchinson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chennu"^^xsd:string; foaf:givenName "Srivas"^^xsd:string; foaf:name "Srivas Chennu"^^xsd:string; rdf:type foaf:Person . foaf:name "Brain Communications"^^xsd:string; rdf:type bibo:Collection . rdfs:label "TBIOM2941728.pdf"^^xsd:string . rdfs:label "TBIOM2941728.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #76574 \n\nExploring Mobile Biometric Performance through Identification of Core Factors and Relationships\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Exploring Mobile Biometric Performance through Identification of Core Factors and Relationships (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Exploring Mobile Biometric Performance through Identification of Core Factors and Relationships (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Exploring Mobile Biometric Performance through Identification of Core Factors and Relationships (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Exploring Mobile Biometric Performance through Identification of Core Factors and Relationships (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Exploring Mobile Biometric Performance through Identification of Core Factors and Relationships (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Exploring Mobile Biometric Performance through Identification of Core Factors and Relationships (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Biometrics, as a form of authentication, has existed for several decades and shows no signs of slowing down. Extensive research has been carried out into enhancing systems either by improving error rates or ease of adoption by examining barriers to use. In this paper, we investigate factors of a biometric system that is likely to affect performance, in particular, focusing on mobile device implementation. By surveying the area, we have identified seven core factors that help to form a clearer understanding of what changes the performance of a system. These seven factors are Users, Modality, Environments, Diversity of Scenarios, System Constraints, Hardware and Algorithms and form ‘The Core Factors Affecting Mobile Biometric Performance’. We utilise these factors to illustrate the practicalities of mobile implementations and indicate future considerations to explore future performance enhancements and provide an informative overview to developers, implementers and testers of biometrics systems, enabling the binning of performance alterations within one of these factors."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "1"; dc:hasVersion ; dct:creator , , , ; dct:date "2019-09-18"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Exploring Mobile Biometric Performance through Identification of Core Factors and Relationships"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "TK7882.B56 Biometric identification"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Corsetti"^^xsd:string; foaf:givenName "Barbara"^^xsd:string; foaf:name "Barbara Corsetti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Deravi"^^xsd:string; foaf:givenName "Farzin"^^xsd:string; foaf:name "Farzin Deravi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Boakes"^^xsd:string; foaf:givenName "Matthew"^^xsd:string; foaf:name "Matthew Boakes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Guest"^^xsd:string; foaf:givenName "Richard"^^xsd:string; foaf:name "Richard Guest"^^xsd:string; rdf:type foaf:Person . bibo:issn "26376407"; foaf:name "IEEE Transactions on Biometrics, Behavior, and Identity Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #76668 \n\nAesthetics, Artificial Intelligence, and Search-based Art\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Aesthetics, Artificial Intelligence, and Search-based Art (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Aesthetics, Artificial Intelligence, and Search-based Art (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Aesthetics, Artificial Intelligence, and Search-based Art (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Aesthetics, Artificial Intelligence, and Search-based Art (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Aesthetics, Artificial Intelligence, and Search-based Art (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Aesthetics, Artificial Intelligence, and Search-based Art (Other)"^^xsd:string . rdf:_1 . rdf:_1 ; rdf:_2 ; rdf:_3 . , , ; bibo:abstract "Why do people exhibit particular behaviour towards a class of objects called artworks? That is the topic of study in aesthetics. This paper explores how various theories of aesthetics can be interpreted in the context of artworks generated by artificial intelligence systems, in particular those that are grounded in the idea of search as a means of implementing intelligence computationally. A number of aesthetic theories are explored, including ideas of imitation, skill, form, expression, imagination, and focus. The paper concludes by highlighting a number of areas that, in light of these considerations, have been neglected by the makers of computer art systems and which provide future opportunities in this area."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; dc:hasVersion ; dct:creator ; dct:date "2019-09-18"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "Aesthetics, Artificial Intelligence, and Search-based Art"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "N Visual arts (General). For photography, see TR"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Johnson"^^xsd:string; foaf:givenName "Colin G."^^xsd:string; foaf:name "Colin G. Johnson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Greenfield"^^xsd:string; foaf:givenName "Gary"^^xsd:string; foaf:name "Gary Greenfield"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Romero"^^xsd:string; foaf:givenName "Juan"^^xsd:string; foaf:name "Juan Romero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Machado"^^xsd:string; foaf:givenName "Penousal"^^xsd:string; foaf:name "Penousal Machado"^^xsd:string; rdf:type foaf:Person . rdfs:label "epjconf_chep2018_08026.pdf"^^xsd:string . rdfs:label "epjconf_chep2018_08026.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77164 \n\nIntegration and Evaluation of QUIC and TCP-BBR in longhaul Science Data Transfers\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Integration and Evaluation of QUIC and TCP-BBR in longhaul Science Data Transfers (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Integration and Evaluation of QUIC and TCP-BBR in longhaul Science Data Transfers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Integration and Evaluation of QUIC and TCP-BBR in longhaul Science Data Transfers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Integration and Evaluation of QUIC and TCP-BBR in longhaul Science Data Transfers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Integration and Evaluation of QUIC and TCP-BBR in longhaul Science Data Transfers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Integration and Evaluation of QUIC and TCP-BBR in longhaul Science Data Transfers (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Two recent and promising additions to the internet protocols are TCP-BBR and QUIC. BBR defines a congestion policy that promises a better control in TCP bottlenecks on long haul transfers and can also be used in the QUIC protocol. TCP-BBR is implemented in the Linux kernels above 4.9. It has been shown, however, to demand careful fine tuning in the interaction, for example, with the Linux Fair Queue. QUIC, on the other hand, replaces HTTP and TLS with a protocol on the top of UDP and thin layer to serve HTTP. It has been reported to account today for 7% of Google’s traffic. It has not been used in server-to-server transfers even if its creators see that as a real possibility. Our work evaluates the applicability and tuning of TCP-BBR and QUIC for data science transfers. We describe the deployment and performance evaluation of TCP-BBR and comparison with CUBIC and H-TCP in transfers through the TEIN link to Singaren (Singapore). Also described is the deployment and initial evaluation of a QUIC server. We argue that QUIC might be a perfect match in security and connectivity to base services that are today performed by the Xroot redirectors."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "214"; dc:hasVersion ; dct:creator , , ; dct:date "2019-09-17"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Integration and Evaluation of QUIC and TCP-BBR in longhaul Science Data Transfers"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "EDP Sciences"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Rand"^^xsd:string; foaf:givenName "Duncan"^^xsd:string; foaf:name "Duncan Rand"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lopes"^^xsd:string; foaf:givenName "Raul H.C."^^xsd:string; foaf:name "Raul H.C. Lopes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N.L."^^xsd:string; foaf:name "Virginia N.L. Franqueira"^^xsd:string; rdf:type foaf:Person . bibo:issn "2100014X"; foaf:name "EPJ Web Conferences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "crest_magazine_crs10_hr_12.pdf"^^xsd:string . rdfs:label "crest_magazine_crs10_hr_12.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #90293 \n\nCyber Resilience: What Is It And How Do We Get It?\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Cyber Resilience: What Is It And How Do We Get It? (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Resilience: What Is It And How Do We Get It? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Resilience: What Is It And How Do We Get It? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Resilience: What Is It And How Do We Get It? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Resilience: What Is It And How Do We Get It? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber Resilience: What Is It And How Do We Get It? (Other)"^^xsd:string . rdf:_1 . bibo:abstract "Prepare, Absorb, Recover, and Adapt: How organisations can better respond to cyber attacks and harms."^^xsd:string; bibo:authorList ; bibo:issue "10"; bibo:status , ; dc:hasVersion ; dct:creator ; dct:date "2019-09-10"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Cyber Resilience: What Is It And How Do We Get It?"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "The Centre for Research and Evidence on Security Threats (CREST)"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "23980540"; foaf:name "CREST Security Review Magazine"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "se4science19.pdf"^^xsd:string . rdfs:label "se4science19.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79924 \n\nLearning Units-of-Measure from Scientific Code\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Learning Units-of-Measure from Scientific Code (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Learning Units-of-Measure from Scientific Code (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Learning Units-of-Measure from Scientific Code (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Learning Units-of-Measure from Scientific Code (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Learning Units-of-Measure from Scientific Code (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Learning Units-of-Measure from Scientific Code (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "CamFort is our multi-purpose tool for lightweight analysis and verification of scientific Fortran code. One core feature provides units-of-measure verification (dimensional analysis) of programs, where users partially annotate programs with units-of-measure from which our tool checks consistency and infers any missing specifications. However, many users find it onerous to provide units-of-measure information for existing code, even in part. We have noted however that there are often many common patterns and clues about the intended units-of-measure contained within variable names, comments, and surrounding code context. In this work-in-progress paper, we describe how we are adapting our approach, leveraging machine learning techniques to reconstruct units-of-measure information automatically thus saving programmer effort and increasing the likelihood of adoption."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2019-09-05"; dct:isPartOf , ; dct:publisher ; dct:title "Learning Units-of-Measure from Scientific Code"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . dct:title "2019 IEEE/ACM 14th International Workshop on Software Engineering for Science (SE4Science)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Montréal, Canada"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Brockschmidt"^^xsd:string; foaf:givenName "Marc"^^xsd:string; foaf:name "Marc Brockschmidt"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rice"^^xsd:string; foaf:givenName "Andrew"^^xsd:string; foaf:name "Andrew Rice"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Allamanis"^^xsd:string; foaf:givenName "Miltiadis"^^xsd:string; foaf:name "Miltiadis Allamanis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Danish"^^xsd:string; foaf:givenName "Matthew"^^xsd:string; foaf:name "Matthew Danish"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Orchard"^^xsd:string; foaf:givenName "Dominic A."^^xsd:string; foaf:name "Dominic A. Orchard"^^xsd:string; rdf:type foaf:Person . foaf:name "2019 IEEE/ACM 14th International Workshop on Software Engineering for Science (SE4Science)"^^xsd:string; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #77489 \n\nConference Companion of the 3rd International Conference on Art, Science, and Engineering of Programming: <Programming>'19:\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . , ; bibo:editorList ; bibo:status , ; dct:date "2019-09-01"; dct:isPartOf ; dct:publisher ; dct:title "Conference Companion of the 3rd International Conference on Art, Science, and Engineering of Programming: '19:"^^xsd:string; rdf:type bibo:Article, ep:EPrint, ep:EdbookEPrint; rdfs:seeAlso . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Cazzola"^^xsd:string; foaf:givenName "Walter"^^xsd:string; foaf:name "Walter Cazzola"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "main.pdf"^^xsd:string . rdfs:label "main.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #75503 \n\nA Sound Algorithm for Asynchronous Session Subtyping\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Sound Algorithm for Asynchronous Session Subtyping (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Sound Algorithm for Asynchronous Session Subtyping (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Sound Algorithm for Asynchronous Session Subtyping (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Sound Algorithm for Asynchronous Session Subtyping (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Sound Algorithm for Asynchronous Session Subtyping (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Sound Algorithm for Asynchronous Session Subtyping (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "Session types, types for structuring communication between endpoints in distributed systems, are recently being integrated into mainstream programming languages. In practice, a very important notion for dealing with such types is that of subtyping, since it allows for typing larger classes of\r\nsystem, where a program has not precisely the expected behavior but a similar one. Unfortunately, recent work has shown that subtyping for session types in an asynchronous setting is undecidable. To cope with this negative result, the only approaches we are aware of either restrict the syntax\r\nof session types or limit communication (by considering forms of bounded asynchrony). Both approaches are too restrictive in practice, hence we proceed differently by presenting an algorithm for checking subtyping which is sound, but not complete (in some cases it terminates without returning a decisive verdict). The algorithm is based on a tree representation of the coinductive definition of asynchronous subtyping; this tree could be infinite, and the algorithm checks for the presence of finite witnesses of infinite successful subtrees. Furthermore, we provide a tool that implements our algorithm and we apply it to many examples that cannot be managed with the previous approaches."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "140"; dc:hasVersion ; dct:creator , , , , ; dct:date "2019-09-01"; dct:isPartOf , ; dct:publisher ; dct:title "A Sound Algorithm for Asynchronous Session Subtyping"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "30th International Conference on Concurrency Theory (CONCUR 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Amsterdam, The Netherlands"^^xsd:string . foaf:name "LIPICS"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "van Glabbeek"^^xsd:string; foaf:givenName "Rob"^^xsd:string; foaf:name "Rob van Glabbeek"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fokkink"^^xsd:string; foaf:givenName "Wan"^^xsd:string; foaf:name "Wan Fokkink"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Carbone"^^xsd:string; foaf:givenName "Marco"^^xsd:string; foaf:name "Marco Carbone"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zavattaro"^^xsd:string; foaf:givenName "Gianluigi"^^xsd:string; foaf:name "Gianluigi Zavattaro"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bravetti"^^xsd:string; foaf:givenName "Mario"^^xsd:string; foaf:name "Mario Bravetti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lange"^^xsd:string; foaf:givenName "Julien"^^xsd:string; foaf:name "Julien Lange"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yoshida"^^xsd:string; foaf:givenName "Nobuko"^^xsd:string; foaf:name "Nobuko Yoshida"^^xsd:string; rdf:type foaf:Person . bibo:issn "18688969"; foaf:name "Leibniz International Proceedings in Informatics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #74586 \n\nA Latent Variable Model for Learning Distributional Relation Vectors\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "A Latent Variable Model for Learning Distributional Relation Vectors (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Latent Variable Model for Learning Distributional Relation Vectors (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Latent Variable Model for Learning Distributional Relation Vectors (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Latent Variable Model for Learning Distributional Relation Vectors (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Latent Variable Model for Learning Distributional Relation Vectors (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Latent Variable Model for Learning Distributional Relation Vectors (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Recently a number of unsupervised approaches have been proposed for learning vectors that capture the relationship between two words. Inspired by word embedding models, these approaches rely on co-occurrence statistics that are obtained from sentences in which the two target words appear. However, the number of such sentences is often quite small, and most of the words that occur in them are not relevant for characterizing the considered relationship. As a result, standard cooccurrence statistics typically lead to noisy relation vectors. To address this issue, we propose a latent variable model that aims to explicitly determine what words from the given sentences best characterize the relationship between the two target words. Relation vectors then correspond to the parameters of a simple unigram language model which is estimated from these words."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2019-09-01"; dct:isPartOf , ; dct:publisher ; dct:title "A Latent Variable Model for Learning Distributional Relation Vectors"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "28th International Joint Conference on Artificial Intelligence (IJCAI)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Macao, China"^^xsd:string . foaf:name "IJCAI"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Camacho-Collados"^^xsd:string; foaf:givenName "Jose"^^xsd:string; foaf:name "Jose Camacho-Collados"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Espinosa-Anke"^^xsd:string; foaf:givenName "Luis"^^xsd:string; foaf:name "Luis Espinosa-Anke"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jameel"^^xsd:string; foaf:givenName "Shoaib"^^xsd:string; foaf:name "Shoaib Jameel"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Schockaert"^^xsd:string; foaf:givenName "Steven"^^xsd:string; foaf:name "Steven Schockaert"^^xsd:string; rdf:type foaf:Person . bibo:issn "10450823"; foaf:name "International Joint Conferences on Artificial Intelligence"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #82197 \n\nOn the Possibility of Recalling Without Seeing: Evidence From State-Trace Analysis of the Experiential Blink\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "On the Possibility of Recalling Without Seeing: Evidence From State-Trace Analysis of the Experiential Blink (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "On the Possibility of Recalling Without Seeing: Evidence From State-Trace Analysis of the Experiential Blink (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the Possibility of Recalling Without Seeing: Evidence From State-Trace Analysis of the Experiential Blink (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the Possibility of Recalling Without Seeing: Evidence From State-Trace Analysis of the Experiential Blink (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the Possibility of Recalling Without Seeing: Evidence From State-Trace Analysis of the Experiential Blink (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On the Possibility of Recalling Without Seeing: Evidence From State-Trace Analysis of the Experiential Blink (Other)"^^xsd:string . rdf:_1 . ; bibo:abstract "In recent years, there has been much debate about how our conscious perception of the world relates to our ability to store and process information about it. Given the tight coupling between these two processes, it is not surprising that the nature of this relationship has proved difficult to establish with any degree of certainty. Recent findings however, have provided an opportunity to quantify evidence about how such a relationship might manifest. In this thesis, we follow up on one particular such set of findings: examining the relationship between participants' subjective experience of stimuli and their ability to encode them into working memory during the attentional blink.\r\n\r\nThis problem is tackled in three progressive steps. Firstly, we attempt to establish with certainty that a difference does exists between these two cognitive processes. In order to quantify the distinctness of the two cognitive processes, we make use of state-trace analysis. Having established that the two cognitive processes are in some way distinct, we examine more closely what form their relationship takes; what kind of relationship of dependency exists between the two measures, is it possible to have one without the other? Finally, we attempt to provide a theory and computational model of the above results. \r\n\r\nOur findings provide evidence that working memory encoding and subjective experience are dissociated in some manner. Further examination yields evidence that it is possible that working memory encoding may exist as a necessary but insufficient condition for subjective experience. We develop a theory of this behaviour based on targets being encoded simultaneously, but only experienced in serial, and build a computational model of these results by integrating with an existing model - the Simultaneous Type/Serial Token model of attention. The predictions this model makes strongly match those observed in human participants."^^xsd:string; bibo:authorList ; bibo:degree ; dct:creator ; dct:date "2019-09"; dct:isPartOf ; dct:issuer , ; dct:title "On the Possibility of Recalling Without Seeing: Evidence From State-Trace Analysis of the Experiential Blink"^^xsd:string; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jones"^^xsd:string; foaf:givenName "William Roger"^^xsd:string; foaf:name "William Roger Jones"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #77165 \n\nPrivacy Verification of PhotoDNA Based on Machine Learning\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Privacy Verification of PhotoDNA Based on Machine Learning (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Privacy Verification of PhotoDNA Based on Machine Learning (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy Verification of PhotoDNA Based on Machine Learning (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy Verification of PhotoDNA Based on Machine Learning (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy Verification of PhotoDNA Based on Machine Learning (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy Verification of PhotoDNA Based on Machine Learning (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "PhotoDNA is a perceptual fuzzy hash technology designed and developed by Microsoft. It is deployed by all major big data service providers to detect Indecent Images of Children (IIOC). Protecting the privacy of individuals is of paramount importance in such images. Microsoft claims that a PhotoDNA hash cannot be reverse engineered into the original image; therefore, it is not possible to identify individuals or objects depicted in the image. In this chapter, we evaluate the privacy protection capability of PhotoDNA by testing it against machine learning. Specifically, our aim is to detect the presence of any structural information that might be utilized to compromise the privacy of the individuals via classification. Due to the widespread usage of PhotoDNA as a deterrent to IIOC by big data companies, ensuring its ability to protect privacy would be crucial. In our experimentation, we achieved a classification accuracy of 57.20%. This result indicates that PhotoDNA is resistant to machine-learning-based classification attacks."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2019-08-31"; dct:isPartOf ; dct:publisher ; dct:title "Privacy Verification of PhotoDNA Based on Machine Learning"^^xsd:string; ep:hasDocument , , , , , ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "IET"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Nadeem"^^xsd:string; foaf:givenName "Muhammad Shahroz"^^xsd:string; foaf:name "Muhammad Shahroz Nadeem"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N. L."^^xsd:string; foaf:name "Virginia N. L. Franqueira"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhai"^^xsd:string; foaf:givenName "Xiaojun"^^xsd:string; foaf:name "Xiaojun Zhai"^^xsd:string; rdf:type foaf:Person . rdfs:label "Figueredo2018_author_version.pdf"^^xsd:string . rdfs:label "Figueredo2018_author_version.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77039 \n\nIdentifying Heavy Goods Vehicle Driving Styles in the United Kingdom\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Identifying Heavy Goods Vehicle Driving Styles in the United Kingdom (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Identifying Heavy Goods Vehicle Driving Styles in the United Kingdom (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Identifying Heavy Goods Vehicle Driving Styles in the United Kingdom (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Identifying Heavy Goods Vehicle Driving Styles in the United Kingdom (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Identifying Heavy Goods Vehicle Driving Styles in the United Kingdom (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Identifying Heavy Goods Vehicle Driving Styles in the United Kingdom (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 . bibo:abstract "Although driving behavior has been largely studied amongst private motor vehicles drivers, the literature addressing heavy goods vehicle (HGV) drivers is scarce. Identifying the existing groups of driving stereotypes and their proportions enables researchers, companies, and policy makers to establish group-specific strategies to improve safety and economy. In addition, insight into driving styles can help predict drivers' reactions and therefore enable the modeling of interactions between vehicles and the possible obstacles encountered on a journey. Consequently, there are also contributions to the research and development of autonomous vehicles and smart roads. In this paper, our interest lies in investigating driving behavior within the HGV community in the United Kingdom (U.K.). We conduct analysis of a telematics dataset containing the incident information on 21 193 HGV drivers across the U.K. We are interested in answering two research questions: 1) What groups of behavior are we able to uncover? 2) How do these groups complement current findings in the literature? To answer these questions, we apply a two-stage data analysis methodology involving consensus clustering and ensemble classification to the dataset. Through the analysis, eight patterns of behavior are uncovered. It is also observed that although our findings have similarities to those from previous work on driving behavior, further knowledge is obtained, such as extra patterns and driving traits arising from vehicle and road characteristics."^^xsd:string; bibo:authorList ; bibo:issue "9"; bibo:status , ; bibo:volume "20"; dc:hasVersion ; dct:creator , , , , , , , , ; dct:date "2019-08-27"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Identifying Heavy Goods Vehicle Driving Styles in the United Kingdom"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Garibaldi"^^xsd:string; foaf:givenName "Jonathan M"^^xsd:string; foaf:name "Jonathan M Garibaldi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mesgarpour"^^xsd:string; foaf:givenName "Mohammad"^^xsd:string; foaf:name "Mohammad Mesgarpour"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mase"^^xsd:string; foaf:givenName "Jimiama MM"^^xsd:string; foaf:name "Jimiama MM Mase"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wagner"^^xsd:string; foaf:givenName "Christian"^^xsd:string; foaf:name "Christian Wagner"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Figueredo"^^xsd:string; foaf:givenName "Grazziela P"^^xsd:string; foaf:name "Grazziela P Figueredo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Siebers"^^xsd:string; foaf:givenName "Peer-Olaf"^^xsd:string; foaf:name "Peer-Olaf Siebers"^^xsd:string; rdf:type foaf:Person . foaf:familyName "John"^^xsd:string; foaf:givenName "Robert I"^^xsd:string; foaf:name "Robert I John"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Agrawal"^^xsd:string; foaf:givenName "Utkarsh"^^xsd:string; foaf:name "Utkarsh Agrawal"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Soria"^^xsd:string; foaf:givenName "Daniele"^^xsd:string; foaf:name "Daniele Soria"^^xsd:string; rdf:type foaf:Person . bibo:issn "15249050"; foaf:name "IEEE Transactions on Intelligent Transportation Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "paper_151.pdf"^^xsd:string . rdfs:label "paper_151.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #75253 \n\nBuilding Taxonomies based on Human-Machine Teaming: Cyber Security as an Example\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Taxonomies and ontologies are handy tools in many application domains such as knowledge systematization and automatic reasoning. In the cyber security field, many researchers have proposed such taxonomies and ontologies, most of which were built based on manual work. Some researchers proposed the use of computing tools to automate the building process, but mainly on very narrow sub-areas of cyber security. Thus, there is a lack of general cyber security taxonomies and ontologies, possibly due to the difficulties of manually curating keywords and concepts for such a diverse, inter-disciplinary and dynamically evolving field.\r\n\r\nThis paper presents a new human-machine teaming based process to build taxonomies, which allows human experts to work with automated natural language processing (NLP) and information retrieval (IR) tools to co-develop a taxonomy from a set of relevant textual documents. The proposed process could be generalized to support non-textual documents and to build (more complicated) ontologies as well. Using the cyber security as an example, we demonstrate how the proposed taxonomy building process has allowed us to build a general cyber security taxonomy covering a wide range of data-driven keywords (topics) with a reasonable amount of human effort."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2019-08-26"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "ZA Information resources"@en . dct:title "14th International Conference on Availability, Reliability and Security (ARES 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Canterbury, UK"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Mahaini"^^xsd:string; foaf:givenName "Mohamad Imad"^^xsd:string; foaf:name "Mohamad Imad Mahaini"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sağlam"^^xsd:string; foaf:givenName "Rahime Belen"^^xsd:string; foaf:name "Rahime Belen Sağlam"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . foaf:name "ICPS: ACM International Conference Proceeding Series"^^xsd:string; rdf:type bibo:Collection . rdfs:label "CS-Cloud-Risk.pdf"^^xsd:string . rdfs:label "CS-Cloud-Risk.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #75979 \n\nCyber risk assessment in cloud provider environments: Current models and future needs\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Cyber risk assessment in cloud provider environments: Current models and future needs (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Cyber risk assessment in cloud provider environments: Current models and future needs (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber risk assessment in cloud provider environments: Current models and future needs (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber risk assessment in cloud provider environments: Current models and future needs (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber risk assessment in cloud provider environments: Current models and future needs (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cyber risk assessment in cloud provider environments: Current models and future needs (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Traditional frameworks for risk assessment do not work well for cloud computing. While recent work has often focussed on the risks faced by firms adopting or selecting cloud services, there has been little research on how cloud providers might assess their own services. In this paper, we use an in-depth review of the extant literature to highlight the weaknesses of traditional risk assessment frameworks for this task. Using examples, we then describe a new risk assessment model (CSCCRA) and compare this against three established approaches. For each approach, we consider its goals, the risk assessment process, decisions, the scope of the assessment and the way in which risk is conceptualised. This evaluation points to the need for dynamic models specifically designed to evaluate cloud risk. Our suggestions for future research are aimed at improving the identification, assessment, and mitigation of inter-dependent cloud risks inherent in a defined supply chain."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "87"; dc:hasVersion ; dct:creator , , , ; dct:date "2019-08-24"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Cyber risk assessment in cloud provider environments: Current models and future needs"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Akinrolabu"^^xsd:string; foaf:givenName "Olusola"^^xsd:string; foaf:name "Olusola Akinrolabu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "New"^^xsd:string; foaf:givenName "Steve"^^xsd:string; foaf:name "Steve New"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Martin"^^xsd:string; foaf:givenName "Andrew"^^xsd:string; foaf:name "Andrew Martin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "01674048"; foaf:name "Computers & Security"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "1-s2.0-S0167739X19300895-main (1).pdf"^^xsd:string . rdfs:label "1-s2.0-S0167739X19300895-main (1).pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #76431 \n\nA cloud-edge based data security architecture for sharing and analyzing cyber threat information\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A cloud-edge based data security architecture for sharing and analyzing cyber threat information (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A cloud-edge based data security architecture for sharing and analyzing cyber threat information (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A cloud-edge based data security architecture for sharing and analyzing cyber threat information (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A cloud-edge based data security architecture for sharing and analyzing cyber threat information (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A cloud-edge based data security architecture for sharing and analyzing cyber threat information (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A cloud-edge based data security architecture for sharing and analyzing cyber threat information (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 . bibo:abstract "Cyber-attacks affect every aspect of our lives. These attacks have serious consequences, not only for cyber-security, but also for safety, as the cyber and physical worlds are increasingly linked. Providing effective cyber-security requires cooperation and collaboration among all the entities involved. Increasing the amount of cyber threat information (CTI) available for analysis allows better prediction, prevention and mitigation of cyber-attacks. However, organizations are deterred from sharing their CTI over concerns that sensitive and confidential information may be revealed to others. We address this concern by providing a flexible framework that allows the confidential sharing of CTI for analysis between collaborators. We propose a five-level trust model for a cloud-edge based data sharing infrastructure. The data owner can choose an appropriate trust level and CTI data sanitization approach, ranging from plain text, through anonymization/pseudonymization to homomorphic encryption, in order to manipulate the CTI data prior to sharing it for analysis. Furthermore, this sanitization can be performed by either an edge device or by the cloud service provider, depending upon the level of trust the organization has in the latter. We describe our trust model, our cloud-edge infrastructure, and its deployment model, which are designed to satisfy the broadest range of requirements for confidential CTI data sharing. Finally we briefly describe our implementation and the testing that has been carried out so far by four pilot projects that are validating our infrastructure."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "102"; dc:hasVersion ; dct:creator , , , , , , , , , ; dct:date "2019-08-23"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "A cloud-edge based data security architecture for sharing and analyzing cyber threat information"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Manera"^^xsd:string; foaf:givenName "Mirko"^^xsd:string; foaf:name "Mirko Manera"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Constantino"^^xsd:string; foaf:givenName "Gianpiero"^^xsd:string; foaf:name "Gianpiero Constantino"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mori"^^xsd:string; foaf:givenName "Paolo"^^xsd:string; foaf:name "Paolo Mori"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Di Cerbo"^^xsd:string; foaf:givenName "Francesco"^^xsd:string; foaf:name "Francesco Di Cerbo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sajjad"^^xsd:string; foaf:givenName "Ali"^^xsd:string; foaf:name "Ali Sajjad"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Xiao-Si"^^xsd:string; foaf:name "Xiao-Si Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chadwick"^^xsd:string; foaf:givenName "David W."^^xsd:string; foaf:name "David W. Chadwick"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Herwono"^^xsd:string; foaf:givenName "Ian"^^xsd:string; foaf:name "Ian Herwono"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Lemos"^^xsd:string; foaf:givenName "Rogério"^^xsd:string; foaf:name "Rogério De Lemos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fan"^^xsd:string; foaf:givenName "Wenjun"^^xsd:string; foaf:name "Wenjun Fan"^^xsd:string; rdf:type foaf:Person . bibo:issn "0167739X"; foaf:name "Future Generation Computer Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "CD-MAKE-2019.pdf"^^xsd:string . rdfs:label "CD-MAKE-2019.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77014 \n\nAutomated machine learning for studying the trade-off between predictive accuracy and interpretability\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Automated machine learning for studying the trade-off between predictive accuracy and interpretability (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Automated machine learning for studying the trade-off between predictive accuracy and interpretability (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automated machine learning for studying the trade-off between predictive accuracy and interpretability (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automated machine learning for studying the trade-off between predictive accuracy and interpretability (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automated machine learning for studying the trade-off between predictive accuracy and interpretability (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automated machine learning for studying the trade-off between predictive accuracy and interpretability (Other)"^^xsd:string . rdf:_1 . bibo:abstract "Automated Machine Learning (Auto-ML) methods search for the best classification algorithm and its best hyper-parameter settings for each input dataset. Auto-ML methods normally maximize only predictive accuracy, ignoring the classification model’s interpretability – an important criterion in many applications. Hence, we propose a novel approach, based on Auto-ML, to investigate the trade-off between the predictive accuracy and the interpretability of classification-model representations. The experiments used the Auto-WEKA tool to investigate this trade-off. We distinguish between white box (interpretable) model representations and two other types of model representations: black box (non-interpretable) and grey box (partly interpretable). We consider as white box the models based on the following 6 interpretable knowledge representations: decision trees, If-Then classification rules, decision tables, Bayesian network classifiers, nearest neighbours and logistic regression. The experiments used 16 datasets and two runtime limits per Auto-WEKA run: 5 h and 20 h. Overall, the best white box model was more accurate than the best non-white box model in 4 of the 16 datasets in the 5-hour runs, and in 7 of the 16 datasets in the 20-hour runs. However, the predictive accuracy differences between the best white box and best non-white box models were often very small. If we accept a predictive accuracy loss of 1% in order to benefit from the interpretability of a white box model representation, we would prefer the best white box model in 8 of the 16 datasets in the 5-hour runs, and in 10 of the 16 datasets in the 20-hour runs."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "11713"; dc:hasVersion ; dct:creator ; dct:date "2019-08-23"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Automated machine learning for studying the trade-off between predictive accuracy and interpretability"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "Third IFIP International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Canterbury, UK"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "TKDE.pdf"^^xsd:string . rdfs:label "TKDE.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #78093 \n\nComponent-based Feature Saliency for Clustering\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Component-based Feature Saliency for Clustering (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Component-based Feature Saliency for Clustering (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Component-based Feature Saliency for Clustering (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Component-based Feature Saliency for Clustering (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Component-based Feature Saliency for Clustering (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Component-based Feature Saliency for Clustering (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 . bibo:abstract "Simultaneous feature selection and clustering is a major challenge in unsupervised learning. In particular, there has been significant research into saliency measures for features that result in good clustering. However, as datasets become larger and more complex, there is a need to adopt a finer-grained approach to saliency by measuring it in relation to a part of a model. Another issue is learning the feature saliency and advanced model parameters. We address the first by presenting a novel Gaussian mixture model, which explicitly models the dependency of individual mixture components on each feature giving a new component-based feature saliency measure. For the second, we use Markov Chain Monte Carlo sampling to estimate the model and hidden variables. Using a synthetic dataset, we demonstrate the superiority of our approach, in terms of clustering accuracy and model parameter estimation, over an approach using a model-based feature saliency with expectation maximisation. We performed an evaluation of our approach with six synthetic trajectory datasets. To demonstrate the generality of our approach, we applied it to a network traffic flow dataset for intrusion detection. Finally, we performed a comparison with state-of-the-art clustering techniques using three real-world trajectory datasets of vehicle traffic."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , , , ; dct:date "2019-08-22"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Component-based Feature Saliency for Clustering"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Li"^^xsd:string; foaf:givenName "Xuelong"^^xsd:string; foaf:name "Xuelong Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hong"^^xsd:string; foaf:givenName "Xin"^^xsd:string; foaf:name "Xin Hong"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Miller"^^xsd:string; foaf:givenName "Paul"^^xsd:string; foaf:name "Paul Miller"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhou"^^xsd:string; foaf:givenName "Huiyu"^^xsd:string; foaf:name "Huiyu Zhou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Crookes"^^xsd:string; foaf:givenName "Danny"^^xsd:string; foaf:name "Danny Crookes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lu"^^xsd:string; foaf:givenName "Yonggang"^^xsd:string; foaf:name "Yonggang Lu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhou"^^xsd:string; foaf:givenName "Jianjiang"^^xsd:string; foaf:name "Jianjiang Zhou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Hailin"^^xsd:string; foaf:name "Hailin Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . bibo:issn "10414347"; foaf:name "IEEE Transactions on Knowledge and Data Engineering"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "EMSE.pdf"^^xsd:string . rdfs:label "EMSE.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #75141 \n\nCorba: Crowdsourcing to Obtain Requirements from Regulations and Breaches\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Corba: Crowdsourcing to Obtain Requirements from Regulations and Breaches (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Corba: Crowdsourcing to Obtain Requirements from Regulations and Breaches (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Corba: Crowdsourcing to Obtain Requirements from Regulations and Breaches (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Corba: Crowdsourcing to Obtain Requirements from Regulations and Breaches (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Corba: Crowdsourcing to Obtain Requirements from Regulations and Breaches (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Corba: Crowdsourcing to Obtain Requirements from Regulations and Breaches (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Context: Modern software systems are deployed in sociotechnical settings, combining social entities (humans and organizations) with technical entities (software and devices). In such settings, on top of technical controls that implement security features of software, regulations specify how users should behave in security-critical situations. No matter how carefully the software is designed and how well regulations are enforced, such systems are subject to breaches due to social (user misuse) and technical (vulnerabilities in software) factors. Breach reports, often legally mandated, describe what went wrong during a breach and how the breach was remedied. However, breach reports are not formally investigated in current practice, leading to valuable lessons being lost regarding past failures.\r\n\r\nObjective: Our research aim is to aid security analysts and software developers in obtaining a set of legal, security, and privacy requirements, by developing a crowdsourcing methodology to extract knowledge from regulations and breach reports.\r\n\r\nMethod: We present Çorba, a methodology that leverages human intelligence via crowdsourcing, and extracts requirements from textual artifacts in the form of regulatory norms. We evaluate Çorba on the US healthcare regulations from the Health Insurance Portability and Accountability Act (HIPAA) and breach reports published by the US Department of Health and Human Services (HHS). Following this methodology, we have conducted a pilot and a final study on the Amazon Mechanical Turk crowdsourcing platform.\r\n\r\nResults: Çorba yields high quality responses from crowd workers, which we analyze to identify requirements for the purpose of complementing HIPAA regulations. We publish a curated dataset of the worker responses and identified requirements.\r\n\r\nConclusions: The results show that the instructions and question formats presented to the crowd workers significantly affect the response quality regarding the identification of requirements. We have observed significant improvement from the pilot to the final study by revising the instructions and question formats. Other factors, such as worker types, breach types, or length of reports, do not have notable effect on the workers’ performance. Moreover, we discuss other potential improvements such as breach report restructuring and text highlighting with automated methods."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "25"; dc:hasVersion ; dct:creator , , , , ; dct:date "2019-08-15"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Corba: Crowdsourcing to Obtain Requirements from Regulations and Breaches"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76.E95 Expert Systems (Intelligent Knowledge Based Systems) "@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Singh"^^xsd:string; foaf:givenName "Munindar P."^^xsd:string; foaf:name "Munindar P. Singh"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Guo"^^xsd:string; foaf:givenName "Hui"^^xsd:string; foaf:name "Hui Guo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jeukeng"^^xsd:string; foaf:givenName "Anne-Liz"^^xsd:string; foaf:name "Anne-Liz Jeukeng"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Williams"^^xsd:string; foaf:givenName "Laurie"^^xsd:string; foaf:name "Laurie Williams"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kafalı"^^xsd:string; foaf:givenName "Özgur"^^xsd:string; foaf:name "Özgur Kafalı"^^xsd:string; rdf:type foaf:Person . bibo:issn "13823256"; foaf:name "Empirical Software Engineering"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Camera_Ready_CSCWD_Scientific_Collaboration.pdf"^^xsd:string . rdfs:label "Camera_Ready_CSCWD_Scientific_Collaboration.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73120 \n\nThe Effect of Scientific Collaboration on CSCW Research: A Scientometric Study\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "The Effect of Scientific Collaboration on CSCW Research: A Scientometric Study (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The Effect of Scientific Collaboration on CSCW Research: A Scientometric Study (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Effect of Scientific Collaboration on CSCW Research: A Scientometric Study (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Effect of Scientific Collaboration on CSCW Research: A Scientometric Study (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Effect of Scientific Collaboration on CSCW Research: A Scientometric Study (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Effect of Scientific Collaboration on CSCW Research: A Scientometric Study (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "The structure and evolution of a scientific research community can be quantitatively assessed taking into account the interactions between scientific agents dispersed geographically. In the recent years, CSCW has stabilized as a cross-disciplinary field suffering significant changes in its core structure, and there is limited understanding about the factors influencing the nature and progress of collaborative computing research. In this paper, we measure the correlation between a set of features related to the influence of collaboration types on the number of citations as well as the geographical distribution of the accumulated contribution to the CSCW literature. Overall, our work can represent a starting point to demonstrate how the study of scientific collaboration can partly explain the variations in the number of citations, frequency of papers, and topics addressed."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2019-08-08"; dct:isPartOf , ; dct:publisher ; dct:title "The Effect of Scientific Collaboration on CSCW Research: A Scientometric Study"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "23rd International Conference on Computer Supported Cooperative Work in Design"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Porto, Portugal"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Schneider"^^xsd:string; foaf:givenName "Daniel"^^xsd:string; foaf:name "Daniel Schneider"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Paredes"^^xsd:string; foaf:givenName "Hugo"^^xsd:string; foaf:name "Hugo Paredes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Correia"^^xsd:string; foaf:givenName "António"^^xsd:string; foaf:name "António Correia"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fonseca"^^xsd:string; foaf:givenName "Benjamim"^^xsd:string; foaf:name "Benjamim Fonseca"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jameel"^^xsd:string; foaf:givenName "Shoaib"^^xsd:string; foaf:name "Shoaib Jameel"^^xsd:string; rdf:type foaf:Person . foaf:name "Computer Supported Cooperative Work in Design"^^xsd:string; rdf:type bibo:Collection . rdfs:label "Conference_LaTeX_template_7_9_18__1_ (1).pdf"^^xsd:string . rdfs:label "Conference_LaTeX_template_7_9_18__1_ (1).pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "Conference_LaTeX_template_7_9_18__1_.pdf"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #74494 \n\nOptimising Directional Changes trading strategies with different algorithms\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Optimising Directional Changes trading strategies with different algorithms (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Optimising Directional Changes trading strategies with different algorithms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Optimising Directional Changes trading strategies with different algorithms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Optimising Directional Changes trading strategies with different algorithms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Optimising Directional Changes trading strategies with different algorithms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Optimising Directional Changes trading strategies with different algorithms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Optimising Directional Changes trading strategies with different algorithms (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Optimising Directional Changes trading strategies with different algorithms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Optimising Directional Changes trading strategies with different algorithms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Optimising Directional Changes trading strategies with different algorithms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Optimising Directional Changes trading strategies with different algorithms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Optimising Directional Changes trading strategies with different algorithms (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Directional Changes (DC), a novel approach for sampling market data, allows the extraction of trends in financial time series by converting series from a time based format to an event-driven format. This paradigm has been shown to give some predictability in financial prediction, and has been used to generate profitable trading strategies on the FOREX market. In the past, a genetic algorithm was used to optimise the parameters of DC-based trading strategy. The goal of this work is to explore whereas different machine learning algorithms can be used to improve the results on the aforementioned optimisation task. For this purpose, we explore two algorithms, namely Particle Swarm Optimization and Shuffled Frog Leaping Algorithm. After comparing the performance of these two algorithms on 36 different datasets from 4 different currency pairs, we find that they statistically improve the profitability of the DC-based trading strategies."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion , ; dct:creator , ; dct:date "2019-08-08"; dct:isPartOf ; dct:publisher ; dct:title "Optimising Directional Changes trading strategies with different algorithms"^^xsd:string; ep:hasAccepted , ; ep:hasDocument , , , , , , , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "2019 IEEE Congress on Evolutionary Computation (CEC)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Wellington, New Zealand"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Adegboye"^^xsd:string; foaf:givenName "Adesola"^^xsd:string; foaf:name "Adesola Adegboye"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palsma"^^xsd:string; foaf:givenName "Jurgen"^^xsd:string; foaf:name "Jurgen Palsma"^^xsd:string; rdf:type foaf:Person . rdfs:label "fse19-rigger-et-al-understanding-gcc-builtins-to-develop-better-tools.pdf"^^xsd:string . rdfs:label "fse19-rigger-et-al-understanding-gcc-builtins-to-develop-better-tools.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #75258 \n\nUnderstanding GCC Builtins to Develop Better Tools\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Understanding GCC Builtins to Develop Better Tools (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Understanding GCC Builtins to Develop Better Tools (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding GCC Builtins to Develop Better Tools (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding GCC Builtins to Develop Better Tools (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding GCC Builtins to Develop Better Tools (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding GCC Builtins to Develop Better Tools (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "C programs can use compiler builtins to provide functionality that the C language lacks. On Linux, GCC provides several thousands of builtins that are also supported by other mature compilers, such as Clang and ICC. Maintainers of other tools lack guidance on whether and which builtins should be implemented to support popular projects. To assist tool developers who want to support GCC builtins, we analyzed builtin use in 4,913 C projects from GitHub. We found that 37% of these projects relied on at least one builtin. Supporting an increasing proportion of projects requires support of an exponentially increasing number of builtins; however, implementing only 10 builtins already covers over 30% of the projects. Since we found that many builtins in our corpus remained unused, the effort needed to support 90% of the projects is moderate, requiring about 110 builtins to be implemented. For each project, we analyzed the evolution of builtin use over time and found that the majority of projects mostly added builtins. This suggests that builtins are not a legacy feature and must be supported in future tools. Systematic testing of builtin support in existing tools revealed that many lacked support for builtins either partially or completely; we also discovered incorrect implementations in various tools, including the formally verified CompCert compiler."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2019-08-08"; dct:isPartOf , ; dct:publisher ; dct:title "Understanding GCC Builtins to Develop Better Tools"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Tallinn, Estonia"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Mössenböck"^^xsd:string; foaf:givenName "Hanspeter"^^xsd:string; foaf:name "Hanspeter Mössenböck"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rigger"^^xsd:string; foaf:givenName "Manuel"^^xsd:string; foaf:name "Manuel Rigger"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Adams"^^xsd:string; foaf:givenName "Bram"^^xsd:string; foaf:name "Bram Adams"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . foaf:name "ESEC/FSE 2019 Proceedings of the 2019 27th ACM"^^xsd:string; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #80114 \n\nEvaluating evaluation: Assessing progress and practices in computational creativity research\n\n"; foaf:primaryTopic . rdf:_1 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "Computational creativity research has produced many computational systems that are described as ‘creative’. Historically, these ‘creative systems’ have not received much in terms of evaluation of the actual creativity of the systems, although this has recently attracted more attention as a research perspective. As a scientific research community, computational creativity researchers can benefit from more systematic/standardised approaches to evaluation of the creativity of our systems, to help us progress in understanding creativity and modelling it computationally. A methodology for creativity evaluation should accommodate different manifestations of creativity but also requires a clear, definitive statement of the tests used for evaluation. Here a historical perspective is given on how computational creativity researchers have evaluated (or not evaluated) the creativity of their systems, considering contextual reasons behind this. Different evaluation approaches and frameworks are currently available, though it is not yet clear which (if any) of several recently proposed methods are emerging as the preferred options to use. The Standardised Procedure for Evaluating Creative Systems (SPECS) forms an overarching set of guidelines for how to tackle evaluation of creative systems and can incorporate recent proposals for creativity evaluation. To help decide which evaluation method is best to use, this chapter concludes by exploring five meta-evaluation criteria devised from cross-disciplinary research into good evaluative practice. Together, these considerations help us explore best practice in computational creativity evaluation, helping us develop the tools we have available to us as computational creativity researchers."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; dct:creator ; dct:date "2019-08-07"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Evaluating evaluation: Assessing progress and practices in computational creativity research"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Cardoso"^^xsd:string; foaf:givenName "Amílcar F."^^xsd:string; foaf:name "Amílcar F. Cardoso"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jordanous"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Jordanous"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Veale"^^xsd:string; foaf:givenName "Tony"^^xsd:string; foaf:name "Tony Veale"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #77166 \n\nGuest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions (Other)"^^xsd:string . rdf:_1 . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . , , , , , ; bibo:authorList ; bibo:editorList ; bibo:issue "4"; bibo:status , ; bibo:volume "6"; dc:hasVersion ; dct:creator ; dct:date "2019-08-06"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:Article, ep:EPrint, ep:EdjournalEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Leppänen"^^xsd:string; foaf:givenName "Ville"^^xsd:string; foaf:name "Ville Leppänen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Inácio"^^xsd:string; foaf:givenName "Pedro Ricardo Morais"^^xsd:string; foaf:name "Pedro Ricardo Morais Inácio"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Conti"^^xsd:string; foaf:givenName "Mauro"^^xsd:string; foaf:name "Mauro Conti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mileva"^^xsd:string; foaf:givenName "Aleksandra"^^xsd:string; foaf:name "Aleksandra Mileva"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lopes"^^xsd:string; foaf:givenName "Raul H.C."^^xsd:string; foaf:name "Raul H.C. Lopes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N. L."^^xsd:string; foaf:name "Virginia N. L. Franqueira"^^xsd:string; rdf:type foaf:Person . bibo:issn "23274662"; foaf:name "IEEE Internet of Things Journal"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "SI_cover_May_2019.pdf"^^xsd:string . rdfs:label "SI_cover_May_2019.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79542 \n\nGuest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "The Internet of Things (IoT) has experienced significant growth over recent years and Gartner predicts that, by 2020, 21 billion IoT endpoints will be in use. The potential behind widespread usage of small devices capable of collecting, transmitting, or acting upon data has been fueling interest both from industry and academia. Security and forensics are two of the topics facing major challenges in this paradigm, on par with or even more prominent than other computing paradigms. Aspects such as low processing power and small storage capacity of such IoT devices contribute to their typically poor built-in security and forensics capabilities. Their reliance on cloud computing and mobile apps to operate and provide services increases the attack surface, distributing the collection of digital evidence and making reconstruction activities (to answer questions as what, where, when, who, why, and how) harder."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "6"; dc:hasVersion ; dct:creator , , , , , ; dct:date "2019-08-06"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Mileva"^^xsd:string; foaf:givenName "Aleksandra"^^xsd:string; foaf:name "Aleksandra Mileva"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Leppänen"^^xsd:string; foaf:givenName "Ville"^^xsd:string; foaf:name "Ville Leppänen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Inácio"^^xsd:string; foaf:givenName "Pedro Ricardo Morais"^^xsd:string; foaf:name "Pedro Ricardo Morais Inácio"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Conti"^^xsd:string; foaf:givenName "Mauro"^^xsd:string; foaf:name "Mauro Conti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lopes"^^xsd:string; foaf:givenName "Raul H.C."^^xsd:string; foaf:name "Raul H.C. Lopes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N. L."^^xsd:string; foaf:name "Virginia N. L. Franqueira"^^xsd:string; rdf:type foaf:Person . bibo:issn "23274662"; foaf:name "IEEE Internet of Things Journal"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "setVA-SetSchematics.pdf"^^xsd:string . rdfs:label "setVA-SetSchematics.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77711 \n\nConcentric Set Schematization\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Concentric Set Schematization (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Concentric Set Schematization (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Concentric Set Schematization (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Concentric Set Schematization (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Concentric Set Schematization (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Concentric Set Schematization (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Sets can be visualized in various ways and settings. An important\r\ndistinction between techniques is based on whether the elements\r\nhave a spatial location that is to be used for the visualization; for\r\nexample, the elements are cities on a map. Strictly adhering to such\r\nlocation may severely limit the visualization and force overlay, intersections\r\nand other forms of clutter. On the other hand, completely\r\nignoring the spatial dimension omits information and may hide spatial\r\npatterns in the data. In this abstract, we present ongoing research\r\non a method that is in between spatial and nonspatial visualizations.\r\nThe main idea is to schematize (move) the spatial locations onto\r\nconcentric circles, to improve the visualization of the set system\r\nwhile roughly maintaining spatial structure."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2019-08-05"; dct:isPartOf ; dct:subject ; dct:title "Concentric Set Schematization"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "SetVA 2019"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Vancouver, Canada"^^xsd:string . foaf:familyName "Frank"^^xsd:string; foaf:givenName "Fabian"^^xsd:string; foaf:name "Fabian Frank"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Schulz"^^xsd:string; foaf:givenName "Andre"^^xsd:string; foaf:name "Andre Schulz"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bekos"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Bekos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rodgers"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Rodgers"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Meulemans"^^xsd:string; foaf:givenName "Wouter"^^xsd:string; foaf:name "Wouter Meulemans"^^xsd:string; rdf:type foaf:Person . rdfs:label "infoVis2019FreeRides_SetVA_Version.pdf"^^xsd:string . rdfs:label "infoVis2019FreeRides_SetVA_Version.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77709 \n\nEvaluating Free Rides in Visualizations of Sets\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Evaluating Free Rides in Visualizations of Sets (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Free Rides in Visualizations of Sets (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Free Rides in Visualizations of Sets (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Free Rides in Visualizations of Sets (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Free Rides in Visualizations of Sets (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Free Rides in Visualizations of Sets (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "A consideration for any visualization technique is the added value\r\nit brings over other representations of data. A free ride, a concept\r\nintroduced by Shimojima, occurs in a visualization when it reveals\r\nsome fact that must be inferred from an alternative representation\r\nfrom which the visualization was derived. This paper presents preliminary\r\nresults from an empirical evaluation of free rides occurring\r\nin visualizations of sets as compared to textual representations. By\r\nfocusing on Euler, linear and Venn diagrams, our results suggest that\r\nmore research is needed to establish when free rides are cognitively\r\nbeneficial."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2019-08-05"; dct:isPartOf ; dct:subject ; dct:title "Evaluating Free Rides in Visualizations of Sets"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "SetVA 2019"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Vancouver, Canada"^^xsd:string . foaf:familyName "Touloumis"^^xsd:string; foaf:givenName "Anestis"^^xsd:string; foaf:name "Anestis Touloumis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Blake"^^xsd:string; foaf:givenName "Andrew"^^xsd:string; foaf:name "Andrew Blake"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Stapleton"^^xsd:string; foaf:givenName "Gem"^^xsd:string; foaf:name "Gem Stapleton"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rodgers"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Rodgers"^^xsd:string; rdf:type foaf:Person . rdfs:label "paper.pdf"^^xsd:string . rdfs:label "paper.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #74450 \n\nQuantitative program reasoning with graded modal types\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Quantitative program reasoning with graded modal types (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Quantitative program reasoning with graded modal types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Quantitative program reasoning with graded modal types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Quantitative program reasoning with graded modal types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Quantitative program reasoning with graded modal types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Quantitative program reasoning with graded modal types (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "In programming, data is often considered to be infinitely copiable, arbitrarily discardable, and universally unconstrained. However this view is naive: some data encapsulates resources that are subject to protocols (e.g., file and device handles, channels); some data should not be arbitrarily copied or communicated (e.g., private data). Linear types provide a partial remedy by delineating data in two camps: \"resources\" to be used but never copied or discarded, and unconstrained values. However, this binary distinction is too coarse-grained. Instead, we propose the general notion of graded modal types, which in combination with linear and indexed types, provides an expressive type theory for enforcing fine-grained resource-like properties of data. We present a type system drawing together these aspects (linear, graded, and indexed) embodied in a fully-fledged functional language implementation, called Granule. We detail the type system, including its metatheoretic properties, and explore examples in the concrete language. This work advances the wider goal of expanding the reach of type systems to capture and verify a broader set of program properties."^^xsd:string; bibo:authorList ; bibo:issue "ICFP"; bibo:status , ; bibo:volume "3"; dc:hasVersion ; dct:creator , , ; dct:date "2019-08-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Quantitative program reasoning with graded modal types"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Orchard"^^xsd:string; foaf:givenName "Dominic A."^^xsd:string; foaf:name "Dominic A. Orchard"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Eades"^^xsd:string; foaf:givenName "Harley"^^xsd:string; foaf:name "Harley Eades"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Liepelt"^^xsd:string; foaf:givenName "Vilem"^^xsd:string; foaf:name "Vilem Liepelt"^^xsd:string; rdf:type foaf:Person . foaf:name "Proceedings of the ACM on Programming Languages"^^xsd:string; rdf:type bibo:Collection . rdfs:label "157Ayah_Helal_Thesis.pdf"^^xsd:string . rdfs:label "157Ayah_Helal_Thesis.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80465 \n\nNew Archive-Based Ant Colony Optimization Algorithms for Learning Predictive Rules from Data\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "New Archive-Based Ant Colony Optimization Algorithms for Learning Predictive Rules from Data (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "New Archive-Based Ant Colony Optimization Algorithms for Learning Predictive Rules from Data (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "New Archive-Based Ant Colony Optimization Algorithms for Learning Predictive Rules from Data (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "New Archive-Based Ant Colony Optimization Algorithms for Learning Predictive Rules from Data (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "New Archive-Based Ant Colony Optimization Algorithms for Learning Predictive Rules from Data (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "New Archive-Based Ant Colony Optimization Algorithms for Learning Predictive Rules from Data (Other)"^^xsd:string . rdf:_1 . , ; bibo:abstract "Data mining is the process of extracting knowledge and patterns from data. Classification and Regression are among the major data mining tasks, where the goal is to predict a value of an attribute of interest for each data instance, given the values of a set of predictive attributes. Most classification and regression problems involve continuous, ordinal and categorical attributes. Currently Ant Colony Optimization (ACO) algorithms have focused on directly handling categorical attributes only; continuous attributes are transformed using a discretisation procedure in either a preprocessing stage or dynamically during the rule creation. The use of a discretisation procedure has several limitations: (i) it increases the computational runtime, since several candidates values need to evaluated; (ii) requires access to the entire attribute domain, which in some applications all data is not available; (iii) the values used to create discrete intervals are not optimised in combination with the values of other attributes. This thesis investigates the use of solution archive pheromone model, based on Ant Colony Optimization for mixed-variable (ACOMV) algorithm, to directly cope with all attribute types. Firstly, an archive-based ACO classification algorithm is presented, followed by an automatic design framework to generate new configuration of ACO algorithms. Then, we addressed the challenging problem of mining data streams, presenting a new ACO algorithm in combination with a hybrid pheromone model. Finally, the archive-based approach is extended to cope with regression problems. All algorithms presented are compared against well-known algorithms from the literature using publicly available data sets. Our results have been shown to improve the computational time while maintaining a competitive predictive performance."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2019-08"; dct:isPartOf ; dct:issuer , ; dct:subject ; dct:title "New Archive-Based Ant Colony Optimization Algorithms for Learning Predictive Rules from Data"^^xsd:string; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex"^^xsd:string; foaf:name "Alex Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Helal"^^xsd:string; foaf:givenName "Ayah"^^xsd:string; foaf:name "Ayah Helal"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando"^^xsd:string; foaf:name "Fernando Otero"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #81637 \n\nImproving Training of Deep Neural Network Sequence Models\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Improving Training of Deep Neural Network Sequence Models (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Improving Training of Deep Neural Network Sequence Models (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improving Training of Deep Neural Network Sequence Models (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improving Training of Deep Neural Network Sequence Models (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improving Training of Deep Neural Network Sequence Models (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improving Training of Deep Neural Network Sequence Models (Other)"^^xsd:string . rdf:_1 . , ; bibo:abstract "Sequence models, in particular, language models are fundamental building blocks of downstream applications including speech recognition, speech synthesis, information retrieval, machine translation, and question answering systems. Neural network language models are effective in generalising (i.e. perform efficiently with the data sparsity problem) compared to traditional N-grams models. However, neural network language models have several fundamental problems - the training of neural network language models is computationally inefficient and analysing the trained models is difficult. In this thesis, improvement techniques to reduce the computational complexity and an extensive analysis of the learned models are presented.\r\n\r\nTo reduce the computational complexity we have focused on the main computational bottleneck of neural training which is the softmax operation. Among different softmax approximation techniques, Noise Contrastive Estimation (NCE) is seen as a method that often does not work well with deep neural models for language modelling. A thorough investigation was done to find out the appropriate and novel integration mechanism of NCE with deep neural networks. We have also explained why the proposed specific hyperparameter settings could have an impact on the integration.\r\n\r\nExisting analysis techniques are not sufficient to explain the training and learned models. Established wisdom on learning theory cannot explain the generalisation of over-parametrised deep neural networks. Therefore, we have proposed methods and analysis techniques to understand the generalisation and explain the regularisation. Furthermore, we have explained the impact of the stacked layers in deep neural networks.\r\n\r\nThe presented techniques have made the neural language models more accurate and computationally efficient. The empirical analysis techniques have helped us understand the model learning and improved our understanding of the generalisation and regularisation. The conducted experiments were based on publicly available benchmark datasets and standard evaluation frameworks."^^xsd:string; bibo:authorList ; bibo:degree ; dct:creator ; dct:date "2019-08"; dct:isPartOf ; dct:issuer , ; dct:title "Improving Training of Deep Neural Network Sequence Models"^^xsd:string; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex"^^xsd:string; foaf:name "Alex Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Liza"^^xsd:string; foaf:givenName "Farhana Ferdousi"^^xsd:string; foaf:name "Farhana Ferdousi Liza"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grześ"^^xsd:string; foaf:givenName "Marek"^^xsd:string; foaf:name "Marek Grześ"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #78643 \n\nExploring Challenges Faced by international Students in Computer Science Programs: Towards understanding the Student Perspective\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . rdf:_1 . , , , , , ; ; bibo:abstract "International students are an important and desirable constituent in most computer science programs, bringing new perspectives into the classroom, diversifying the student population, globalizing the curriculum, broadening the perspective of domestic students, and often generating revenue for the host institution. Each of these characteristics is desirable and increasingly important in today’s highly connected world and job market. Most institutions invest resources in attracting international students and providing support and orientation sessions for them on arrival to help acclimate them to the new environment and to introduce them to other students. Student clubs often provide support groups and social functions to help them meet and make friends with domestic students. However, challenges for international students, and for the faculty teaching them, persist at many institutions despite these efforts to help international students deal with culture shock, differing academic expectations and teaching methods, and different attitudes toward issues such as academic honesty. In this paper, the authors examine the challenges faced by international students in integrating into computer science programs at various institutions, and explores these challenges and identifies differences in student and faculty perceptions. Asurveyofover200international students studying in four counties was conducted to gain insight into student perceptions of their educational experience."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; dct:creator , , , , , ; dct:date "2019-08"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Exploring Challenges Faced by international Students in Computer Science Programs: Towards understanding the Student Perspective"^^xsd:string; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "L Education (General)"@en . foaf:name "Nova science publishers inc"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Oudshoorn"^^xsd:string; foaf:givenName "Michael J"^^xsd:string; foaf:name "Michael J Oudshoorn"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pearce"^^xsd:string; foaf:givenName "Janice L"^^xsd:string; foaf:name "Janice L Pearce"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hitchcock"^^xsd:string; foaf:givenName "Leo"^^xsd:string; foaf:name "Leo Hitchcock"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Clear"^^xsd:string; foaf:givenName "Alison"^^xsd:string; foaf:name "Alison Clear"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Abandoh-Sam"^^xsd:string; foaf:givenName "Joseph A"^^xsd:string; foaf:name "Joseph A Abandoh-Sam"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Allison"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Allison"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Carter"^^xsd:string; foaf:givenName "Janet"^^xsd:string; foaf:name "Janet Carter"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #77509 \n\nAccountable Disciplinary Knowledge in Computing Education\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Accountable Disciplinary Knowledge in Computing Education (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Accountable Disciplinary Knowledge in Computing Education (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Accountable Disciplinary Knowledge in Computing Education (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Accountable Disciplinary Knowledge in Computing Education (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Accountable Disciplinary Knowledge in Computing Education (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Accountable Disciplinary Knowledge in Computing Education (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "This paper uses an approach that differs from conventional interview research to trace the individual trajectories of two computing graduates. In this approach, interviews are considered a dialogic process and analysis is a case-centred process that explores similarities and differences in participants' trajectories. This approach allows us to probe the experience and lasting value of computing education beyond graduation. In this extended analytic approach we expose participants' sense of professionalism and we connect this with the concept of accountable disciplinary knowledge (ADK). ADK has previously only been applied to students' experiences and identity formation at university. The approach taken in this work allows us to see the extension of ADK into the workplace."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2019-07-30"; dct:isPartOf , ; dct:publisher ; dct:title "Accountable Disciplinary Knowledge in Computing Education"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "2019 ACM Conference on International Computing Education Research"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Toronto ON, Canada"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Dziallas"^^xsd:string; foaf:givenName "Sebastian"^^xsd:string; foaf:name "Sebastian Dziallas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fincher"^^xsd:string; foaf:givenName "Sally"^^xsd:string; foaf:name "Sally Fincher"^^xsd:string; rdf:type foaf:Person . foaf:name "Proceedings of the 2019 ACM Conference on International Computing Education Research"^^xsd:string; rdf:type bibo:Collection . rdfs:label "IJHCS-paper.pdf"^^xsd:string . rdfs:label "IJHCS-paper.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #75624 \n\n(Smart)Watch Out! Encouraging Privacy-Protective Behavior through Interactive Games\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "(Smart)Watch Out! Encouraging Privacy-Protective Behavior through Interactive Games (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "(Smart)Watch Out! Encouraging Privacy-Protective Behavior through Interactive Games (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "(Smart)Watch Out! Encouraging Privacy-Protective Behavior through Interactive Games (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "(Smart)Watch Out! Encouraging Privacy-Protective Behavior through Interactive Games (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "(Smart)Watch Out! Encouraging Privacy-Protective Behavior through Interactive Games (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "(Smart)Watch Out! Encouraging Privacy-Protective Behavior through Interactive Games (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The public frequently appear to overlook privacy, even when they claim to value it. This disparity between concern and behavior is known as the Privacy Paradox. Smartwatches are novel products that offer helpful functionality. However, although they often store sensitive data (e.g. text messages), owners rarely use protective features (e.g. app permissions). Campaigns have sought to increase privacy awareness, but initiatives tend to be ineffective. We therefore explore the efficacy of a serious game in encouraging protective smartwatch behavior. The application is designed with Learning Science principles and evaluated through a study with 504 smartwatch owners. After soliciting concerns and behavior, our treatment group [n = 252] play the online simulation. Our control group do not participate [n = 252], as we seek to limit extraneous variables. In a follow-up session, all users report posttest responses and qualitative justifications. We appear to encourage protective behavior, with our treatment group using privacy features more often. We also significantly reduce the prevalence of the Paradox, realigning behavior with concern. These quantitative findings are complemented by an inductive analysis of user rationale. Smartwatch behavior is influenced by several factors, including privacy awareness and data sensitivity. Finally, we use Protection Motivation Theory (PMT) to develop intervention recommendations. These include risk exposure tools and protective demonstrations. To our knowledge, this is the first tool to encourage protective smartwatch behavior."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "132"; dc:hasVersion ; dct:creator , , ; dct:date "2019-07-30"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "(Smart)Watch Out! Encouraging Privacy-Protective Behavior through Interactive Games"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Creese"^^xsd:string; foaf:givenName "Sadie"^^xsd:string; foaf:name "Sadie Creese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Williams"^^xsd:string; foaf:givenName "Meredydd"^^xsd:string; foaf:name "Meredydd Williams"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "10715819"; foaf:name "International Journal of Human-Computer Studies"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "humanintheloop_design_with_machine_learning.pdf"^^xsd:string . rdfs:label "humanintheloop_design_with_machine_learning.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #78092 \n\nHuman-in-the-Loop Design with Machine Learning\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Human-in-the-Loop Design with Machine Learning (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Human-in-the-Loop Design with Machine Learning (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human-in-the-Loop Design with Machine Learning (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human-in-the-Loop Design with Machine Learning (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human-in-the-Loop Design with Machine Learning (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human-in-the-Loop Design with Machine Learning (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Human-in-the-Loop Design with Machine Learning (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Human-in-the-Loop Design with Machine Learning (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human-in-the-Loop Design with Machine Learning (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human-in-the-Loop Design with Machine Learning (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human-in-the-Loop Design with Machine Learning (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Human-in-the-Loop Design with Machine Learning (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 . bibo:abstract "Deep learning methods have been applied to randomly generate images, such as in fashion, furniture design. To date, consideration of human aspects which play a vital role in a design process has not been given significant attention in deep learning approaches. In this paper, results are reported from a human- in-the-loop design method where brain EEG signals are used to capture preferable design features. In the framework developed, an encoder extracting EEG features from raw signals recorded from subjects when viewing images from ImageNet are learned. Secondly, a GAN model is trained conditioned on the encoded EEG features to generate design images. Thirdly, the trained model is used to generate design images from a person's EEG measured brain activity in the cognitive process of thinking about a design. To verify the proposed method, a case study is presented following the proposed approach. The results indicate that the method can generate preferred designs styles guided by the preference related brain signals. In addition, this method could also help improve communication between designers and clients where clients might not be able to express design requests clearly."^^xsd:string; bibo:authorList ; bibo:issue "1"; bibo:presentedAt ; bibo:status , ; bibo:volume "1"; dc:hasVersion , ; dct:creator , , , , , , , ; dct:date "2019-07-26"; dct:isPartOf , ; dct:publisher ; dct:subject , , , , , ; dct:title "Human-in-the-Loop Design with Machine Learning"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF41 Psychology and philosophy" . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "NX Arts in general"@en . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "ICED 2019"^^xsd:string; rdf:type bibo:Conference . foaf:name "Cambridge University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Pan"^^xsd:string; foaf:name "Pan Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chen"^^xsd:string; foaf:givenName "Liuqing"^^xsd:string; foaf:name "Liuqing Chen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wu"^^xsd:string; foaf:givenName "Chao"^^xsd:string; foaf:name "Chao Wu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Guo"^^xsd:string; foaf:givenName "Yike"^^xsd:string; foaf:name "Yike Guo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Peng"^^xsd:string; foaf:givenName "Danlin"^^xsd:string; foaf:name "Danlin Peng"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Childs"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Childs"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Xiaoyi"^^xsd:string; foaf:name "Xiaoyi Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . bibo:issn "22204342"; foaf:name "Proceedings of the Design Society: International Conference on Engineering Design"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "PPIG_2019_paper_6.pdf"^^xsd:string . rdfs:label "PPIG_2019_paper_6.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79905 \n\nEvaluating programming systems design\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Evaluating programming systems design (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating programming systems design (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating programming systems design (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating programming systems design (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating programming systems design (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating programming systems design (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Research on programming systems design needs to consider a wide range of aspects in their full complexity. This includes user interaction, implementation, interoperability but also the sustainability of its ecosystem and wider societal impact. Established methods of evaluation, such as formal proofs or user studies, impose a reductionist view that makes it difficult to see programming systems in their full complexity and, consequently, force researchers to adopt simplistic perspectives.\r\n\r\nThis paper asks whether we can create more amenable methods of evaluation derived from existing informal practices such as multimedia essays, demos, and interactive tutorials. These popular forms incorporate recorded or scaffolded interaction, often embedded in a text that guides the reader. Can we augment such forms with structure and guidelines to obtain methods of evaluation suitable for peer review? We do not answer this question, but merely seek to identify some of the problems and instigate a community discussion. In that spirit we propose to hold a panel session at the conference."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2019-07-19"; dct:isPartOf ; dct:subject ; dct:title "Evaluating programming systems design"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "PPIG 2019"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Newcastle upon Tyne, United Kingdom"^^xsd:string . foaf:familyName "Edwards"^^xsd:string; foaf:givenName "Jonathan"^^xsd:string; foaf:name "Jonathan Edwards"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Church"^^xsd:string; foaf:givenName "Luke"^^xsd:string; foaf:name "Luke Church"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kell"^^xsd:string; foaf:givenName "Stephen"^^xsd:string; foaf:name "Stephen Kell"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Petricek"^^xsd:string; foaf:givenName "Tomas"^^xsd:string; foaf:name "Tomas Petricek"^^xsd:string; rdf:type foaf:Person . rdfs:label "AAAI-2019-Camera-Ready (1).pdf"^^xsd:string . rdfs:label "AAAI-2019-Camera-Ready (1).pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #70009 \n\nWord Embedding as Maximum A Posteriori Estimation\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Word Embedding as Maximum A Posteriori Estimation (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Word Embedding as Maximum A Posteriori Estimation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Word Embedding as Maximum A Posteriori Estimation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Word Embedding as Maximum A Posteriori Estimation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Word Embedding as Maximum A Posteriori Estimation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Word Embedding as Maximum A Posteriori Estimation (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "The GloVe word embedding model relies on solving a global optimization problem, which can be reformulated as a maximum likelihood estimation problem. In this paper, we propose to generalize this approach to word embedding by considering parametrized variants of the GloVe model and incorporating priors on these parameters. To demonstrate the usefulness of this approach, we consider a word embedding model in which each context word is associated with a corresponding variance, intuitively encoding how informative it is. Using our framework, we can then learn these variances together with the resulting word vectors in a unified way. We experimentally show that the resulting word embedding models outperform GloVe, as well as many popular alternatives."^^xsd:string; bibo:authorList ; bibo:issue "1"; bibo:presentedAt ; bibo:status , ; bibo:volume "33"; dc:hasVersion ; dct:creator , , , , ; dct:date "2019-07-17"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Word Embedding as Maximum A Posteriori Estimation"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "33rd AAAI Conference on Artificial Intelligence (AAAI 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Hawaii, USA"^^xsd:string . foaf:name "Association for the Advancement of Artificial Intelligence"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Shi"^^xsd:string; foaf:givenName "Bei"^^xsd:string; foaf:name "Bei Shi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fu"^^xsd:string; foaf:givenName "Zihao"^^xsd:string; foaf:name "Zihao Fu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lam"^^xsd:string; foaf:givenName "Wai"^^xsd:string; foaf:name "Wai Lam"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Schockart"^^xsd:string; foaf:givenName "Steven"^^xsd:string; foaf:name "Steven Schockart"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jameel"^^xsd:string; foaf:givenName "Shoaib"^^xsd:string; foaf:name "Shoaib Jameel"^^xsd:string; rdf:type foaf:Person . bibo:issn "23743468"; foaf:name "Proceedings of the AAAI Conference on Artificial Intelligence"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #91403 \n\nPerformance analysis of data fragmentation techniques on a cloud server\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "The advancements in virtualisation and distributed computing have allowed the cloud paradigm to become very popular among users and resources. It allows companies to save costs on infrastructure and maintenance and to focus on the development of products. However, this fast-growing paradigm has brought along some concerns from users, such as the integrity and security of the data, particularly in environments where users rely entirely on providers to secure their data. This paper explores different techniques to fragment data on the cloud and prevent direct unauthorised access to the data. It explores their performance on a cloud instance, where the total time to perform the operation, including the upload and download of the data, is considered. Results from this experiment indicate that fragmentation algorithms show better performance compared to encryption. Moreover, when combining encryption with fragmentation, there is an increase in the security, with the trade-off of the performance."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "10"; dct:creator , , , , ; dct:date "2019-07-16"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Performance analysis of data fragmentation techniques on a cloud server"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Inderscience Enterprises Ltd"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Grosso"^^xsd:string; foaf:givenName "Enrico"^^xsd:string; foaf:name "Enrico Grosso"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Santos"^^xsd:string; foaf:givenName "Nelson"^^xsd:string; foaf:name "Nelson Santos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ghita"^^xsd:string; foaf:givenName "Bogdan"^^xsd:string; foaf:name "Bogdan Ghita"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lentini"^^xsd:string; foaf:givenName "Salvatore"^^xsd:string; foaf:name "Salvatore Lentini"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Masala"^^xsd:string; foaf:givenName "Giovanni Luca"^^xsd:string; foaf:name "Giovanni Luca Masala"^^xsd:string; rdf:type foaf:Person . bibo:issn "1741847X"; foaf:name "International Journal of Grid and Utility Computing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90195 \n\nDeep Rule-Based Aerial Scene Classifier using High-Level Ensemble Feature Descriptor\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "In this paper, a new deep rule-based approach using high-level ensemble feature descriptor is proposed for aerial scene classification. By creating an ensemble of three pre-trained deep convolutional neural networks for feature extraction, the proposed approach is able to extract more discriminative representations from the local regions of aerial images. With a set of massively parallel IF...THEN rules built upon the prototypes identified through a self-organizing, nonparametric, transparent and highly human-interpretable learning process, the proposed approach is able to produce the state-of-the-art classification results on the unlabeled images outperforming the alternatives. Numerical examples on benchmark datasets demonstrate the strong performance of the proposed approach."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , ; dct:date "2019-07-14"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Deep Rule-Based Aerial Scene Classifier using High-Level Ensemble Feature Descriptor"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "2019 International Joint Conference on Neural Networks (IJCNN)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Budapest, Hungary"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P."^^xsd:string; foaf:name "Plamen P. Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "21614393"; foaf:name "Neural Networks (IJCNN), The 2013 International Joint Conference"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Untitle.pdf"^^xsd:string . rdfs:label "Untitle.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #75345 \n\nParallelism and partitioning in large-scale GAs using spark\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Parallelism and partitioning in large-scale GAs using spark (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Parallelism and partitioning in large-scale GAs using spark (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Parallelism and partitioning in large-scale GAs using spark (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Parallelism and partitioning in large-scale GAs using spark (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Parallelism and partitioning in large-scale GAs using spark (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Parallelism and partitioning in large-scale GAs using spark (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Big Data promises new scientific discovery and economic value. Genetic algorithms (GAs) have proven their flexibility in many application areas and substantial research effort has been dedicated to improving their performance through parallelisation. In contrast with most previous efforts we reject approaches that are based on the centralisation of data in the main memory of a single node or that require remote access to shared/distributed memory. We focus instead on scenarios where data is partitioned across machines.\r\n\r\nIn this partitioned scenario, we explore two parallelisation models: PDMS, inspired by the traditional master-slave model, and PDMD, based on island models; we compare their performance in large-scale classification problems. We implement two distributed versions of Bio-HEL, a popular large-scale single-node GA classifier, using the Spark distributed data processing platform. In contrast to existing GA based on MapReduce, Spark allows a more efficient implementation of parallel GAs thanks to its simple, efficient iterative processing of partitioned datasets.\r\n\r\nWe study the accuracy, efficiency and scalability of the proposed models. Our results show that PDMS provides the same accuracy of traditional BioHEL and exhibit good scalability up to 64 cores, while PDMD provides substantial reduction of execution time at a minor loss of accuracy."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2019-07-13"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Parallelism and partitioning in large-scale GAs using spark"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . dct:title "Genetic and Evolutionary Computation Conference (GECCO 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Prague, Czech Republic"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Alterkawi"^^xsd:string; foaf:givenName "Laila"^^xsd:string; foaf:name "Laila Alterkawi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Migliavacca"^^xsd:string; foaf:givenName "Matteo"^^xsd:string; foaf:name "Matteo Migliavacca"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "main.pdf"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #74012 \n\nVerifying Asynchronous Interactions via Communicating Session Automata\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Verifying Asynchronous Interactions via Communicating Session Automata (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Verifying Asynchronous Interactions via Communicating Session Automata (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Verifying Asynchronous Interactions via Communicating Session Automata (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Verifying Asynchronous Interactions via Communicating Session Automata (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Verifying Asynchronous Interactions via Communicating Session Automata (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Verifying Asynchronous Interactions via Communicating Session Automata (Other)"^^xsd:string . cc:license ; dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Verifying Asynchronous Interactions via Communicating Session Automata (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Verifying Asynchronous Interactions via Communicating Session Automata (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Verifying Asynchronous Interactions via Communicating Session Automata (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Verifying Asynchronous Interactions via Communicating Session Automata (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Verifying Asynchronous Interactions via Communicating Session Automata (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Verifying Asynchronous Interactions via Communicating Session Automata (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "This paper proposes a sound procedure to verify properties of communicating session automata (CSA), i.e., communicating automata that include multiparty session types. We introduce a new asynchronous compatibility property for CSA, called k-multiparty compatibility (k-MC), which is a strict superset of the synchronous multiparty compatibility used in theories and tools based on session types. It is decomposed into two bounded properties: (i) a condition called k-safety which guarantees that, within the bound, all sent messages can be received and each automaton can make a move; and (ii) a condition called k-exhaustivity which guarantees that all k-reachable send actions can be fired within the bound. We show that k-exhaustivity implies existential boundedness, and soundly and completely characterises systems where each automaton behaves equivalently under bounds greater than or equal to k. We show that checking k-MC is PSPACE-complete, and demonstrate its performance empirically over large systems using partial order reduction."^^xsd:string; bibo:authorList ; bibo:issue "11561"; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2019-07-12"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Verifying Asynchronous Interactions via Communicating Session Automata"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasSupplemental ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "31st International Conference on Computer-Aided Verification (CAV 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "New York City, USA"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Lange"^^xsd:string; foaf:givenName "Julien"^^xsd:string; foaf:name "Julien Lange"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yoshida"^^xsd:string; foaf:givenName "Nobuko"^^xsd:string; foaf:name "Nobuko Yoshida"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90809 \n\nOntology-based data access – Beyond relational sources\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 . bibo:abstract "The database (DB) landscape has been significantly diversified during the last decade, resulting in the emergence of a variety of non-relational (also called NoSQL) DBs, e.g., xml and json-document DBs, key-value stores, and graph DBs. To enable access to such data, we generalize the well-known ontology-based data access (OBDA) framework so as to allow for querying arbitrary data sources using sparql. We propose an architecture for a generalized OBDA system implementing the virtual approach. Then, to investigate feasibility of OBDA over non-relational DBs, we compare an implementation of an OBDA system over MongoDB, a popular json-document DB, with a triple store. This article is an extended and revised version of an article that appeared in the proceedings of the 17th International Conference of the Italian Association for Artificial Intelligence (AI*IA) [4]."^^xsd:string; bibo:authorList ; bibo:issue "1"; bibo:status , ; bibo:volume "13"; dct:creator , , , , , , , ; dct:date "2019-07-09"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Ontology-based data access – Beyond relational sources"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "IOS Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Magnini"^^xsd:string; foaf:givenName "Bernardo"^^xsd:string; foaf:name "Bernardo Magnini"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Passerini"^^xsd:string; foaf:givenName "Andrea"^^xsd:string; foaf:name "Andrea Passerini"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Xiao"^^xsd:string; foaf:givenName "Guohui"^^xsd:string; foaf:name "Guohui Xiao"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Calvanese"^^xsd:string; foaf:givenName "Diego"^^xsd:string; foaf:name "Diego Calvanese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cogrel"^^xsd:string; foaf:givenName "Benjamin"^^xsd:string; foaf:name "Benjamin Cogrel"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ghidini"^^xsd:string; foaf:givenName "Chiara"^^xsd:string; foaf:name "Chiara Ghidini"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Corman"^^xsd:string; foaf:givenName "Julien"^^xsd:string; foaf:name "Julien Corman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Botoeva"^^xsd:string; foaf:givenName "Elena"^^xsd:string; foaf:name "Elena Botoeva"^^xsd:string; rdf:type foaf:Person . bibo:issn "17248035"; foaf:name "Intelligenza Artificiale"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "ISI-2019-NNG-author-final.pdf"^^xsd:string . rdfs:label "ISI-2019-NNG-author-final.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73926 \n\nUnderstanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The Internet and, in particular, Online Social Networks have changed the way that terrorist and extremist groups can influence and radicalise individuals. Recent reports show that the mode of operation of these groups starts by exposing a wide audience to extremist material online, before migrating them to less open online platforms for further radicalization. Thus, identifying radical content online is crucial to limit the reach and spread of the extremist narrative. In this paper, our aim is to identify measures to automatically detect radical content in social media. We identify several signals, including textual, psychological and behavioural, that together allow for the classification of radical messages. Our contribution is three-fold: (1) we analyze propaganda material published by extremist groups and create a contextual text-based model of radical content, (2) we build a model of psychological properties inferred from these material, and (3) we evaluate these models on Twitter to determine the extent to which it is possible to automatically identify online radical tweets. Our results show that radical users do exhibit distinguishable textual, psychological, and behavioural properties. We find that the psychological properties are among the most distinguishing features. Additionally, our results show that textual models using vector embedding features significantly improves the detection over TF-IDF features. We validate our approach on two experiments achieving high accuracy. Our findings can be utilized as signals for detecting online radicalization activities."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2019-07-03"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "17th IEEE International Conference on Intelligence and Security Informatics (ISI)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Shenzhen, China"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Goldsmith"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Goldsmith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nouh"^^xsd:string; foaf:givenName "Mariam"^^xsd:string; foaf:name "Mariam Nouh"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:name "2019 IEEE International Conference on Intelligence and Security Informatics (ISI)"^^xsd:string; rdf:type bibo:Collection . rdfs:label "petras-iet-2019-awncm.pdf"^^xsd:string . rdfs:label "petras-iet-2019-awncm.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73330 \n\nA Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "As new technologies such as the Internet of Things (IoT) are integrated into Critical National Infrastructures (CNI), new cybersecurity threats emerge that require specific security solutions. Approaches used for analysis include the modelling and simulation of critical infrastructure systems using attributes, functionalities, operations, and behaviours to support various security analysis viewpoints, recognising and appropriately managing associated security risks. With several critical infrastructure protection approaches available, the question of how to effectively model the complex behaviour of interconnected CNI elements and to configure their protection as a system-of-systems remains a challenge. Using a systematic review approach, existing critical infrastructure protection approaches (tools and techniques) are examined to determine their suitability given trends like IoT, and effective security modelling and analysis issues. It is found that empirical-based, agent-based, system dynamics-based, and network-based modelling are more commonly applied than economic-based and equation-based techniques, and empirical-based modelling is the most widely used. The energy and transportation critical infrastructure sectors reflect the most responsive sectors, and no one Critical Infrastructure Protection (CIP) approach – tool, technique, methodology or framework – provides a ‘fit-for-all’ capacity for all-round attribute modelling and simulation of security risks. Typically, deciding factors for CIP choices to adopt are often dominated by trade-offs between ‘complexity of use’ and ‘popularity of approach’, as well as between ‘specificity’ and ‘generality’ of application in sectors. Improved security modelling is feasible via; appropriate tweaking of CIP approaches to include a wider scope of security risk management, functional responsiveness to interdependency, resilience and policy formulation requirements, and collaborative information sharing between public and private sectors."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2019-07-02"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . rdf:type skos:Concept; skos:prefLabel "TJ Mechanical engineering and machinery"@en . dct:title "PETRAS/IET Conference. Living in the Internet of Things: Cybersecurity of the IoT - 2019"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "London, UK"^^xsd:string . foaf:name "IET"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ani"^^xsd:string; foaf:givenName "Uchenna D."^^xsd:string; foaf:name "Uchenna D. Ani"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Maple"^^xsd:string; foaf:givenName "Carsten"^^xsd:string; foaf:name "Carsten Maple"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cook"^^xsd:string; foaf:givenName "Al"^^xsd:string; foaf:name "Al Cook"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Watson"^^xsd:string; foaf:givenName "Jeremy D. McK."^^xsd:string; foaf:name "Jeremy D. McK. Watson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90808 \n\nQuery inseparability for \\(ALC\\) ontologies\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "We investigate the problem whether two \\(ALC\\) ontologies are indistinguishable (or inseparable) by means of queries in a given signature, which is fundamental for ontology engineering tasks such as ontology versioning, modularisation, update, and forgetting. We consider both knowledge base (KB) and TBox inseparability. For KBs, we give model-theoretic criteria in terms of (finite partial) homomorphisms and products and prove that this problem is undecidable for conjunctive queries (CQs), but 2ExpTime-complete for unions of CQs (UCQs). The same results hold if (U)CQs are replaced by rooted (U)CQs, where every variable is connected to an answer variable. We also show that inseparability by CQs is still undecidable if one KB is given in the lightweight DL \\(EL\\) and if no restrictions are imposed on the signature of the CQs. We also consider the problem whether two \\(ALC\\) TBoxes give the same answers to any query over any ABox in a given signature and show that, for CQs, this problem is undecidable, too. We then develop model-theoretic criteria for Horn \\(ALC\\) TBoxes and show using tree automata that, in contrast, inseparability becomes decidable and 2ExpTime-complete, even ExpTime-complete when restricted to (unions of) rooted CQs."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "272"; dct:creator , , , , ; dct:date "2019-07-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Query inseparability for \\(ALC\\) ontologies"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ryzhikov"^^xsd:string; foaf:givenName "Vladislav"^^xsd:string; foaf:name "Vladislav Ryzhikov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zakharyaschev"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Zakharyaschev"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wolter"^^xsd:string; foaf:givenName "Frank"^^xsd:string; foaf:name "Frank Wolter"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lutz"^^xsd:string; foaf:givenName "Carsten"^^xsd:string; foaf:name "Carsten Lutz"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Botoeva"^^xsd:string; foaf:givenName "Elena"^^xsd:string; foaf:name "Elena Botoeva"^^xsd:string; rdf:type foaf:Person . bibo:issn "00043702"; foaf:name "Artificial Intelligence"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #91417 \n\nA multi-spectrogram deep neural network for acoustic scene classification\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , ; dct:date "2019-07-01"; dct:isPartOf ; dct:title "A multi-spectrogram deep neural network for acoustic scene classification"^^xsd:string; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "Detection and Classification of Acoustic Scenes and Events"^^xsd:string; rdf:type bibo:Conference . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pham"^^xsd:string; foaf:givenName "Lam Dang"^^xsd:string; foaf:name "Lam Dang Pham"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . rdfs:label "08744516.pdf"^^xsd:string . rdfs:label "08744516.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77168 \n\nA Survey of Deep Learning Solutions for Multimedia Visual Content Analysis\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Survey of Deep Learning Solutions for Multimedia Visual Content Analysis (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Survey of Deep Learning Solutions for Multimedia Visual Content Analysis (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Survey of Deep Learning Solutions for Multimedia Visual Content Analysis (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Survey of Deep Learning Solutions for Multimedia Visual Content Analysis (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Survey of Deep Learning Solutions for Multimedia Visual Content Analysis (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Survey of Deep Learning Solutions for Multimedia Visual Content Analysis (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "The increasing use of social media networks on handheld devices, especially smartphones with powerful built-in cameras, and the widespread availability of fast and high bandwidth broadband connections, added to the popularity of cloud storage, is enabling the generation and distribution of massive volumes of digital media, including images and videos. Such media is full of visual information and holds immense value in today's world. The volume of data involved calls for automated visual content analysis systems able to meet the demands of practice in terms of efficiency and effectiveness. Deep learning (DL) has recently emerged as a prominent technique for visual content analysis. It is data-driven in nature and provides automatic end-to-end learning solutions without the need to rely explicitly on predefined handcrafted feature extractors. Another appealing characteristic of DL solutions is the performance they can achieve, once the network is trained, under practical constraints. This paper identifies eight problem domains which require analysis of visual artifacts in multimedia. It surveys the recent, authoritative, and the best performing DL solutions and lists the datasets used in the development of these deep methods for the identified types of visual analysis problems. This paper also discusses the challenges that the DL solutions face which can compromise their reliability, robustness, and accuracy for visual content analysis."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "7"; dc:hasVersion ; dct:creator , , , ; dct:date "2019-06-24"; dct:isPartOf , ; dct:publisher ; dct:title "A Survey of Deep Learning Solutions for Multimedia Visual Content Analysis"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Kurugollu"^^xsd:string; foaf:givenName "Fatih"^^xsd:string; foaf:name "Fatih Kurugollu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nadeem"^^xsd:string; foaf:givenName "Muhammad Shahroz"^^xsd:string; foaf:name "Muhammad Shahroz Nadeem"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N.L."^^xsd:string; foaf:name "Virginia N.L. Franqueira"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhai"^^xsd:string; foaf:givenName "Xiaojun"^^xsd:string; foaf:name "Xiaojun Zhai"^^xsd:string; rdf:type foaf:Person . bibo:issn "21693536"; foaf:name "IEEE Access"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "s41598-019-45289-7.pdf"^^xsd:string . rdfs:label "s41598-019-45289-7.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #74303 \n\nEEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "EEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "EEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "EEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "EEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "EEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "EEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "EEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "EEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "EEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "EEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "EEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "EEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 . bibo:abstract "The weighted Phase Lag Index (wPLI) and the weighted Symbolic Mutual Information (wSMI) represent two robust and widely used methods for MEG/EEG functional connectivity estimation. Interestingly, both ethods have been shown to detect relative alterations of brain functional connectivity in conditions associated with changes in the level of consciousness, such as following severe brain injury or under naesthesia. Despite these promising findings, it was unclear whether wPLI and wSMI may account for distinct or similar types of functional interactions. Using simulated high-density (hd-)EEG data, we demonstrate that while wPLI has high sensitivity for couplings presenting a mixture of linear and nonlinear interdependencies, only wSMI can detect purely nonlinear interaction dynamics. Moreover, we evaluated the potential impact of these differences on real experimental data by computing wPLI and wSMI connectivity in hd-EEG recordings of 12 healthy adults during wakefulness and deep (N3-)sleep, characterized by different levels of consciousness. In line with the simulation-based findings, this analysis revealed that both methods have different sensitivity for changes in brain connectivity across the two vigilance states. Our results indicate that the conjoint use of wPLI and wSMI may represent a powerful tool to study the functional bases of consciousness in physiological and pathological conditions."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "9"; dc:hasVersion , ; dct:creator , , , , , , , , ; dct:date "2019-06-20"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "EEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Betta"^^xsd:string; foaf:givenName "Monica"^^xsd:string; foaf:name "Monica Betta"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bernardi"^^xsd:string; foaf:givenName "Giulio"^^xsd:string; foaf:name "Giulio Bernardi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Siclari"^^xsd:string; foaf:givenName "Francesca"^^xsd:string; foaf:name "Francesca Siclari"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Imperatori"^^xsd:string; foaf:givenName "Laura Sophie"^^xsd:string; foaf:name "Laura Sophie Imperatori"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ricciardi"^^xsd:string; foaf:givenName "Emiliano"^^xsd:string; foaf:name "Emiliano Ricciardi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pietrini"^^xsd:string; foaf:givenName "Pietro"^^xsd:string; foaf:name "Pietro Pietrini"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Canales-Johnson"^^xsd:string; foaf:givenName "Andrés"^^xsd:string; foaf:name "Andrés Canales-Johnson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cecchetti"^^xsd:string; foaf:givenName "Luca"^^xsd:string; foaf:name "Luca Cecchetti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chennu"^^xsd:string; foaf:givenName "Srivas"^^xsd:string; foaf:name "Srivas Chennu"^^xsd:string; rdf:type foaf:Person . foaf:name "Scientific Reports"^^xsd:string; rdf:type bibo:Collection . rdfs:label "HCI 2019 paper.pdf"^^xsd:string . rdfs:label "HCI 2019 paper.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #71265 \n\nPredicting Java Computer Programming Task Difficulty Levels Using EEG for Educational Environments\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Predicting Java Computer Programming Task Difficulty Levels Using EEG for Educational Environments (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Java Computer Programming Task Difficulty Levels Using EEG for Educational Environments (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Java Computer Programming Task Difficulty Levels Using EEG for Educational Environments (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Java Computer Programming Task Difficulty Levels Using EEG for Educational Environments (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Java Computer Programming Task Difficulty Levels Using EEG for Educational Environments (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Java Computer Programming Task Difficulty Levels Using EEG for Educational Environments (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Understanding how difficult a learning task is for a person allows teaching material to be appropriately designed to suit the person, especially for programming material. A first step for this would be to predict on the task difficulty level. While this is possible through subjective questionnaire, it could lead to misleading outcome and it would be better to do this by tapping the actual thought process in the brain while the subject is performing the task, which can be done using electroencephalogram. We set out on this objective and show that it is possible to predict easy and difficult levels of mental tasks when subjects are attempting to solve Java programming problems. Using a proposed confidence threshold, we obtained a classification performance of 87.05% thereby showing that it is possible to use brain data to determine the teaching material difficulty level which will be useful in educational environments."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "11580"; dc:hasVersion ; dct:creator , , , ; dct:date "2019-06-20"; dct:isPartOf , ; dct:publisher ; dct:title "Predicting Java Computer Programming Task Difficulty Levels Using EEG for Educational Environments"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . dct:title "21st International Conference on Human-Computer Interaction"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Orlando, Florida, USA"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Murugappan"^^xsd:string; foaf:givenName "Murugappan"^^xsd:string; foaf:name "Murugappan Murugappan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chinnaiah"^^xsd:string; foaf:givenName "Nithyakalyani"^^xsd:string; foaf:name "Nithyakalyani Chinnaiah"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Duraisingam"^^xsd:string; foaf:givenName "Aruna"^^xsd:string; foaf:name "Aruna Duraisingam"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "jics-2019-bn-camera-ready.pdf"^^xsd:string . rdfs:label "jics-2019-bn-camera-ready.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73481 \n\nDeveloping cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs)\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs) (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs) (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs) (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs) (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs) (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs) (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "An essential component of an organisation’s cybersecurity strategy is building awareness and education of online threats, and how to protect corporate data and services. This research article focuses on this topic and proposes a high-level programme for cybersecurity education and awareness to be used when targeting Small-to-Medium-sized Enterprises/Businesses (SMEs/SMBs) at a city-level. We ground this programme in existing research as well as unique insight into an ongoing city-based project with similar aims. To structure our work, we begin by conducting a scoping review of the literature in cybersecurity education and awareness, particularly for SMEs/SMBs. This theoretical analysis is then complemented by using a case study and reflecting on an ongoing, innovative programme that seeks to work with these businesses to significantly enhance their security posture. From these analyses, we extract best practice and important lessons/recommendations to produce a high-level programme for cybersecurity education and awareness. We find that whilst literature can be informative at guiding education and awareness programmes, it may not always reach real-world programmes. On the other hand, existing programmes, such as the one we explored, have great potential but there can also be room for improvement. Knowledge from each of these areas can, and should, be combined to the benefit of the academic and practitioner communities. The study contributes to current research through the outline of a high-level programme for cybersecurity education and awareness targeting SMEs/SMBs. Through this research, we engage in a reflection of literature in this space, and present insights into the advances and challenges faced by an on-going programme. These analyses allow us to craft a proposal for a core programme that can assist in improving the security education, awareness and training that targets SMEs/SMBs."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "27"; dc:hasVersion ; dct:creator , ; dct:date "2019-06-11"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs)"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "HF Commerce"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Emerald"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bada"^^xsd:string; foaf:givenName "Maria"^^xsd:string; foaf:name "Maria Bada"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "20564961"; foaf:name "Information and Computer Security"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "APF_2019_paper_25.pdf"^^xsd:string . rdfs:label "APF_2019_paper_25.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73262 \n\nSharing Cyber Threat Intelligence under the General Data Protection Regulation\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Sharing Cyber Threat Intelligence under the General Data Protection Regulation (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Sharing Cyber Threat Intelligence under the General Data Protection Regulation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sharing Cyber Threat Intelligence under the General Data Protection Regulation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sharing Cyber Threat Intelligence under the General Data Protection Regulation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sharing Cyber Threat Intelligence under the General Data Protection Regulation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sharing Cyber Threat Intelligence under the General Data Protection Regulation (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Sharing Cyber Threat Intelligence (CTI) is a key strategy for improving cyber defense, but there are risks of breaching regulations and laws regarding privacy. With regulations such as the General Data Protection Regulation (GDPR) that are designed to protect citizens’ data privacy, the managers of CTI datasets need clear guidance on how and when it is legal to share such information. This paper defines the impact that GDPR legal aspects may have on the sharing of CTI. In addition, we define adequate protection levels for sharing CTI to ensure compli- ance with the GDPR. We also present a model for evaluating the legal require- ments for supporting decision making when sharing CTI, which also includes advice on the required protection level. Finally, we evaluate our model using use cases of sharing CTI datasets between entities."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "11498"; dc:hasVersion ; dct:creator , , ; dct:date "2019-06-08"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Sharing Cyber Threat Intelligence under the General Data Protection Regulation"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . dct:title "Annual Privacy Forum 2019"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Rome, Italy"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Albakri"^^xsd:string; foaf:givenName "Adham"^^xsd:string; foaf:name "Adham Albakri"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Boiten"^^xsd:string; foaf:givenName "Eerke Albert"^^xsd:string; foaf:name "Eerke Albert Boiten"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Lemos"^^xsd:string; foaf:givenName "Rogerio"^^xsd:string; foaf:name "Rogerio de Lemos"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #91420 \n\nBag-of-features models based on C-DNN network for acoustic scene classification\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "This work proposes bag-of-features deep learning models for acoustic scene classi?cation (ASC) – identifying recording locations by analyzing background sound. We explore the effect on classi?cation accuracy of various front-end feature extraction techniques, ensembles of audio channels, and patch sizes from three kinds of spectrogram. The back-end process presents a two-stage learning model with a pre-trained CNN (preCNN) and a post-trained DNN (postDNN). Additionally, data augmentation using the mixup technique is investigated for both the pre-trained and post-trained processes, to improve classi?cation accuracy through increasing class boundary training conditions. Our experiments on the 2018 Challenge on Detection and Classi?cation of Acoustic Scenes and Events - Acoustic Scene Classi?cation (DCASE2018-ASC) subtask 1A and 1B signi?cantly outperform the DCASE2018 reference implementation and approach state-of-the-art performance for each task. Results reveal that the ensemble of multi-spectrogram features and data augmentation is bene?cial to performance."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , , ; dct:date "2019-06-08"; dct:isPartOf ; dct:title "Bag-of-features models based on C-DNN network for acoustic scene classification"^^xsd:string; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "2019 AES International Conference on Audio Forensics (June 2019)"^^xsd:string; rdf:type bibo:Conference . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lang"^^xsd:string; foaf:givenName "Yue"^^xsd:string; foaf:name "Yue Lang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pham"^^xsd:string; foaf:givenName "Lam Dang"^^xsd:string; foaf:name "Lam Dang Pham"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #73780 \n\nBeyond Equal-Length Snippets: How Long is Sufficient to Recognize an Audio Scene?\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Beyond Equal-Length Snippets: How Long is Sufficient to Recognize an Audio Scene? (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Beyond Equal-Length Snippets: How Long is Sufficient to Recognize an Audio Scene? (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Beyond Equal-Length Snippets: How Long is Sufficient to Recognize an Audio Scene? (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Beyond Equal-Length Snippets: How Long is Sufficient to Recognize an Audio Scene? (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Beyond Equal-Length Snippets: How Long is Sufficient to Recognize an Audio Scene? (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Beyond Equal-Length Snippets: How Long is Sufficient to Recognize an Audio Scene? (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "Due to the variability in characteristics of audio scenes, some scenes can naturally be recognized earlier than others. In this work, rather than using equal-length snippets for all scene categories, as is common in the literature, we study to which temporal extent an audio scene can be reliably recognized given state-of-the-art models. Moreover, as model fusion with deep network ensemble is prevalent in audio scene classification, we further study whether, and if so, when model fusion is necessary for this task. To achieve these goals, we employ two single-network systems relying on a convolutional neural network and a recurrent neural network for classification as well as early fusion and late fusion of these networks. Experimental results on the LITIS-Rouen dataset show that some scenes can be reliably recognized with a few seconds while other scenes require significantly longer durations. In addition, model fusion is shown to be the most beneficial when the signal length is short."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2019-06-08"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Beyond Equal-Length Snippets: How Long is Sufficient to Recognize an Audio Scene?"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "2019 AES Conference on Audio Forensics"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Porto, Portugal"^^xsd:string . foaf:name "The Audio Engineering Society"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Koch"^^xsd:string; foaf:givenName "Philipp"^^xsd:string; foaf:name "Philipp Koch"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian"^^xsd:string; foaf:name "Ian McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pham"^^xsd:string; foaf:givenName "Lam Dang"^^xsd:string; foaf:name "Lam Dang Pham"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Vos"^^xsd:string; foaf:givenName "Maarten"^^xsd:string; foaf:name "Maarten De Vos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mertins"^^xsd:string; foaf:givenName "Alfred"^^xsd:string; foaf:name "Alfred Mertins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chén"^^xsd:string; foaf:givenName "Oliver Y."^^xsd:string; foaf:name "Oliver Y. Chén"^^xsd:string; rdf:type foaf:Person . bibo:issn "15494950"; foaf:name "AES E-LIBRARY"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "paper (1).pdf"^^xsd:string . rdfs:label "paper (1).pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73526 \n\nCharacterising Renaming within OCaml’s Module System: Theory and Implementation\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Characterising Renaming within OCaml’s Module System: Theory and Implementation (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Characterising Renaming within OCaml’s Module System: Theory and Implementation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Characterising Renaming within OCaml’s Module System: Theory and Implementation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Characterising Renaming within OCaml’s Module System: Theory and Implementation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Characterising Renaming within OCaml’s Module System: Theory and Implementation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Characterising Renaming within OCaml’s Module System: Theory and Implementation (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "We present an abstract, set-theoretic denotational semantics\r\nfor a significant subset of OCaml and its module system\r\nin order to reason about the correctness of renaming value\r\nbindings. Our abstract semantics captures information about\r\nthe binding structure of programs. Crucially for renaming, it\r\nalso captures information about the relatedness of different\r\ndeclarations that is induced by the use of various different\r\nlanguage constructs (e.g. functors, module types and module constraints). Correct renamings are precisely those that\r\npreserve this structure. We demonstrate that our semantics\r\nallows us to prove various high-level, intuitive properties\r\nof renamings. We also show that it is sound with respect to\r\na (domain-theoretic) denotational model of the operational\r\nbehaviour of programs. This formal framework has been\r\nimplemented in a prototype refactoring tool for OCaml that\r\nperforms renaming"^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2019-06-08"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Characterising Renaming within OCaml’s Module System: Theory and Implementation"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "PLDI '19: ACM SIGPLAN Conference on Programming Language Design and Implementation"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Phoenix, Arizona, United States"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Férée"^^xsd:string; foaf:givenName "Hugo"^^xsd:string; foaf:name "Hugo Férée"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rowe"^^xsd:string; foaf:givenName "Reuben"^^xsd:string; foaf:name "Reuben Rowe"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Owens"^^xsd:string; foaf:givenName "Scott"^^xsd:string; foaf:name "Scott Owens"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Thompson"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Thompson"^^xsd:string; rdf:type foaf:Person . foaf:name "PLDI 2019: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation"^^xsd:string; rdf:type bibo:Collection . rdfs:label "herbrand-jlc.pdf"^^xsd:string . rdfs:label "herbrand-jlc.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73527 \n\nTowards Automated Reasoning in Herbrand Structures\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Towards Automated Reasoning in Herbrand Structures (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Towards Automated Reasoning in Herbrand Structures (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Automated Reasoning in Herbrand Structures (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Automated Reasoning in Herbrand Structures (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Automated Reasoning in Herbrand Structures (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards Automated Reasoning in Herbrand Structures (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Herbrand structures have the advantage, computationally speaking, of being guided by the definability of all elements in them. A salient feature of the logics induced by them is that they internally\r\nexhibit the induction scheme, thus providing a congenial, computationally-oriented framework for\r\nformal inductive reasoning. Nonetheless, their enhanced expressivity renders any effective proof\r\nsystem for them incomplete. Furthermore, the fact that they are not compact poses yet another prooftheoretic challenge. This paper offers several layers for coping with the inherent incompleteness and\r\nnon-compactness of these logics. First, two types of infinitary proof system are introduced—one\r\nof infinite width and one of infinite height—which manipulate infinite sequents and are sound and\r\ncomplete for the intended semantics. The restriction of these systems to finite sequents induces a\r\ncompleteness result for finite entailments. Then, in search of effectiveness, two finite approximations\r\nof these systems are presented and explored. Interestingly, the approximation of the infinite-width\r\nsystem via an explicit induction scheme turns out to be weaker than the effective cyclic fragment of the\r\ninfinite-height system."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2019-06-03"; dct:isPartOf , ; dct:publisher ; dct:title "Towards Automated Reasoning in Herbrand Structures"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Oxford University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Cohen"^^xsd:string; foaf:givenName "Liron"^^xsd:string; foaf:name "Liron Cohen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zohar"^^xsd:string; foaf:givenName "Yoni"^^xsd:string; foaf:name "Yoni Zohar"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rowe"^^xsd:string; foaf:givenName "Reuben"^^xsd:string; foaf:name "Reuben Rowe"^^xsd:string; rdf:type foaf:Person . bibo:issn "0955792X"; foaf:name "Journal of Logic and Computation"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #80311 \n\nThe Art, Science, and Engineering of Programming\n\n"; foaf:primaryTopic . rdf:_1 . ; bibo:editorList ; bibo:issue "1"; bibo:status ; bibo:volume "4"; dct:date "2019-06-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "The Art, Science, and Engineering of Programming"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, ep:EPrint, ep:EdjournalEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "AOSA"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . bibo:issn "24737321"; foaf:name "The Art, Science, and Engineering of Programming"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "175ThesisYunDeng.pdf"^^xsd:string . rdfs:label "175ThesisYunDeng.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80473 \n\nNovel Methods for the Computational Analysis of Codon Usage Bias\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Novel Methods for the Computational Analysis of Codon Usage Bias (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Novel Methods for the Computational Analysis of Codon Usage Bias (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Novel Methods for the Computational Analysis of Codon Usage Bias (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Novel Methods for the Computational Analysis of Codon Usage Bias (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Novel Methods for the Computational Analysis of Codon Usage Bias (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Novel Methods for the Computational Analysis of Codon Usage Bias (Other)"^^xsd:string . rdf:_1 . , ; bibo:abstract "The genetic code encodes the same amino acid with multiple codon choices, but in a biased fashion. This phenomenon is called the codon usage bias (CUB). There have been significant research efforts trying to quantify codon usage bias and probe into its origins. Understanding CUB is important for at least two reasons. Firstly, it is connected with gene expression, and thus of fundamental importance for our understanding of life. Secondly it is important for the optimisation of heterologous gene expression in industrial bioproduction including the pharmaceutical industry. This thesis makes three main contributions to the understanding of CUB: (1) It proposes a novel measure of codon usage bias which does not require any context information other than the nature of the coding sequences themselves. The proposed measure is capable of quantifying codon usage bias at different levels of an individual sequence, a particular amino acid type, and a whole genome, and also capable to provide comprehensive and desired CUB information for the correlation study about specific CUB related factors by constructing high dimensional CUB feature spaces. (2) It derives a stochastic thermodynamic based model to investigate what the evolutionary drivers of codon usage bias are from a macroscopic perspective. (3) It applies the proposed methods to extensive genomic data. Our main conclusions derived from the applications to real organisms include (a) codon usage bias and gene lengths cooperate together to satisfy different protein requirements in the cells; (b) codon usage bias correlates with phylogenetic distances among remote groups of species; (c) codon usage bias cannot be explained solely by selection pressures that act on the genome-wide codon frequencies, but also includes pressures that act at the level of individual genes."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2019-06"; dct:isPartOf ; dct:issuer , ; dct:subject ; dct:title "Novel Methods for the Computational Analysis of Codon Usage Bias"^^xsd:string; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chu"^^xsd:string; foaf:givenName "Dominique"^^xsd:string; foaf:name "Dominique Chu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "von der Haar"^^xsd:string; foaf:givenName "Tobias"^^xsd:string; foaf:name "Tobias von der Haar"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Deng"^^xsd:string; foaf:givenName "Yun"^^xsd:string; foaf:name "Yun Deng"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #71415 \n\nDynamic Analysis of Digital Chaotic Maps via State-Mapping Networks\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Chaotic dynamics is widely used to design pseudorandom number generators and for other applications such as secure communications and encryption. This paper aims to study the dynamics of discrete-time chaotic maps in the digital (i.e., finite-precision) domain. Differing from the traditional approaches treating a digital chaotic map as a black box with different explanations according to the test results of the output, the dynamical properties of such chaotic maps are first explored with a fixed-point arithmetic, using the Logistic map and the Tent map as two representative examples, from a new perspective with the corresponding state-mapping networks (SMNs). In an SMN, every possible value in the digital domain is considered as a node and the mapping relationship between any pair of nodes is a directed edge. The scale-free properties of the Logistic map's SMN are proved. The analytic results are further extended to the scenario of floating-point arithmetic and for other chaotic maps. Understanding the network structure of a chaotic map's SMN in digital computers can facilitate counteracting the undesirable degeneration of chaotic dynamics in finite-precision domains, helping also classify and improve the randomness of pseudorandom number sequences generated by iterating chaotic maps."^^xsd:string; bibo:authorList ; bibo:issue "6"; bibo:status , ; bibo:volume "66"; dc:hasVersion ; dct:creator , , , , ; dct:date "2019-06"; dct:isPartOf , ; dct:publisher ; dct:subject , , , ; dct:title "Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "QA101 Arithmetic"@en . rdf:type skos:Concept; skos:prefLabel "QC20 Mathematical Physics"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Kurths"^^xsd:string; foaf:givenName "Jurgen"^^xsd:string; foaf:name "Jurgen Kurths"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Feng"^^xsd:string; foaf:givenName "Bingbing"^^xsd:string; foaf:name "Bingbing Feng"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Chengqing"^^xsd:string; foaf:name "Chengqing Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chen"^^xsd:string; foaf:givenName "Guanrong"^^xsd:string; foaf:name "Guanrong Chen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . bibo:issn "15498328"; foaf:name "IEEE Transactions on Circuits and Systems I: Regular Papers"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "liza19DelFol.pdf"^^xsd:string . rdfs:label "liza19DelFol.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #74240 \n\nRelating RNN layers with the spectral WFA ranks in sequence modelling\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Relating RNN layers with the spectral WFA ranks in sequence modelling (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Relating RNN layers with the spectral WFA ranks in sequence modelling (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Relating RNN layers with the spectral WFA ranks in sequence modelling (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Relating RNN layers with the spectral WFA ranks in sequence modelling (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Relating RNN layers with the spectral WFA ranks in sequence modelling (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Relating RNN layers with the spectral WFA ranks in sequence modelling (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "We analyse Recurrent Neural Networks (RNNs) to understand the significance of multiple LSTM layers. We argue that the Weighted Finite-state Automata (WFA) trained using a spectral learning algorithm are helpful to analyse RNNs. Our results suggest that multiple LSTM layers in RNNs help learning distributed hidden states, but have a smaller impact on the ability to learn long-term dependencies. The analysis is based on the empirical results, however relevant theory (whenever possible) was discussed to justify and support our conclusions."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2019-05-30"; dct:isPartOf ; dct:subject ; dct:title "Relating RNN layers with the spectral WFA ranks in sequence modelling"^^xsd:string; ep:hasDocument , , , , , ; ep:hasSubmitted ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . dct:title "ACL workshop on Deep Learning and Formal Languages: Building Bridges"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Florence, Italy"^^xsd:string . foaf:familyName "Liza"^^xsd:string; foaf:givenName "Farhana Ferdousi"^^xsd:string; foaf:name "Farhana Ferdousi Liza"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grzes"^^xsd:string; foaf:givenName "Marek"^^xsd:string; foaf:name "Marek Grzes"^^xsd:string; rdf:type foaf:Person . rdfs:label "rotor_iwor2019.pdf"^^xsd:string . rdfs:label "rotor_iwor2019.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80338 \n\nROTOR : A Tool for Renaming Values in OCaml's Module System\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "ROTOR : A Tool for Renaming Values in OCaml's Module System (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "ROTOR : A Tool for Renaming Values in OCaml's Module System (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "ROTOR : A Tool for Renaming Values in OCaml's Module System (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "ROTOR : A Tool for Renaming Values in OCaml's Module System (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "ROTOR : A Tool for Renaming Values in OCaml's Module System (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "ROTOR : A Tool for Renaming Values in OCaml's Module System (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "The functional programming paradigm presents its own unique challenges to refactoring. For the OCaml language in particular, the expressiveness of its module system makes this a highly non-trivial task and there is currently no automated support for large-scale refactoring in the OCaml language.\r\n\r\nWe present Rotor, a tool for automatically renaming top-level value definitions in OCaml's module system. To compute the effect of renaming, Rotor relies on a novel concept which we call a value extension. This is a collection of related declarations in a program that must all be renamed at once. In practice, this leads to a notion of dependency: renaming a function foo in module A (mutually) depends on renaming function foo in module B etc.\r\n\r\nWe describe important aspects of Rotor's design, implementation, and evaluation on two large codebases: Jane Street's core library and its dependencies, and the OCaml compiler itself. In these real-world settings we find that some cases involve a surprisingly complex network of dependencies, and that the use of the PPX preprocessor system presents significant challenges."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2019-05-28"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "ROTOR : A Tool for Renaming Values in OCaml's Module System"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "3rd International Workshop on Refactoring"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Montréal, Canada"^^xsd:string . foaf:name "IEEE Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Férée"^^xsd:string; foaf:givenName "Hugo"^^xsd:string; foaf:name "Hugo Férée"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rowe"^^xsd:string; foaf:givenName "Reuben"^^xsd:string; foaf:name "Reuben Rowe"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Owens"^^xsd:string; foaf:givenName "Scott"^^xsd:string; foaf:name "Scott Owens"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Thompson"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Thompson"^^xsd:string; rdf:type foaf:Person . foaf:name "2019 IEEE/ACM 3rd International Workshop on Refactoring (IWoR)"^^xsd:string; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #83684 \n\nGenerating an Artifact From a Benchmarking Setup as Part of CI\n\n"; foaf:primaryTopic . rdf:_1 . bibo:authorList ; bibo:status ; dct:creator ; dct:date "2019-05-27"; dct:isPartOf ; dct:subject ; dct:title "Generating an Artifact From a Benchmarking Setup as Part of CI"^^xsd:string; rdf:type bibo:Article, ep:EPrint, ep:InternetEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "SEAMS2019 (8).pdf"^^xsd:string . rdfs:label "SEAMS2019 (8).pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73259 \n\nSelf-adaptive Artificial Intelligence\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Self-adaptive Artificial Intelligence (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptive Artificial Intelligence (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptive Artificial Intelligence (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptive Artificial Intelligence (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptive Artificial Intelligence (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptive Artificial Intelligence (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Machine learning tools, like deep neural networks, are perceived to be black boxes. That is, the only way of changing their internal data models is to retrain these models using different inputs. This is ineffective in dynamic systems that are prone to changes, like concept drift. A new promising solution is transparent artificial intelligence, based on the notions of interpretation and explanation, whose objective is to correlate the internal data models with predictions. The research question being addressed is whether we can have a self-adaptive machine learning system that is able to interpret and explain its data model in order for it to be controlled. In this position paper, we present our initial thoughts whether this can be achieved."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2019-05-25"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Self-adaptive Artificial Intelligence"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.87 Neural computers, neural networks"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "2019 IEEE/ACM 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Montreal, Canada"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Grzes"^^xsd:string; foaf:givenName "Marek"^^xsd:string; foaf:name "Marek Grzes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Lemos"^^xsd:string; foaf:givenName "Rogerio"^^xsd:string; foaf:name "Rogerio de Lemos"^^xsd:string; rdf:type foaf:Person . rdfs:label "Agrawal-AIIM-2019-accepted-version.pdf"^^xsd:string . rdfs:label "Agrawal-AIIM-2019-accepted-version.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #76421 \n\nCombining clustering and classification ensembles: A novel pipeline to identify breast cancer profiles\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Combining clustering and classification ensembles: A novel pipeline to identify breast cancer profiles (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Combining clustering and classification ensembles: A novel pipeline to identify breast cancer profiles (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Combining clustering and classification ensembles: A novel pipeline to identify breast cancer profiles (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Combining clustering and classification ensembles: A novel pipeline to identify breast cancer profiles (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Combining clustering and classification ensembles: A novel pipeline to identify breast cancer profiles (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Combining clustering and classification ensembles: A novel pipeline to identify breast cancer profiles (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 . bibo:abstract "Breast Cancer is one of the most common causes of cancer death in women, representing a very complex disease with varied molecular alterations. To assist breast cancer prognosis, the classification of patients into biological groups is of great significance for treatment strategies. Recent studies have used an ensemble of multiple clustering algorithms to elucidate the most characteristic biological groups of breast cancer. However, the combination of various clustering methods resulted in a number of patients remaining unclustered. Therefore, a framework still needs to be developed which can assign as many unclustered (i.e. biologically diverse) patients to one of the identified groups in order to improve classification. Therefore, in this paper we develop a novel classification framework which introduces a new ensemble classification stage after the ensemble clustering stage to target the unclustered patients. Thus, a step-by-step pipeline is introduced which couples ensemble clustering with ensemble classification for the identification of core groups, data distribution in them and improvement in final classification results by targeting the unclustered data. The proposed pipeline is employed on a novel real world breast cancer dataset and subsequently its robustness and stability are examined by testing it on standard datasets. The results show that by using the presented framework, an improved classification is obtained. Finally, the results have been verified using statistical tests, visualisation techniques, cluster quality assessment and interpretation from clinical experts."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "97"; dc:hasVersion ; dct:creator , , , , , , , , ; dct:date "2019-05-15"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Combining clustering and classification ensembles: A novel pipeline to identify breast cancer profiles"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "R858 Computer applications to medicine. Medical informatics. Medical information technology" . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Garibaldi"^^xsd:string; foaf:givenName "Jonathan"^^xsd:string; foaf:name "Jonathan Garibaldi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bartlett"^^xsd:string; foaf:givenName "John M.S."^^xsd:string; foaf:name "John M.S. Bartlett"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wagner"^^xsd:string; foaf:givenName "Christian"^^xsd:string; foaf:name "Christian Wagner"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cameron"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Cameron"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Agrawal"^^xsd:string; foaf:givenName "Utkarsh"^^xsd:string; foaf:name "Utkarsh Agrawal"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rakha"^^xsd:string; foaf:givenName "Emad A."^^xsd:string; foaf:name "Emad A. Rakha"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ellis"^^xsd:string; foaf:givenName "Ian O."^^xsd:string; foaf:name "Ian O. Ellis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Soria"^^xsd:string; foaf:givenName "Daniele"^^xsd:string; foaf:name "Daniele Soria"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Green"^^xsd:string; foaf:givenName "Andrew R."^^xsd:string; foaf:name "Andrew R. Green"^^xsd:string; rdf:type foaf:Person . bibo:issn "09333657"; foaf:name "Artificial Intelligence in Medicine"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "main.pdf"^^xsd:string . rdfs:label "main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "1-s2.0-S0304397518307199-main.pdf"^^xsd:string . rdfs:label "1-s2.0-S0304397518307199-main.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #70546 \n\nIncremental Closure for Systems of Two Variables Per Inequality\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Incremental Closure for Systems of Two Variables Per Inequality (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Incremental Closure for Systems of Two Variables Per Inequality (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incremental Closure for Systems of Two Variables Per Inequality (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incremental Closure for Systems of Two Variables Per Inequality (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incremental Closure for Systems of Two Variables Per Inequality (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incremental Closure for Systems of Two Variables Per Inequality (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Incremental Closure for Systems of Two Variables Per Inequality (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incremental Closure for Systems of Two Variables Per Inequality (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incremental Closure for Systems of Two Variables Per Inequality (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incremental Closure for Systems of Two Variables Per Inequality (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Incremental Closure for Systems of Two Variables Per Inequality (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Incremental Closure for Systems of Two Variables Per Inequality (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Subclasses of linear inequalities where each inequality has at most two variables are popular in abstract interpretation and model checking, because they strike a balance between what can be described and what can be efficiently computed. This paper focuses on the TVPI class of inequalities, for which each coefficient of each two variable inequality is unrestricted. An implied TVPI inequality can be generated from a pair of TVPI inequalities by eliminating a given common variable (echoing resolution on clauses). This operation, called result, can be applied to derive TVPI inequalities which are entailed (implied) by a given TVPI system. The key operation on TVPI is calculating closure: satisfiability can be observed from a closed system and a closed system also simplifies the calculation of other operations. A closed system can be derived by repeatedly applying the result operator. The process of adding a single TVPI inequality to an already closed input TVPI system and then finding the closure of this augmented system is called incremental closure. This too can be calculated by the repeated application of the result operator. This paper studies the calculus defined by result, the structure of result derivations, and how derivations can be combined and controlled. A series of lemmata on derivations are presented that, collectively, provide a pathway for synthesising an algorithm for incremental closure. The complexity of the incremental closure algorithm is analysed and found to be O((n^2+m^2)lg(m)), where n is the number of variables and $m$ the number of inequalities of the input TVPI system."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "768"; dc:hasVersion , ; dct:creator , , ; dct:date "2019-05-10"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Incremental Closure for Systems of Two Variables Per Inequality"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "King"^^xsd:string; foaf:givenName "Andy"^^xsd:string; foaf:name "Andy King"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Simon"^^xsd:string; foaf:givenName "Axel"^^xsd:string; foaf:name "Axel Simon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Howe"^^xsd:string; foaf:givenName "Jacob M."^^xsd:string; foaf:name "Jacob M. Howe"^^xsd:string; rdf:type foaf:Person . bibo:issn "03043975"; foaf:name "Theoretical Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Language_of_Biometrics_Analysing_Public_Perceptions.pdf"^^xsd:string . rdfs:label "Language_of_Biometrics_Analysing_Public_Perceptions.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73743 \n\nThe Language of Biometrics: Analysing Public Perceptions\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "The Language of Biometrics: Analysing Public Perceptions (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The Language of Biometrics: Analysing Public Perceptions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Language of Biometrics: Analysing Public Perceptions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Language of Biometrics: Analysing Public Perceptions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Language of Biometrics: Analysing Public Perceptions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Language of Biometrics: Analysing Public Perceptions (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "There is an increasing shift in technology towards biometric solutions, but one of the biggest barriers to widespread use is the acceptance by the users. In this paper we investigate the understanding, awareness and acceptance of biometrics by the general public. The primary research method was a survey, which had 282 respondents, designed to gauge public opinion around biometrics. Additionally, qualitative data was captured in the form of the participants' definition of the term biometrics. We applied thematic analysis as well as an automated Word Vector analysis to this data to provide a deeper insight into the perceptions and understanding of the term. Our results demonstrate that while there is generally a reasonable level of understanding of what biometrics are, this is typically limited to the techniques that are most familiar to participants (e.g., fingerprints or facial recognition). Most notably individuals' awareness overlooks emerging areas such as behavioural biometrics (e.g., gait). This was also apparent when we compared participants' views to definitions provided by official, published sources (e.g., ISO, NIST, OED, DHS). Overall, this article provides unique insight into the perceptions and understanding of biometrics as well as areas where users may lack knowledge on biometric applications."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "47"; dc:hasVersion ; dct:creator , ; dct:date "2019-05-08"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "The Language of Biometrics: Analysing Public Perceptions"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Buckley"^^xsd:string; foaf:givenName "Oliver"^^xsd:string; foaf:name "Oliver Buckley"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:name "Journal of Information Security and Applications"^^xsd:string; rdf:type bibo:Collection . rdfs:label "CHB-2019-WNC.pdf"^^xsd:string . rdfs:label "CHB-2019-WNC.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73887 \n\nSmartwatch games: Encouraging privacy-protective behaviour in a longitudinal study\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "While the public claim concern for their privacy, they frequently appear to overlook it. This disparity between concern and behaviour is known as the Privacy Paradox. Such issues are particularly prevalent on wearable devices. These products can store personal data, such as text messages and contact details. However, owners rarely use protective features. Educational games can be effective in encouraging changes in behaviour. Therefore, we developed the first privacy game for (Android) Wear OS watches. 10 participants used smartwatches for two months, allowing their high-level settings to be monitored. Five individuals were randomly assigned to our treatment group, and they played a dynamically-customised privacy-themed game. To minimise confounding variables, the other five received the same app but lacking the privacy topic. The treatment group improved their protection, with their usage of screen locks significantly increasing (p = 0.043). In contrast, 80% of the control group continued to never restrict their settings. After the posttest phase, we evaluated behavioural rationale through semi-structured interviews. Privacy concerns became more nuanced in the treatment group, with opinions aligning with behaviour. Actions appeared influenced primarily by three factors: convenience, privacy salience and data sensitivity. This is the first smartwatch game to encourage privacy-protective behaviour."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "99"; dc:hasVersion ; dct:creator , , ; dct:date "2019-05-08"; dct:isPartOf , ; dct:publisher ; dct:subject , , , , ; dct:title "Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "HA Statistics"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Creese"^^xsd:string; foaf:givenName "Sadie"^^xsd:string; foaf:name "Sadie Creese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Williams"^^xsd:string; foaf:givenName "Meredydd"^^xsd:string; foaf:name "Meredydd Williams"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "07475632"; foaf:name "Computers in Human Behavior"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "CHI-2019-Labhackathons-camera-ready.pdf"^^xsd:string . rdfs:label "CHI-2019-Labhackathons-camera-ready.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #71381 \n\nLab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Equipment shortages in Africa undermine Science, Technology, Engineering and Mathematics (STEM) Education. We have pioneered the LabHackathon (LabHack): a novel initiative that adapts the conventional hackathon and draws on insights from the Open Hardware movement and Responsible Research and Innovation (RRI). LabHacks are fun, educational events that challenge student participants to build frugal and reproducible pieces of laboratory equipment. Completed designs are then made available to others. LabHacks can therefore facilitate the open and sustainable design of laboratory equipment, in situ, in Africa. In this case study we describe the LabHackathon model, discuss its application in a pilot event held in Zimbabwe and outline the opportunities and challenges it presents."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2019-05-05"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "R Medicine"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "CHI Conference on Human Factors in Computing Systems"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Glasglow, UK"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Jirotka"^^xsd:string; foaf:givenName "Marina"^^xsd:string; foaf:name "Marina Jirotka"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bezuidenhout"^^xsd:string; foaf:givenName "Louise"^^xsd:string; foaf:name "Louise Bezuidenhout"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Webb"^^xsd:string; foaf:givenName "Helena"^^xsd:string; foaf:name "Helena Webb"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . rdfs:label "Intro - Complex Systems in Aesthetics and Arts.pdf"^^xsd:string . rdfs:label "Intro - Complex Systems in Aesthetics and Arts.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73750 \n\nEditorial: Complex Systems in Aesthetics and Arts\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Editorial: Complex Systems in Aesthetics and Arts (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Editorial: Complex Systems in Aesthetics and Arts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Editorial: Complex Systems in Aesthetics and Arts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Editorial: Complex Systems in Aesthetics and Arts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Editorial: Complex Systems in Aesthetics and Arts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Editorial: Complex Systems in Aesthetics and Arts (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Editorial for a special issue of the journal Complexity on complex systems in aesthetics and the arts."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "2019"; dc:hasVersion ; dct:creator , , ; dct:date "2019-05-02"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Editorial: Complex Systems in Aesthetics and Arts"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Hindawi"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Johnson"^^xsd:string; foaf:givenName "Colin G."^^xsd:string; foaf:name "Colin G. Johnson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Romero"^^xsd:string; foaf:givenName "Juan"^^xsd:string; foaf:name "Juan Romero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jon"^^xsd:string; foaf:givenName "McCormack"^^xsd:string; foaf:name "McCormack Jon"^^xsd:string; rdf:type foaf:Person . bibo:issn "10762787"; foaf:name "Complexity"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90197 \n\nA Semi-supervised Deep Rule-Based Approach for Remote Sensing Scene Classification\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "This paper proposes a new approach that is based on the recently introduced semi-supervised deep rule-based classifier for remote sensing scene classification. The proposed approach employs a pre-trained deep convoluational neural network as the feature descriptor to extract high-level discriminative semantic features from the sub-regions of the remote sensing images. This approach is able to self-organize a set of prototype-based IF...THEN rules from few labeled training images through an efficient supervised initialization process, and continuously self-updates the rule base with the unlabeled images in an unsupervised, autonomous, transparent and human-interpretable manner. Highly accurate classification on the unlabeled images is performed at the end of the learning process. Numerical examples demonstrate that the proposed approach is a strong alternative to the state-of-the-art ones."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "1"; dct:creator , ; dct:date "2019-04-18"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "A Semi-supervised Deep Rule-Based Approach for Remote Sensing Scene Classification"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "INNS Big Data and Deep Learning conference 2019"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Sestri Levante, Italy"^^xsd:string . foaf:name "Springer, Cham"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P."^^xsd:string; foaf:name "Plamen P. Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . rdfs:label "Koch2019a.pdf"^^xsd:string . rdfs:label "Koch2019a.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72659 \n\nForked Recurrent Neural Network for Hand Gesture Classification Using Inertial Measurement Data\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Forked Recurrent Neural Network for Hand Gesture Classification Using Inertial Measurement Data (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Forked Recurrent Neural Network for Hand Gesture Classification Using Inertial Measurement Data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Forked Recurrent Neural Network for Hand Gesture Classification Using Inertial Measurement Data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Forked Recurrent Neural Network for Hand Gesture Classification Using Inertial Measurement Data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Forked Recurrent Neural Network for Hand Gesture Classification Using Inertial Measurement Data (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Forked Recurrent Neural Network for Hand Gesture Classification Using Inertial Measurement Data (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "For many applications of hand gesture recognition, a delayfree, affordable, and mobile system relying on body signals is mandatory. Therefore, we propose an approach for hand gestures classification given signals of inertial measurement units (IMUs) that works with extremely short windows to avoid delays. With a simple recurrent neural network the suitability of the sensor modalities of an IMU (accelerometer, gyroscope, magnetometer) are evaluated by only providing data of one modality. For the multi-modal data a second network with mid-level fusion is proposed. Its forked architecture allows us to process data of each modality individually before carrying out a joint analysis for classification. Experiments on three databases reveal that even when relying on a single modality our proposed system outperforms state-of-the-art systems significantly. With the forked network classification accuracy can be further improved by over 10% absolute compared to the best reported system while causing a fraction of the delay."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2019-04-17"; dct:isPartOf ; dct:publisher ; dct:title "Forked Recurrent Neural Network for Hand Gesture Classification Using Inertial Measurement Data"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "44th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Brighton, United Kingdom"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Brügge"^^xsd:string; foaf:givenName "Nele"^^xsd:string; foaf:name "Nele Brügge"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Koch"^^xsd:string; foaf:givenName "Philipp"^^xsd:string; foaf:name "Philipp Koch"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Maass"^^xsd:string; foaf:givenName "Marco"^^xsd:string; foaf:name "Marco Maass"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mertins"^^xsd:string; foaf:givenName "Afred"^^xsd:string; foaf:name "Afred Mertins"^^xsd:string; rdf:type foaf:Person . rdfs:label "Phan2019b.pdf"^^xsd:string . rdfs:label "Phan2019b.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72657 \n\nUnifying Isolated and Overlapping Audio Event Detection with Multi-Label Multi-Task Convolutional Recurrent Neural Networks\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Unifying Isolated and Overlapping Audio Event Detection with Multi-Label Multi-Task Convolutional Recurrent Neural Networks (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Unifying Isolated and Overlapping Audio Event Detection with Multi-Label Multi-Task Convolutional Recurrent Neural Networks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Unifying Isolated and Overlapping Audio Event Detection with Multi-Label Multi-Task Convolutional Recurrent Neural Networks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Unifying Isolated and Overlapping Audio Event Detection with Multi-Label Multi-Task Convolutional Recurrent Neural Networks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Unifying Isolated and Overlapping Audio Event Detection with Multi-Label Multi-Task Convolutional Recurrent Neural Networks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Unifying Isolated and Overlapping Audio Event Detection with Multi-Label Multi-Task Convolutional Recurrent Neural Networks (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "We propose a multi-label multi-task framework based on a convolutional recurrent neural network to unify detection of isolated and overlapping audio events. The framework leverages the power of convolutional recurrent neural network architectures; convolutional layers learn effective features over which higher recurrent layers perform sequential modelling. Furthermore, the output layer is designed to handle arbitrary degrees of event overlap. At each time step in the recurrent output sequence, an output triple is dedicated to each event category of interest to jointly model event occurrence and temporal boundaries. That is, the network jointly determines whether an event of this category occurs, and when it occurs, by estimating onset and offset positions at each recurrent time step. We then introduce three sequential losses for network training: multi-label classification loss, distance estimation loss, and confidence loss. We demonstrate good generalization on two datasets: ITC-Irst for isolated audio event detection, and TUT-SED-Synthetic-2016 for overlapping audio event detection."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2019-04-17"; dct:isPartOf ; dct:publisher ; dct:title "Unifying Isolated and Overlapping Audio Event Detection with Multi-Label Multi-Task Convolutional Recurrent Neural Networks"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "44th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Brighton, United Kingdom"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Koch"^^xsd:string; foaf:givenName "Philipp"^^xsd:string; foaf:name "Philipp Koch"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pham"^^xsd:string; foaf:givenName "Lam Dang"^^xsd:string; foaf:name "Lam Dang Pham"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Vos"^^xsd:string; foaf:givenName "Maarten"^^xsd:string; foaf:name "Maarten De Vos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mertins"^^xsd:string; foaf:givenName "Afred"^^xsd:string; foaf:name "Afred Mertins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chén"^^xsd:string; foaf:givenName "Oliver Y."^^xsd:string; foaf:name "Oliver Y. Chén"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #83685 \n\nAnother Decade of SOM Language Implementation\n\n"; foaf:primaryTopic . rdf:_1 . bibo:authorList ; bibo:status ; dct:creator ; dct:date "2019-04-09"; dct:isPartOf ; dct:subject ; dct:title "Another Decade of SOM Language Implementation"^^xsd:string; rdf:type bibo:Article, ep:EPrint, ep:InternetEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "Asynchronous timed session types.pdf"^^xsd:string . rdfs:label "Asynchronous timed session types.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72337 \n\nAsynchronous timed session types: from duality to time-sensitive processes\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Asynchronous timed session types: from duality to time-sensitive processes (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Asynchronous timed session types: from duality to time-sensitive processes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Asynchronous timed session types: from duality to time-sensitive processes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Asynchronous timed session types: from duality to time-sensitive processes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Asynchronous timed session types: from duality to time-sensitive processes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Asynchronous timed session types: from duality to time-sensitive processes (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Asynchronous timed session types: from duality to time-sensitive processes (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Asynchronous timed session types: from duality to time-sensitive processes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Asynchronous timed session types: from duality to time-sensitive processes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Asynchronous timed session types: from duality to time-sensitive processes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Asynchronous timed session types: from duality to time-sensitive processes (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Asynchronous timed session types: from duality to time-sensitive processes (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "We present a behavioural typing system for a higher-order timed calculus, using session types to model timed protocols, and the calculus to abstract implementations. Behavioural typing ensures that processes in the calculus will perform actions in the time-windows prescribed by their protocols. We introduce duality and subtyping for timed asynchronous session types. Duality includes a class of protocols that previous work on asynchronous timed session types could not type-check. Subtyping is critical for precision of our typing system, especially for\r\nsession delegation. The composition of dual (timed asynchronous) types enjoys progress when using an urgent receive semantics, in which receive actions are executed as soon as the expected message is available. Our calculus increases the modelling power of calculi used in the previous work on timed sessions, adding a blocking receive primitive with timeout, and a primitive that consumes an arbitrary amount of time in a given range."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "11423"; dc:hasVersion , ; dct:creator , , , ; dct:date "2019-04-06"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Asynchronous timed session types: from duality to time-sensitive processes"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . dct:title "28th European Symposium on Programming (ESOP)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Prague, Czech Republic"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Vasconcelos"^^xsd:string; foaf:givenName "Vasco Thudichum"^^xsd:string; foaf:name "Vasco Thudichum Vasconcelos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bocchi"^^xsd:string; foaf:givenName "Laura"^^xsd:string; foaf:name "Laura Bocchi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Murgia"^^xsd:string; foaf:givenName "Maurizio"^^xsd:string; foaf:name "Maurizio Murgia"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yoshida"^^xsd:string; foaf:givenName "Nobuko"^^xsd:string; foaf:name "Nobuko Yoshida"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Composing Bidirectional Programs Monadically.pdf"^^xsd:string . rdfs:label "Composing Bidirectional Programs Monadically.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72625 \n\nComposing bidirectional programs monadically\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Composing bidirectional programs monadically (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Composing bidirectional programs monadically (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Composing bidirectional programs monadically (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Composing bidirectional programs monadically (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Composing bidirectional programs monadically (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Composing bidirectional programs monadically (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Composing bidirectional programs monadically (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Composing bidirectional programs monadically (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Composing bidirectional programs monadically (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Composing bidirectional programs monadically (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Composing bidirectional programs monadically (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Composing bidirectional programs monadically (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Software frequently converts data from one representation to another and vice versa. Naively specifying both conversion directions separately is error prone and introduces conceptual duplication. Instead, bidirectional programming techniques allow programs to be written which can be interpreted in both directions. However, these techniques often employ unfamiliar programming idioms via restricted, specialised combinator libraries. Instead, we introduce a framework for composing bidirectional programs monadically, enabling bidirectional programming with familiar abstractions in functional languages such as Haskell. We demonstrate the generality of our approach applied to parsers/printers, lenses, and generators/predicates. We show how to leverage compositionality and equational reasoning for the verification of round-tripping properties for such monadic bidirectional programs."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "11423"; dc:hasVersion , ; dct:creator , , ; dct:date "2019-04-06"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Composing bidirectional programs monadically"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "28th European Symposium on Programming (ESOP)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Prague, Czech Republic"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Orchard"^^xsd:string; foaf:givenName "Dominic A."^^xsd:string; foaf:name "Dominic A. Orchard"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Meng"^^xsd:string; foaf:name "Meng Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Xia"^^xsd:string; foaf:givenName "Li-Yao"^^xsd:string; foaf:name "Li-Yao Xia"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90200 \n\nSelf-boosting first-order autonomous learning neuro-fuzzy systems\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "In this paper, a detailed mathematical analysis of the optimality of the premise and consequent parts of the recently introduced first-order Autonomous Learning Multi-Model (ALMMo) neuro-fuzzy system is conducted. A novel self-boosting algorithm for structure- and parameter-optimization is, then, introduced to the ALMMo, which results in the self-boosting ALMMo (SBALMMo) neuro-fuzzy system. By minimizing the objective functions with the previously collected data, the SBALMMo is able to optimize its system structure and parameters in few iterations. Numerical examples based benchmark datasets and real-world problems demonstrate the effectiveness and validity of the SBALMMo, and show the strong potential of the proposed approach for real applications."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "77"; dct:creator , ; dct:date "2019-04-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Self-boosting first-order autonomous learning neuro-fuzzy systems"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen"^^xsd:string; foaf:name "Plamen Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "15684946"; foaf:name "Applied Soft Computing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90198 \n\nA distance-type-insensitive clustering approach\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "In this paper, we offer a method aiming to minimize the role of distance metric used in clustering. It is well known that distance metrics used in clustering algorithms heavily influence the end results and also make the algorithms sensitive to imbalanced attribute/feature scales. To solve these problems, a new clustering algorithm using a per-attribute/feature ranking operating mechanism is proposed in this paper. Ranking is a rarely used discrete, nonlinear operator by other clustering algorithms. However, it also has unique advantages over the dominantly used continuous operators. The proposed algorithm is based on the ranks of the data samples in terms of their spatial separation and is able to provide a more objective clustering result compared with the alternative approaches. Numerical examples on benchmark datasets prove the validity and effectiveness of the proposed concept and principles."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "77"; dct:creator , , ; dct:date "2019-04-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A distance-type-insensitive clustering approach"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Zhao"^^xsd:string; foaf:givenName "Zhijin"^^xsd:string; foaf:name "Zhijin Zhao"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen"^^xsd:string; foaf:name "Plamen Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "15684946"; foaf:name "Applied Soft Computing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #91405 \n\n2D recurrent neural networks: a high-performance tool for robust visual tracking in dynamic scenes\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "This paper proposes a novel method for robust visual tracking of arbitrary objects, based on the combination of image-based prediction and position refinement by weighted correlation. The effectiveness of the proposed approach is demonstrated on a challenging set of dynamic video sequences, extracted from the final of triple jump at the London 2012 Summer Olympics. A comparison is made against five baseline tracking systems. The novel system shows remarkable superior performances with respect to the other methods, in all considered cases characterized by changing background, and a large variety of articulated motions. The novel architecture, from here onward named 2D Recurrent Neural Network (2D-RNN), is derived from the well-known recurrent neural network model and adopts nearest neighborhood connections between the input and context layers in order to store the temporal information content of the video. Starting from the selection of the object of interest in the first frame, neural computation is applied to predict the position of the target in each video frame. Normalized cross-correlation is then applied to refine the predicted target position. 2D-RNN ensures limited complexity, great adaptability and a very fast learning time. At the same time, it shows on the considered dataset fast execution times and very good accuracy, making this approach an excellent candidate for automated analysis of complex video streams."^^xsd:string; bibo:authorList ; bibo:issue "7"; bibo:status , ; bibo:volume "29"; dct:creator , , , ; dct:date "2019-04-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "2D recurrent neural networks: a high-performance tool for robust visual tracking in dynamic scenes"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Golosio"^^xsd:string; foaf:givenName "Bruno"^^xsd:string; foaf:name "Bruno Golosio"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grosso"^^xsd:string; foaf:givenName "Enrico"^^xsd:string; foaf:name "Enrico Grosso"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Casu"^^xsd:string; foaf:givenName "Filippo"^^xsd:string; foaf:name "Filippo Casu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Masala"^^xsd:string; foaf:givenName "Giovanni Luca"^^xsd:string; foaf:name "Giovanni Luca Masala"^^xsd:string; rdf:type foaf:Person . bibo:issn "09410643"; foaf:name "Neural Computing and Applications"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "ecoop19-roberts-et-al-transient-typechecks-are-almost-free.pdf"^^xsd:string . rdfs:label "ecoop19-roberts-et-al-transient-typechecks-are-almost-free.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #74327 \n\nTransient Typechecks are (Almost) Free\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Transient Typechecks are (Almost) Free (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transient Typechecks are (Almost) Free (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transient Typechecks are (Almost) Free (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transient Typechecks are (Almost) Free (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transient Typechecks are (Almost) Free (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Transient Typechecks are (Almost) Free (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Transient gradual typing imposes run-time type tests that typically cause a linear slowdown in\r\nprograms’ performance. This performance impact discourages the use of type annotations because\r\nadding types to a program makes the program slower. A virtual machine can employ standard justin-time optimizations to reduce the overhead of transient checks to near zero. These optimizations\r\ncan give gradually-typed languages performance comparable to state-of-the-art dynamic languages,\r\nso programmers can add types to their code without affecting their programs’ performance."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "134"; dc:hasVersion ; dct:creator , , , ; dct:date "2019-04-01"; dct:isPartOf ; dct:publisher ; dct:title "Transient Typechecks are (Almost) Free"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "33rd European Conference on Object-Oriented Programming"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "London, UK"^^xsd:string . foaf:name "Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Noble"^^xsd:string; foaf:givenName "James"^^xsd:string; foaf:name "James Noble"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Homer"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Homer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Roberts"^^xsd:string; foaf:givenName "Richard"^^xsd:string; foaf:name "Richard Roberts"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "ecoop19-torres-lopez-et-al-multiverse-debugging-non-deterministic-debugging-for-non-deterministic-programs.pdf"^^xsd:string . rdfs:label "ecoop19-torres-lopez-et-al-multiverse-debugging-non-deterministic-debugging-for-non-deterministic-programs.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #74328 \n\nMultiverse Debugging: Non-deterministic Debugging for Non-deterministic Programs\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Multiverse Debugging: Non-deterministic Debugging for Non-deterministic Programs (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multiverse Debugging: Non-deterministic Debugging for Non-deterministic Programs (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multiverse Debugging: Non-deterministic Debugging for Non-deterministic Programs (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multiverse Debugging: Non-deterministic Debugging for Non-deterministic Programs (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multiverse Debugging: Non-deterministic Debugging for Non-deterministic Programs (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Multiverse Debugging: Non-deterministic Debugging for Non-deterministic Programs (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Many of today's software systems are parallel or concurrent. With the rise of Node.js and more generally event-loop architectures, many systems need to handle concurrency. However, its non-deterministic behavior makes it hard to reproduce bugs. Today's interactive debuggers unfortunately do not support developers in debugging non-deterministic issues. They only allow us to explore a single execution path. Therefore, some bugs may never be reproduced in the debugging session, because the right conditions are not triggered. As a solution, we propose multiverse debugging, a new approach for debugging non-deterministic programs that allows developers to observe all possible execution paths of a parallel program and debug it interactively. We introduce the concepts of multiverse breakpoints and stepping, which can halt a program in different execution paths, i.e. universes. We apply multiverse debugging to AmbientTalk, an actor-based language, resulting in Voyager, a multiverse debugger implemented on top of the AmbientTalk operational semantics. We provide a proof of non-interference, i.e., we prove that observing the behavior of a program by the debugger does not affect the behavior of that program and vice versa. Multiverse debugging establishes the foundation for debugging non-deterministic programs interactively, which we believe can aid the development of parallel and concurrent systems."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2019-04-01"; dct:isPartOf ; dct:publisher ; dct:title "Multiverse Debugging: Non-deterministic Debugging for Non-deterministic Programs"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "33rd European Conference on Object-Oriented Programming"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "London, UK"^^xsd:string . foaf:name "Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Scholliers"^^xsd:string; foaf:givenName "Christophe"^^xsd:string; foaf:name "Christophe Scholliers"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Torres Lopez"^^xsd:string; foaf:givenName "Carmen"^^xsd:string; foaf:name "Carmen Torres Lopez"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gonzalez Boix"^^xsd:string; foaf:givenName "Elisa"^^xsd:string; foaf:name "Elisa Gonzalez Boix"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gurdeep Singh"^^xsd:string; foaf:givenName "Robbert"^^xsd:string; foaf:name "Robbert Gurdeep Singh"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "journal.pone.0211234.pdf"^^xsd:string . rdfs:label "journal.pone.0211234.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73642 \n\nThe efficacy of Euler diagrams and linear diagrams for visualizing set cardinality using proportions and numbers\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "The efficacy of Euler diagrams and linear diagrams for visualizing set cardinality using proportions and numbers (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The efficacy of Euler diagrams and linear diagrams for visualizing set cardinality using proportions and numbers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The efficacy of Euler diagrams and linear diagrams for visualizing set cardinality using proportions and numbers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The efficacy of Euler diagrams and linear diagrams for visualizing set cardinality using proportions and numbers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The efficacy of Euler diagrams and linear diagrams for visualizing set cardinality using proportions and numbers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The efficacy of Euler diagrams and linear diagrams for visualizing set cardinality using proportions and numbers (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "This paper presents the first empirical investigation that compares Euler and linear diagrams when they are used to represent set cardinality. A common approach is to use area-proportional Euler diagrams but linear diagrams can exploit length-proportional straight-lines for the same purpose. Another common approach is to use numerical annotations. We first conducted two empirical studies, one on Euler diagrams and the other on linear diagrams. These suggest that area-proportional Euler diagrams with numerical annotations and length-proportional linear diagrams without numerical annotations support significantly better task performance. We then conducted a third study to investigate which of these two notations should be used in practice. This suggests that area-proportional Euler diagrams with numerical annotations most effectively supports task performance and so should be used to visualize set cardinalities. However, these studies focused on data that can be visualized reasonably accurately using circles and the results should be taken as valid within that context. Future work needs to determine whether the results generalize both to when circles cannot be used and for other ways of encoding cardinality information."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "14"; dc:hasVersion ; dct:creator , , , , , ; dct:date "2019-03-28"; dct:isPartOf , ; dct:publisher ; dct:title "The efficacy of Euler diagrams and linear diagrams for visualizing set cardinality using proportions and numbers"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Public Library of Science"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Blake"^^xsd:string; foaf:givenName "Andrew"^^xsd:string; foaf:name "Andrew Blake"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Stapleton"^^xsd:string; foaf:givenName "Gem"^^xsd:string; foaf:name "Gem Stapleton"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Touloumis"^^xsd:string; foaf:givenName "Anestis"^^xsd:string; foaf:name "Anestis Touloumis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chapman"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Chapman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Delaney"^^xsd:string; foaf:givenName "Aidan"^^xsd:string; foaf:name "Aidan Delaney"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rodgers"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Rodgers"^^xsd:string; rdf:type foaf:Person . bibo:issn "19326203"; foaf:name "PLOS ONE"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Understanding_Aesthetics_and_Fitness_Measures_in_Evolutionary_Art_Systems(2).pdf"^^xsd:string . rdfs:label "Understanding_Aesthetics_and_Fitness_Measures_in_Evolutionary_Art_Systems(2).pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72848 \n\nUnderstanding Aesthetics and Fitness Measures in Evolutionary Art Systems\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Understanding Aesthetics and Fitness Measures in Evolutionary Art Systems (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Understanding Aesthetics and Fitness Measures in Evolutionary Art Systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding Aesthetics and Fitness Measures in Evolutionary Art Systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding Aesthetics and Fitness Measures in Evolutionary Art Systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding Aesthetics and Fitness Measures in Evolutionary Art Systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Understanding Aesthetics and Fitness Measures in Evolutionary Art Systems (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "One of the general aims of evolutionary art research is to build a computer systems capable of creating interesting, beautiful or creative results, including images, videos, animations, text, and performances. In this context it is crucial to understand how fitness is conceived and implemented to explore the ‘interestingness’, beauty or creativity that the system is capable of. In this paper we survey the recent research on fitness for evolutionary art related to aesthetics. We also cover research in the psychology of aesthetics, including relation between complexity and aesthetics, measures of complexity and complexity predictors. We try to establish connections between human perception and understanding of aesthetics with current evolutionary techniques."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "2019"; dc:hasVersion ; dct:creator , , , ; dct:date "2019-03-21"; dct:isPartOf , ; dct:publisher ; dct:subject , , , ; dct:title "Understanding Aesthetics and Fitness Measures in Evolutionary Art Systems"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "M Music"@en . rdf:type skos:Concept; skos:prefLabel "N Visual arts (General). For photography, see TR"@en . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Hindawi Publishing Corporation"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Johnson"^^xsd:string; foaf:givenName "Colin G."^^xsd:string; foaf:name "Colin G. Johnson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Santos"^^xsd:string; foaf:givenName "Iria"^^xsd:string; foaf:name "Iria Santos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McCormack"^^xsd:string; foaf:givenName "Jon"^^xsd:string; foaf:name "Jon McCormack"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Romero"^^xsd:string; foaf:givenName "Juan"^^xsd:string; foaf:name "Juan Romero"^^xsd:string; rdf:type foaf:Person . bibo:issn "10762787"; foaf:name "Complexity"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Chen2019.pdf"^^xsd:string . rdfs:label "Chen2019.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72658 \n\nResting-state brain information flow predicts cognitive flexibility in humans\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Resting-state brain information flow predicts cognitive flexibility in humans (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Resting-state brain information flow predicts cognitive flexibility in humans (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Resting-state brain information flow predicts cognitive flexibility in humans (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Resting-state brain information flow predicts cognitive flexibility in humans (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Resting-state brain information flow predicts cognitive flexibility in humans (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Resting-state brain information flow predicts cognitive flexibility in humans (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 . bibo:abstract "The human brain is a dynamic system, where communication between spatially distinct areas facilitates complex cognitive functions and behaviors. How information transfers between brain regions and how it gives rise to human cognition, however, are unclear. In this article, using resting-state functional magnetic resonance imaging (fMRI) data from 783 healthy adults in the Human Connectome Project (HCP) dataset, we map the brain’s directed information flow architecture through a Granger-Geweke causality prism. We demonstrate that the information flow profiles in the general population primarily involve local exchanges within specialized functional systems, long-distance exchanges from the dorsal brain to the ventral brain, and topdown exchanges from the higher-order systems to the primary systems. Using an information flow map discovered from 550 subjects, the individual directed information flow profiles can significantly predict cognitive flexibility scores in 233 novel individuals. Our results provide evidence for directed information network architecture in the cerebral cortex, and suggest that features of the information flow configuration during rest underpin cognitive ability in humans."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "9"; dc:hasVersion ; dct:creator , , , , , , , ; dct:date "2019-03-07"; dct:isPartOf , ; dct:publisher ; dct:title "Resting-state brain information flow predicts cognitive flexibility in humans"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Nature"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Gou"^^xsd:string; foaf:givenName "Jiangtao"^^xsd:string; foaf:name "Jiangtao Gou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Qian"^^xsd:string; foaf:givenName "Tianchen"^^xsd:string; foaf:name "Tianchen Qian"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cao"^^xsd:string; foaf:givenName "Hengyi"^^xsd:string; foaf:name "Hengyi Cao"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cannon"^^xsd:string; foaf:givenName "Tyrone"^^xsd:string; foaf:name "Tyrone Cannon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Vos"^^xsd:string; foaf:givenName "Maarten De"^^xsd:string; foaf:name "Maarten De Vos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Reinen"^^xsd:string; foaf:givenName "Jenna"^^xsd:string; foaf:name "Jenna Reinen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chén"^^xsd:string; foaf:givenName "Oliver Y."^^xsd:string; foaf:name "Oliver Y. Chén"^^xsd:string; rdf:type foaf:Person . bibo:issn "20452322"; foaf:name "Scientific reports"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Muscle_Connectivity_Analysis_for_Hand_Gesture_Recognition_via_sEMG (1).pdf"^^xsd:string . rdfs:label "Muscle_Connectivity_Analysis_for_Hand_Gesture_Recognition_via_sEMG (1).pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73945 \n\nMuscle Connectivity Analysis for Hand Gesture Recognition via sEMG\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Muscle Connectivity Analysis for Hand Gesture Recognition via sEMG (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Muscle Connectivity Analysis for Hand Gesture Recognition via sEMG (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Muscle Connectivity Analysis for Hand Gesture Recognition via sEMG (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Muscle Connectivity Analysis for Hand Gesture Recognition via sEMG (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Muscle Connectivity Analysis for Hand Gesture Recognition via sEMG (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Muscle Connectivity Analysis for Hand Gesture Recognition via sEMG (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Physiological measurement like surface electromyography (sEMG) allows a deeper insight on interactions among subsystems during the human motion coordination. In this paper, we aim to investigate such interactions via functional muscle networks during hand movements, especially when different hand gestures are performed. It is achieved by considering muscle connectivities using Granger Prediction of paired sEMG signals, which were recorded from extrinsic muscles of the upper limb, while participants were sitting upright and performing hand gestures. It is found that by using muscle connectivities obtained by applying the method of Granger Prediction as features, although individual differences exist among subjects, significant connections between pairs of muscles were observed through permutation tests at a group level. Graph theory based on the overall statistical result was used to visualise functional networks by considering all the significant connections which were not bidirectional. We found two distinct networks can be used to represent the differences between two hand gestures. Such insight of functional networks can be a potential candidate to interpret the relationships between muscle pairs, which is helpful for decoding hand gestures."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2019-03-07"; dct:isPartOf ; dct:publisher ; dct:title "Muscle Connectivity Analysis for Hand Gesture Recognition via sEMG"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Honolulu, Hawaii, USA"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Wilde"^^xsd:string; foaf:givenName "Philippe"^^xsd:string; foaf:name "Philippe De Wilde"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lin"^^xsd:string; foaf:givenName "Yuzhou"^^xsd:string; foaf:name "Yuzhou Lin"^^xsd:string; rdf:type foaf:Person . rdfs:label "not-edited-manuscript.pdf"^^xsd:string . rdfs:label "not-edited-manuscript.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77169 \n\nBehavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes (PDF)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "The state-of-the-art and practice show an increased recognition, but limited adoption, of Behavioural Evidence Analysis (BEA) within the Digital Forensics (DF) investigation process. Yet, there is currently no BEA-driven process model and guidelines for DF investigators to follow in order to take advantage of such an approach. This paper proposes the Behavioural Digital Forensics Model to fill this gap. It takes a multidisciplinary approach which incorporates BEA into in-lab investigation of seized devices related to interpersonal cases (i.e., digital crimes involving human interactions between offender(s) and victim(s)). The model was designed based on the application of traditional BEA phases to 35 real cases, and evaluated using 5 real digital crime cases - all from Dubai Police archive. This paper, however, provides details of only one case from this evaluation pool. Compared to the outcome of these cases using a traditional DF investigation process, the new model showed a number of benefits. It allowed a more effective focusing of the investigation, and provided logical directions for identifying the location of further relevant evidence. It also enabled a better understanding and interpretation of victim/offender behaviours (e.g., probable offenders' motivations and modus operandi), which facilitated a more in depth understanding of the dynamics of the specific crime. Finally, in some cases, it enabled the identification of suspect's collaborators, something which was not identified via the traditional investigative process."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "28"; dc:hasVersion , ; dct:creator , , , , ; dct:date "2019-03-01"; dct:isPartOf , ; dct:publisher ; dct:title "Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Marrington"^^xsd:string; foaf:givenName "Andrew"^^xsd:string; foaf:name "Andrew Marrington"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bryce"^^xsd:string; foaf:givenName "Joanne"^^xsd:string; foaf:name "Joanne Bryce"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Read"^^xsd:string; foaf:givenName "Janet C."^^xsd:string; foaf:name "Janet C. Read"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mutawa"^^xsd:string; foaf:givenName "Noora Al"^^xsd:string; foaf:name "Noora Al Mutawa"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N.L."^^xsd:string; foaf:name "Virginia N.L. Franqueira"^^xsd:string; rdf:type foaf:Person . bibo:issn "17422876"; foaf:name "Digital Investigation"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "main.pdf"^^xsd:string . rdfs:label "main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #71491 \n\nAn Empirical Study of Messaging Passing Concurrency in Go Projects\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An Empirical Study of Messaging Passing Concurrency in Go Projects (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An Empirical Study of Messaging Passing Concurrency in Go Projects (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Empirical Study of Messaging Passing Concurrency in Go Projects (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Empirical Study of Messaging Passing Concurrency in Go Projects (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Empirical Study of Messaging Passing Concurrency in Go Projects (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Empirical Study of Messaging Passing Concurrency in Go Projects (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Go is a popular programming language renowned for its good support for system programming and its channel-\r\nbased message passing concurrency mechanism. These strengths have made it the language of choice of many platform software such as Docker and Kubernetes. In this paper, we analyse 865 Go projects from GitHub in order to understand how message passing concurrency is used in publicly available code. Our results include the following findings: (1) message passing primitives are used frequently and intensively, (2) concurrency-related features are generally clustered in specific parts of a Go project, (3) most projects use synchronous communication channels over asynchronous ones, and (4) most Go projects use simple concurrent thread topologies, which are however currently\r\nunsupported by existing static verification frameworks."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2019-02-24"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "An Empirical Study of Messaging Passing Concurrency in Go Projects"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "IEEE International Conference on Software Analysis, Evolution and Reengineering"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Hangzhou, China"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Lange"^^xsd:string; foaf:givenName "Julien"^^xsd:string; foaf:name "Julien Lange"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dilley"^^xsd:string; foaf:givenName "Nicolas"^^xsd:string; foaf:name "Nicolas Dilley"^^xsd:string; rdf:type foaf:Person . rdfs:label "NDSS-USEC-19-cybercrime-nnwg.pdf"^^xsd:string . rdfs:label "NDSS-USEC-19-cybercrime-nnwg.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #71674 \n\nCybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Cybercrime investigators face numerous challenges when policing online crimes. Firstly, the methods and processes they use when dealing with traditional crimes do not necessarily apply in the cyber-world. Additionally, cyber criminals are usually technologically-aware and constantly adapting and developing new tools that allow them to stay ahead of law enforcement investigations. In order to provide adequate support for cybercrime investigators, there needs to be a better understanding of the challenges they face at both technical and socio-technical levels. In this paper, we investigate this problem through an analysis of current practices and workflows of investigators. We use interviews with experts from government and private sectors who investigate cybercrimes as our main data gathering process. From an analysis of the collected data, we identify several outstanding challenges faced by investigators. These pertain to practical, technical, and social issues such as systems availability, usability, and in computer-supported collaborative work. Importantly, we use our findings to highlight research areas where user-centric workflows and tools are desirable. We also define a set of recommendations that can aid in providing a better foundation for future research in the field and allow more effective combating of cybercrimes."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2019-02-24"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences (General)"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Sand Diego, CA, USA"^^xsd:string . foaf:name "Internet Society"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Webb"^^xsd:string; foaf:givenName "Helena"^^xsd:string; foaf:name "Helena Webb"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Goldsmith"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Goldsmith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nouh"^^xsd:string; foaf:givenName "Mariam"^^xsd:string; foaf:name "Mariam Nouh"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . rdfs:label "msa2019.pdf"^^xsd:string . rdfs:label "msa2019.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73261 \n\nMicroservices Architectures and Technical Debt: A Self-adaptation View\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Microservices Architectures and Technical Debt: A Self-adaptation View (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Microservices Architectures and Technical Debt: A Self-adaptation View (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "In this paper, we discuss the impact that technical debt (TD) may have on MSA regarding some quality attributes, like security, and hypothesise how self-adaptation could be useful in dealing with some aspects of TD."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2019-02-19"; dct:isPartOf ; dct:subject ; dct:title "Microservices Architectures and Technical Debt: A Self-adaptation View"^^xsd:string; ep:hasAccepted ; ep:hasDocument , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . dct:title "International Conference on Microservices (Microservices 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Dortmund, Germany"^^xsd:string . foaf:familyName "Chhonker"^^xsd:string; foaf:givenName "Ananya"^^xsd:string; foaf:name "Ananya Chhonker"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Lemos"^^xsd:string; foaf:givenName "Rogerio"^^xsd:string; foaf:name "Rogerio de Lemos"^^xsd:string; rdf:type foaf:Person . rdfs:label "Hull2019_Article_RansomwareDeploymentMethodsAnd.pdf"^^xsd:string . rdfs:label "Hull2019_Article_RansomwareDeploymentMethodsAnd.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "Questionnaire Template - Company - University US.pdf"^^xsd:string . rdfs:label "Questionnaire Template - Students.pdf"^^xsd:string . rdfs:label "Questionnaire Template - University UK.pdf"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #71720 \n\nRansomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . cc:license ; dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (PDF)"^^xsd:string . cc:license ; dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (PDF)"^^xsd:string . cc:license ; dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Ransomware incidents have increased dramatically in the past few years. The number of ransomware variants is also increasing, which means signature and heuristic-based detection techniques are becoming harder to achieve, due to the ever changing pattern of ransomware attack vectors. Therefore, in order to combat ransomware, we need a better understanding on how ransomware is being deployed, its characteristics, as well as how potential victims may react to ransomware incidents. This paper aims to address this challenge by carrying out an investigation on 18 families of ransomware, leading to a model for categorising ransomware behavioural characteristics, which can then be used to improve detection and handling of ransomware incidents. The categorisation was done in respect to the stages of ransomware deployment methods with a predictive model we developed called Randep. The stages are fingerprint, propagate, communicate, map, encrypt, lock, delete and threaten. Analysing the samples gathered for the predictive model provided an insight into the stages and timeline of ransomware execution. Furthermore, we carried out a study on how potential victims (individuals, as well as IT support staff at universities and SMEs) detect that ransomware was being deployed on their machine, what steps they took to investigate the incident, and how they responded to the attack. Both quantitative and qualitative data were collected through questionnaires and in-depth interviews. The results shed an interesting light into the most common attack methods, the most targeted operating systems and the infection symptoms, as well as recommended defence mechanisms. This information can be used in the future to create behavioural patterns for improved ransomware detection and response."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "8"; dc:hasVersion , ; dct:creator , , ; dct:date "2019-02-12"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ; ep:hasPublished ; ep:hasSupplemental , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Arief"^^xsd:string; foaf:givenName "Budi"^^xsd:string; foaf:name "Budi Arief"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hull"^^xsd:string; foaf:givenName "Gavin"^^xsd:string; foaf:name "Gavin Hull"^^xsd:string; rdf:type foaf:Person . foaf:familyName "John"^^xsd:string; foaf:givenName "Henna"^^xsd:string; foaf:name "Henna John"^^xsd:string; rdf:type foaf:Person . bibo:issn "21937680"; foaf:name "Crime Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "IFL2018_paper_2.pdf"^^xsd:string . rdfs:label "IFL2018_paper_2.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #74037 \n\nDelta Debugging Type Errors with a Blackbox Compiler\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Delta Debugging Type Errors with a Blackbox Compiler (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Delta Debugging Type Errors with a Blackbox Compiler (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Delta Debugging Type Errors with a Blackbox Compiler (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Delta Debugging Type Errors with a Blackbox Compiler (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Delta Debugging Type Errors with a Blackbox Compiler (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Delta Debugging Type Errors with a Blackbox Compiler (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Debugging type errors is a necessary process that programmers, both novices and experts alike, face when using statically typed functional programming languages. All compilers often report the location of a type error inaccurately. This problem has been a subject of research for over thirty years. We present a new method for locating type errors: We apply the Isolating Delta Debugging algorithm coupled with a blackbox compiler. We evaluate our implementation for Haskell by comparing it with the output of the Glasgow Haskell Compiler; overall we obtain positive results in favour of our method of type error debugging."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2019-02-10"; dct:isPartOf ; dct:publisher ; dct:title "Delta Debugging Type Errors with a Blackbox Compiler"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "30th Symposium on Implementation and Application of Functional Languages (IFL 2018)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Lowell, MA, USA"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Meng"^^xsd:string; foaf:name "Meng Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sharrad"^^xsd:string; foaf:givenName "Joanna"^^xsd:string; foaf:name "Joanna Sharrad"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chitil"^^xsd:string; foaf:givenName "Olaf"^^xsd:string; foaf:name "Olaf Chitil"^^xsd:string; rdf:type foaf:Person . rdfs:label "PricingMod V3.pdf"^^xsd:string . rdfs:label "PricingMod V3.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72082 \n\nStochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives (Other)"^^xsd:string . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Rainfall derivatives are in their infancy since starting trading on the Chicago Mercantile Exchange (CME) in 2011.\r\nBeing a relatively new class of financial instruments there is no generally recognised pricing framework used within\r\nthe literature. In this paper, we propose a novel Genetic Programming (GP) algorithm for pricing contracts. Our\r\nnovel algorithm, which is called Stochastic Model GP (SMGP), is able to generate and evolve stochastic equations\r\nof rainfall, which allows us to probabilistically transform rainfall predictions from the risky world to the risk-neutral\r\nworld. In order to achieve this, SMGP’s representation allows its individuals to comprise of two weighted parts,\r\nnamely a seasonal component and an autoregressive component. To create the stochastic nature of an equation for\r\neach SMGP individual, we estimate the weights by using a probabilistic approach. We evaluate the models produced\r\nby SMGP in terms of rainfall predictive accuracy and in terms of pricing performance on 42 cities from Europe and the\r\nUSA. We compare SMGP to 8 methods: its predecessor DGP, 5 well-known machine learning methods (M5 Rules, M5\r\nModel trees, k-Nearest Neighbors, Support Vector Regression, Radial Basis Function), and two statistical methods,\r\nnamely AutoRegressive Integrated Moving Average (ARIMA) and Monte Carlo Rainfall Prediction (MCRP). Results\r\nshow that the proposed algorithm is able to statistically outperform all other algorithms."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "46"; dc:hasVersion , ; dct:creator , , , ; dct:date "2019-02-07"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Alexandridis"^^xsd:string; foaf:givenName "Antonis"^^xsd:string; foaf:name "Antonis Alexandridis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kampouridis"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Kampouridis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cramer"^^xsd:string; foaf:givenName "Sam"^^xsd:string; foaf:name "Sam Cramer"^^xsd:string; rdf:type foaf:Person . bibo:issn "22106502"; foaf:name "Swarm and Evolutionary Computation"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "po08311464.pdf"^^xsd:string . rdfs:label "po08311464.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72626 \n\nHoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design (Other)"^^xsd:string . rdf:_1 . bibo:abstract "Honeypots are designed to trap the attacker with the purpose of investigating its malicious behaviour. Owing to the increasing variety and sophistication of cyber attacks, how to capture high-quality attack data has become a challenge in the context of honeypot area. All-round honeypots, which mean a significant improvement in sensibility, countermeasure, and stealth, are necessary to tackle the problem. In this paper, we propose a novel honeypot architecture termed HoneyDOC to support all-round honeypot design and implementation. Our HoneyDOC architecture clearly identifies three essential independent and collaborative modules, Decoy, Captor, and Orchestrator. Based on the efficient architecture, a software-defined networking-enabled honeypot system is designed, which supplies a high programmability for technically sustaining the features for capturing high-quality data. A proof-of-concept system is implemented to validate its feasibility and effectiveness. The experimental results show the benefits by using the proposed architecture compared with the previous honeypot solutions."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "37"; dc:hasVersion ; dct:creator ; dct:date "2019-02-05"; dct:isPartOf , ; dct:subject , ; dct:title "HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "TK5105.5 Computer networks"@en . rdf:type skos:Concept; skos:prefLabel "TK7885 Computer engineering. Computer hardware"@en . foaf:familyName "Fan"^^xsd:string; foaf:givenName "Wenjun"^^xsd:string; foaf:name "Wenjun Fan"^^xsd:string; rdf:type foaf:Person . bibo:issn "07338716"; foaf:name "IEEE Journal on Selected Areas in Communications"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "paper.pdf"^^xsd:string . rdfs:label "paper.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #71304 \n\nThe Verified CakeML Compiler Backend\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "The Verified CakeML Compiler Backend (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The Verified CakeML Compiler Backend (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Verified CakeML Compiler Backend (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Verified CakeML Compiler Backend (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Verified CakeML Compiler Backend (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Verified CakeML Compiler Backend (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "The CakeML compiler is, to the best of our knowledge, the most realistic veri?ed compiler for a functional programming language to date. The architecture of the compiler, a sequence of intermediate languages through which high-level features are compiled away incrementally, enables veri?cation of each compilation pass at inappropriate level of semantic detail.Partsofthecompiler’s implementation resemble mainstream (unveri?ed) compilers for strict functional languages, and it support several important features and optimisations. These include ef?cient curried multi-argument functions, con?gurable data representations, ef?cient exceptions, register allocation,and more. The compiler produces machine code for ?ve architectures: x86-64, ARMv6, ARMv8, MIPS-64, and RISC-V. The generatedmachine code contains the veri?edruntime system which includes averi?ed generational copying garbage collect or and averi?edarbitraryprecisionarithmetic(bignum)library. In this paper we present the overall design of the compiler backend, including its 12 intermediate languages. We explain how the semantics and proofs ?t together, and provide detail on how the compiler has been bootstrapped inside the logic of a theorem prover. The entire development has been carried out within the HOL4 theorem prover."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "29"; dc:hasVersion ; dct:creator , , , , , ; dct:date "2019-02-04"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "The Verified CakeML Compiler Backend"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Cambridge University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Fox"^^xsd:string; foaf:givenName "Anthony"^^xsd:string; foaf:name "Anthony Fox"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kumar"^^xsd:string; foaf:givenName "Ramana"^^xsd:string; foaf:name "Ramana Kumar"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Myreen"^^xsd:string; foaf:givenName "Magnus O."^^xsd:string; foaf:name "Magnus O. Myreen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Norrish"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Norrish"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tan"^^xsd:string; foaf:givenName "Yong Kiam"^^xsd:string; foaf:name "Yong Kiam Tan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Owens"^^xsd:string; foaf:givenName "Scott"^^xsd:string; foaf:name "Scott Owens"^^xsd:string; rdf:type foaf:Person . bibo:issn "09567968"; foaf:name "Journal of Functional Programming"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "Al-Sudani-Palaniappan2019_Article_PredictingStudentsFinalDegreeC.pdf"^^xsd:string . rdfs:label "Al-Sudani-Palaniappan2019_Article_PredictingStudentsFinalDegreeC.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #71736 \n\nPredicting Students’ Final Degree Classification Using an Extended Profile\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Predicting Students’ Final Degree Classification Using an Extended Profile (Microsoft Word)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Students’ Final Degree Classification Using an Extended Profile (Other)"^^xsd:string . rdf:type bibo:Document, ep:Document; rdfs:label "Predicting Students’ Final Degree Classification Using an Extended Profile (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Students’ Final Degree Classification Using an Extended Profile (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Students’ Final Degree Classification Using an Extended Profile (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Students’ Final Degree Classification Using an Extended Profile (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Students’ Final Degree Classification Using an Extended Profile (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Students’ Final Degree Classification Using an Extended Profile (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Predicting Students’ Final Degree Classification Using an Extended Profile (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Students’ Final Degree Classification Using an Extended Profile (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Students’ Final Degree Classification Using an Extended Profile (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Students’ Final Degree Classification Using an Extended Profile (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Students’ Final Degree Classification Using an Extended Profile (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Predicting Students’ Final Degree Classification Using an Extended Profile (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "The students’ progression and attainment gap are considered as key performance indicators of many universities worldwide. Therefore, universities invest significantly in resources to reduce the attainment gap between good and poor performing students. In this regard, various mathematical models have been utilised to predict students’ performances in the hope of informing the support team to intervene at an early stage of the at risk student’s at the university. In this work, we used a combination of institutional, academic, demographic, psychological and economic factors to predict students’ performances using a multi-layered neural network (NN) to classify students’ degrees into either a good or basic degree class. To our knowledge, the usage of such an extended profile is novel. A feed-forward network with 100 nodes in the hidden layer trained using Levenberg-Marquardt learning algorithm was able to achieve the best performance with an average classification accuracy of 83.7%, sensitivity of 77.37%, specificity of 85.16%, Positive Predictive Value of 94.04%, and Negative Predictive Value of 50.93%. The NN model was also compared against other classi?ers specifically k-Nearest Neighbour, Decision Tree and Support Vector Machine on the same dataset using the same features. The results indicate that the NN outperforms all other classi?ers in terms of overall classification accuracy and shows promise for the method to be used in Student Success ventures in the universities in an automatic manner."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "24"; dc:hasVersion , , ; dct:creator , ; dct:date "2019-02-02"; dct:isPartOf , ; dct:publisher ; dct:title "Predicting Students’ Final Degree Classification Using an Extended Profile"^^xsd:string; ep:hasAccepted , ; ep:hasDocument , , , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ramaswamy"^^xsd:string; foaf:givenName "Palaniappan"^^xsd:string; foaf:name "Palaniappan Ramaswamy"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Al-Sudani"^^xsd:string; foaf:givenName "Sahar"^^xsd:string; foaf:name "Sahar Al-Sudani"^^xsd:string; rdf:type foaf:Person . bibo:issn "13602357"; foaf:name "Education and Information Technologies"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #74188 \n\nTeacher Learning and Professional Development\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 ; rdf:_2 . , ; bibo:authorList ; bibo:editorList ; bibo:status , ; dct:creator , , ; dct:date "2019-02-01"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Teacher Learning and Professional Development"^^xsd:string; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "L Education"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Cambridge University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Robins"^^xsd:string; foaf:givenName "Anthony"^^xsd:string; foaf:name "Anthony Robins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Falkner"^^xsd:string; foaf:givenName "Katrina"^^xsd:string; foaf:name "Katrina Falkner"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ben-David Kolikant"^^xsd:string; foaf:givenName "Yifat"^^xsd:string; foaf:name "Yifat Ben-David Kolikant"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fincher"^^xsd:string; foaf:givenName "Sally"^^xsd:string; foaf:name "Sally Fincher"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #74187 \n\nAssessment and Plagiarism\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 ; rdf:_2 . , ; bibo:authorList ; bibo:editorList ; bibo:status , ; dct:creator , , ; dct:date "2019-02-01"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Assessment and Plagiarism"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "L Education"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Cambridge University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Lancaster"^^xsd:string; foaf:givenName "Thomas"^^xsd:string; foaf:name "Thomas Lancaster"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Robins"^^xsd:string; foaf:givenName "Anthony"^^xsd:string; foaf:name "Anthony Robins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fincher"^^xsd:string; foaf:givenName "Sally"^^xsd:string; foaf:name "Sally Fincher"^^xsd:string; rdf:type foaf:Person . rdfs:label "Qiu2018-IEEE-TMI-Final.pdf"^^xsd:string . rdfs:label "Qiu2018-IEEE-TMI-Final.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77395 \n\nAn end-to-end deep learning histochemical scoring system for breast cancer TMA\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An end-to-end deep learning histochemical scoring system for breast cancer TMA (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An end-to-end deep learning histochemical scoring system for breast cancer TMA (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An end-to-end deep learning histochemical scoring system for breast cancer TMA (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An end-to-end deep learning histochemical scoring system for breast cancer TMA (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An end-to-end deep learning histochemical scoring system for breast cancer TMA (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An end-to-end deep learning histochemical scoring system for breast cancer TMA (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 . bibo:abstract "One of the methods for stratifying different molecular classes of breast cancer is the Nottingham Prognostic Index Plus (NPI+) which uses breast cancer relevant biomarkers to stain tumour tissues prepared on tissue microarray (TMA). To determine the molecular class of the tumour, pathologists will have to manually mark the nuclei activity biomarkers through a microscope and use a semi-quantitative assessment method to assign a histochemical score (H-Score) to each TMA core. Manually marking positively stained nuclei is a time consuming, imprecise and subjective process which will lead to inter-observer and intra-observer discrepancies. In this paper, we present an end-to-end deep learning system which directly predicts the H-Score automatically. Our system imitates the pathologists’ decision process and uses one fully convolutional network (FCN) to extract all nuclei region (tumour and non-tumour), a second FCN to extract tumour nuclei region, and a multi-column convolutional neural network which takes the outputs of the first two FCNs and the stain intensity description image as input and acts as the high-level decision making mechanism to directly output the H-Score of the input TMA image. To the best of our knowledge, this is the first end-to-end system that takes a TMA image as input and directly outputs a clinical score. We will present experimental results which demonstrate that the H-Scores predicted by our model have very high and statistically significant correlation with experienced pathologists’ scores and that the H-Score discrepancy between our algorithm and the pathologists is on par with the inter-subject discrepancy between the pathologists."^^xsd:string; bibo:authorList ; bibo:issue "2"; bibo:status , ; bibo:volume "38"; dc:hasVersion ; dct:creator , , , , , , , , , ; dct:date "2019-02-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "An end-to-end deep learning histochemical scoring system for breast cancer TMA"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Liu"^^xsd:string; foaf:givenName "Jingxin"^^xsd:string; foaf:name "Jingxin Liu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zheng"^^xsd:string; foaf:givenName "Chi"^^xsd:string; foaf:name "Chi Zheng"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zou"^^xsd:string; foaf:givenName "Wenbin"^^xsd:string; foaf:name "Wenbin Zou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Qiu"^^xsd:string; foaf:givenName "Guoping"^^xsd:string; foaf:name "Guoping Qiu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Garibaldi"^^xsd:string; foaf:givenName "Jonathan M."^^xsd:string; foaf:name "Jonathan M. Garibaldi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Xu"^^xsd:string; foaf:givenName "Bolei"^^xsd:string; foaf:name "Bolei Xu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gong"^^xsd:string; foaf:givenName "Yuanhao"^^xsd:string; foaf:name "Yuanhao Gong"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Green"^^xsd:string; foaf:givenName "Andrew R."^^xsd:string; foaf:name "Andrew R. Green"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Soria"^^xsd:string; foaf:givenName "Daniele"^^xsd:string; foaf:name "Daniele Soria"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ellis"^^xsd:string; foaf:givenName "Ian O."^^xsd:string; foaf:name "Ian O. Ellis"^^xsd:string; rdf:type foaf:Person . bibo:issn "02780062"; foaf:name "IEEE Transactions on Medical Imaging"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #74184 \n\nThe Cambridge Handbook of Computing Education Research\n\n"; foaf:primaryTopic . rdf:_1 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "This Handbook describes the extent and shape of computing education research today. Over fifty leading researchers from academia and industry (including Google and Microsoft) have contributed chapters that together define and expand the evidence base. The foundational chapters set the field in context, articulate expertise from key disciplines, and form a practical guide for new researchers. They address what can be learned empirically, methodologically and theoretically from each area. The topic chapters explore issues that are of current interest, why they matter, and what is already known. They include discussion of motivational context, implications for practice, and open questions which might suggest future research. The authors provide an authoritative introduction to the field and is essential reading for policy makers, as well as both new and established researchers."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; dct:creator ; dct:date "2019-02"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "The Cambridge Handbook of Computing Education Research"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, ep:EPrint, ep:EdbookEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "L Education (General)"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Cambridge University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Robins"^^xsd:string; foaf:givenName "Anthony V"^^xsd:string; foaf:name "Anthony V Robins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fincher"^^xsd:string; foaf:givenName "Sally A"^^xsd:string; foaf:name "Sally A Fincher"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #74185 \n\nComputing Education Research Today\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . rdf:_1 ; rdf:_2 . , ; bibo:authorList ; bibo:editorList ; bibo:status , ; dct:creator , , , , , ; dct:date "2019-02"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Computing Education Research Today"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "L Education"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Cambridge University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Robins"^^xsd:string; foaf:givenName "Anthony V"^^xsd:string; foaf:name "Anthony V Robins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hundhausen"^^xsd:string; foaf:givenName "Christopher"^^xsd:string; foaf:name "Christopher Hundhausen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McCartney"^^xsd:string; foaf:givenName "Robert"^^xsd:string; foaf:name "Robert McCartney"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dorn"^^xsd:string; foaf:givenName "Brian"^^xsd:string; foaf:name "Brian Dorn"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tenenberg"^^xsd:string; foaf:givenName "Josh"^^xsd:string; foaf:name "Josh Tenenberg"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Murphy"^^xsd:string; foaf:givenName "Laurie"^^xsd:string; foaf:name "Laurie Murphy"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fincher"^^xsd:string; foaf:givenName "Sally A"^^xsd:string; foaf:name "Sally A Fincher"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #74186 \n\nA Study Design Process\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . rdf:_1 ; rdf:_2 . , ; bibo:authorList ; bibo:editorList ; bibo:status , ; dct:creator , ; dct:date "2019-02"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "A Study Design Process"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "L Education"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Cambridge University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Robins"^^xsd:string; foaf:givenName "Anthony"^^xsd:string; foaf:name "Anthony Robins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ko"^^xsd:string; foaf:givenName "Andrew J"^^xsd:string; foaf:name "Andrew J Ko"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fincher"^^xsd:string; foaf:givenName "Sally"^^xsd:string; foaf:name "Sally Fincher"^^xsd:string; rdf:type foaf:Person . rdfs:label "2019ToolsEnvironments.pdf"^^xsd:string . rdfs:label "2019ToolsEnvironments.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73256 \n\nTools and Environments\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Tools and Environments (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Tools and Environments (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tools and Environments (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tools and Environments (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tools and Environments (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Tools and Environments (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "Teaching and learning how to build software are central aspects of computing education, and the tools which we use to support this are themselves a focus of research and innovation. This chapter considers tools designed or predominately used for education; from software development environments to automatic assessment tools, visualization, and educational games platforms. It looks at not just the history and state-of-the-art of these tools, but also at the challenges and opportunities in researching with and about them."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; dct:creator , , ; dct:date "2019-02"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Tools and Environments"^^xsd:string; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "LB Theory and practice of education"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Cambridge University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ko"^^xsd:string; foaf:givenName "Andrew J"^^xsd:string; foaf:name "Andrew J Ko"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Malmi"^^xsd:string; foaf:givenName "Lauri"^^xsd:string; foaf:name "Lauri Malmi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Robins"^^xsd:string; foaf:givenName "A V"^^xsd:string; foaf:name "A V Robins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Utting"^^xsd:string; foaf:givenName "Ian"^^xsd:string; foaf:name "Ian Utting"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fincher"^^xsd:string; foaf:givenName "S A"^^xsd:string; foaf:name "S A Fincher"^^xsd:string; rdf:type foaf:Person . rdfs:label "248ThesisAW.pdf"^^xsd:string . rdfs:label "248ThesisAW.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73337 \n\nEEG-Based Mental States Identification\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "EEG-Based Mental States Identification (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "EEG-Based Mental States Identification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "EEG-Based Mental States Identification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "EEG-Based Mental States Identification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "EEG-Based Mental States Identification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "EEG-Based Mental States Identification (Other)"^^xsd:string . rdf:_1 . , ; bibo:abstract "In this thesis, we focus on the identification of mental states described according to the definition of awareness and wakefulness. Using algorithmic methods, we show that it is possible to differentiate between two brain states based on the brain electrical activity collected by EEG. We begin by explaining the overall theoretical framework which enabled us to develop the detection of brain states. It starts with data acquisition. Following that, we analyse the pre-processing of the data before the extraction of features. Finally, we go on to statistically evaluate the results. In order to achieve this task, we propose four experiments. We will first focus on exploring different brain states for patients in Intensive Care Unit (ICU) such as coma and quasi-brain-death states. To distinguish these states, we use a signal processing method based on the EEG signal phase. A phase synchrony index based on Shannon entropy was used to separate the two states. Statistical validation revealed a significant difference between the two via delta-alpha and theta-alpha frequency couplings. Next, we studied the neuronal mechanisms which is used to understand consciousness. We did that by using dipole modelling. This method was applied to local-global experiment and the paradigm of auditory deviance with two hierarchical levels. A modulation of this experiment is generated by a sedative Propofol to study the effect on conscious states. This experiment was analysed in greater detail using the Imaging Method to do the source localisation. We analysed three different time-windows. The first window corresponds to the local effect during the initial response of the brain. We assume that this input is related to auditory\r\nareas and activates the temporal lobe. The second window is at the interface between the local effect and the global effect. In here we are especially interested in the interaction between these two effects during the second window. Finally, the third window will enable us to study the overall effect. We hypothesize a global activation of neural networks corresponding to consciousness as described by the global workspace theory. The third experiment focused on brain states high-level athletes experience during a cognitive task. Two different groups of cyclists, endurances and sprinters,\r\nwere asked to do a Stroop task for 30 minutes. We studied the influence of the task and the potential differences in brain activity between the two groups. We found through the frequency analysis that the brain activity between the two groups can be distinguished, but was not modified by the cognitive task.\r\nFinally, we studied the influence of the sensorimotor loop on the brain. A physical task was applied, consisting in lifting a weight with two measurements, where the lifting arm can also be in fatigued state. Using sources reconstruction from EEG, we studied the impact of weight-lifting and the physical fatigue upon neuronal activities and the neuronal origins of these effects. We found that only\r\nweight has an effect, whereas fatigue effect is not significant. We conclude with a discussion of the mechanisms of consciousness analysed via algorithmic methods and some future work for the possibility to distinguish better between different cognitive states."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2019-02"; dct:isPartOf ; dct:issuer , ; dct:subject ; dct:title "EEG-Based Mental States Identification"^^xsd:string; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Witon"^^xsd:string; foaf:givenName "Adrien J-B."^^xsd:string; foaf:name "Adrien J-B. Witon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . rdfs:label "new1Latest1.pdf"^^xsd:string . rdfs:label "new1Latest1.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #70670 \n\nThe Impact of Potential Crowd Behaviours on Emergency Evacuation: An Evolutionary Game Theoretic Approach\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "The Impact of Potential Crowd Behaviours on Emergency Evacuation: An Evolutionary Game Theoretic Approach (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The Impact of Potential Crowd Behaviours on Emergency Evacuation: An Evolutionary Game Theoretic Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Impact of Potential Crowd Behaviours on Emergency Evacuation: An Evolutionary Game Theoretic Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Impact of Potential Crowd Behaviours on Emergency Evacuation: An Evolutionary Game Theoretic Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Impact of Potential Crowd Behaviours on Emergency Evacuation: An Evolutionary Game Theoretic Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Impact of Potential Crowd Behaviours on Emergency Evacuation: An Evolutionary Game Theoretic Approach (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Abstract—Crowd dynamics have important applications in evacuation management systems relevant to organizing safer large scale gatherings. For crowd safety, it is very important\r\nto study the evolution of potential crowd behaviours by simulating the crowd evacuation process. Planning crowd control tasks via studying the impact of crowd behavioural evolution towards evacuation simulation could mitigate the possibility of crowd disasters that may happen. During a typical emergency evacuation scenario, conflict among agents occurs when agents intend to move to the same location as a result of the interaction of agents within their nearest neighbours. The effect of the agent response towards their neighbourhood is vital in order to understand the effect of variation of crowd behaviours towards the whole environment. In this work, we model crowd motion subject to exit congestion under uncertainty conditions in a continuous space via computer simulations. We model bestresponse, risk-seeking, risk-averse and risk-neutral behaviours of agents via certain game theory notions. We perform computer simulations with heterogeneous populations in order to study the effect of the evolution of agent behaviours towards egress flow under threat conditions. Our simulation results show the relation between the local crowd pressure and the number of injured agents. We observe that when the proportion of agents in a population of risk-seeking agents is increased, the average crowd pressure, average local density and the number of injured agents get increased. Besides that, based on our simulation results, we can infer that crowd disaster could be prevented if the agent population are full of risk-averse and risk-neutral agents despite circumstances that lead to threat consequences."^^xsd:string; bibo:authorList ; bibo:issue "1"; bibo:status , ; bibo:volume "22"; dc:hasVersion ; dct:creator , , ; dct:date "2019-01-31"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "The Impact of Potential Crowd Behaviours on Emergency Evacuation: An Evolutionary Game Theoretic Approach"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "SimSoc Consortium"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Venkat"^^xsd:string; foaf:givenName "Ibrahim"^^xsd:string; foaf:name "Ibrahim Venkat"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ibrahim"^^xsd:string; foaf:givenName "Azhar Mohd"^^xsd:string; foaf:name "Azhar Mohd Ibrahim"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Wilde"^^xsd:string; foaf:givenName "Philippe"^^xsd:string; foaf:name "Philippe De Wilde"^^xsd:string; rdf:type foaf:Person . bibo:issn "14607425"; foaf:name "Journal of Artificial Societies and Social Simulation"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "CGJ_IEEE_SSCI_CIHLI_2018.pdf"^^xsd:string . rdfs:label "CGJ_IEEE_SSCI_CIHLI_2018.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69595 \n\nSolving the Rubik’s Cube with Learned Guidance Functions\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Solving the Rubik’s Cube with Learned Guidance Functions (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Solving the Rubik’s Cube with Learned Guidance Functions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Solving the Rubik’s Cube with Learned Guidance Functions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Solving the Rubik’s Cube with Learned Guidance Functions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Solving the Rubik’s Cube with Learned Guidance Functions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Solving the Rubik’s Cube with Learned Guidance Functions (Other)"^^xsd:string . rdf:_1 . bibo:abstract "This paper introduces move sequence problems— problems where a system can exist in a number of states, including a goal state, with moves between those states. This paper introduces Learned Guidance Functions (LGFs) as a machine learning method to tackle these. An LGF is a function learned by supervised machine learning that predicts how far a particular state is from the goal state. These methods are applied to the challenging problem of unscrambling a Rubik’s Cube."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator ; dct:date "2019-01-31"; dct:isPartOf ; dct:subject , ; dct:title "Solving the Rubik’s Cube with Learned Guidance Functions"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.87 Neural computers, neural networks"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "2018 IEEE Symposium Series on Computational Intelligence"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Bengaluru, India"^^xsd:string . foaf:familyName "Johnson"^^xsd:string; foaf:givenName "Colin G."^^xsd:string; foaf:name "Colin G. Johnson"^^xsd:string; rdf:type foaf:Person . rdfs:label "Phan2019a_TNSRE.pdf"^^xsd:string . rdfs:label "Phan2019a_TNSRE.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72120 \n\nSeqSleepNet: End-to-End Hierarchical Recurrent Neural Network for Sequence-to-Sequence Automatic Sleep Staging\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "SeqSleepNet: End-to-End Hierarchical Recurrent Neural Network for Sequence-to-Sequence Automatic Sleep Staging (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "SeqSleepNet: End-to-End Hierarchical Recurrent Neural Network for Sequence-to-Sequence Automatic Sleep Staging (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SeqSleepNet: End-to-End Hierarchical Recurrent Neural Network for Sequence-to-Sequence Automatic Sleep Staging (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SeqSleepNet: End-to-End Hierarchical Recurrent Neural Network for Sequence-to-Sequence Automatic Sleep Staging (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SeqSleepNet: End-to-End Hierarchical Recurrent Neural Network for Sequence-to-Sequence Automatic Sleep Staging (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "SeqSleepNet: End-to-End Hierarchical Recurrent Neural Network for Sequence-to-Sequence Automatic Sleep Staging (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Automatic sleep staging has been often treated as a simple classification problem that aims at determining the label of individual target polysomnography (PSG) epochs one at a time. In this work, we tackle the task as a sequence-to-sequence classification problem that receives a sequence of multiple epochs as input and classifies all of their labels at once. For this purpose, we propose a hierarchical recurrent neural network named SeqSleepNet. At the epoch processing level, the network consists of a filterbank layer tailored to learn frequency-domain filters for preprocessing and an attention-based recurrent layer designed for short-term sequential modelling. At the sequence processing level, a recurrent layer placed on top of the learned epoch-wise features for long-term modelling of sequential epochs. The classification is then carried out on the output vectors at every time step of the top recurrent layer to produce the sequence of output labels. Despite being hierarchical, we present a strategy to train the network in an end-to-end fashion. We show that the proposed network outperforms state-of-the-art approaches, achieving an overall accuracy, macro F1-score, and Cohen's kappa of 87.1%, 83.3%, and 0.815 on a publicly available dataset with 200 subjects."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "27"; dc:hasVersion ; dct:creator , , , , ; dct:date "2019-01-31"; dct:isPartOf , ; dct:publisher ; dct:title "SeqSleepNet: End-to-End Hierarchical Recurrent Neural Network for Sequence-to-Sequence Automatic Sleep Staging"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Andreotti"^^xsd:string; foaf:givenName "Fernando"^^xsd:string; foaf:name "Fernando Andreotti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Vos"^^xsd:string; foaf:givenName "Maarten"^^xsd:string; foaf:name "Maarten De Vos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cooray"^^xsd:string; foaf:givenName "Navin"^^xsd:string; foaf:name "Navin Cooray"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chén"^^xsd:string; foaf:givenName "Oliver Y."^^xsd:string; foaf:name "Oliver Y. Chén"^^xsd:string; rdf:type foaf:Person . bibo:issn "15344320"; foaf:name "IEEE Transactions on Neural Systems and Rehabilitation Engineering"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Rokaya2019_my_new_affiliation.pdf"^^xsd:string . rdfs:label "Rokaya2019_my_new_affiliation.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77038 \n\nThe combined expression of solute carriers is associated with a poor prognosis in highly proliferative ER+ breast cancer\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "The combined expression of solute carriers is associated with a poor prognosis in highly proliferative ER+ breast cancer (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The combined expression of solute carriers is associated with a poor prognosis in highly proliferative ER+ breast cancer (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The combined expression of solute carriers is associated with a poor prognosis in highly proliferative ER+ breast cancer (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The combined expression of solute carriers is associated with a poor prognosis in highly proliferative ER+ breast cancer (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The combined expression of solute carriers is associated with a poor prognosis in highly proliferative ER+ breast cancer (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The combined expression of solute carriers is associated with a poor prognosis in highly proliferative ER+ breast cancer (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 . bibo:abstract "Purpose: Breast cancer (BC) is a heterogeneous disease characterised by variant biology, metabolic activity, and patient outcome. Glutamine availability for growth and progression of BC is important in several BC subtypes. This study aimed to evaluate the biological and prognostic role of the combined expression of key glutamine transporters, SLC1A5, SLC7A5 and SLC3A2 in BC with emphasis on the intrinsic molecular subtypes.\r\nMethods: SLC1A5, SLC7A5 and SLC3A2 were assessed at the protein level, using immunohistochemistry on tissue microarrays constructed from a large well characterised BC cohort (n=2,248). Patients were stratified into accredited clusters based on protein expression and correlated with clinicopathological parameters, molecular subtypes, and patient outcome.\r\nResults: Clustering analysis of SLC1A5, SLC7A5 and SLC3A2 identified three clusters Low SLCs (SLC1A5-/SLC7A5-/SLC3A2-), High SLC1A5 (SLC1A5+/SLC7A5-/SLC3A2-) and High SLCs (SLC1A5+/SLC7A5+/SLC3A2+) which had distinct correlations to known prognostic factors and patient outcome (p<0.001). The key regulator of tumour cell metabolism, c-MYC, was significantly expressed in tumours in the High SLCs cluster (p<0.001). When different BC subtypes were considered, the association with the poor outcome was observed in the ER+ high proliferation/luminal B class only (p= 0.003). In multivariate analysis, SLC clusters were independent risk factor for shorter breast cancer specific survival (p= 0.001).\r\nConclusion: The co-operative expression of SLC1A5, SLC7A5 and SLC3A2 appears to play a role in the aggressive subclass of ER+ high proliferation/ luminal BC, driven by c-MYC, and therefore have the potential to act as therapeutic targets, particularly in synergism."^^xsd:string; bibo:authorList ; bibo:issue "1"; bibo:status , ; bibo:volume "175"; dc:hasVersion ; dct:creator , , , , , , , , ; dct:date "2019-01-22"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "The combined expression of solute carriers is associated with a poor prognosis in highly proliferative ER+ breast cancer"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "RC254 Neoplasms. Tumors. Oncology"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Green"^^xsd:string; foaf:givenName "Andrew R."^^xsd:string; foaf:name "Andrew R. Green"^^xsd:string; rdf:type foaf:Person . foaf:familyName "El-Ansari"^^xsd:string; foaf:givenName "Rokaya"^^xsd:string; foaf:name "Rokaya El-Ansari"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Craze"^^xsd:string; foaf:givenName "Madeleine L."^^xsd:string; foaf:name "Madeleine L. Craze"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rakha"^^xsd:string; foaf:givenName "Emad A."^^xsd:string; foaf:name "Emad A. Rakha"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Diez-Rodriguez"^^xsd:string; foaf:givenName "Maria"^^xsd:string; foaf:name "Maria Diez-Rodriguez"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nolan"^^xsd:string; foaf:givenName "Christopher C."^^xsd:string; foaf:name "Christopher C. Nolan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Soria"^^xsd:string; foaf:givenName "Daniele"^^xsd:string; foaf:name "Daniele Soria"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ellis"^^xsd:string; foaf:givenName "Ian O."^^xsd:string; foaf:name "Ian O. Ellis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Alfarsi"^^xsd:string; foaf:givenName "Lutfi"^^xsd:string; foaf:name "Lutfi Alfarsi"^^xsd:string; rdf:type foaf:Person . bibo:issn "01676806"; foaf:name "Breast cancer research and treatment"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "version10_lzx_ivm.pdf"^^xsd:string . rdfs:label "version10_lzx_ivm.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #71467 \n\nListening and grouping: an online autoregressive approach for monaural speech separation\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Listening and grouping: an online autoregressive approach for monaural speech separation (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Listening and grouping: an online autoregressive approach for monaural speech separation (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Listening and grouping: an online autoregressive approach for monaural speech separation (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Listening and grouping: an online autoregressive approach for monaural speech separation (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Listening and grouping: an online autoregressive approach for monaural speech separation (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Listening and grouping: an online autoregressive approach for monaural speech separation (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "This paper proposes an autoregressive approach to harness the power of deep learning for multi-speaker monaural speech separation. It exploits a causal temporal context in both mixture and past estimated separated signals and performs online separation that is compatible with real-time applications. The approach adopts a learned listening and grouping architecture motivated by computational auditory scene analysis, with a grouping stage that effectively addresses the label permutation problem at both frame and segment levels. Experimental results on the benchmark WSJ0-2mix dataset show that the new approach can outperform the majority of state-of-the-art methods in both closed-set and open-set conditions in terms of signal-to-distortion ratio (SDR) improvement and perceptual evaluation of speech quality (PESQ), even approaches that exploit whole-utterance statistics for separation, with relatively fewer model parameters."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "27"; dc:hasVersion ; dct:creator , , , ; dct:date "2019-01-10"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Listening and grouping: an online autoregressive approach for monaural speech separation"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Li"^^xsd:string; foaf:givenName "Zheng-Xi"^^xsd:string; foaf:name "Zheng-Xi Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dai"^^xsd:string; foaf:givenName "Li-Rong"^^xsd:string; foaf:name "Li-Rong Dai"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Song"^^xsd:string; foaf:givenName "Yan"^^xsd:string; foaf:name "Yan Song"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian"^^xsd:string; foaf:name "Ian McLoughlin"^^xsd:string; rdf:type foaf:Person . bibo:issn "15587916"; foaf:name "IEEE Transactions On Audio Speech And Language Processing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Brief-BioInfo-2019-post-print.pdf"^^xsd:string . rdfs:label "Brief-BioInfo-2019-post-print.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72582 \n\nInvestigating the Role of Simpson’s Paradox in the Analysis of Top-Ranked Features in High-Dimensional Bioinformatics Datasets\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Investigating the Role of Simpson’s Paradox in the Analysis of Top-Ranked Features in High-Dimensional Bioinformatics Datasets (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Role of Simpson’s Paradox in the Analysis of Top-Ranked Features in High-Dimensional Bioinformatics Datasets (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Role of Simpson’s Paradox in the Analysis of Top-Ranked Features in High-Dimensional Bioinformatics Datasets (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Role of Simpson’s Paradox in the Analysis of Top-Ranked Features in High-Dimensional Bioinformatics Datasets (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Role of Simpson’s Paradox in the Analysis of Top-Ranked Features in High-Dimensional Bioinformatics Datasets (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Investigating the Role of Simpson’s Paradox in the Analysis of Top-Ranked Features in High-Dimensional Bioinformatics Datasets (Other)"^^xsd:string . rdf:_1 . bibo:abstract "An important problem in bioinformatics consists of identifying the most important features (or predictors), among a large number of features in a given classification dataset. This problem is often addressed by using a machine learning-based feature ranking method to identify a small set of top-ranked predictors (i.e. the most relevant features for classification). The large number of studies in this area have, however, an important limitation: they ignore the possibility that the top-ranked predictors occur in an instance of Simpson’s paradox, where the positive or negative association between a predictor and a class variable reverses sign upon conditional on each of the values of a third (confounder) variable. In this work, we review and investigate the role of Simpson’s paradox in the analysis of top-ranked predictors in high-dimensional bioinformatics datasets, in order to avoid the potential danger of misinterpreting an association between a predictor and the class variable. We perform computational experiments using four well-known feature ranking methods from the machine learning field and five high-dimensional datasets of ageing-related genes, where the predictors are Gene Ontology terms. The results show that occurrences of Simpson’s paradox involving top-ranked predictors are much more common for one of the feature ranking methods."^^xsd:string; bibo:authorList ; bibo:issue "2"; bibo:status , ; bibo:volume "21"; dc:hasVersion ; dct:creator ; dct:date "2019-01-09"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Investigating the Role of Simpson’s Paradox in the Analysis of Top-Ranked Features in High-Dimensional Bioinformatics Datasets"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Oxford University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:name "Briefings in Bioinformatics"^^xsd:string; rdf:type bibo:Collection . rdfs:label "BSCT_2018_accepted.pdf"^^xsd:string . rdfs:label "BSCT_2018_accepted.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79533 \n\nBlockchain-Based Distributed Marketplace\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Blockchain-Based Distributed Marketplace (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Blockchain-Based Distributed Marketplace (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Blockchain-Based Distributed Marketplace (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Blockchain-Based Distributed Marketplace (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Blockchain-Based Distributed Marketplace (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Blockchain-Based Distributed Marketplace (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "Developments in Blockchain technology have enabled the creation of smart contracts; i.e., self-executing code that is stored and executed on the Blockchain. This has led to the creation of distributed, decentralised applications, along with frameworks for developing and deploying them easily. This paper describes a proof-of-concept system that implements a distributed online marketplace using the Ethereum framework, where buyers and sellers can engage in e-commerce transactions without the need of a large central entity coordinating the process. The performance of the system was measured in terms of cost of use through the concept of ‘gas usage’. It was determined that such costs are significantly less than that of Amazon and eBay for high volume users. The findings generally support the ability to use Ethereum to create a distributed on-chain market, however, there are still areas that require\r\nfurther research and development."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2019-01-03"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Blockchain-Based Distributed Marketplace"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . dct:title "BSCT 2018: 1st Workshop on Blockchain and Smart Contract Technologies"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Berlin, Germany"^^xsd:string . foaf:name "Springer Nature"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Abramowicz"^^xsd:string; foaf:givenName "Witolf"^^xsd:string; foaf:name "Witolf Abramowicz"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Paschke"^^xsd:string; foaf:givenName "Adrian"^^xsd:string; foaf:name "Adrian Paschke"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kabi"^^xsd:string; foaf:givenName "Oliver R."^^xsd:string; foaf:name "Oliver R. Kabi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N. L."^^xsd:string; foaf:name "Virginia N. L. Franqueira"^^xsd:string; rdf:type foaf:Person . rdfs:label "popl19main-p8-p.pdf"^^xsd:string . rdfs:label "popl19main-p8-p.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #78086 \n\nExploring C semantics and pointer provenance\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Exploring C semantics and pointer provenance (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Exploring C semantics and pointer provenance (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Exploring C semantics and pointer provenance (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Exploring C semantics and pointer provenance (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Exploring C semantics and pointer provenance (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Exploring C semantics and pointer provenance (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "The semantics of pointers and memory objects in C has been a vexed question for many years. C values cannot be treated as either purely abstract or purely concrete entities: the language exposes their representations, but compiler optimisations rely on analyses that reason about provenance and initialisation status, not just runtime representations. The ISO WG14 standard leaves much of this unclear, and in some respects differs with de facto standard usage --- which itself is difficult to investigate.\r\n\r\nIn this paper we explore the possible source-language semantics for memory objects and pointers, in ISO C and in C as it is used and implemented in practice, focussing especially on pointer provenance. We aim to, as far as possible, reconcile the ISO C standard, mainstream compiler behaviour, and the semantics relied on by the corpus of existing C code. We present two coherent proposals, tracking provenance via integers and not; both address many design questions. We highlight some pros and cons and open questions, and illustrate the discussion with a library of test cases. We make our semantics executable as a test oracle, integrating it with the Cerberus semantics for much of the rest of C, which we have made substantially more complete and robust, and equipped with a web-interface GUI. This allows us to experimentally assess our proposals on those test cases. To assess their viability with respect to larger bodies of C code, we analyse the changes required and the resulting behaviour for a port of FreeBSD to CHERI, a research architecture supporting hardware capabilities, which (roughly speaking) traps on the memory safety violations which our proposals deem undefined behaviour. We also develop a new runtime instrumentation tool to detect possible provenance violations in normal C code, and apply it to some of the SPEC benchmarks. We compare our proposal with a source-language variant of the twin-allocation LLVM semantics proposal of Lee et al. Finally, we describe ongoing interactions with WG14, exploring how our proposals could be incorporated into the ISO standard."^^xsd:string; bibo:authorList ; bibo:issue "POPL"; bibo:status , ; bibo:volume "3"; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2019-01-02"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Exploring C semantics and pointer provenance"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Watson"^^xsd:string; foaf:givenName "Robert N.M."^^xsd:string; foaf:name "Robert N.M. Watson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Richardson"^^xsd:string; foaf:givenName "Alexander"^^xsd:string; foaf:name "Alexander Richardson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Memarian"^^xsd:string; foaf:givenName "Kayvan"^^xsd:string; foaf:name "Kayvan Memarian"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gomes"^^xsd:string; foaf:givenName "Victor B.F."^^xsd:string; foaf:name "Victor B.F. Gomes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "David"^^xsd:string; foaf:givenName "Brooks"^^xsd:string; foaf:name "Brooks David"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sewell"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Sewell"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kell"^^xsd:string; foaf:givenName "Stephen"^^xsd:string; foaf:name "Stephen Kell"^^xsd:string; rdf:type foaf:Person . bibo:issn "24751421"; foaf:name "Proceedings of the ACM on Programming Languages"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90644 \n\nFrom fine- to coarse-grained dynamic information flow control and back\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "We show that fine-grained and coarse-grained dynamic information-flow control (IFC) systems are equally expressive. To this end, we mechanize two mostly standard languages, one with a fine-grained dynamic IFC system and the other with a coarse-grained dynamic IFC system, and prove a semantics-preserving translation from each language to the other. In addition, we derive the standard security property of non-interference of each language from that of the other, via our verified translation. This result addresses a longstanding open problem in IFC: whether coarse-grained dynamic IFC techniques are less expressive than fine-grained dynamic IFC techniques (they are not!). The translations also stand to have important implications on the usability of IFC approaches. The coarse- to fine-grained direction can be used to remove the label annotation burden that fine-grained systems impose on developers, while the fine- to coarse-grained translation shows that coarse-grained systems---which are easier to design and implement---can track information as precisely as fine-grained systems and provides an algorithm for automatically retrofitting legacy applications to run on existing coarse-grained systems."^^xsd:string; bibo:authorList ; bibo:issue "POPL"; bibo:status , ; bibo:volume "3"; dct:creator , , , , ; dct:date "2019-01-02"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "From fine- to coarse-grained dynamic information flow control and back"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Association for Computing Machinery New York NY United States"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Russo"^^xsd:string; foaf:givenName "Alejandro"^^xsd:string; foaf:name "Alejandro Russo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Vassena"^^xsd:string; foaf:givenName "Marco"^^xsd:string; foaf:name "Marco Vassena"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Stefan"^^xsd:string; foaf:givenName "Deian"^^xsd:string; foaf:name "Deian Stefan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Garg"^^xsd:string; foaf:givenName "Deepak"^^xsd:string; foaf:name "Deepak Garg"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rajani"^^xsd:string; foaf:givenName "Vineet"^^xsd:string; foaf:name "Vineet Rajani"^^xsd:string; rdf:type foaf:Person . bibo:issn "24751421"; foaf:name "Proceedings of the ACM on Programming Languages"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Famous_Faces_Author_Accepted.pdf"^^xsd:string . rdfs:label "Famous_Faces_Author_Accepted.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #68555 \n\nBreakthrough Percepts of Famous Faces\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Breakthrough Percepts of Famous Faces (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Breakthrough Percepts of Famous Faces (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breakthrough Percepts of Famous Faces (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breakthrough Percepts of Famous Faces (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breakthrough Percepts of Famous Faces (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Breakthrough Percepts of Famous Faces (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 . bibo:abstract "Recently, we showed that presenting salient names (i.e. a participant’s first name) on the fringe of awareness (in Rapid Serial Visual Presentation) breaks through into awareness, resulting in the generation of a P3, which (if concealed information is presented) could be used to differentiate between deceivers and non-deceivers (Bowman et al., 2013; Bowman, Filetti, Alsufyani, Janssen, & Su, 2014). The aim of the present study was to explore whether face stimuli can be used in an ERP-based RSVP paradigm to infer recognition of broadly familiar faces. To do this, we explored whether famous faces differentially break into awareness when presented in RSVP and, importantly, whether ERPs can be used to detect these ‘breakthrough’ events on an individual basis. Our findings provide evidence that famous faces are differentially perceived and processed by participants’ brains as compared to novel (or unfamiliar) faces. EEG data revealed large differences in brain responses between these conditions."^^xsd:string; bibo:authorList ; bibo:issue "1"; bibo:status , ; bibo:volume "56"; dc:hasVersion ; dct:creator , , , , , , , ; dct:date "2019-01-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Breakthrough Percepts of Famous Faces"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "Wiley"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Filetti"^^xsd:string; foaf:givenName "Marco"^^xsd:string; foaf:name "Marco Filetti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zoumpoulaki"^^xsd:string; foaf:givenName "Alexia"^^xsd:string; foaf:name "Alexia Zoumpoulaki"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hajilou"^^xsd:string; foaf:givenName "Omid"^^xsd:string; foaf:name "Omid Hajilou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Solomon"^^xsd:string; foaf:givenName "Christopher J."^^xsd:string; foaf:name "Christopher J. Solomon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Alsufyani"^^xsd:string; foaf:givenName "Abdulmajeed"^^xsd:string; foaf:name "Abdulmajeed Alsufyani"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Alroobaea"^^xsd:string; foaf:givenName "Roobaea"^^xsd:string; foaf:name "Roobaea Alroobaea"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gibson"^^xsd:string; foaf:givenName "Stuart J."^^xsd:string; foaf:name "Stuart J. Gibson"^^xsd:string; rdf:type foaf:Person . bibo:issn "00485772"; foaf:name "Psychophysiology"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90109 \n\nEmpirical Approach to Machine Learning\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "This book provides a ‘one-stop source’ for all readers who are interested in a new, empirical approach to machine learning that, unlike traditional methods, successfully addresses the demands of today’s data-driven world. After an introduction to the fundamentals, the book discusses in depth anomaly detection, data partitioning and clustering, as well as classification and predictors. It describes classifiers of zero and first order, and the new, highly efficient and transparent deep rule-based classifiers, particularly highlighting their applications to image processing. Local optimality and stability conditions for the methods presented are formally derived and stated, while the software is also provided as supplemental, open-source material. The book will greatly benefit postgraduate students, researchers and practitioners dealing with advanced data processing, applied mathematicians, software developers of agent-oriented systems, and developers of embedded and real-time systems. It can also be used as a textbook for postgraduate coursework; for this purpose, a standalone set of lecture notes and corresponding lab session notes are available on the same website as the code."^^xsd:string; bibo:authorList ; bibo:isbn "9783030023836"; bibo:status , ; dct:creator , ; dct:date "2019-01-01"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Empirical Approach to Machine Learning"^^xsd:string; owl:sameAs , ; rdf:type bibo:Article, bibo:Book, ep:BookEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen Parvanov"^^xsd:string; foaf:name "Plamen Parvanov Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . rdfs:label "TimeDictionaryAttack.pdf"^^xsd:string . rdfs:label "TimeDictionaryAttack.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69553 \n\nWhen Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "This paper proposes the first user-independent inter-keystroke timing attacks on PINs. Our attack method is based on an inter-keystroke timing dictionary built from a human cognitive model whose parameters can be determined by a small amount of training data on any users (not necessarily the target victims). Our attacks can thus be potentially launched on a large scale in real-world settings. We investigate inter-keystroke timing attacks in different online attack settings and evaluate their performance on PINs at different strength levels. Our experimental results show that the proposed attack performs significantly better than random guessing attacks. We further demonstrate that our attacks pose a serious threat to real-world applications and propose various ways to mitigate the threat."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "80"; dc:hasVersion ; dct:creator , , , , ; dct:date "2019-01-01"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . rdf:type skos:Concept; skos:prefLabel "TK7885 Computer engineering. Computer hardware"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chang"^^xsd:string; foaf:givenName "Bing"^^xsd:string; foaf:name "Bing Chang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Deng"^^xsd:string; foaf:givenName "Robert H."^^xsd:string; foaf:name "Robert H. Deng"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Liu"^^xsd:string; foaf:givenName "Ximing"^^xsd:string; foaf:name "Ximing Liu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Yingjiu"^^xsd:string; foaf:name "Yingjiu Li"^^xsd:string; rdf:type foaf:Person . bibo:issn "01674048"; foaf:name "Computers and Security"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #69500 \n\nCybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit (Other)"^^xsd:string . rdf:_1 . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . , , , ; bibo:abstract "Cybercrime is a significant challenge to society, but it can be particularly harmful to the individuals who become victims. This chapter engages in a comprehensive and topical analysis of the cybercrimes that target individuals. It also examines the motivation of criminals that perpetrate such attacks and the key human factors and psychological aspects that help to make cybercriminals successful. Key areas assessed include social engineering (e.g., phishing, romance scams, catfishing), online harassment (e.g., cyberbullying, trolling, revenge porn, hate crimes), identity-related crimes (e.g., identity theft, doxing), hacking (e.g., malware, cryptojacking, account hacking), and denial-of-service crimes. As a part of its contribution, the chapter introduces a summary taxonomy of cybercrimes against individuals and a case for why they will continue to occur if concerted interdisciplinary efforts are not pursued."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; dc:hasVersion ; dct:creator ; dct:date "2019-01-01"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Oxford University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Kuss"^^xsd:string; foaf:givenName "Daria J."^^xsd:string; foaf:name "Daria J. Kuss"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Attrill-Smith"^^xsd:string; foaf:givenName "Alison"^^xsd:string; foaf:name "Alison Attrill-Smith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fullwood"^^xsd:string; foaf:givenName "Chris"^^xsd:string; foaf:name "Chris Fullwood"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Keep"^^xsd:string; foaf:givenName "Melanie"^^xsd:string; foaf:name "Melanie Keep"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . rdfs:label "OHCP-Group-element-of-cybercrime-DRAFT2.pdf"^^xsd:string . rdfs:label "OHCP-Group-element-of-cybercrime-DRAFT2.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69501 \n\nThe Group Element of Cybercrime: Types, Dynamics, and Criminal Operations\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . , , , ; bibo:abstract "While cybercrime can often be an individual activity pursued by lone hackers, it has increasingly grown into a group activity, with networks across the world. This chapter critically examines the group element of cybercrime from several perspectives. It identifies the platforms that online groups - cybercriminal and otherwise - use to interact, and considers groups as both perpetrators and victims of cybercrime. A key novelty is the discovery of new types of online groups whose collective actions border on criminality. The chapter also analyzes how online cybercrime groups form, organize, and operate. It explores issues such as trust, motives, and means, and draws on several poignant examples, from Anonymous to LulzSec, to illustrate the arguments."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2019-01-01"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Oxford University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Keep"^^xsd:string; foaf:givenName "Melanie"^^xsd:string; foaf:name "Melanie Keep"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Attrill-Smith"^^xsd:string; foaf:givenName "Alison"^^xsd:string; foaf:name "Alison Attrill-Smith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fullwood"^^xsd:string; foaf:givenName "Chris"^^xsd:string; foaf:name "Chris Fullwood"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bada"^^xsd:string; foaf:givenName "Maria"^^xsd:string; foaf:name "Maria Bada"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kuss"^^xsd:string; foaf:givenName "Daria J."^^xsd:string; foaf:name "Daria J. Kuss"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90400 \n\nBlind estimation of long and short Pseudo-random codes in multi-rate LSC-DS-CDMA signals\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Aiming at the problem of blind estimation of pseudo-noise codes in multi-rate long and short codes direct sequence code division multiple access signal, in this paper, a novel codes estimation method based on Fast-ICA algorithm and sequences properties is proposed in this paper. The received signal is firstly segmented twice according to its maximum long scrambling code period and minimum spreading code period. Each user’s composite code fragments consisting of long and short codes are separated by Fast-ICA algorithm. Then the user's long and short codes are estimated in descending order of the data rate, and the specific steps are as follows. Firstly, the separated composite code fragments make up the fuzzy sequences, and the double delay-and-multiply method is used to eliminate the order fuzzy and spread code interference. Secondly, combined with cyclotomic cosets and triple correlation properties, the method of feature information matching is used to estimate the long scrambling codes of all users with the same data rate. Meanwhile, the short spread codes are estimated by correlation operation. Lastly, all the estimated users’ composite code fragments are deleted by using similarity matrix, fuzzy sequences are reconstructed, and three steps above are repeated until all users’ long and short codes are estimated. Simulation results show the effectiveness of the proposed method."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "13"; dct:creator , , , ; dct:date "2019-01-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Blind estimation of long and short Pseudo-random codes in multi-rate LSC-DS-CDMA signals"^^xsd:string; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Naun"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Zhao"^^xsd:string; foaf:givenName "Z."^^xsd:string; foaf:name "Z. Zhao"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jiang"^^xsd:string; foaf:givenName "Xianyang"^^xsd:string; foaf:name "Xianyang Jiang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Qiang"^^xsd:string; foaf:givenName "Fangfang"^^xsd:string; foaf:name "Fangfang Qiang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "19984464"; foaf:name "International Journal of Circuits, Systems and Signal Processing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Brain_Proportional_Recovery_Accepted_Version.pdf"^^xsd:string . rdfs:label "Brain_Proportional_Recovery_Accepted_Version.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69746 \n\nRecovery After Stroke: Not So Proportional After All?\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Recovery After Stroke: Not So Proportional After All? (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Recovery After Stroke: Not So Proportional After All? (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Recovery After Stroke: Not So Proportional After All? (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Recovery After Stroke: Not So Proportional After All? (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Recovery After Stroke: Not So Proportional After All? (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Recovery After Stroke: Not So Proportional After All? (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "The proportional recovery rule asserts that most stroke survivors recover a fixed proportion of lost function. To the extent that this is true, recovery from stroke can be predicted accurately from baseline measures of acute post-stroke impairment alone. Reports that baseline scores explain more\r\nthan 80%, and sometimes more than 90%, of the variance in the patients’ recoveries, are rapidly accumulating. Here, we show that these headline effect sizes are likely inflated. The key effects in this literature are typically expressed as, or reducible to, correlation\r\ncoefficients between baseline scores and recovery (outcome scores minus baseline scores). Using formal analyses and simulations, we show that these correlations will be extreme when outcomes are less variable than baselines, which they often will be in practice regardless of the real relationship between outcomes and baselines. We show that these effect sizes are likely to be over optimistic in every empirical study that we found, which reported enough information for us to make the judgement, and argue that the same is likely to be true in other studies as well. The implication is that recovery after stroke may not be as proportional as recent studies suggest."^^xsd:string; bibo:authorList ; bibo:issue "1"; bibo:status , ; bibo:volume "142"; dc:hasVersion ; dct:creator , , , , , ; dct:date "2019-01"; dct:isPartOf , ; dct:publisher ; dct:title "Recovery After Stroke: Not So Proportional After All?"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Oxford University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Rotshtein"^^xsd:string; foaf:givenName "Pia"^^xsd:string; foaf:name "Pia Rotshtein"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Leff"^^xsd:string; foaf:givenName "Alex P."^^xsd:string; foaf:name "Alex P. Leff"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Price"^^xsd:string; foaf:givenName "Cathy J."^^xsd:string; foaf:name "Cathy J. Price"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hope"^^xsd:string; foaf:givenName "Thomas M.H."^^xsd:string; foaf:name "Thomas M.H. Hope"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Friston"^^xsd:string; foaf:givenName "Karl J."^^xsd:string; foaf:name "Karl J. Friston"^^xsd:string; rdf:type foaf:Person . bibo:issn "00068950"; foaf:name "Brain"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "16THESIS_GPARISH_CORRECTED.pdf"^^xsd:string . rdfs:label "16THESIS_GPARISH_CORRECTED.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #83107 \n\nFunctional Brain Oscillations: How Oscillations Facilitate Information Representation and Code Memories\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Functional Brain Oscillations: How Oscillations Facilitate Information Representation and Code Memories (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Functional Brain Oscillations: How Oscillations Facilitate Information Representation and Code Memories (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Functional Brain Oscillations: How Oscillations Facilitate Information Representation and Code Memories (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Functional Brain Oscillations: How Oscillations Facilitate Information Representation and Code Memories (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Functional Brain Oscillations: How Oscillations Facilitate Information Representation and Code Memories (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Functional Brain Oscillations: How Oscillations Facilitate Information Representation and Code Memories (Other)"^^xsd:string . rdf:_1 . ; bibo:abstract "The overall aim of the modelling works within this thesis is to lend theoretical evidence to empirical findings from the brain oscillations literature. We therefore hope to solidify and expand the notion that precise spike timing through oscillatory mechanisms facilitates communication, learning, information processing and information representation within the brain. The primary hypothesis of this thesis is that it can be shown computationally that neural de-synchronisations can allow information content to emerge. We do this using two neural network models, the first of which shows how differential rates of neuronal firing can indicate when a single item is being actively represented. The second model expands this notion by creating a complimentary timing mechanism, thus enabling the emergence of qualitive temporal information when a pattern of items is being actively represented. The secondary hypothesis of this thesis is that it can be also be shown computationally that oscillations might play a functional role in learning. Both of the models presented within this thesis propose a sparsely coded and fast learning hippocampal region that engages in the binding of novel episodic information. The first model demonstrates how active cortical representations enable learning to occur in their hippocampal counterparts via a phase-dependent learning rule. The second model expands this notion, creating hierarchical temporal sequences to encode the relative temporal position of cortical representations. We demonstrate in both of these models, how cortical brain oscillations might provide a gating function to the representation of information, whilst complimentary hippocampal oscillations might provide distinct phasic reference points for learning."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2019-01"; dct:isPartOf ; dct:issuer , ; dct:subject ; dct:title "Functional Brain Oscillations: How Oscillations Facilitate Information Representation and Code Memories"^^xsd:string; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science (General)"@en . dct:isPartOf ; foaf:name "Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Parish"^^xsd:string; foaf:givenName "George Michael"^^xsd:string; foaf:name "George Michael Parish"^^xsd:string; rdf:type foaf:Person . rdfs:label "forewordSEVIS_rdelemos_04RDL.pdf"^^xsd:string . rdfs:label "forewordSEVIS_rdelemos_04RDL.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67032 \n\nForeword\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Foreword (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Foreword (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Foreword (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Foreword (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Foreword (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Foreword (Other)"^^xsd:string . rdf:_1 . rdf:_1 ; rdf:_2 ; rdf:_3 . , , ; bibo:authorList ; bibo:editorList ; bibo:status , ; dc:hasVersion ; dct:creator ; dct:date "2019-01"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Foreword"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "CRC Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Maxim"^^xsd:string; foaf:givenName "Bruce"^^xsd:string; foaf:name "Bruce Maxim"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mistrík"^^xsd:string; foaf:givenName "Ivan"^^xsd:string; foaf:name "Ivan Mistrík"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Galster"^^xsd:string; foaf:givenName "Matthias"^^xsd:string; foaf:name "Matthias Galster"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Lemos"^^xsd:string; foaf:givenName "Rogerio"^^xsd:string; foaf:name "Rogerio de Lemos"^^xsd:string; rdf:type foaf:Person . rdfs:label "vmil-camera-ready-submitted.pdf"^^xsd:string . rdfs:label "vmil-camera-ready-submitted.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #76576 \n\nTowards seamless interfacing between dynamic languages and native code\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Towards seamless interfacing between dynamic languages and native code (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Towards seamless interfacing between dynamic languages and native code (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards seamless interfacing between dynamic languages and native code (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards seamless interfacing between dynamic languages and native code (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards seamless interfacing between dynamic languages and native code (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Towards seamless interfacing between dynamic languages and native code (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Existing approaches to interfacing high- and low-level code push considerable burdens onto the programmer, such as wrapper maintenance, explicit code generation, interface re-declaration, and/or signalling to garbage collectors. We note that run-time information on data layout and allocations in native code is available, and may be extended with knowledge of object lifetimes to assist in automating garbage collection. We describe work in progress towards an extension of the CPython virtual machine along these lines. We report initial experience building a first working prototype,and some early performance experiments."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2019"; dct:isPartOf ; dct:publisher ; dct:title "Towards seamless interfacing between dynamic languages and native code"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "VMIL 2019: International Workshop on Virtual Machines and Intermediate Languages"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Athens, Greece"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bertholon"^^xsd:string; foaf:givenName "Guillaume"^^xsd:string; foaf:name "Guillaume Bertholon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kell"^^xsd:string; foaf:givenName "Stephen"^^xsd:string; foaf:name "Stephen Kell"^^xsd:string; rdf:type foaf:Person . rdfs:label "pirasa.pdf"^^xsd:string . rdfs:label "pirasa.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "Hopkins2018_Article_PirasaStrategicProtocolSelecti.pdf"^^xsd:string . rdfs:label "Hopkins2018_Article_PirasaStrategicProtocolSelecti.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67446 \n\nPirasa: strategic protocol selection for e-commerce agents\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Pirasa: strategic protocol selection for e-commerce agents (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Pirasa: strategic protocol selection for e-commerce agents (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Pirasa: strategic protocol selection for e-commerce agents (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Pirasa: strategic protocol selection for e-commerce agents (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Pirasa: strategic protocol selection for e-commerce agents (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Pirasa: strategic protocol selection for e-commerce agents (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Pirasa: strategic protocol selection for e-commerce agents (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Pirasa: strategic protocol selection for e-commerce agents (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Pirasa: strategic protocol selection for e-commerce agents (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Pirasa: strategic protocol selection for e-commerce agents (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Pirasa: strategic protocol selection for e-commerce agents (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Pirasa: strategic protocol selection for e-commerce agents (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "We present Pirasa: an agent-based simulation environment for studying how autonomous agents can best interact with each other to exchange goods in e-commerce marketplaces. A marketplace in Pirasa enables agents to enact buyer or seller roles and select from sales, auction, and negotiation protocols to achieve the individual goals of their users. An agent's strategy to maximize its utility in the marketplace is guided by its user's preferences and constraints such as `maximum price' and `deadline', as well as an agent's personality attributes, e.g., how `eager' or `late' the agent can be for exchanging goods and whether the agent is a `spender' or `saver' in an exchange. To guide the agent's actions selected by a strategy, we use the notion of electronic contracts formulated as regulatory norms. In this context, we present how Pirasa is organized with regards to seller processes for goods submission, the inclusion of buyer preferences, and the management of transactions through specialized broker agents. Using randomized simulations, we demonstrate how a buyer agent can strategically select the most suitable protocol to satisfy its user's preferences, goals and constraints in dynamically changing market settings. The generated simulation data can be leveraged by researchers to analyze agent behaviors, and develop additional strategies."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "29"; dc:hasVersion , ; dct:creator , , , ; dct:date "2019"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Pirasa: strategic protocol selection for e-commerce agents"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "HF5548.32 E-commerce"@en . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76.E95 Expert Systems (Intelligent Knowledge Based Systems) "@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hopkins"^^xsd:string; foaf:givenName "Jack"^^xsd:string; foaf:name "Jack Hopkins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Alrayes"^^xsd:string; foaf:givenName "Bedour"^^xsd:string; foaf:name "Bedour Alrayes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Stathis"^^xsd:string; foaf:givenName "Kostas"^^xsd:string; foaf:name "Kostas Stathis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kafalı"^^xsd:string; foaf:givenName "Özgur"^^xsd:string; foaf:name "Özgur Kafalı"^^xsd:string; rdf:type foaf:Person . bibo:issn "10196781"; foaf:name "Electronic Markets"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "ACL_2019___vMF_embeddings.pdf"^^xsd:string . rdfs:label "ACL_2019___vMF_embeddings.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #74583 \n\nWord and Document Embedding with vMF-Mixture Priors on Context Word Vectors\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Word and Document Embedding with vMF-Mixture Priors on Context Word Vectors (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Word and Document Embedding with vMF-Mixture Priors on Context Word Vectors (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Word and Document Embedding with vMF-Mixture Priors on Context Word Vectors (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Word and Document Embedding with vMF-Mixture Priors on Context Word Vectors (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Word and Document Embedding with vMF-Mixture Priors on Context Word Vectors (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Word and Document Embedding with vMF-Mixture Priors on Context Word Vectors (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Word embedding models typically learn two types of vectors: target word vectors and context word vectors. These vectors are normally learned such that they are predictive of some word co-occurrence statistic, but they are otherwise unconstrained. However, the words from a given language can be organized in various natural groupings, such as syntactic word classes (e.g. nouns, adjectives, verbs) and semantic themes (e.g. sports, politics, sentiment). Our hypothesis in this paper is that embedding models can be improved by explicitly imposing a cluster structure on the set of context word vectors. To this end, our model relies on the assumption that context word vectors are drawn from a mixture of von Mises- Fisher (vMF) distributions, where the parameters of this mixture distribution are jointly optimized with the word vectors. We show that this results in word vectors which are qualitatively different from those obtained with existing word embedding models. We furthermore show that our embedding model can also be used to learn high-quality document representations."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2019"; dct:isPartOf ; dct:publisher ; dct:title "Word and Document Embedding with vMF-Mixture Priors on Context Word Vectors"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "The 57th Annual Meeting of the Association for Computational Linguistics (ACL)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Florence, Italy"^^xsd:string . foaf:name "ACL"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Jameel"^^xsd:string; foaf:givenName "Shoaib"^^xsd:string; foaf:name "Shoaib Jameel"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Schockaert"^^xsd:string; foaf:givenName "Steven"^^xsd:string; foaf:name "Steven Schockaert"^^xsd:string; rdf:type foaf:Person . rdfs:label "1-s2.0-S0167739X19303814-main.pdf"^^xsd:string . rdfs:label "1-s2.0-S0167739X19303814-main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #75315 \n\nA cloud-agnostic queuing system to support the implementation of deadline-based application execution policies\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A cloud-agnostic queuing system to support the implementation of deadline-based application execution policies (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A cloud-agnostic queuing system to support the implementation of deadline-based application execution policies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A cloud-agnostic queuing system to support the implementation of deadline-based application execution policies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A cloud-agnostic queuing system to support the implementation of deadline-based application execution policies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A cloud-agnostic queuing system to support the implementation of deadline-based application execution policies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A cloud-agnostic queuing system to support the implementation of deadline-based application execution policies (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 . bibo:abstract "There are many scientific and commercial applications that require the execution of a large number of independent jobs resulting in significant overall execution time. Therefore, such applications typically require distributed computing infrastructures and science gateways to run efficiently and to be easily accessible for end-users. Optimising the execution of such applications in a cloud computing environment by keeping resource utilisation at minimum but still completing the experiment by a set deadline has paramount importance. As container-based technologies are becoming more widespread, support for job-queuing and auto-scaling in such environments is becoming important. Current container management technologies, such as Docker Swarm or Kubernetes, while provide auto-scaling based on resource consumption, do not support job queuing and deadline-based execution policies directly. This paper presents JQueuer, a cloud-agnostic queuing system that supports the scheduling of a large number of jobs in containerised cloud environments. The paper also demonstrates how JQueuer, when integrated with a cloud application-level orchestrator and auto-scaling framework, called MiCADO, can be used to implement deadline-based execution policies. This novel technical solution provides an important step towards the cost-optimisation of batch processing and job submission applications. In order to test and prove the effectiveness of the solution, the paper presents experimental results when executing an agent-based simulation application using the open source REPAST simulation framework."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "101"; dc:hasVersion ; dct:creator , , , , , , , , ; dct:date "2019"; dct:isPartOf , ; dct:publisher ; dct:title "A cloud-agnostic queuing system to support the implementation of deadline-based application execution policies"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Pierantoni"^^xsd:string; foaf:givenName "Gabriele"^^xsd:string; foaf:name "Gabriele Pierantoni"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Anagnostou"^^xsd:string; foaf:givenName "Anastasia"^^xsd:string; foaf:name "Anastasia Anagnostou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kovacs"^^xsd:string; foaf:givenName "Jozsef"^^xsd:string; foaf:name "Jozsef Kovacs"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kiss"^^xsd:string; foaf:givenName "Tamas"^^xsd:string; foaf:name "Tamas Kiss"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Terstyanszky"^^xsd:string; foaf:givenName "Gabor"^^xsd:string; foaf:name "Gabor Terstyanszky"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Taylor"^^xsd:string; foaf:givenName "Simon J.E."^^xsd:string; foaf:name "Simon J.E. Taylor"^^xsd:string; rdf:type foaf:Person . foaf:familyName "DesLauriers"^^xsd:string; foaf:givenName "James"^^xsd:string; foaf:name "James DesLauriers"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gesmier"^^xsd:string; foaf:givenName "Gregoire"^^xsd:string; foaf:name "Gregoire Gesmier"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Oun"^^xsd:string; foaf:givenName "Osama Abu"^^xsd:string; foaf:name "Osama Abu Oun"^^xsd:string; rdf:type foaf:Person . bibo:issn "0167739X"; foaf:name "Future Generation Computer Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Michelmann et al_Nature Human Behavior -Author_accepted_version_inclFigs.pdf"^^xsd:string . rdfs:label "Michelmann et al_Nature Human Behavior -Author_accepted_version_inclFigs.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #71430 \n\nSpeed of time-compressed forward replay flexibly changes in human episodic memory\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Speed of time-compressed forward replay flexibly changes in human episodic memory (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Speed of time-compressed forward replay flexibly changes in human episodic memory (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Speed of time-compressed forward replay flexibly changes in human episodic memory (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Speed of time-compressed forward replay flexibly changes in human episodic memory (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Speed of time-compressed forward replay flexibly changes in human episodic memory (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Speed of time-compressed forward replay flexibly changes in human episodic memory (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Remembering information from continuous past episodes is a complex task. On the one hand, we must be able to recall events in a highly accurate way that often includes exact timing; on the other hand, we can ignore irrelevant details and skip to events of interest. We here track continuous episodes, consisting of different sub-events, as they are recalled from memory. In behavioral and MEG data, we show that memory replay is temporally compressed and proceeds in a forward direction. Neural replay is characterized by the reinstatement of temporal patterns from encoding. These fragments of activity reappear on a compressed timescale. Herein, the replay of sub-events takes longer than the transition from one sub-event to another. This identifies episodic memory replay as a dynamic process in which participants replay fragments of fine-grained temporal patterns and are able to skip flexibly across sub-events."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "3"; dc:hasVersion ; dct:creator , , , ; dct:date "2019"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Speed of time-compressed forward replay flexibly changes in human episodic memory"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "Springer Nature"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hanslmayr"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Hanslmayr"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Michelmann"^^xsd:string; foaf:givenName "Sebastian"^^xsd:string; foaf:name "Sebastian Michelmann"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Staresina"^^xsd:string; foaf:givenName "Bernhard"^^xsd:string; foaf:name "Bernhard Staresina"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:name "Nature Human Behavior"^^xsd:string; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "ECTA_2019_13.pdf"^^xsd:string . rdfs:label "ECTA_2019_13.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77371 \n\nUsing Population-based Metaheuristics and Trend Representative Testing to Compose Strategies for Market Timing\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Using Population-based Metaheuristics and Trend Representative Testing to Compose Strategies for Market Timing (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Using Population-based Metaheuristics and Trend Representative Testing to Compose Strategies for Market Timing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Population-based Metaheuristics and Trend Representative Testing to Compose Strategies for Market Timing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Population-based Metaheuristics and Trend Representative Testing to Compose Strategies for Market Timing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Population-based Metaheuristics and Trend Representative Testing to Compose Strategies for Market Timing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Population-based Metaheuristics and Trend Representative Testing to Compose Strategies for Market Timing (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Using Population-based Metaheuristics and Trend Representative Testing to Compose Strategies for Market Timing (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Population-based Metaheuristics and Trend Representative Testing to Compose Strategies for Market Timing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Population-based Metaheuristics and Trend Representative Testing to Compose Strategies for Market Timing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Population-based Metaheuristics and Trend Representative Testing to Compose Strategies for Market Timing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using Population-based Metaheuristics and Trend Representative Testing to Compose Strategies for Market Timing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Using Population-based Metaheuristics and Trend Representative Testing to Compose Strategies for Market Timing (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Market Timing is the capacity of deciding when to buy or sell a given asset on a financial market. Market Timing strategies are usually composed of components that process market context and return a recommendation whether to buy or sell. The main issues with composing market timing strategies are twofold: (i) selecting the signal generating components; and (ii) tuning their parameters. In previous work, researchers usually attempt to either tune the parameters of a set of components or select amongst a number of components with predetermined parameter values. In this paper, we approach market timing as one integrated problem and propose to solve it with two variants of Particle Swarm Optimization (PSO). We compare the performance of PSO against a Genetic Algorithm (GA), the most widely used metaheuristic in the domain of market timing. We also propose the use of trend representative testing to circumvent the issue of overfitting commonly associated with step-forward testing. Results show PSO to be competitive with GA, and that trend representative testing is an effective method of exposing strategies to various market conditions during training and testing."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion , ; dct:creator , ; dct:date "2019"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Using Population-based Metaheuristics and Trend Representative Testing to Compose Strategies for Market Timing"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "11th International Joint Conference on Computational Intelligence (IJCCI 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Vienna, Austria"^^xsd:string . foaf:name "SciTePress"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando E.B."^^xsd:string; foaf:name "Fernando E.B. Otero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mohamed"^^xsd:string; foaf:givenName "Ismail"^^xsd:string; foaf:name "Ismail Mohamed"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #67031 \n\nChallenges in Engineering Self-adaptive Authorisation Infrastructures\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Challenges in Engineering Self-adaptive Authorisation Infrastructures (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Challenges in Engineering Self-adaptive Authorisation Infrastructures (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Challenges in Engineering Self-adaptive Authorisation Infrastructures (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Challenges in Engineering Self-adaptive Authorisation Infrastructures (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Challenges in Engineering Self-adaptive Authorisation Infrastructures (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Challenges in Engineering Self-adaptive Authorisation Infrastructures (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 . , , , , , , , ; bibo:abstract "As organisations expand and interconnect, authorisation infrastructures become increasingly difficult to manage. Several solutions have been proposed, including self-adaptive authorisation, where the access control policies are dynamically adapted at run-time to respond to misuse and malicious behaviour. The ultimate goal of self-adaptive authorisation is to reduce human intervention, make authorisation infrastructures more responsive to malicious behaviour. In this chapter, we scope and define the emerging area of self-adaptive authorisation by describing some of its developments, trends and challenges. For that, we start by identifying key concepts related to access control and authorisation infrastructures, and provide a brief introduction to self-adaptive software systems, which provides the foundation for investigating how self-adaptation can enable the enforcement of authorisation policies. The outcome of this study is the identification of several technical challenges related to self-adaptive authorisation, which are classified according to the different stages of a feedback control loop."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; dct:creator , , ; dct:date "2019"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Challenges in Engineering Self-adaptive Authorisation Infrastructures"^^xsd:string; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Yu"^^xsd:string; foaf:givenName "Y."^^xsd:string; foaf:name "Y. Yu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Muller"^^xsd:string; foaf:givenName "H."^^xsd:string; foaf:name "H. Muller"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mylopoulos"^^xsd:string; foaf:givenName "J."^^xsd:string; foaf:name "J. Mylopoulos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nuseibeh"^^xsd:string; foaf:givenName "B."^^xsd:string; foaf:name "B. Nuseibeh"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bailey"^^xsd:string; foaf:givenName "Christopher"^^xsd:string; foaf:name "Christopher Bailey"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Montrieux"^^xsd:string; foaf:givenName "Lionel"^^xsd:string; foaf:name "Lionel Montrieux"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Honiden"^^xsd:string; foaf:givenName "S."^^xsd:string; foaf:name "S. Honiden"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hu"^^xsd:string; foaf:givenName "Z."^^xsd:string; foaf:name "Z. Hu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bandara"^^xsd:string; foaf:givenName "A."^^xsd:string; foaf:name "A. Bandara"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tamai"^^xsd:string; foaf:givenName "T."^^xsd:string; foaf:name "T. Tamai"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Lemos"^^xsd:string; foaf:givenName "Rogerio"^^xsd:string; foaf:name "Rogerio de Lemos"^^xsd:string; rdf:type foaf:Person . rdfs:label "mscs-fpc.pdf"^^xsd:string . rdfs:label "mscs-fpc.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69685 \n\nDenotational semantics of recursive types in synthetic guarded domain theory\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Denotational semantics of recursive types in synthetic guarded domain theory (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Denotational semantics of recursive types in synthetic guarded domain theory (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Denotational semantics of recursive types in synthetic guarded domain theory (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Denotational semantics of recursive types in synthetic guarded domain theory (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Denotational semantics of recursive types in synthetic guarded domain theory (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Denotational semantics of recursive types in synthetic guarded domain theory (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Just like any other branch of mathematics, denotational semantics of programming languages should be formalised in type theory, but adapting traditional domain theoretic semantics, as originally formulated in classical set theory to type theory has proven challenging. This paper is part of a project on formulating denotational semantics in type theories with guarded recursion. This should have the benefit of not only giving simpler semantics and proofs of properties such as adequacy, but also hopefully in the future to scale to languages with advanced features, such as general references, outside the reach of traditional domain theoretic techniques. Working in Guarded Dependent Type Theory (GDTT), we develop denotational semantics for FPC, the simply typed lambda calculus extended with recursive types, modelling the recursive types of FPC using the guarded recursive types of GDTT. We prove soundness and computational adequacy of the model in GDTT using a logical relation between syntax and semantics constructed also using guarded recursive types. The denotational semantics is intensional in the sense that it counts the number of unfold-fold reductions needed to compute the value of a term, but we construct a relation relating the denotations of extensionally equal terms, i.e., pairs of terms that compute the same value in a different number of steps. Finally we show how the denotational semantics of terms can be executed inside type theory and prove that executing the denotation of a boolean term computes the same value as the operational semantics of FPC."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "29"; dc:hasVersion ; dct:creator , ; dct:date "2019"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Denotational semantics of recursive types in synthetic guarded domain theory"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 9 Formal systems, logics"@en . foaf:name "Cambridge University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Paviotti"^^xsd:string; foaf:givenName "Marco"^^xsd:string; foaf:name "Marco Paviotti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Møgelberg"^^xsd:string; foaf:givenName "Rasmus"^^xsd:string; foaf:name "Rasmus Møgelberg"^^xsd:string; rdf:type foaf:Person . bibo:issn "09601295"; foaf:name "Mathematical Structures in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "SEVIS_Taxonomy(1).pdf"^^xsd:string . rdfs:label "SEVIS_Taxonomy(1).pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66574 \n\nRealising Variability in Dynamic Software Product Line Solutions\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Realising Variability in Dynamic Software Product Line Solutions (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Realising Variability in Dynamic Software Product Line Solutions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Realising Variability in Dynamic Software Product Line Solutions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Realising Variability in Dynamic Software Product Line Solutions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Realising Variability in Dynamic Software Product Line Solutions (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Realising Variability in Dynamic Software Product Line Solutions (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Modern systems need to be able to self-adapt to changes in user needs, and changes affecting the system itself or its environment. Dynamic software product line (DSPL) is an engineering approach for developing self-adaptive systems based on commonalities and variabilities for a family of similar systems. Currently, many DSPL approaches fail to meet all adaptability requirements, and in many cases, they are developed in a such unstructured manner that the controller is not explicitly represented, for example. We specify a two-dimension taxonomy to address basic technical issues for realising variability in DSPLs. The self-adaptation dimension classifies the different design choices for the adaptability requirements. The DSPL variability dimension classifies different design choices for implementing variability schemes and for creating different kinds of feature models. Our study was substantiated by surveying several DSPL approaches, and evaluating and comparing their different design strategies. We also summarise practical issues and difficulties, identify major trends in actual DSPL proposals, and suggest directions for future."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2019"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Realising Variability in Dynamic Software Product Line Solutions"^^xsd:string; ep:hasDocument , , , , , ; ep:hasSubmitted ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . foaf:name "CRC Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "de França"^^xsd:string; foaf:givenName "Breno B. N."^^xsd:string; foaf:name "Breno B. N. de França"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rubira"^^xsd:string; foaf:givenName "Cecilia M. F."^^xsd:string; foaf:name "Cecilia M. F. Rubira"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sandim Eleutério"^^xsd:string; foaf:givenName "Jane D. A."^^xsd:string; foaf:name "Jane D. A. Sandim Eleutério"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Lemos"^^xsd:string; foaf:givenName "Rogerio"^^xsd:string; foaf:name "Rogerio de Lemos"^^xsd:string; rdf:type foaf:Person . rdfs:label "Brit-J-Oral-Maxilofacial-Survery-2019-Tighe-accepted.pdf"^^xsd:string . rdfs:label "Brit-J-Oral-Maxilofacial-Survery-2019-Tighe-accepted.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77045 \n\nMachine learning methods applied to audit of surgical outcomes after treatment for cancer of the head and neck\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Machine learning methods applied to audit of surgical outcomes after treatment for cancer of the head and neck (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Machine learning methods applied to audit of surgical outcomes after treatment for cancer of the head and neck (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine learning methods applied to audit of surgical outcomes after treatment for cancer of the head and neck (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine learning methods applied to audit of surgical outcomes after treatment for cancer of the head and neck (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine learning methods applied to audit of surgical outcomes after treatment for cancer of the head and neck (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Machine learning methods applied to audit of surgical outcomes after treatment for cancer of the head and neck (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Most surgical specialties have attempted to address concerns about unfair comparison of outcomes by “risk-adjusting” data to benchmark specialty-specific outcomes that are indicative of the quality of care. We are building on previous work in head and neck surgery to address the current need for a robust validated means of risk adjustment. A dataset of care episodes, which were recorded as a clinical audit of complications after operations for squamous cell carcinoma (SCC) of the head and neck (n = 1254), was analysed with the Waikarto Environment for Knowledge Analysis (WEKA) machine learning tool. This produced 4 classification models that could predict complications using data on the preoperative demographics of the patients, operation, functional status, and tumour stage. Three of them performed acceptably: one that predicted “any complication” within 30 days (area under the receiver operating characteristic curve (AUROC) 0.72), one that predicted severe complications (Clavien-Dindo grade 3 or above) within 30 days (AUROC 0.70), and one that predicted a prolonged duration of hospital stay of more than 15 days, (AUROC 0.81). The final model, which was developed on a subgroup of patients who had free tissue transfer (n = 443), performed poorly (AUROC 0.59). Subspecialty groups within oral and maxillofacial surgery are seeking metrics that will allow a meaningful comparison of the quality of care delivered by surgical units in the UK. For these metrics to be effective they must show variation between units and be amendable to change by service personnel. Published baseline data must also be available. They should be modelled effectively so that meaningful comparison, which takes account of variations in the complexity of the patients’ needs or care, is possible."^^xsd:string; bibo:authorList ; bibo:issue "8"; bibo:status , ; bibo:volume "57"; dc:hasVersion ; dct:creator , , ; dct:date "2019"; dct:isPartOf , ; dct:publisher ; dct:title "Machine learning methods applied to audit of surgical outcomes after treatment for cancer of the head and neck"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Lewis-Morris"^^xsd:string; foaf:givenName "T."^^xsd:string; foaf:name "T. Lewis-Morris"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tighe"^^xsd:string; foaf:givenName "D."^^xsd:string; foaf:name "D. Tighe"^^xsd:string; rdf:type foaf:Person . bibo:issn "02664356"; foaf:name "British Journal of Oral and Maxillofacial Surgery"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "version8.pdf"^^xsd:string . rdfs:label "version8.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69101 \n\nImproved Conditional Generative Adversarial Net Classification For Spoken Language Recognition\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Improved Conditional Generative Adversarial Net Classification For Spoken Language Recognition (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Improved Conditional Generative Adversarial Net Classification For Spoken Language Recognition (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improved Conditional Generative Adversarial Net Classification For Spoken Language Recognition (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improved Conditional Generative Adversarial Net Classification For Spoken Language Recognition (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improved Conditional Generative Adversarial Net Classification For Spoken Language Recognition (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improved Conditional Generative Adversarial Net Classification For Spoken Language Recognition (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Recent research on generative adversarial nets (GAN) for language identification (LID) has shown promising results. In this paper, we further exploit the latent abilities of GAN networks to firstly combine them with deep neural network (DNN)-based i-vector approaches and then to improve the LID model using conditional generative adversarial net (cGAN) classification. First, phoneme dependent deep bottleneck features (DBF) combined with output posteriors of a pre-trained DNN for automatic speech recognition (ASR) are used to extract i-vectors in the normal way. These i-vectors are then classified using cGAN, and we show an effective method within the cGAN to optimize parameters by combining both language identification and verification signals as supervision. Results show firstly that cGAN methods can significantly outperform DBF DNN i-vector methods where 49-dimensional i-vectors are used, but not where 600-dimensional vectors are used. Secondly, training a cGAN discriminator network for direct classification has further benefit for low dimensional i-vectors as well as short utterances with high dimensional i-vectors. However, incorporating a dedicated discriminator network output layer for classification and optimizing both classification and verification loss brings benefits in all test cases."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2018-12-18"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Improved Conditional Generative Adversarial Net Classification For Spoken Language Recognition"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "The 7th IEEE Workshop on Spoken Language Technology (SLT)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Athens, Greece"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Yan"^^xsd:string; foaf:givenName "Yonghong"^^xsd:string; foaf:name "Yonghong Yan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yao"^^xsd:string; foaf:givenName "Shengyu"^^xsd:string; foaf:name "Shengyu Yao"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Miao"^^xsd:string; foaf:givenName "Xiaoxiao"^^xsd:string; foaf:name "Xiaoxiao Miao"^^xsd:string; rdf:type foaf:Person . rdfs:label "papercv.pdf"^^xsd:string . rdfs:label "papercv.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73694 \n\nMeta-Learning for Recommending Metaheuristics for the MaxSAT Problem\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Meta-Learning for Recommending Metaheuristics for the MaxSAT Problem (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Recommending Metaheuristics for the MaxSAT Problem (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Recommending Metaheuristics for the MaxSAT Problem (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Recommending Metaheuristics for the MaxSAT Problem (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Recommending Metaheuristics for the MaxSAT Problem (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Recommending Metaheuristics for the MaxSAT Problem (Other)"^^xsd:string . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Meta-Learning for Recommending Metaheuristics for the MaxSAT Problem (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Recommending Metaheuristics for the MaxSAT Problem (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Recommending Metaheuristics for the MaxSAT Problem (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Recommending Metaheuristics for the MaxSAT Problem (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Recommending Metaheuristics for the MaxSAT Problem (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Recommending Metaheuristics for the MaxSAT Problem (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "It is of great interest to build recommendation systems capable of choosing the best solver for a particular problem of a combinatorial optimisation task given past runs of solvers in various problems of that optimisation task. In this paper, a meta-learning approach is proposed to predict which metaheuristic is the best solver for MaxSAT problems. The proposal includes the creation of new meta-features derived from graph descriptions of MaxSAT problems and an interpretation of the meta-model. Our approach successfully selected the best metaheuristic to solve each problem in 87% of the cases. Also, the new meta-features have shown to be as good as the state-of-the-art meta-features, and the meta-model interpretation found interesting problem-specific knowledge."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion , ; dct:creator , , , , ; dct:date "2018-12-17"; dct:isPartOf , ; dct:publisher ; dct:title "Meta-Learning for Recommending Metaheuristics for the MaxSAT Problem"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "2018 7th Brazilian Conference on Intelligent Systems (BRACIS)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Brazil, Sao Paulo,"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Nascimento"^^xsd:string; foaf:givenName "Chrystian G. M."^^xsd:string; foaf:name "Chrystian G. M. Nascimento"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Miranda"^^xsd:string; foaf:givenName "Enrico S."^^xsd:string; foaf:name "Enrico S. Miranda"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fabris"^^xsd:string; foaf:givenName "Fabio"^^xsd:string; foaf:name "Fabio Fabris"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Oliveira"^^xsd:string; foaf:givenName "Alexandre C. M."^^xsd:string; foaf:name "Alexandre C. M. Oliveira"^^xsd:string; rdf:type foaf:Person . foaf:name "IEEE Conference on Intelligent Systems"^^xsd:string; rdf:type bibo:Collection . rdfs:label "final.pdf"^^xsd:string . rdfs:label "final.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #71418 \n\nPrivacy Protection in Tourism: Where We Are and Where We Should Be Heading For\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "The link between information privacy concerns and privacy behaviours has been a focus of extensive investigation in various disciplines. However, little attention has been devoted to this issue in the tourism literature. Spurred by technological development and shaped by tourism-related environments, emerging privacy issues call for comprehensive yet context-specific studies to ensure tourists are making beneficial privacy choices. This paper first presents a comprehensive review of state-of-the-art research on privacy concerns and behaviours. Then, it suggests a list of overarching research priorities, merging social and technical aspects of privacy protection approaches as they apply to tourism. The priorities include research to measure tourists’ privacy concerns, explore specific biases in tourists’ privacy decisions, experiment with privacy nudges, and explore how to integrate privacy nudges in system design. Thus, this paper contributes to guiding the direction of future research on privacy protection in tourism."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-12-15"; dct:isPartOf ; dct:publisher ; dct:subject , , , , , ; dct:title "Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "HE Transportation and Communications"@en . rdf:type skos:Concept; skos:prefLabel "HF5351 Business"@en . rdf:type skos:Concept; skos:prefLabel "HM Sociology"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "TK5101 Telecommunications"@en . dct:title "International Conference on Information and Communication Technologies in Tourism 2019 (ENTER 2019)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Nicosia, Cyprus"^^xsd:string . foaf:name "Springer Nature Switzerland AG"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Miller"^^xsd:string; foaf:givenName "Graham"^^xsd:string; foaf:name "Graham Miller"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tussyadiah"^^xsd:string; foaf:givenName "Iis"^^xsd:string; foaf:name "Iis Tussyadiah"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pesonen"^^xsd:string; foaf:givenName "Juho"^^xsd:string; foaf:name "Juho Pesonen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Neidhardt"^^xsd:string; foaf:givenName "Julia"^^xsd:string; foaf:name "Julia Neidhardt"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "sapphire.pdf"^^xsd:string . rdfs:label "sapphire.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67207 \n\nTransactional Sapphire: Lessons in High Performance, On-the-fly Garbage Collection\n\n"; foaf:primaryTopic . cc:license ; rdf:type bibo:Document, ep:Document; rdfs:label "Transactional Sapphire: Lessons in High Performance, On-the-fly Garbage Collection (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transactional Sapphire: Lessons in High Performance, On-the-fly Garbage Collection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transactional Sapphire: Lessons in High Performance, On-the-fly Garbage Collection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transactional Sapphire: Lessons in High Performance, On-the-fly Garbage Collection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transactional Sapphire: Lessons in High Performance, On-the-fly Garbage Collection (Other)"^^xsd:string . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Transactional Sapphire: Lessons in High Performance, On-the-fly Garbage Collection (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transactional Sapphire: Lessons in High Performance, On-the-fly Garbage Collection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transactional Sapphire: Lessons in High Performance, On-the-fly Garbage Collection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transactional Sapphire: Lessons in High Performance, On-the-fly Garbage Collection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transactional Sapphire: Lessons in High Performance, On-the-fly Garbage Collection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Transactional Sapphire: Lessons in High Performance, On-the-fly Garbage Collection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Transactional Sapphire: Lessons in High Performance, On-the-fly Garbage Collection (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Constructing a high-performance garbage collector is hard. Constructing a fully concurrent 'on-the-fly', compacting collector is much more so. We describe our experience of implementing the Sapphire algorithm as the first on-the-fly, parallel, replication copying, garbage collector for the Jikes RVM Java virtual machine. In part, we explain our innovations such as copying with hardware and software transactions, on-the-fly management of Java's reference types and simple, yet correct, lock-free management of volatile fields in a replicating collector. We fully evaluate, for the first time, and using realistic benchmarks, Sapphire's performance and suitability as a low latency collector. An important contribution of this work is a detailed description of our experience of building an on-the-fly copying collector for a complete JVM with some assurance that it is correct. A key aspect of this is model checking of critical components of this complicated and highly concurrent system."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "40"; dc:hasVersion , ; dct:creator , , ; dct:date "2018-12-10"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Transactional Sapphire: Lessons in High Performance, On-the-fly Garbage Collection"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ugawa"^^xsd:string; foaf:givenName "Tomoharu"^^xsd:string; foaf:name "Tomoharu Ugawa"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ritson"^^xsd:string; foaf:givenName "Carl G."^^xsd:string; foaf:name "Carl G. Ritson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jones"^^xsd:string; foaf:givenName "Richard E."^^xsd:string; foaf:name "Richard E. Jones"^^xsd:string; rdf:type foaf:Person . bibo:issn "01640925"; foaf:name "ACM Transactions on Programming Languages and Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Patlatzoglou_BI_2018.pdf"^^xsd:string . rdfs:label "Patlatzoglou_BI_2018.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69530 \n\nDeep Neural Networks for Automatic Classification of Anesthetic-Induced Unconsciousness\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Deep Neural Networks for Automatic Classification of Anesthetic-Induced Unconsciousness (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Deep Neural Networks for Automatic Classification of Anesthetic-Induced Unconsciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Deep Neural Networks for Automatic Classification of Anesthetic-Induced Unconsciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Deep Neural Networks for Automatic Classification of Anesthetic-Induced Unconsciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Deep Neural Networks for Automatic Classification of Anesthetic-Induced Unconsciousness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Deep Neural Networks for Automatic Classification of Anesthetic-Induced Unconsciousness (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 . bibo:abstract "Despite the common use of anesthetics to modulate consciousness in the clinic, brain-based monitoring of consciousness is uncommon. We com-bined electroencephalographic measurement of brain activity with deep neural networks to automatically discriminate anesthetic states induced by propofol. Our results with leave-one-participant-out-cross-validation show that convolutional neural networks significantly outperform multilayer perceptrons in discrimination accuracy when working with raw time series. Perceptrons achieved comparable accuracy when provided with power spec-tral densities. These findings highlight the potential of deep convolutional networks for completely automatic extraction of useful spatio-temporo-spectral features from human EEG."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , , ; dct:date "2018-12-07"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Deep Neural Networks for Automatic Classification of Anesthetic-Induced Unconsciousness"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "11th International Conference on Brain Informatics"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Arlington, Texas"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Brichant"^^xsd:string; foaf:givenName "Jean-Francois"^^xsd:string; foaf:name "Jean-Francois Brichant"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Laureys"^^xsd:string; foaf:givenName "Steven"^^xsd:string; foaf:name "Steven Laureys"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bonhomme"^^xsd:string; foaf:givenName "Vincent"^^xsd:string; foaf:name "Vincent Bonhomme"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Boly"^^xsd:string; foaf:givenName "Melanie"^^xsd:string; foaf:name "Melanie Boly"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Noirhomme"^^xsd:string; foaf:givenName "Quentin"^^xsd:string; foaf:name "Quentin Noirhomme"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gosseries"^^xsd:string; foaf:givenName "Olivia"^^xsd:string; foaf:name "Olivia Gosseries"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Patlatzoglou"^^xsd:string; foaf:givenName "Konstantinos"^^xsd:string; foaf:name "Konstantinos Patlatzoglou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chennu"^^xsd:string; foaf:givenName "Srivas"^^xsd:string; foaf:name "Srivas Chennu"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #77172 \n\nAnalytical Tools for Blockchain: Review, Taxonomy and Open Challenges\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Bitcoin has introduced a new concept that could feasibly revolutionise the entire Internet as it exists, and positively impact on many types of industries including, but not limited to, banking, public sector and supply chain. This innovation is grounded on pseudo-anonymity and strives on its innovative decentralised architecture based on the blockchain technology. Blockchain is pushing forward a race of transaction-based applications with trust establishment without the need for a centralised authority, promoting accountability and transparency within the business process. However, a blockchain ledger (e.g., Bitcoin) tend to become very complex and specialised tools, collectively called “Blockchain Analytics”, are required to allow individuals, law enforcement agencies and service providers to search, explore and visualise it. Over the last years, several analytical tools have been developed with capabilities that allow, e.g., to map relationships, examine flow of transactions and filter crime instances as a way to enhance forensic investigations. This paper discusses the current state of blockchain analytical tools and presents a thematic taxonomy model based on their applications. It also examines open challenges for future development and research."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2018-12-06"; dct:isPartOf ; dct:publisher ; dct:title "Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Glasgow, UK"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Balaskas"^^xsd:string; foaf:givenName "Anastasios"^^xsd:string; foaf:name "Anastasios Balaskas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N. L."^^xsd:string; foaf:name "Virginia N. L. Franqueira"^^xsd:string; rdf:type foaf:Person . rdfs:label "21thesis.pdf"^^xsd:string . rdfs:label "21thesis.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #76774 \n\nDiscovering Regression and Classification Rules with Monotonic Constraints Using Ant Colony Optimization\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Discovering Regression and Classification Rules with Monotonic Constraints Using Ant Colony Optimization (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Discovering Regression and Classification Rules with Monotonic Constraints Using Ant Colony Optimization (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Discovering Regression and Classification Rules with Monotonic Constraints Using Ant Colony Optimization (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Discovering Regression and Classification Rules with Monotonic Constraints Using Ant Colony Optimization (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Discovering Regression and Classification Rules with Monotonic Constraints Using Ant Colony Optimization (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Discovering Regression and Classification Rules with Monotonic Constraints Using Ant Colony Optimization (Other)"^^xsd:string . rdf:_1 . , ; bibo:abstract "Data mining is a broad area that encompasses many different tasks from the supervised classification and regression tasks to unsupervised association rule mining and clustering. A first research thread in this thesis is the introduction of new Ant Colony Optimization (ACO)-based algorithms that tackle the regression task in data mining, exploring three different learning strategies: Iterative Rule Learning, Pittsburgh and Michigan strategies. The Iterative Rule Learning strategy constructs one rule at a time, where the best rule created by the ant colony is added to the rule list at each iteration, until a complete rule list is created. In the Michigan strategy, each ant constructs a single rule and from this collection of rules a niching algorithm combines the rules to create the final rule list. Finally, in the Pittsburgh strategy each ant constructs an entire rule list at each iteration, with the best list constructed by an ant in any iteration representing the final model. The most successful Pittsburgh-based Ant-Miner-Reg_PB algorithm, among the three variants, has been shown to be competitive against a well-known regression rule induction algorithm from the literature. The second research thread pursued involved incorporating existing domain knowledge to guide the construction of models as it is rare to find new domains that nothing is known about. One type of domain knowledge that occurs frequently in real world data-sets is monotonic constraints which capture increasing or decreasing trends within the data. In this thesis, monotonic constraints have been introduced into ACO-based rule induction algorithms for both classification and regression tasks. The enforcement of monotonic constraints has been implemented as a two step process. The first is a soft constraint preference in the model construction phase. This is followed by a hard constraint post-processing pruning suite to ensure the production of monotonic models. The new algorithms presented here have been shown to maintain and improve their predictive power when compared to non-monotonic rule induction algorithms."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2018-12"; dct:isPartOf ; dct:issuer , ; dct:title "Discovering Regression and Classification Rules with Monotonic Constraints Using Ant Colony Optimization"^^xsd:string; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex"^^xsd:string; foaf:name "Alex Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando"^^xsd:string; foaf:name "Fernando Otero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Brookhouse"^^xsd:string; foaf:givenName "James"^^xsd:string; foaf:name "James Brookhouse"^^xsd:string; rdf:type foaf:Person . rdfs:label "BTOP-D-17-00185_R3.pdf"^^xsd:string . rdfs:label "BTOP-D-17-00185_R3.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "Comsa2019_Article_TransientTopographicalDynamics.pdf"^^xsd:string . rdfs:label "Comsa2019_Article_TransientTopographicalDynamics.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #70355 \n\nTransient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "As we fall sleep, our brain traverses a series of gradual changes at physiological, behavioural and cognitive levels, which are not yet fully understood. The loss of responsiveness is a critical event in the transition from wakefulness to sleep. Here we seek to understand the electrophysiological signatures that reflect the loss of capacity to respond to external stimuli during drowsiness using two complementary methods: spectral connectivity and EEG microstates. Furthermore, we integrate these two methods for the first time by investigating the connectivity patterns captured during individual microstate lifetimes. While participants performed an auditory semantic classification task, we allowed them to become drowsy and unresponsive. As they stopped responding to the stimuli, we report the breakdown of alpha networks and the emergence of theta connectivity. Further, we show that the temporal dynamics of all canonical EEG microstates slow down during unresponsiveness. We identify a specific microstate (D) whose occurrence and duration are prominently increased during this period. Employing machine learning, we show that the temporal properties of microstate D, particularly its prolonged duration, predicts the response likelihood to individual stimuli. Finally, we find a novel relationship between microstates and brain networks as we show that microstate D uniquely indexes significantly stronger theta connectivity during unresponsiveness. Our findings demonstrate that the transition to unconsciousness is not linear, but rather consists of an interplay between transient brain networks reflecting different degrees of sleep depth."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "32"; dc:hasVersion , ; dct:creator , , ; dct:date "2018-11-29"; dct:isPartOf , ; dct:publisher ; dct:title "Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bekinschtein"^^xsd:string; foaf:givenName "Tristan A."^^xsd:string; foaf:name "Tristan A. Bekinschtein"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Comsa"^^xsd:string; foaf:givenName "Iulia M."^^xsd:string; foaf:name "Iulia M. Comsa"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chennu"^^xsd:string; foaf:givenName "Srivas"^^xsd:string; foaf:name "Srivas Chennu"^^xsd:string; rdf:type foaf:Person . bibo:issn "08960267"; foaf:name "Brain Topography"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #70340 \n\nMeta'16 Workshop Special Issue\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . , ; bibo:editorList ; bibo:issue "1"; bibo:status , ; bibo:volume "17"; dct:date "2018-11-27"; dct:isPartOf , ; dct:publisher ; dct:title "Meta'16 Workshop Special Issue"^^xsd:string; rdf:type bibo:Article, ep:EPrint, ep:EdjournalEPrint; rdfs:seeAlso . foaf:name "AITO"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Gonzalez Boix"^^xsd:string; foaf:givenName "Elisa"^^xsd:string; foaf:name "Elisa Gonzalez Boix"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . foaf:name "The Journal of Object Technology"^^xsd:string; rdf:type bibo:Collection . rdfs:label "editorial.pdf"^^xsd:string . rdfs:label "editorial.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #70338 \n\nIntroduction to the Meta’16 Workshop Special Issue\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Introduction to the Meta’16 Workshop Special Issue (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Introduction to the Meta’16 Workshop Special Issue (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Introduction to the Meta’16 Workshop Special Issue (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Introduction to the Meta’16 Workshop Special Issue (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Introduction to the Meta’16 Workshop Special Issue (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Introduction to the Meta’16 Workshop Special Issue (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:authorList ; bibo:issue "1"; bibo:status , ; bibo:volume "17"; dc:hasVersion ; dct:creator , ; dct:date "2018-11-27"; dct:isPartOf , ; dct:publisher ; dct:title "Introduction to the Meta’16 Workshop Special Issue"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "AITO"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Gonzalez Boix"^^xsd:string; foaf:givenName "Elisa"^^xsd:string; foaf:name "Elisa Gonzalez Boix"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . bibo:issn "16601769"; foaf:name "Journal of Object Technology"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "ISJ Honeypot Survey.pdf"^^xsd:string . rdfs:label "ISJ Honeypot Survey.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "Honeypot Anatomy.pdf"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #64933 \n\nEnabling an Anatomic View to Investigate Honeypot Systems: A Survey\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Enabling an Anatomic View to Investigate Honeypot Systems: A Survey (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Enabling an Anatomic View to Investigate Honeypot Systems: A Survey (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling an Anatomic View to Investigate Honeypot Systems: A Survey (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling an Anatomic View to Investigate Honeypot Systems: A Survey (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling an Anatomic View to Investigate Honeypot Systems: A Survey (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling an Anatomic View to Investigate Honeypot Systems: A Survey (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Enabling an Anatomic View to Investigate Honeypot Systems: A Survey (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling an Anatomic View to Investigate Honeypot Systems: A Survey (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling an Anatomic View to Investigate Honeypot Systems: A Survey (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling an Anatomic View to Investigate Honeypot Systems: A Survey (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling an Anatomic View to Investigate Honeypot Systems: A Survey (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Enabling an Anatomic View to Investigate Honeypot Systems: A Survey (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "A honeypot is a type of security facility deliberately created to be probed, attacked, and compromised. It is often used for protecting production systems by detecting and deflecting unauthorized accesses. It is also useful for investigating the behavior of attackers, and in particular, unknown attacks. For the past 17 years plenty of effort has been invested in the research and development of honeypot techniques, and they have evolved to be an increasingly powerful means of defending against the creations of the blackhat community. In this paper, by studying a wide set of honeypots, the two essential elements of honeypots—the decoy and the captor—are captured and presented, together with two abstract organizational forms—independent and cooperative—where these two elements can be integrated. A novel decoy and captor (D-C) based taxonomy is proposed for the purpose of studying and classifying the various honeypot techniques. An extensive set of independent and cooperative honeypot projects and research that cover these techniques is surveyed under the taxonomy framework. Furthermore, two subsets of features from the taxonomy are identified, which can greatly influence the honeypot performances. These two subsets of features are applied to a number of typical independent and cooperative honeypots separately in order to validate the taxonomy and predict the honeypot development trends."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "12"; dc:hasVersion , ; dct:creator , , , ; dct:date "2018-11-22"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Enabling an Anatomic View to Investigate Honeypot Systems: A Survey"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "TK7885 Computer engineering. Computer hardware"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Du"^^xsd:string; foaf:givenName "Zhihui"^^xsd:string; foaf:name "Zhihui Du"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fernandez"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Fernandez"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Villagra"^^xsd:string; foaf:givenName "Victor A."^^xsd:string; foaf:name "Victor A. Villagra"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fan"^^xsd:string; foaf:givenName "Wenjun"^^xsd:string; foaf:name "Wenjun Fan"^^xsd:string; rdf:type foaf:Person . bibo:issn "19328184"; foaf:name "IEEE Systems Journal"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90406 \n\nForeign currency exchange rate prediction using neuro-fuzzy systems\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "The complex nature of the foreign exchange (FOREX) market along with the increased interest towards the currency exchange market has prompted extensive research from various academic disciplines. With the inclusion of more in-depth analysis and forecasting methods, traders will be able to make an informed decision when trading. Therefore, an approach incorporating the use of historical data along with computational intelligence for analysis and forecasting is proposed in this paper. Firstly, the Gaussian Mixture Model method is applied for data partitioning on historical observations. While the antecedent part of the neuro-fuzzy system of AnYa type is initialised by the partitioning result, the consequent part is trained using the fuzzily weighted RLS algorithm based on the same data. Numerical examples based on the real currency exchange data demonstrated that the proposed approach trained with historical data produce promising results when used to forecast the future foreign exchange rates over a long-term period. Although implemented in an offline environment, it could potentially be utilised in real-time application in the future."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "144"; dct:creator , , , , , ; dct:date "2018-11-21"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Foreign currency exchange rate prediction using neuro-fuzzy systems"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P"^^xsd:string; foaf:name "Plamen P Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Shafipour"^^xsd:string; foaf:givenName "Elnaz"^^xsd:string; foaf:name "Elnaz Shafipour"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lee"^^xsd:string; foaf:givenName "Yunli"^^xsd:string; foaf:name "Yunli Lee"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ngo"^^xsd:string; foaf:givenName "David Chek Ling"^^xsd:string; foaf:name "David Chek Ling Ngo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yong"^^xsd:string; foaf:givenName "Yoke Leng"^^xsd:string; foaf:name "Yoke Leng Yong"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "18770509"; foaf:name "Procedia Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "sensors-18-04040.pdf"^^xsd:string . rdfs:label "sensors-18-04040.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77171 \n\nMan-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems (ITS) technology, relies on communication between dynamically connected vehicles and static Road Side Units (RSU) to offer various applications (e.g., collision avoidance alerts, steep-curve warnings and infotainment). VANET has a massive potential to improve traffic efficiency, and road safety by exchanging critical information between nodes (vehicles and RSU), thus reducing the likelihood of traffic accidents. However, this communication between nodes is subject to a variety of attacks, such as Man-In-The-Middle (MITM) attacks which represent a major risk in VANET. It happens when a malicious node intercepts or tampers with messages exchanged between legitimate nodes. In this paper, we studied the impact on network performance of different strategies which attackers can adopt to launch MITM attacks in VANET, such as fleet or random strategies. In particular, we focus on three goals of MITM attacks—message delayed, message dropped and message tampered. The simulation results indicate that these attacks have a severe influence on the legitimate nodes in VANET as the network experience high number of compromised messages, high end-to-end delays and preeminent packet losses."^^xsd:string; bibo:authorList ; bibo:issue "11"; bibo:status , ; bibo:volume "18"; dc:hasVersion ; dct:creator , , , , ; dct:date "2018-11-20"; dct:isPartOf , ; dct:publisher ; dct:title "Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "MDPI AG"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Adnane"^^xsd:string; foaf:givenName "Asma"^^xsd:string; foaf:name "Asma Adnane"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ahmad"^^xsd:string; foaf:givenName "Farhan"^^xsd:string; foaf:name "Farhan Ahmad"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kurugollu"^^xsd:string; foaf:givenName "Fatih"^^xsd:string; foaf:name "Fatih Kurugollu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Liu"^^xsd:string; foaf:givenName "Lu"^^xsd:string; foaf:name "Lu Liu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N.L."^^xsd:string; foaf:name "Virginia N.L. Franqueira"^^xsd:string; rdf:type foaf:Person . bibo:issn "14248220"; foaf:name "Sensors"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #91263 \n\nA Generalized Framework for Ontology-Based Data Access\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "The database (DB) landscape has been significantly diversified during the last decade, resulting in the emergence of a variety of non-relational (also called NoSQL) DBs, e.g., xml and json-document DBs, key-value stores, and graph DBs. To enable access to such data, we generalize the well-known ontology-based data access (OBDA) framework so as to allow for querying arbitrary data sources using sparql. We propose an architecture for a generalized OBDA system implementing the virtual approach. Then, to investigate feasibility of OBDA over non-relational DBs, we compare an implementation of an OBDA system over MongoDB, a popular json-document DB, with a triple store."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "11298"; dct:creator , , , , ; dct:date "2018-11-20"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "A Generalized Framework for Ontology-Based Data Access"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "AI*IA 2018 - Advances in Artificial Intelligence - XVIIth International Conference of the Italian Association for Artificial Intelligence, Trento, Italy, November 20-23, 2018, Proceedings"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Trento, Italy"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Cogrel"^^xsd:string; foaf:givenName "Benjamin"^^xsd:string; foaf:name "Benjamin Cogrel"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Calvanese"^^xsd:string; foaf:givenName "Diego"^^xsd:string; foaf:name "Diego Calvanese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Corman"^^xsd:string; foaf:givenName "Julien"^^xsd:string; foaf:name "Julien Corman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Botoeva"^^xsd:string; foaf:givenName "Elena"^^xsd:string; foaf:name "Elena Botoeva"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Xiao"^^xsd:string; foaf:givenName "Guohui"^^xsd:string; foaf:name "Guohui Xiao"^^xsd:string; rdf:type foaf:Person . rdfs:label "16522-71167-2-SM.pdf"^^xsd:string . rdfs:label "16522-71167-2-SM.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #65147 \n\nImproving Language Modelling with Noise Contrastive Estimation\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Improving Language Modelling with Noise Contrastive Estimation (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Improving Language Modelling with Noise Contrastive Estimation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improving Language Modelling with Noise Contrastive Estimation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improving Language Modelling with Noise Contrastive Estimation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improving Language Modelling with Noise Contrastive Estimation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improving Language Modelling with Noise Contrastive Estimation (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Neural language models do not scale well when the vocabulary is large. Noise contrastive estimation (NCE) is a sampling-based method that allows for fast learning with large vocabularies. Although NCE has shown promising performance in neural machine translation, its full potential has not been demonstrated in the language modelling literature. A sufficient investigation of the hyperparameters in the NCE-based neural language models was clearly missing. In this paper, we showed that NCE can be a very successful approach in neural language modelling when the hyperparameters of a neural network are tuned appropriately. We introduced the `search-then-converge' learning rate schedule for NCE and designed a heuristic that specifies how to use this schedule. The impact of the other important hyperparameters, such as the dropout rate and the weight initialisation range, was also demonstrated. Using a popular benchmark, we showed that appropriate tuning of NCE in neural language models outperforms the state-of-the-art single-model methods based on the standard LSTM recurrent neural networks."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2018-11-18"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Improving Language Modelling with Noise Contrastive Estimation"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.87 Neural computers, neural networks"@en . rdf:type skos:Concept; skos:prefLabel "QA276 Mathematical statistics"@en . dct:title "The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "New Orleans, USA"^^xsd:string . foaf:name "AAAI Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Liza"^^xsd:string; foaf:givenName "Farhana Ferdousi"^^xsd:string; foaf:name "Farhana Ferdousi Liza"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grzes"^^xsd:string; foaf:givenName "Marek"^^xsd:string; foaf:name "Marek Grzes"^^xsd:string; rdf:type foaf:Person . rdfs:label "2018-CCS-MPS-snw-author-final.pdf"^^xsd:string . rdfs:label "2018-CCS-MPS-snw-author-final.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #68765 \n\nAre we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR)\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR) (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR) (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR) (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The EU General Data Protection Regulation (GDPR), enforced from 25th May 2018, aims to reform how organisations view and control the personal data of private EU citizens. The scope of GDPR is somewhat unprecedented: it regulates every aspect of personal data handling, includes hefty potential penalties for non-compliance, and can prosecute any company in the world that processes EU citizens' data. In this paper, we look behind the scenes to investigate the real challenges faced by organisations in engaging with the GDPR. This considers issues in working with the regulation, the implementation process, and how compliance is verified. Our research approach relies on literature but, more importantly, draws on detailed interviews with several organisations. Key findings include the fact that large organisations generally found GDPR compliance to be reasonable and doable. The same was found for small-to-medium organisations (SMEs/SMBs) that were highly security-oriented. SMEs with less focus on data protection struggled to make what they felt was a satisfactory attempt at compliance. The main issues faced in their compliance attempts emerged from: the sheer breadth of the regulation; questions around how to enact the qualitative recommendations of the regulation; and the need to map out the entirety of their complex data networks."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-11-15"; dct:isPartOf , ; dct:publisher ; dct:subject , , , ; dct:title "Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR)"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences (General)"@en . rdf:type skos:Concept; skos:prefLabel "K Law (General)"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "International Workshop on Multimedia Privacy and Security (MPS) at the 25th ACM Conference on Computer and Communications Security (CCS)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Toronto, Canada"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Sirur"^^xsd:string; foaf:givenName "Sean"^^xsd:string; foaf:name "Sean Sirur"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Webb"^^xsd:string; foaf:givenName "Helena"^^xsd:string; foaf:name "Helena Webb"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . foaf:name "International Workshop on Multimedia Privacy and Security (MPS) at the 25th ACM Conference on Computer and Communications Security (CCS)"^^xsd:string; rdf:type bibo:Collection . rdfs:label "tkde-gkan-camera-ready.pdf"^^xsd:string . rdfs:label "tkde-gkan-camera-ready.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69952 \n\nA semi-supervised approach to message stance classification\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A semi-supervised approach to message stance classification (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A semi-supervised approach to message stance classification (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A semi-supervised approach to message stance classification (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A semi-supervised approach to message stance classification (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A semi-supervised approach to message stance classification (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A semi-supervised approach to message stance classification (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Social media communications are becoming increasingly prevalent; some useful, some false, whether unwittingly or maliciously. An increasing number of rumours daily flood the social networks. Determining their veracity in an autonomous way is a very active and challenging field of research, with a variety of methods proposed. However, most of the models rely on determining the constituent messages’ stance towards the rumour, a feature known as the “wisdom of the crowd”. Although several supervised machine-learning approaches have been proposed to tackle the message stance classification problem, these have numerous shortcomings. In this paper we argue that semi-supervised learning is more effective than supervised models and use two graph-based methods to demonstrate it. This is not only in terms of classification accuracy, but equally important, in terms of speed and scalability. We use the Label Propagation and Label Spreading algorithms and run experiments on a dataset of 72 rumours and hundreds of thousands messages collected from Twitter. We compare our results on two available datasets to the state-of-the-art to demonstrate our algorithms’ performance regarding accuracy, speed and scalability for real-time applications."^^xsd:string; bibo:authorList ; bibo:issue "1"; bibo:status , ; bibo:volume "32"; dc:hasVersion ; dct:creator , , , ; dct:date "2018-11-09"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "A semi-supervised approach to message stance classification"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA276 Mathematical statistics"@en . rdf:type skos:Concept; skos:prefLabel "T Technology (General)"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Kaplis"^^xsd:string; foaf:givenName "Nikolaos"^^xsd:string; foaf:name "Nikolaos Kaplis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Giasemidis"^^xsd:string; foaf:givenName "Georgios"^^xsd:string; foaf:name "Georgios Giasemidis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Agrafiotis"^^xsd:string; foaf:givenName "Ioannis"^^xsd:string; foaf:name "Ioannis Agrafiotis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R.C."^^xsd:string; foaf:name "Jason R.C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "10414347"; foaf:name "IEEE Transactions on Knowledge and Data Engineering"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Versio?n_Reviewers_vf.pdf"^^xsd:string . rdfs:label "Versio?n_Reviewers_vf.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69229 \n\nReduced delta-band modulation underlies the loss of P300 responses in disorders of consciousness\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Reduced delta-band modulation underlies the loss of P300 responses in disorders of consciousness (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reduced delta-band modulation underlies the loss of P300 responses in disorders of consciousness (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reduced delta-band modulation underlies the loss of P300 responses in disorders of consciousness (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reduced delta-band modulation underlies the loss of P300 responses in disorders of consciousness (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Reduced delta-band modulation underlies the loss of P300 responses in disorders of consciousness (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Objective\r\nThe P300 component of a sensory event-related potential is one of the major electrophysiological markers used to explore remnants of cognitive function in patients with disorders of consciousness (DoC). However, measuring the P300 in patients is complicated by significant inter-trial variability commonly observed in levels of arousal and awareness. To overcome this limitation, we analyzed single-trial modulation of power in the delta and theta frequency bands, which underlie the P300.\r\nMethods\r\nIn a preliminary cross-sectional study using a 24-channel EEG and a passive own-name oddball paradigm, we analyzed event-related synchronization (ERS) across trials in the delta and theta bands in a sample of 10 control and 12 DoC subjects.\r\nResults\r\nIn comparison to controls, DoC subjects presented a low percentage of trials where delta ERS was observed. In particular, coordinated modulation between delta and theta in response to the stimulus was absent, with a high percentage of trials where only theta ERS was observed. Further, we found a positive correlation between the percentage of epochs with delta ERS and the strength of the P300.\r\nConclusions\r\nReduced modulation of spectral activity in the delta band in response to stimuli indicates a dissociation in the activity of the neural networks that oscillate in delta and theta ranges and contribute to the generation of the P300.\r\nSignificance\r\nThe reduction in spectral modulation observed in DoC provides a deeper understanding of neurophysiological dysfunction and the means to develop a more fine-grained marker of residual cognitive function in individual patients."^^xsd:string; bibo:authorList ; bibo:issue "12"; bibo:status , ; bibo:volume "129"; dc:hasVersion ; dct:creator , , , , , ; dct:date "2018-11-09"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Reduced delta-band modulation underlies the loss of P300 responses in disorders of consciousness"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Egan?a"^^xsd:string; foaf:givenName "Jose"^^xsd:string; foaf:name "Jose Egan?a"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Burgos"^^xsd:string; foaf:givenName "Pablo"^^xsd:string; foaf:name "Pablo Burgos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rivera-Lillo"^^xsd:string; foaf:givenName "Gonzalo"^^xsd:string; foaf:name "Gonzalo Rivera-Lillo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Maldonado"^^xsd:string; foaf:givenName "Pedro"^^xsd:string; foaf:name "Pedro Maldonado"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rojas-Li?bano"^^xsd:string; foaf:givenName "Daniel"^^xsd:string; foaf:name "Daniel Rojas-Li?bano"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chennu"^^xsd:string; foaf:givenName "Srivas"^^xsd:string; foaf:name "Srivas Chennu"^^xsd:string; rdf:type foaf:Person . bibo:issn "13882457"; foaf:name "Clinical Neurophysiology"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "oliveira-gptp2016_preprint.pdf"^^xsd:string . rdfs:label "oliveira-gptp2016_preprint.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #59297 \n\nA Generic Framework for Building Dispersion Operators in the Semantic Space\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Generic Framework for Building Dispersion Operators in the Semantic Space (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Generic Framework for Building Dispersion Operators in the Semantic Space (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Generic Framework for Building Dispersion Operators in the Semantic Space (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Generic Framework for Building Dispersion Operators in the Semantic Space (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Generic Framework for Building Dispersion Operators in the Semantic Space (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Generic Framework for Building Dispersion Operators in the Semantic Space (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "This chapter proposes a generic framework to build geometric dispersion (GD) operators for Geometric Semantic Genetic Programming in the context of symbolic regression, followed by two concrete instantiations of the framework: a multiplicative geometric dispersion operator and an additive geometric dispersion operator. These operators move individuals in the semantic space in order to balance the population around the target output in each dimension, with the objective of expanding the convex hull defined by the population to include the desired output vector. An experimental analysis was conducted in a testbed composed of sixteen datasets showing that dispersion operators can improve GSGP search and that the multiplicative version of the operator is overall better than the additive version."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-11-08"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "A Generic Framework for Building Dispersion Operators in the Semantic Space"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando E.B."^^xsd:string; foaf:name "Fernando E.B. Otero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pappa"^^xsd:string; foaf:givenName "Gisele L."^^xsd:string; foaf:name "Gisele L. Pappa"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Oliveira"^^xsd:string; foaf:givenName "Luiz O.V.B."^^xsd:string; foaf:name "Luiz O.V.B. Oliveira"^^xsd:string; rdf:type foaf:Person . rdfs:label "oopsla18-daloze-et-al-parallelization-of-dynamic-languages-synchronizing-built-in-collections.pdf"^^xsd:string . rdfs:label "oopsla18-daloze-et-al-parallelization-of-dynamic-languages-synchronizing-built-in-collections.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69156 \n\nParallelization of Dynamic Languages: Synchronizing Built-in Collections\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Parallelization of Dynamic Languages: Synchronizing Built-in Collections (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Parallelization of Dynamic Languages: Synchronizing Built-in Collections (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Parallelization of Dynamic Languages: Synchronizing Built-in Collections (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Parallelization of Dynamic Languages: Synchronizing Built-in Collections (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Parallelization of Dynamic Languages: Synchronizing Built-in Collections (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Parallelization of Dynamic Languages: Synchronizing Built-in Collections (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Dynamic programming languages such as Python and Ruby are widely used, and much effort is spent on making them efficient. One substantial research effort in this direction is the enabling of parallel code execution. While there has been significant progress, making dynamic collections efficient, scalable, and thread-safe is an open issue. Typical programs in dynamic languages use few but versatile collection types. Such collections are an important ingredient of dynamic environments, but are difficult to make safe, efficient, and scalable. In this paper, we propose an approach for efficient and concurrent collections by gradually increasing synchronization levels according to the dynamic needs of each collection instance. Collections reachable only by a single thread have no synchronization, arrays accessed in bounds have minimal synchronization, and for the general case, we adopt the Layout Lock paradigm and extend its design with a lightweight version that fits the setting of dynamic languages. We apply our approach to Ruby’s Array and Hash collections. Our experiments show that our approach has no overhead on single-threaded benchmarks, scales linearly for Array and Hash accesses, achieves the same scalability as Fortran and Java for classic parallel algorithms, and scales better than other Ruby implementations on Ruby workloads."^^xsd:string; bibo:authorList ; bibo:issue "OOPSLA"; bibo:status , ; bibo:volume "2"; dc:hasVersion ; dct:creator , , , , ; dct:date "2018-11"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Parallelization of Dynamic Languages: Synchronizing Built-in Collections"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Petrank"^^xsd:string; foaf:givenName "Erez"^^xsd:string; foaf:name "Erez Petrank"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tal"^^xsd:string; foaf:givenName "Arie"^^xsd:string; foaf:name "Arie Tal"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mössenböck"^^xsd:string; foaf:givenName "Hanspeter"^^xsd:string; foaf:name "Hanspeter Mössenböck"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Daloze"^^xsd:string; foaf:givenName "Benoit"^^xsd:string; foaf:name "Benoit Daloze"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . bibo:issn "24751421"; foaf:name "Proceedings of the ACM on Programming Languages"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "paper X.pdf"^^xsd:string . rdfs:label "paper X.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69846 \n\nMarlowe: Financial Contracts on Blockchain\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Marlowe: Financial Contracts on Blockchain (PDF)"^^xsd:string . rdf:type bibo:Document, ep:Document; rdfs:label "Marlowe: Financial Contracts on Blockchain (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Marlowe: Financial Contracts on Blockchain (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Marlowe: Financial Contracts on Blockchain (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Marlowe: Financial Contracts on Blockchain (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Marlowe: Financial Contracts on Blockchain (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Marlowe: Financial Contracts on Blockchain (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Marlowe: Financial Contracts on Blockchain (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Marlowe: Financial Contracts on Blockchain (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Marlowe: Financial Contracts on Blockchain (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Marlowe: Financial Contracts on Blockchain (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Marlowe: Financial Contracts on Blockchain (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Blockchains allow the specification of contracts in the form of programs that guarantee their fulfilment. Nevertheless, errors in those programs can cause important, and often irretrievable, monetary loss. General-purpose languages provide a platform on which contracts can be built, but by their very generality they have the potential to exhibit behaviours of an unpredictable kind, and are also not easy to read or comprehend for general users.\r\n\r\nAn alternative solution is provided by domain-specific languages (DSLs), which are designed to express programs in a particular field. This paper explores the design of one DSL, Marlowe, targeted at the execution of financial contracts in the style of Peyton Jones et al. on blockchains. We present an executable semantics of Marlowe in Haskell, an example of Marlowe in practice, and describe the Meadow tool that allows users to interact in-browser with simulations of Marlowe contracts."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion , ; dct:creator , ; dct:date "2018-10-30"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Marlowe: Financial Contracts on Blockchain"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "ISoLA 2018: Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice"^^xsd:string; rdf:type bibo:Conference . foaf:name "Springer-Verlag Berlin"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Lamela Seijas"^^xsd:string; foaf:givenName "Pablo"^^xsd:string; foaf:name "Pablo Lamela Seijas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Thompson"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Thompson"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Phan2018d.pdf"^^xsd:string . rdfs:label "Phan2018d.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72660 \n\nAutomatic Sleep Stage Classification Using Single-Channel EEG: Learning Sequential Features with Attention-Based Recurrent Neural Networks\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Automatic Sleep Stage Classification Using Single-Channel EEG: Learning Sequential Features with Attention-Based Recurrent Neural Networks (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Sleep Stage Classification Using Single-Channel EEG: Learning Sequential Features with Attention-Based Recurrent Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Sleep Stage Classification Using Single-Channel EEG: Learning Sequential Features with Attention-Based Recurrent Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Sleep Stage Classification Using Single-Channel EEG: Learning Sequential Features with Attention-Based Recurrent Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Sleep Stage Classification Using Single-Channel EEG: Learning Sequential Features with Attention-Based Recurrent Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Sleep Stage Classification Using Single-Channel EEG: Learning Sequential Features with Attention-Based Recurrent Neural Networks (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "We propose in this work a feature learning approach using deep bidirectional recurrent neural networks (RNNs) with attention mechanism for single-channel automatic sleep stage classification. We firstly decompose an EEG epoch into multiple small frames and subsequently transform them into a sequence of frame-wise feature vectors. Given the training sequences, the attention-based RNN is trained in a sequence-to-label fashion for sleep stage classification. Due to discriminative training, the network is expected to encode information of an input sequence into a high-level feature vector after the attention layer. We, therefore, treat the trained network as a feature extractor and extract these feature vectors for classification which is accomplished by a linear SVM classifier. We also propose a discriminative method to learn a filter bank with a DNN for preprocessing purpose. Filtering the frame-wise feature vectors with the learned filter bank beforehand leads to further improvement on the classification performance. The proposed approach demonstrates good performance on the Sleep-EDF dataset."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2018-10-29"; dct:isPartOf ; dct:publisher ; dct:title "Automatic Sleep Stage Classification Using Single-Channel EEG: Learning Sequential Features with Attention-Based Recurrent Neural Networks"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2018)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Honolulu, Hawaii"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Cooray"^^xsd:string; foaf:givenName "Navin"^^xsd:string; foaf:name "Navin Cooray"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Andreotti"^^xsd:string; foaf:givenName "Fernando"^^xsd:string; foaf:name "Fernando Andreotti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Vos"^^xsd:string; foaf:givenName "Maarten"^^xsd:string; foaf:name "Maarten De Vos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chén"^^xsd:string; foaf:givenName "Oliver Y."^^xsd:string; foaf:name "Oliver Y. Chén"^^xsd:string; rdf:type foaf:Person . rdfs:label "Phan2018c.pdf"^^xsd:string . rdfs:label "Phan2018c.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72661 \n\nDNN Filter Bank Improves 1-Max Pooling CNN for Single-Channel EEG Automatic Sleep Stage Classification\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "DNN Filter Bank Improves 1-Max Pooling CNN for Single-Channel EEG Automatic Sleep Stage Classification (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "DNN Filter Bank Improves 1-Max Pooling CNN for Single-Channel EEG Automatic Sleep Stage Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "DNN Filter Bank Improves 1-Max Pooling CNN for Single-Channel EEG Automatic Sleep Stage Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "DNN Filter Bank Improves 1-Max Pooling CNN for Single-Channel EEG Automatic Sleep Stage Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "DNN Filter Bank Improves 1-Max Pooling CNN for Single-Channel EEG Automatic Sleep Stage Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "DNN Filter Bank Improves 1-Max Pooling CNN for Single-Channel EEG Automatic Sleep Stage Classification (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "We present in this paper an efficient convolutional neural network (CNN) running on time-frequency image features for automatic sleep stage classification. Opposing to deep architectures which have been used for the task, the proposed CNN is much simpler. However, the CNN’s convolutional layer is able to support convolutional kernels with different sizes, and therefore, capable of learning features at multiple temporal resolutions. In addition, the 1-max pooling strategy is employed at the pooling layer to better capture the shift-invariance property of EEG signals. We further propose a method to discriminatively learn a frequency-domain filter bank with a deep neural network (DNN) to preprocess the time-frequency image features. Our experiments show that the proposed 1-max pooling CNN performs comparably with the very deep CNNs in the literature on the Sleep-EDF dataset. Preprocessing the time-frequency image features with the learned filter bank before presenting them to the CNN leads to significant improvements on the classification accuracy, setting the state-of-the-art performance on the dataset."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2018-10-29"; dct:isPartOf ; dct:publisher ; dct:title "DNN Filter Bank Improves 1-Max Pooling CNN for Single-Channel EEG Automatic Sleep Stage Classification"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2018)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Honolulu, Hawaii"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Andreotti"^^xsd:string; foaf:givenName "Fernando"^^xsd:string; foaf:name "Fernando Andreotti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Vos"^^xsd:string; foaf:givenName "Maarten"^^xsd:string; foaf:name "Maarten De Vos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cooray"^^xsd:string; foaf:givenName "Navin"^^xsd:string; foaf:name "Navin Cooray"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chén"^^xsd:string; foaf:givenName "Oliver Y."^^xsd:string; foaf:name "Oliver Y. Chén"^^xsd:string; rdf:type foaf:Person . rdfs:label "4407-949-4365-1-10-20181130.pdf"^^xsd:string . rdfs:label "4407-949-4365-1-10-20181130.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72111 \n\nIs P-value<0.05 Enough? Two Case Studies in Classifiers Evaluation\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Is P-value<0.05 Enough? Two Case Studies in Classifiers Evaluation (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Is P-value<0.05 Enough? Two Case Studies in Classifiers Evaluation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Is P-value<0.05 Enough? Two Case Studies in Classifiers Evaluation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Is P-value<0.05 Enough? Two Case Studies in Classifiers Evaluation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Is P-value<0.05 Enough? Two Case Studies in Classifiers Evaluation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Is P-value<0.05 Enough? Two Case Studies in Classifiers Evaluation (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "A common tool used in the process of comparing classifiers is\r\nthe statistical significance analysis, performed through the hypothesis test.\r\nHowever, there are many researchers attempting to obtain statistical significance through a blinding evaluating of the p-value<0.05 condition, ignoring\r\nimportant concepts such as the effect size and statistical power. This work\r\nhighlights possible problems caused by the misuse of the hypothesis test and\r\nhow the effect size and the statistical power can provide information for\r\na better decision making. Therefore, two case studies applying Student’s\r\nt-test and Wilcoxon signed-rank test for the comparison of two classifiers\r\nare presented."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2018-10-22"; dct:isPartOf ; dct:title "Is P-value<0.05 Enough? Two Case Studies in Classifiers Evaluation"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "XV National Meeting of Artificial and Computational Intelligence (ENIAC)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "São Paulo, Brazil"^^xsd:string . foaf:familyName "Plastino"^^xsd:string; foaf:givenName "Alexandre"^^xsd:string; foaf:name "Alexandre Plastino"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pinto Junior"^^xsd:string; foaf:givenName "Jony A."^^xsd:string; foaf:name "Jony A. Pinto Junior"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Neumann"^^xsd:string; foaf:givenName "Nadine M."^^xsd:string; foaf:name "Nadine M. Neumann"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #73790 \n\nExtraction of Natural Language Requirements from Breach Reports Using Event Inference\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Extraction of Natural Language Requirements from Breach Reports Using Event Inference (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Extraction of Natural Language Requirements from Breach Reports Using Event Inference (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Extraction of Natural Language Requirements from Breach Reports Using Event Inference (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Extraction of Natural Language Requirements from Breach Reports Using Event Inference (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Extraction of Natural Language Requirements from Breach Reports Using Event Inference (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Extraction of Natural Language Requirements from Breach Reports Using Event Inference (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "We address the problem of extracting useful information contained in security and privacy breach reports. A breach report tells a short story describing how a breach happened and the follow-up remedial actions taken by the responsible parties. By predicting sentences that may follow a breach description using natural language processing, our goal is to suggest security and privacy requirements for practitioners and end users that can be used to prevent and recover from such breaches. We prepare a curated dataset of structured short breach stories using unstructured breach reports published by the U.S. Department of Health and Human Services. We propose a prediction model for inferring held-out sentences based on Paragraph Vector, a document embedding method, and Long Short-Term Memory networks. The predicted sentences can suggest natural language requirements. We evaluate our model on the curated dataset as well as the ROCStories corpus, a collection of five-sentence commonsense stories, and find that the presented model performs significantly better than the baseline of using average word vectors."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-10-22"; dct:isPartOf ; dct:publisher ; dct:title "Extraction of Natural Language Requirements from Breach Reports Using Event Inference"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "2018 5th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE 2018)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Banff, AB, Canada"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Guo"^^xsd:string; foaf:givenName "Hui"^^xsd:string; foaf:name "Hui Guo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Singh"^^xsd:string; foaf:givenName "Munindar"^^xsd:string; foaf:name "Munindar Singh"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kafalı"^^xsd:string; foaf:givenName "Özgur"^^xsd:string; foaf:name "Özgur Kafalı"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "08502139.pdf"^^xsd:string . rdfs:label "08502139.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72662 \n\nJoint Classification and Prediction CNN Framework for Automatic Sleep Stage Classification\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Joint Classification and Prediction CNN Framework for Automatic Sleep Stage Classification (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Joint Classification and Prediction CNN Framework for Automatic Sleep Stage Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Joint Classification and Prediction CNN Framework for Automatic Sleep Stage Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Joint Classification and Prediction CNN Framework for Automatic Sleep Stage Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Joint Classification and Prediction CNN Framework for Automatic Sleep Stage Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Joint Classification and Prediction CNN Framework for Automatic Sleep Stage Classification (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Joint Classification and Prediction CNN Framework for Automatic Sleep Stage Classification (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Joint Classification and Prediction CNN Framework for Automatic Sleep Stage Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Joint Classification and Prediction CNN Framework for Automatic Sleep Stage Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Joint Classification and Prediction CNN Framework for Automatic Sleep Stage Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Joint Classification and Prediction CNN Framework for Automatic Sleep Stage Classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Joint Classification and Prediction CNN Framework for Automatic Sleep Stage Classification (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Correctly identifying sleep stages is important in diagnosing and treating sleep disorders. This work proposes a joint classification-and-prediction framework based on convolutional neural networks (CNNs) for automatic sleep staging, and, subsequently, introduces a simple yet efficient CNN architecture to power the framework. Given a single input epoch, the novel framework jointly determines its label (classification) and its neighboring epochs' labels (prediction) in the contextual output. While the proposed framework is orthogonal to the widely adopted classification schemes, which take one or multiple epochs as contextual inputs and produce a single classification decision on the target epoch, we demonstrate its advantages in several ways. First, it leverages the dependency among consecutive sleep epochs while surpassing the problems experienced with the common classification schemes. Second, even with a single model, the framework has the capacity to produce multiple decisions, which are essential in obtaining a good performance as in ensemble-of-models methods, with very little induced computational overhead. Probabilistic aggregation techniques are then proposed to leverage the availability of multiple decisions. To illustrate the efficacy of the proposed framework, we conducted experiments on two public datasets: Sleep-EDF Expanded (Sleep-EDF), which consists of 20 subjects, and Montreal Archive of Sleep Studies (MASS) dataset, which consists of 200 subjects. The proposed framework yields an overall classification accuracy of 82.3% and 83.6%, respectively. We also show that the proposed framework not only is superior to the baselines based on the common classification schemes but also outperforms existing deep-learning approaches. To our knowledge, this is the first work going beyond the standard single-output classification to consider multitask neural networks for automatic sleep staging. This framework provides avenues for further studies of different neural-network architectures for automatic sleep staging."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion , ; dct:creator , , , , ; dct:date "2018-10-22"; dct:isPartOf , ; dct:publisher ; dct:title "Joint Classification and Prediction CNN Framework for Automatic Sleep Stage Classification"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Andreotti"^^xsd:string; foaf:givenName "Fernando"^^xsd:string; foaf:name "Fernando Andreotti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cooray"^^xsd:string; foaf:givenName "Navin"^^xsd:string; foaf:name "Navin Cooray"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Vos"^^xsd:string; foaf:givenName "Maarten"^^xsd:string; foaf:name "Maarten De Vos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chén"^^xsd:string; foaf:givenName "Oliver Y."^^xsd:string; foaf:name "Oliver Y. Chén"^^xsd:string; rdf:type foaf:Person . bibo:issn "00189294"; foaf:name "IEEE Transactions on Biomedical Engineering"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "1806.04875.pdf"^^xsd:string . rdfs:label "1806.04875.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69136 \n\nA thermodynamically consistent model of finite state machines\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A thermodynamically consistent model of finite state machines (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A thermodynamically consistent model of finite state machines (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A thermodynamically consistent model of finite state machines (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A thermodynamically consistent model of finite state machines (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A thermodynamically consistent model of finite state machines (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A thermodynamically consistent model of finite state machines (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Finite state machines (FSMs) are a theoretically and practically important model of computation. We propose a general, thermodynamically consistent model of FSMs and characterise the resource requirements of these machines. We model FSMs as time-inhomogeneous Markov chains. The computation is driven by instantaneous manipulations of the energy levels of the states. We calculate the entropy production of the machine, its error probability, and the time required to complete one update step. We find that a sequence of generalised bit-setting operations is sufficient to implement any FSM."^^xsd:string; bibo:authorList ; bibo:issue "6"; bibo:status , ; bibo:volume "8"; dc:hasVersion ; dct:creator , ; dct:date "2018-10-19"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A thermodynamically consistent model of finite state machines"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science (General)"@en . foaf:name "Royal Society"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chu"^^xsd:string; foaf:givenName "Dominique"^^xsd:string; foaf:name "Dominique Chu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Spinney"^^xsd:string; foaf:givenName "Richard E."^^xsd:string; foaf:name "Richard E. Spinney"^^xsd:string; rdf:type foaf:Person . bibo:issn "20428898"; foaf:name "Journal of the Royal Society Interface Focus"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90106 \n\nEmpirical Approach—Introduction\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "In this chapter, we will describe the fundamentals of the proposed new “empirical” approach as a systematic methodology with its nonparametric quantities derived entirely from the actual data with no subjective and/or problem-specific assumptions made. It has a potential to be a powerful extension of (and/or alternative to) the traditional probability theory, statistical learning and computational intelligence methods. The nonparametric quantities of the proposed new empirical approach include: (1) the cumulative proximity; (2) the eccentricity, and the standardized eccentricity; (3) the data density, and (4) the typicality. They can be recursively updated on a sample-by-sample basis, and they have unimodal and multimodal, discrete and continuous forms/versions. The nonparametric quantities are based on ensemble properties of the data and not limited by prior restrictive assumptions. The discrete version of the typicality resembles the unimodal probability density function, but is in a discrete form. The discrete multimodal typicality resembles the probability mass function."^^xsd:string; bibo:authorList ; bibo:status , ; dct:creator , ; dct:date "2018-10-18"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Empirical Approach—Introduction"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P."^^xsd:string; foaf:name "Plamen P. Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "1860949X"; foaf:name "Empirical Approach to Machine Learning"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Taxonomy_of_Cyber-Harms-author-final.pdf"^^xsd:string . rdfs:label "Taxonomy_of_Cyber-Harms-author-final.pdf_nocoversheet"^^xsd:string . rdfs:label "XCV .pdf"^^xsd:string . rdfs:label "XCV .pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69076 \n\nA taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Technological advances have resulted in organisations digitalizing many parts of their operations. The threat landscape of cyber-attacks is rapidly changing and the potential impact of such attacks is uncertain, because there is a lack of effective metrics, tools and frameworks to understand and assess the harm organisations face from cyber-attacks. In this paper, we reflect on the literature on harm, and how it has been conceptualised in disciplines such as criminology and economics, and investigate how other notions such as risk and impact relate to harm. Based on an extensive literature survey and on reviewing news articles and databases reporting cyber-incidents, cybercrimes, hacks and other attacks, we identify various types of harm and create a taxonomy of cyber-harms encountered by organisations. This taxonomy comprises five broad themes: physical or digital harm; economic harm; psychological harm; reputational harm; and social and societal harm. In each of these themes we present several cyber-harms that can result from cyber-attacks. To provide initial indications about how these different types of harm are connected and how cyber-harm in general may propagate, this article also analyses and draws insight from four real-world case studies, involving Sony (2011 and 2014), JPMorgan and Ashley Madison. We conclude by arguing for the need for analytical tools for organisational cyber-harm, which can be based on a taxonomy such as the one we propose here. These would allow organisations to identify corporate assets, link these to different types of cyber-harm, measure those harms and, finally, consider the security controls needed for the treatment of harm."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion , ; dct:creator , , , , ; dct:date "2018-10-16"; dct:isPartOf , ; dct:publisher ; dct:subject , , , ; dct:title "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF41 Psychology and philosophy" . rdf:type skos:Concept; skos:prefLabel "H Social Sciences"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Oxford University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Goldsmith"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Goldsmith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Creese"^^xsd:string; foaf:givenName "Sadie"^^xsd:string; foaf:name "Sadie Creese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Upton"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Upton"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Agrafiotis"^^xsd:string; foaf:givenName "Ioannis"^^xsd:string; foaf:name "Ioannis Agrafiotis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "20572085"; foaf:name "Journal of Cybersecurity"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "lost-digital-wild.pdf"^^xsd:string . rdfs:label "lost-digital-wild.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69008 \n\nLost in the Digital Wild: Hiding Information in Digital Activities\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Lost in the Digital Wild: Hiding Information in Digital Activities (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Lost in the Digital Wild: Hiding Information in Digital Activities (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Lost in the Digital Wild: Hiding Information in Digital Activities (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Lost in the Digital Wild: Hiding Information in Digital Activities (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Lost in the Digital Wild: Hiding Information in Digital Activities (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Lost in the Digital Wild: Hiding Information in Digital Activities (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . rdf:_1 ; rdf:_2 ; rdf:_3 . , , ; bibo:abstract "This paper presents a new general framework of information hiding, in which the hidden information is embedded into a collection of activities conducted by selected human and computer entities (e.g., a number of online accounts of one or more online social networks) in a selected digital world. Different from other traditional schemes, where the hidden information is embedded into one or more selected or generated cover objects, in the new framework the hidden information is embedded in the fact that some particular digital activities with some particular attributes took place in some particular ways in the receiver-observable digital world.\r\n\r\nIn the new framework the concept of \"cover\" almost disappears, or one can say that now the whole digital world selected becomes the cover. The new framework can find applications in both security (e.g., steganography) and non-security domains (e.g., gaming). For security applications we expect that the new framework calls for completely new steganalysis techniques, which are likely more complicated, less effective and less efficient than existing ones due to the need to monitor and analyze the whole digital world constantly and in real time. A proof-of-concept system was developed as a mobile app based on Twitter activities to demonstrate the information hiding framework works. We are developing a more hybrid system involving several online social networks."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2018-10-15"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Lost in the Digital Wild: Hiding Information in Digital Activities"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "MPS 2018 (2nd International Workshop on Multimedia Privacy and Security)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Toronto, Canada"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ho"^^xsd:string; foaf:givenName "Anthony T.S."^^xsd:string; foaf:name "Anthony T.S. Ho"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chang"^^xsd:string; foaf:givenName "Victor"^^xsd:string; foaf:name "Victor Chang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hallman"^^xsd:string; foaf:givenName "Roger"^^xsd:string; foaf:name "Roger Hallman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Zichi"^^xsd:string; foaf:name "Zichi Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhang"^^xsd:string; foaf:givenName "Xinpeng"^^xsd:string; foaf:name "Xinpeng Zhang"^^xsd:string; rdf:type foaf:Person . rdfs:label "bare_jrnl.pdf"^^xsd:string . rdfs:label "bare_jrnl.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69761 \n\nContext-aware Mouse Behaviour Recognition using Hidden Markov Models\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Context-aware Mouse Behaviour Recognition using Hidden Markov Models (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Context-aware Mouse Behaviour Recognition using Hidden Markov Models (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Context-aware Mouse Behaviour Recognition using Hidden Markov Models (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Context-aware Mouse Behaviour Recognition using Hidden Markov Models (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Context-aware Mouse Behaviour Recognition using Hidden Markov Models (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Context-aware Mouse Behaviour Recognition using Hidden Markov Models (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 . bibo:abstract "Automated recognition of mouse behaviours is crucial in studying psychiatric and neurologic diseases. To achieve this objective, it is very important to analyse temporal dynamics of mouse behaviours. In particular, the change between mouse neighbouring actions is swift in a short period. In this paper, we develop and implement a novel Hidden Markov Model (HMM) algorithm to describe the temporal characteristics of mouse behaviours. In particular, we here propose a hybrid deep learning architecture, where the first unsupervised layer relies on an advanced spatial-temporal segment Fisher Vector (SFV) encoding both visual and contextual features. Subsequent supervised layers based on our segment aggregate network (SAN) are trained to estimate the state dependent observation probabilities of the HMM. The proposed architecture shows the ability to discriminate between visually similar behaviours and results in high recognition rates with the strength of processing imbalanced mouse behaviour datasets. Finally, we evaluate our approach using JHuang’s and our own datasets, and the results show that our method outperforms other state-of-the-art approaches."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "28"; dc:hasVersion ; dct:creator , , , , , , , , ; dct:date "2018-10-10"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Context-aware Mouse Behaviour Recognition using Hidden Markov Models"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Zhou"^^xsd:string; foaf:givenName "Huiyu"^^xsd:string; foaf:name "Huiyu Zhou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhang"^^xsd:string; foaf:givenName "Shengping"^^xsd:string; foaf:name "Shengping Zhang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jiang"^^xsd:string; foaf:givenName "Zheheng"^^xsd:string; foaf:name "Zheheng Jiang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Crookes"^^xsd:string; foaf:givenName "Danny"^^xsd:string; foaf:name "Danny Crookes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhao"^^xsd:string; foaf:givenName "Yunfeng"^^xsd:string; foaf:name "Yunfeng Zhao"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ma"^^xsd:string; foaf:givenName "Haiping"^^xsd:string; foaf:name "Haiping Ma"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Green"^^xsd:string; foaf:givenName "Brian D"^^xsd:string; foaf:name "Brian D Green"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tao"^^xsd:string; foaf:givenName "Dacheng"^^xsd:string; foaf:name "Dacheng Tao"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . bibo:issn "10577149"; foaf:name "IEEE Transactions on Image Processing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #91264 \n\nEfficient Handling of SPARQL OPTIONAL for OBDA\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "OPTIONAL is a key feature in SPARQL for dealing with missing information. While this operator is used extensively, it is also known for its complexity, which can make efficient evaluation of queries with OPTIONAL challenging. We tackle this problem in the Ontology-Based Data Access (OBDA) setting, where the data is stored in a SQL relational database and exposed as a virtual RDF graph by means of an R2RML mapping. We start with a succinct translation of a SPARQL fragment into SQL. It fully respects bag semantics and three-valued logic and relies on the extensive use of the LEFT JOIN operator and COALESCE function. We then propose optimisation techniques for reducing the size and improving the structure of generated SQL queries. Our optimisations capture interactions between JOIN, LEFT JOIN, COALESCE and integrity constraints such as attribute nullability, uniqueness and foreign key constraints. Finally, we empirically verify effectiveness of our techniques on the BSBM OBDA benchmark."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "11136"; dct:creator , , , , ; dct:date "2018-10-08"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Efficient Handling of SPARQL OPTIONAL for OBDA"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "The Semantic Web - ISWC 2018 - 17th International Semantic Web Conference, Monterey, CA, USA, October 8-12, 2018, Proceedings, Part I"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Monterey, CA, USA"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Kontchakov"^^xsd:string; foaf:givenName "Roman"^^xsd:string; foaf:name "Roman Kontchakov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cogrel"^^xsd:string; foaf:givenName "Benjamin"^^xsd:string; foaf:name "Benjamin Cogrel"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Xiao"^^xsd:string; foaf:givenName "Guohui"^^xsd:string; foaf:name "Guohui Xiao"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Calvanese"^^xsd:string; foaf:givenName "Diego"^^xsd:string; foaf:name "Diego Calvanese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Botoeva"^^xsd:string; foaf:givenName "Elena"^^xsd:string; foaf:name "Elena Botoeva"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90201 \n\nA Deep Rule-Based Approach for Satellite Scene Image Analysis\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "Satellite scene images contain multiple sub-regions of different land use categories; however, traditional approaches usually classify them into a particular category only. In this paper, a new approach is proposed for automatically analyzing the semantic content of sub-regions of satellite images. At the core of the proposed approach is the recently introduced deep rule-based image classification method. The proposed approach includes a self-organizing set of transparent zero order fuzzy IF-THEN rules with human-interpretable prototypes identified from the training images and a pre-trained deep convolutional neural network as the feature descriptor. It requires a very short, nonparametric, highly parallelizable training process and can perform a highly accurate analysis on the semantic features of local areas of the image with the generated IF-THEN rules in a fully automatic way. Examples based on benchmark datasets demonstrate the validity and effectiveness of the proposed approach."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , ; dct:date "2018-10-07"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "A Deep Rule-Based Approach for Satellite Scene Image Analysis"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Miyazaki, Japan"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen"^^xsd:string; foaf:name "Plamen Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "FINAL VERSION.pdf"^^xsd:string . rdfs:label "FINAL VERSION.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69758 \n\nA Multipopulation-Based Multiobjective Evolutionary Algorithm\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "A Multipopulation-Based Multiobjective Evolutionary Algorithm (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Multipopulation-Based Multiobjective Evolutionary Algorithm (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Multipopulation-Based Multiobjective Evolutionary Algorithm (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Multipopulation-Based Multiobjective Evolutionary Algorithm (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Multipopulation-Based Multiobjective Evolutionary Algorithm (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Multipopulation-Based Multiobjective Evolutionary Algorithm (Other)"^^xsd:string . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Multipopulation-Based Multiobjective Evolutionary Algorithm (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Multipopulation-Based Multiobjective Evolutionary Algorithm (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Multipopulation-Based Multiobjective Evolutionary Algorithm (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Multipopulation-Based Multiobjective Evolutionary Algorithm (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Multipopulation-Based Multiobjective Evolutionary Algorithm (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Multipopulation-Based Multiobjective Evolutionary Algorithm (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Multipopulation is an effective optimization component often embedded into evolutionary algorithms to solve optimization problems. In this paper, a new multipopulation-based multiobjective genetic algorithm (MOGA) is proposed, which uses a unique cross-subpopulation migration process inspired by biological processes to share information between subpopulations. Then, a Markov model of the proposed multipopulation MOGA is derived, the first of its kind, which provides an exact mathematical model for each possible population occurring simultaneously with multiple objectives. Simulation results of two multiobjective test problems with multiple subpopulations justify the derived Markov model, and show that the proposed multipopulation method can improve the optimization ability of the MOGA. Also, the proposed multipopulation method is applied to other multiobjective evolutionary algorithms (MOEAs) for evaluating its performance against the IEEE Congress on Evolutionary Computation multiobjective benchmarks. The experimental results show that a single-population MOEA can be extended to a multipopulation version, while obtaining better optimization performance."^^xsd:string; bibo:authorList ; bibo:issue "2"; bibo:status , ; bibo:volume "50"; dc:hasVersion , ; dct:creator , , , , , ; dct:date "2018-10-05"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A Multipopulation-Based Multiobjective Evolutionary Algorithm"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science (General)"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ma"^^xsd:string; foaf:givenName "Haiping"^^xsd:string; foaf:name "Haiping Ma"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Crookes"^^xsd:string; foaf:givenName "Danny"^^xsd:string; foaf:name "Danny Crookes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhou"^^xsd:string; foaf:givenName "Huiyu"^^xsd:string; foaf:name "Huiyu Zhou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fei"^^xsd:string; foaf:givenName "Minrui"^^xsd:string; foaf:name "Minrui Fei"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jiang"^^xsd:string; foaf:givenName "Zheheng"^^xsd:string; foaf:name "Zheheng Jiang"^^xsd:string; rdf:type foaf:Person . bibo:issn "21682267"; foaf:name "IEEE Transactions on Cybernetics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90114 \n\nToward Anthropomorphic Machine Learning\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "Future intelligent machines will be more human-friendly and human-like, while offering much higher throughput and automation, thus augmenting our (human) capabilities. Anthropomorphic machine learning is an emerging direction for future development in artificial intelligence (AI) and data science. This revolutionary shift offers human-like abilities to the next generation of machine learning with greater potential for underpinning breakthroughs in technology development as well as in various aspects of everyday life."^^xsd:string; bibo:authorList ; bibo:issue "9"; bibo:status , ; bibo:volume "51"; dct:creator , ; dct:date "2018-10-04"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Toward Anthropomorphic Machine Learning"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P."^^xsd:string; foaf:name "Plamen P. Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "00189162"; foaf:name "Computer"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "CEC-2018-Goncalves.pdf"^^xsd:string . rdfs:label "CEC-2018-Goncalves.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #74161 \n\nA survey of genetic algorithms for multi-label classification\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A survey of genetic algorithms for multi-label classification (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A survey of genetic algorithms for multi-label classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A survey of genetic algorithms for multi-label classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A survey of genetic algorithms for multi-label classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A survey of genetic algorithms for multi-label classification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A survey of genetic algorithms for multi-label classification (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "In recent years, multi-label classification (MLC) has become an emerging research topic in big data analytics and machine learning. In this problem, each object of a dataset may belong to multiple class labels and the goal is to learn a classification model that can infer the correct labels of new, previously unseen, objects. This paper presents a survey of genetic algorithms (GAs) designed for MLC tasks. The study is organized in three parts. First, we propose a new taxonomy focused on GAs for MLC. In the second part, we provide an up-to-date overview of the work in this area, categorizing the approaches identified in the literature with respect to the taxonomy. In the third and last part, we discuss some new ideas for combining GAs with MLC."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-10-04"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A survey of genetic algorithms for multi-label classification"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "2018 IEEE Congress on Evolutionary Computation (CEC 2018)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Rio de Janeiro, Brazil"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Plastino"^^xsd:string; foaf:givenName "Alexandre"^^xsd:string; foaf:name "Alexandre Plastino"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Goncalves"^^xsd:string; foaf:givenName "E.C."^^xsd:string; foaf:name "E.C. Goncalves"^^xsd:string; rdf:type foaf:Person . foaf:name "Proceedings of the 2018 IEEE Congress on Evolutionary Computation (CEC 2018)"^^xsd:string; rdf:type bibo:Collection . rdfs:label "08481441.pdf"^^xsd:string . rdfs:label "08481441.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69882 \n\nAn in-Depth Study of the Jisut Family of Android Ransomware\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An in-Depth Study of the Jisut Family of Android Ransomware (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An in-Depth Study of the Jisut Family of Android Ransomware (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An in-Depth Study of the Jisut Family of Android Ransomware (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An in-Depth Study of the Jisut Family of Android Ransomware (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An in-Depth Study of the Jisut Family of Android Ransomware (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An in-Depth Study of the Jisut Family of Android Ransomware (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Android malware is increasing in spread and complexity. Advanced obfuscation, emulation detection, delayed payload activation or dynamic code loading are some of the techniques employed by the current malware to hinder the use of reverse engineering techniques and anti-malware tools. This growing complexity is particularly noticeable in the evolution of different strands of the same malware family. Over the years, these families mature to become more effective by incorporating new and enhanced techniques. In this paper, we focus on a particular Android ransomware family named Jisut, and perform a thorough technical analysis. We also provide a detailed overall perspective, which will hopefully help to create new tools and techniques to tackle more effectively the threat posed by ransomware."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "6"; dc:hasVersion ; dct:creator , , ; dct:date "2018-10-04"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "An in-Depth Study of the Jisut Family of Android Ransomware"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Martin"^^xsd:string; foaf:givenName "Alejandro"^^xsd:string; foaf:name "Alejandro Martin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Camacho"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Camacho"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio C."^^xsd:string; foaf:name "Julio C. Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . bibo:issn "21693536"; foaf:name "IEEE Access"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "main.pdf"^^xsd:string . rdfs:label "main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69683 \n\nOn Urgency in Asynchronous Timed Session Types\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "On Urgency in Asynchronous Timed Session Types (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "On Urgency in Asynchronous Timed Session Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On Urgency in Asynchronous Timed Session Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On Urgency in Asynchronous Timed Session Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On Urgency in Asynchronous Timed Session Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On Urgency in Asynchronous Timed Session Types (Other)"^^xsd:string . rdf:_1 . bibo:abstract "We study an urgent semantics of asynchronous timed session types, where input actions happen as soon as possible. We show that with this semantics we can recover to the timed setting an appealing property of untimed session types: namely, deadlock-freedom is preserved when passing from synchronous to asynchronous communication."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "279"; dc:hasVersion ; dct:creator ; dct:date "2018-10-04"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "On Urgency in Asynchronous Timed Session Types"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . dct:title "Interaction and Concurrency Experience 2018"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Madrid, Spain"^^xsd:string . foaf:name "Open Publishing Association"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Murgia"^^xsd:string; foaf:givenName "Maurizio"^^xsd:string; foaf:name "Maurizio Murgia"^^xsd:string; rdf:type foaf:Person . bibo:issn "20752180"; foaf:name "Electronic Proceedings in Theoretical Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90113 \n\nDeep rule-based classifier with human-level performance and characteristics\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "In this paper, a new type of multilayer rule-based classifier is proposed and applied to image classification problems. The proposed approach is entirely data-driven and fully automatic. It is generic and can be applied to various classification and prediction problems, but in this paper we focus on image processing, in particular. The core of the classifier is a fully interpretable, understandable, self-organized set of IF…THEN… fuzzy rules based on the prototypes autonomously identified by using a one-pass type training process. The classifier can self-evolve and be updated continuously without a full retraining. Due to the prototype-based nature, it is non-parametric; its training process is non-iterative, highly parallelizable and computationally efficient. At the same time, the proposed approach is able to achieve very high classification accuracy on various benchmark datasets surpassing most of the published methods, be comparable with the human abilities. In addition, it can start classification from the first image of each class in the same way as humans do, which makes the proposed classifier suitable for real-time applications. Numerical examples of benchmark image processing demonstrate the merits of the proposed approach."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "463-64"; dct:creator , ; dct:date "2018-10-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Deep rule-based classifier with human-level performance and characteristics"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P."^^xsd:string; foaf:name "Plamen P. Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "00200255"; foaf:name "Information Sciences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90112 \n\nA Generalized Methodology for Data Analysis\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Based on a critical analysis of data analytics and its foundations, we propose a functional approach to estimate data ensemble properties, which is based entirely on the empirical observations of discrete data samples and the relative proximity of these points in the data space and hence named empirical data analysis (EDA). The ensemble functions include the nonparametric square centrality (a measure of closeness used in graph theory) and typicality (an empirically derived quantity which resembles probability). A distinctive feature of the proposed new functional approach to data analysis is that it does not assume randomness or determinism of the empirically observed data, nor independence. The typicality is derived from the discrete data directly in contrast to the traditional approach, where a continuous probability density function is assumed a priori. The typicality is expressed in a closed analytical form that can be calculated recursively and, thus, is computationally very efficient. The proposed nonparametric estimators of the ensemble properties of the data can also be interpreted as a discrete form of the information potential (known from the information theoretic learning theory as well as the Parzen windows). Therefore, EDA is very suitable for the current move to a data-rich environment, where the understanding of the underlying phenomena behind the available vast amounts of data is often not clear. We also present an extension of EDA for inference. The areas of applications of the new methodology of the EDA are wide because it concerns the very foundation of data analysis. Preliminary tests show its good performance in comparison to traditional techniques."^^xsd:string; bibo:authorList ; bibo:issue "10"; bibo:status , ; bibo:volume "48"; dct:creator , , ; dct:date "2018-10-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A Generalized Methodology for Data Analysis"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P."^^xsd:string; foaf:name "Plamen P. Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Principe"^^xsd:string; foaf:givenName "Jose C."^^xsd:string; foaf:name "Jose C. Principe"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "21682267"; foaf:name "IEEE Transactions on Cybernetics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "grace18-marr-et-al-newspeak-and-truffle-a-platform-for-grace.pdf"^^xsd:string . rdfs:label "grace18-marr-et-al-newspeak-and-truffle-a-platform-for-grace.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #70341 \n\nNewspeak and Truffle: A Platform for Grace?\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Newspeak and Truffle: A Platform for Grace? (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Newspeak and Truffle: A Platform for Grace? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Newspeak and Truffle: A Platform for Grace? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Newspeak and Truffle: A Platform for Grace? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Newspeak and Truffle: A Platform for Grace? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Newspeak and Truffle: A Platform for Grace? (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-10-01"; dct:isPartOf ; dct:title "Newspeak and Truffle: A Platform for Grace?"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "Grace'18"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Boston, MA, USA"^^xsd:string . foaf:familyName "Noble"^^xsd:string; foaf:givenName "James"^^xsd:string; foaf:name "James Noble"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Roberts"^^xsd:string; foaf:givenName "Richard"^^xsd:string; foaf:name "Richard Roberts"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90401 \n\nStability of Evolving Fuzzy Systems Based on Data Clouds\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Evolving fuzzy systems (EFSs) are now well developed and widely used, thanks to their ability to self-adapt both their structures and parameters online. Since the concept was first introduced two decades ago, many different types of EFSs have been successfully implemented. However, there are only very few works considering the stability of the EFSs, and these studies were limited to certain types of membership functions with specifically predefined parameters, which largely increases the complexity of the learning process. At the same time, stability analysis is of paramount importance for control applications and provides the theoretical guarantees for the convergence of the learning algorithms. In this paper, we introduce the stability proof of a class of EFSs based on data clouds, which are grounded at the AnYa type fuzzy systems and the recently introduced empirical data analytics (EDA) methodological framework. By employing data clouds, the class of EFSs of AnYa type considered in this paper avoids the traditional way of defining membership functions for each input variable in an explicit manner and its learning process is entirely data driven. The stability of the considered EFS of AnYa type is proven through the Lyapunov theory, and the proof of stability shows that the average identification error converges to a small neighborhood of zero. Although, the stability proof presented in this paper is specially elaborated for the considered EFS, it is also applicable to general EFSs. The proposed method is illustrated with Box-Jenkins gas furnace problem, one nonlinear system identification problem, Mackey-Glass time series prediction problem, eight real-world benchmark regression problems as well as a high-frequency trading prediction problem. Compared with other EFSs, the numerical examples show that the considered EFS in this paper provides guaranteed stability as well as a better approximation accuracy."^^xsd:string; bibo:authorList ; bibo:issue "5"; bibo:status , ; bibo:volume "26"; dct:creator , , , ; dct:date "2018-10-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Stability of Evolving Fuzzy Systems Based on Data Clouds"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P."^^xsd:string; foaf:name "Plamen P. Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rong"^^xsd:string; foaf:givenName "Hai-Jun"^^xsd:string; foaf:name "Hai-Jun Rong"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bai"^^xsd:string; foaf:givenName "Jian-Ming"^^xsd:string; foaf:name "Jian-Ming Bai"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "10636706"; foaf:name "IEEE Transactions on Fuzzy Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "GRIG.pdf"^^xsd:string . rdfs:label "GRIG.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67553 \n\nSelective Monitoring\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Selective Monitoring (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Selective Monitoring (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Selective Monitoring (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Selective Monitoring (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Selective Monitoring (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Selective Monitoring (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "We study selective monitors for labelled Markov chains. Monitors observe the outputs that are\r\ngenerated by a Markov chain during its run, with the goal of identifying runs as correct or faulty.\r\nA monitor is selective if it skips observations in order to reduce monitoring overhead. We are\r\ninterested in monitors that minimize the expected number of observations. We establish an\r\nundecidability result for selectively monitoring general Markov chains. On the other hand, we\r\nshow for non-hidden Markov chains (where any output identifies the state the Markov chain is\r\nin) that simple optimal monitors exist and can be computed efficiently, based on DFA language\r\nequivalence. These monitors do not depend on the precise transition probabilities in the Markov\r\nchain. We report on experiments where we compute these monitors for several open-source\r\nJava projects."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "20"; dc:hasVersion ; dct:creator , ; dct:date "2018-09-30"; dct:isPartOf , ; dct:publisher ; dct:title "Selective Monitoring"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "29th International Conference on Concurrency Theory (CONCUR 2018), 4--7 September 2018, Beijing, China"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Beijing, China"^^xsd:string . foaf:name "LIPICS"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Kiefer"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Kiefer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grigore"^^xsd:string; foaf:givenName "Radu"^^xsd:string; foaf:name "Radu Grigore"^^xsd:string; rdf:type foaf:Person . bibo:issn "18688969"; foaf:name "Leibniz International Proceedings in Informatics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #69298 \n\nAutomatic detection of core Erlang message passing errors\n\n"; foaf:primaryTopic . rdf:_1 . bibo:abstract "Erlang's powerful communication model allows us to build high-level concurrent systems. These can, however, harbour subtle communication errors less severe than global deadlock or crashes: messages never received can degrade performance and consume swaths of memory. We believe that some of these errors can be quickly detected with static analysis. We have built a prototype tool which operates at the Core Erlang level to assist identification of some of these errors.\r\n\r\nWe present a fragment of Erlang's type system as a subtyping relation, following up with type inference functions for a portion of Core Erlang's patterns, guards, and message syntax. The implementation of the prototype is detailed, noting specific behaviours of the Erlang compiler and nuances of Core Erlang's syntax along the way, some of which complicate our analysis.\r\n\r\nAlthough our tool is at a very early stage of development, we show examples of the errors we can identify, despite using a considerable over-approximation in our type inference system. After comparing our tool to other work in the Erlang community and beyond, we reflect on the current state of the prototype, before considering further applications of our concept of message compatibility."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator ; dct:date "2018-09-29"; dct:isPartOf , ; dct:publisher ; dct:title "Automatic detection of core Erlang message passing errors"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "Erlang 2018 Proceedings of the 17th ACM SIGPLAN International Workshop on Erlang"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "St. Louis, MO, USA"^^xsd:string . foaf:name "ACM Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Harrison"^^xsd:string; foaf:givenName "Joseph"^^xsd:string; foaf:name "Joseph Harrison"^^xsd:string; rdf:type foaf:Person . foaf:name "Proceedings of the 17th ACM SIGPLAN International Workshop on Erlang - Erlang 2018"^^xsd:string; rdf:type bibo:Collection . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "69211.pdf"^^xsd:string . rdfs:label "69211.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69211 \n\nAutomatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Currently, carbon dioxide (CO2) waveforms measured by capnography are used to estimate respiratory rate and end-tidal CO2 (EtCO2) in the clinic. However, the shape of the CO2 signal carries significant diagnostic information about the asthmatic condition. Previous studies have shown a strong correlation between various features that quantitatively characterize the shape of CO2 signal and are used to discriminate asthma from non-asthma using pulmonary function tests, but no reliable progress was made, and no translation into clinical practice has been achieved. Therefore, this study reports a relatively simple signal processing algorithm for automatic differentiation of asthma and non-asthma. CO2 signals were recorded from 30 non-asthmatic and 43 asthmatic patients. Each breath cycle was decomposed into subcycles, and features were computationally extracted. Thereafter, feature selection was performed using the area (Az) under the receiver operating characteristics curve analysis. A classification was performed via a leave-one-out (LOO) cross-validation procedure by employing a support vector machine (SVM). Our results show maximum screening capabilities for upward expiration (AR1), downward inspiration (AR2) and the sum of AR1 and AR2, with an Az of 0.892, 0.803, and 0.793, respectively. The proposed method obtained an average accuracy of 94.52%, sensitivity of 97.67%, and specificity of 90% for discrimination of asthma and non-asthma. The proposed method allows for automatic classification of asthma and non-asthma condition by analyzing the shape of the CO2 waveform. The developed method may possibly be incorporated in real-time for assessment and management of the asthmatic conditions."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-09-20"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine"^^xsd:string; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "R858 Computer applications to medicine. Medical informatics. Medical information technology" . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Singh"^^xsd:string; foaf:givenName "Om Prakash"^^xsd:string; foaf:name "Om Prakash Singh"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Malarvilli"^^xsd:string; foaf:givenName "M.B."^^xsd:string; foaf:name "M.B. Malarvilli"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . bibo:issn "21693536"; foaf:name "IEEE Access"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "stack 10.1186%2Fs13174-018-0090-7.pdf"^^xsd:string . rdfs:label "stack 10.1186%2Fs13174-018-0090-7.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67437 \n\nSelf-adaptive Authorisation in OpenStack Cloud Platform\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Self-adaptive Authorisation in OpenStack Cloud Platform (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptive Authorisation in OpenStack Cloud Platform (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptive Authorisation in OpenStack Cloud Platform (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptive Authorisation in OpenStack Cloud Platform (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptive Authorisation in OpenStack Cloud Platform (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptive Authorisation in OpenStack Cloud Platform (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Self-adaptive Authorisation in OpenStack Cloud Platform (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptive Authorisation in OpenStack Cloud Platform (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptive Authorisation in OpenStack Cloud Platform (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptive Authorisation in OpenStack Cloud Platform (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptive Authorisation in OpenStack Cloud Platform (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptive Authorisation in OpenStack Cloud Platform (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . ; bibo:abstract "Although major advances have been made in protection of cloud platforms against malicious attacks, little has been done regarding the protection of these platforms against insider threats. \r\nThis paper looks into this challenge by introducing self-adaptation as a mechanism to handle insider threats in cloud platforms, and this will be demonstrated in the context of OpenStack.\r\nOpenStack is a popular cloud platform that relies on Keystone, its identity management component, for controlling access to its resources.\r\nThe use of self-adaptation for handling insider threats has been motivated by the fact that self-adaptation has been shown to be quite effective in dealing with uncertainty in a wide range of applications. \r\nInsider threats have become a major cause for concern since legitimate, though malicious, users might have access, in case of theft, to a large amount of information. \r\nThe key contribution of this paper is the definition of an architectural solution that incorporates self-adaptation into OpenStack Keystone in order to handle insider threats. \r\nFor that, we have identified and analysed several insider threats scenarios in the context of the OpenStack cloud platform, and have developed a prototype that was used for experimenting and evaluating the impact of these scenarios upon the self-adaptive authorisation system for the cloud platforms."^^xsd:string; bibo:authorList ; bibo:issue "19"; bibo:status , ; bibo:volume "9"; dc:hasVersion , ; dct:creator , , , ; dct:date "2018-09-16"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Self-adaptive Authorisation in OpenStack Cloud Platform"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "da Silva"^^xsd:string; foaf:givenName "Carlos Eduardo"^^xsd:string; foaf:name "Carlos Eduardo da Silva"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cacho"^^xsd:string; foaf:givenName "Nelio"^^xsd:string; foaf:name "Nelio Cacho"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Diniz"^^xsd:string; foaf:givenName "Thomas"^^xsd:string; foaf:name "Thomas Diniz"^^xsd:string; rdf:type foaf:Person . foaf:familyName ""^^xsd:string; foaf:givenName ""^^xsd:string; foaf:name " "^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Lemos"^^xsd:string; foaf:givenName "Rogerio"^^xsd:string; foaf:name "Rogerio de Lemos"^^xsd:string; rdf:type foaf:Person . bibo:issn "18674828"; foaf:name "Journal of Internet Services and Applications"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "version4[1].pdf"^^xsd:string . rdfs:label "version4[1].pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67161 \n\nSource-Aware Context Network for Single-Channel Multi-speaker Speech Separation\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Source-Aware Context Network for Single-Channel Multi-speaker Speech Separation (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Source-Aware Context Network for Single-Channel Multi-speaker Speech Separation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Source-Aware Context Network for Single-Channel Multi-speaker Speech Separation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Source-Aware Context Network for Single-Channel Multi-speaker Speech Separation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Source-Aware Context Network for Single-Channel Multi-speaker Speech Separation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Source-Aware Context Network for Single-Channel Multi-speaker Speech Separation (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Deep learning based approaches have achieved promising performance in speaker-dependent single-channel multi-speaker speech separation.However, partly due to the label permutation problem, they may encounter difficulties in speaker-independent conditions. Recent methods address this problem by some assignment operations. Different from them, we propose a novel source-aware context network, which explicitly inputs speech sources as well as mixture signal. By exploiting the temporal dependency and continuity of the same source signal, the permutation order of outputs can be easily determined without any additional post-processing. Furthermore, a Multi-time-step Prediction Training strategy is proposed to address the mismatch between training and inference stages. Experimental results on benchmark WSJ0-2mix dataset revealed that our network achieved comparable or better results than state-of-the-art methods in both closed-set and open-set conditions, in terms of Signal-to-Distortion Ratio (SDR) improvement."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2018-09-13"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Source-Aware Context Network for Single-Channel Multi-speaker Speech Separation"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Calgary, Alberta, Canada"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Dai"^^xsd:string; foaf:givenName "Li-Rong"^^xsd:string; foaf:name "Li-Rong Dai"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Zengxi"^^xsd:string; foaf:name "Zengxi Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Song"^^xsd:string; foaf:givenName "Yan"^^xsd:string; foaf:name "Yan Song"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "ICASSP-camera-ready.pdf"^^xsd:string . rdfs:label "ICASSP-camera-ready.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69762 \n\nMultiple Feature Fusion for Automatic Emotion Recognition Using EEG Signals\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Multiple Feature Fusion for Automatic Emotion Recognition Using EEG Signals (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Multiple Feature Fusion for Automatic Emotion Recognition Using EEG Signals (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multiple Feature Fusion for Automatic Emotion Recognition Using EEG Signals (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multiple Feature Fusion for Automatic Emotion Recognition Using EEG Signals (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multiple Feature Fusion for Automatic Emotion Recognition Using EEG Signals (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multiple Feature Fusion for Automatic Emotion Recognition Using EEG Signals (Other)"^^xsd:string . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Multiple Feature Fusion for Automatic Emotion Recognition Using EEG Signals (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Multiple Feature Fusion for Automatic Emotion Recognition Using EEG Signals (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multiple Feature Fusion for Automatic Emotion Recognition Using EEG Signals (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multiple Feature Fusion for Automatic Emotion Recognition Using EEG Signals (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multiple Feature Fusion for Automatic Emotion Recognition Using EEG Signals (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multiple Feature Fusion for Automatic Emotion Recognition Using EEG Signals (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Automatic emotion recognition based on electroencephalo-graphic (EEG) signals has received increasing attention in recent years. The Deep Residual Networks (ResNets) can solve vanishing gradient problem and exploding gradient problem well in computer vision and can learn more profound semantic information. And for traditional methods, frequency features often play important role in signal processing area. Thus, in this paper, we use the pre-trained ResNets to extract deep semantic information and the linear-frequency cepstral coefficients (LFCC) as features from raw EEG signals. Then the two features are fused to improve the emotion classification performance of our approach. Moreover, several classifiers are used for our fused features to evaluate the performance and it shows that the proposed approach is effective for emotion classification. We find that the best performance is achieved when use k-nearst neighbor (KNN) as classifier, and we provide a detailed discussion for the reason."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion , ; dct:creator , , , , , ; dct:date "2018-09-13"; dct:isPartOf ; dct:publisher ; dct:title "Multiple Feature Fusion for Automatic Emotion Recognition Using EEG Signals"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Calgary, AB, Canada"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Fang"^^xsd:string; foaf:givenName "Y."^^xsd:string; foaf:name "Y. Fang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hou"^^xsd:string; foaf:givenName "L."^^xsd:string; foaf:name "L. Hou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Liu"^^xsd:string; foaf:givenName "N."^^xsd:string; foaf:name "N. Liu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "L."^^xsd:string; foaf:name "L. Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yang"^^xsd:string; foaf:givenName "F."^^xsd:string; foaf:name "F. Yang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Guo"^^xsd:string; foaf:givenName "Y."^^xsd:string; foaf:name "Y. Guo"^^xsd:string; rdf:type foaf:Person . rdfs:label "2018_icassp_3.pdf"^^xsd:string . rdfs:label "2018_icassp_3.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67162 \n\nEnabling Early Audio Event Detection With Neural Networks\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Enabling Early Audio Event Detection With Neural Networks (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Enabling Early Audio Event Detection With Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling Early Audio Event Detection With Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling Early Audio Event Detection With Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling Early Audio Event Detection With Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Enabling Early Audio Event Detection With Neural Networks (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "This paper presents a methodology for early detection of audio events from audio streams. Early detection is the ability to infer an ongoing event during its initial stage. The proposed system consists of a novel inference step coupled with dual parallel tailored-loss deep neural networks (DNNs). The DNNs share a similar architecture except for their loss functions, i.e. weighted loss and multitask loss, which are designed to efficiently cope with issues common to audio event detection. The inference step is newly introduced to make use of the network output for recognizing ongoing events. The monotonicity of the detection function is required for reliable early detection, and will also be proved. Experiments on the ITC-Irst database show that the proposed system achieves state-of-the-art detection performance. Furthermore, even partial events are sufficient to achieve good performance similar to that obtained when an entire event is observed, enabling early event detection."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2018-09-13"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Enabling Early Audio Event Detection With Neural Networks"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Calgary, Alberta, Canada"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Koch"^^xsd:string; foaf:givenName "Philipp"^^xsd:string; foaf:name "Philipp Koch"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mertins"^^xsd:string; foaf:givenName "A."^^xsd:string; foaf:name "A. Mertins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . rdfs:label "main_single.pdf"^^xsd:string . rdfs:label "main_single.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67556 \n\nProgress-preserving Refinements of CTA\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Progress-preserving Refinements of CTA (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Progress-preserving Refinements of CTA (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Progress-preserving Refinements of CTA (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Progress-preserving Refinements of CTA (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Progress-preserving Refinements of CTA (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Progress-preserving Refinements of CTA (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "We develop a theory of refinement for timed asynchronous systems, in the setting of Communicating Timed Automata (CTA). Our refinement applies point-wise to the components of a system of CTA, and only affecting their time constraints—in this way, we achieve compositionality and decidability. We then establish a decidable condition under which our refinement preserves behavioural properties of systems,such as their global and local progress. Our theory provides guidelines on how to implement timed protocols using the real-time primitives of programming languages. We validate our theory through a series of experiments, supported by an open-source tool which implements our verification techniques."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-09-07"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Progress-preserving Refinements of CTA"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "29th International Conference on Concurrency Theory (CONCUR 2018), 4--7 September 2018, Beijing, China"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Beijing, China"^^xsd:string . foaf:name "Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bartoletti"^^xsd:string; foaf:givenName "Massimo"^^xsd:string; foaf:name "Massimo Bartoletti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Murgia"^^xsd:string; foaf:givenName "Massimo"^^xsd:string; foaf:name "Massimo Murgia"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bocchi"^^xsd:string; foaf:givenName "Laura"^^xsd:string; foaf:name "Laura Bocchi"^^xsd:string; rdf:type foaf:Person . bibo:issn "18688969"; foaf:name "Leibniz International Proceedings in Informatics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Koch2018b.pdf"^^xsd:string . rdfs:label "Koch2018b.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72665 \n\nRecurrent Neural Networks with Weighting Loss for Early Prediction of Hand Movements\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Recurrent Neural Networks with Weighting Loss for Early Prediction of Hand Movements (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Recurrent Neural Networks with Weighting Loss for Early Prediction of Hand Movements (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Recurrent Neural Networks with Weighting Loss for Early Prediction of Hand Movements (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Recurrent Neural Networks with Weighting Loss for Early Prediction of Hand Movements (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Recurrent Neural Networks with Weighting Loss for Early Prediction of Hand Movements (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Recurrent Neural Networks with Weighting Loss for Early Prediction of Hand Movements (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "We propose in this work an approach for early prediction of hand movements using recurrent neural networks (RNNs) and a novel weighting loss. The proposed loss function leverages the outputs of an RNN at different time steps and weights their contributions to the final loss linearly over time steps. Additionally, a sample weighting scheme also constitutes a part of the weighting loss to deal with the scarcity of the samples where a change of hand movements takes place. The experiments conducted with the Ninapro database reveal that our proposed approach not only improves the performance in the early prediction task but also obtains state of the art results in classification of hand movements. These results are especially promising for the amputees."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , ; dct:date "2018-09-07"; dct:isPartOf ; dct:title "Recurrent Neural Networks with Weighting Loss for Early Prediction of Hand Movements"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "26th European Signal Processing Conference (Eusipco 2018)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Rome, Italy"^^xsd:string . foaf:familyName "Katzberg"^^xsd:string; foaf:givenName "Fabrice"^^xsd:string; foaf:name "Fabrice Katzberg"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Maass"^^xsd:string; foaf:givenName "Marco"^^xsd:string; foaf:name "Marco Maass"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mertins"^^xsd:string; foaf:givenName "Alfred"^^xsd:string; foaf:name "Alfred Mertins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mazur"^^xsd:string; foaf:givenName "Radoslaw"^^xsd:string; foaf:name "Radoslaw Mazur"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Koch"^^xsd:string; foaf:givenName "Philipp"^^xsd:string; foaf:name "Philipp Koch"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . rdfs:label "CRv1_tracking_off.pdf"^^xsd:string . rdfs:label "CRv1_tracking_off.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69611 \n\nFear Learning for Flexible Decision Making in RoboCup: A Discussion\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Fear Learning for Flexible Decision Making in RoboCup: A Discussion (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Fear Learning for Flexible Decision Making in RoboCup: A Discussion (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fear Learning for Flexible Decision Making in RoboCup: A Discussion (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fear Learning for Flexible Decision Making in RoboCup: A Discussion (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fear Learning for Flexible Decision Making in RoboCup: A Discussion (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fear Learning for Flexible Decision Making in RoboCup: A Discussion (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . , , , ; bibo:abstract "In this paper, we address the stagnation of RoboCup com- petitions in the fields of contextual perception, real-time adaptation and flexible decision-making, mainly in regards to the Standard Platform League (SPL). We argue that our Situation-Aware FEar Learning (SAFEL) model has the necessary tools to leverage the SPL competition in these fields of research, by allowing robot players to learn the behaviour profile of the opponent team at runtime. Later, players can use this knowledge to predict when an undesirable outcome is imminent, thus having the chance to act towards preventing it. We discuss specific scenarios where SAFEL’s associative learning could help to increase the positive outcomes of a team during a soccer match by means of contextual adaptation."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "11175"; dc:hasVersion ; dct:creator , , ; dct:date "2018-09-07"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Fear Learning for Flexible Decision Making in RoboCup: A Discussion"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.87 Neural computers, neural networks"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "RoboCup 2017: Robot World Cup XXI"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Nagoya, Japan"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Tonidandel"^^xsd:string; foaf:givenName "Flavio"^^xsd:string; foaf:name "Flavio Tonidandel"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Obst"^^xsd:string; foaf:givenName "Oliver"^^xsd:string; foaf:name "Oliver Obst"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Johnson"^^xsd:string; foaf:givenName "Colin G."^^xsd:string; foaf:name "Colin G. Johnson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rizzi"^^xsd:string; foaf:givenName "Caroline"^^xsd:string; foaf:name "Caroline Rizzi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Akiyama"^^xsd:string; foaf:givenName "Hidehisa"^^xsd:string; foaf:name "Hidehisa Akiyama"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sammut"^^xsd:string; foaf:givenName "Claude"^^xsd:string; foaf:name "Claude Sammut"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Vargas"^^xsd:string; foaf:givenName "Patricia"^^xsd:string; foaf:name "Patricia Vargas"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "1-s2.0-S1935861X18303048-main.pdf"^^xsd:string . rdfs:label "1-s2.0-S1935861X18303048-main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69096 \n\nTheta network centrality correlates with tDCS response in disorders of consciousness\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Theta network centrality correlates with tDCS response in disorders of consciousness (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Theta network centrality correlates with tDCS response in disorders of consciousness (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Theta network centrality correlates with tDCS response in disorders of consciousness (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Theta network centrality correlates with tDCS response in disorders of consciousness (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Theta network centrality correlates with tDCS response in disorders of consciousness (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Theta network centrality correlates with tDCS response in disorders of consciousness (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "Transcranial direct current stimulation (tDCS) applied over the dorsolateral prefrontal cortex (DLPFC) has induced promising behavioral improvement, both in acute and chronic minimally conscious state (MCS - [ 1 ]) patients [ 2 , 3 ]. We previously defined a tDCS-responder as a patient who demonstrates a new sign of consciousness following stimulation, which was neither present beforehand, nor before or after the sham stimulation [ 2 ]. In a study investigating the metabolic and structural differences between DLPFC-tDCS-responders and non-responders, we have identified that tDCS-responders presented a preservation of brain metabolism and grey matter integrity under the stimulated area, but also in the thalamus and the precuneus, areas involved in consciousness recovery [ 4 ]. Even if these results provided relevant insights into potential biomarkers of responsiveness, the access to such neuroimaging techniques (positron emission tomography - PET - and magnetic resonance imaging - MRI) remains limited. Recently, it has been demonstrated that high-density electroencephalography (hdEEG) network metrics in the alpha band correlates with the level of consciousness [ 5 ]. In addition, a strong correlation between brain metabolism and hdEEG network metrics was reported, making this bedside assessment a robust way to evaluate patients’ brain function."^^xsd:string; bibo:authorList ; bibo:issue "6"; bibo:status , ; bibo:volume "11"; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2018-09-07"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Theta network centrality correlates with tDCS response in disorders of consciousness"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Cassol"^^xsd:string; foaf:givenName "Helena"^^xsd:string; foaf:name "Helena Cassol"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chatelle"^^xsd:string; foaf:givenName "Camille"^^xsd:string; foaf:name "Camille Chatelle"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Annen"^^xsd:string; foaf:givenName "Jitka"^^xsd:string; foaf:name "Jitka Annen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Laureys"^^xsd:string; foaf:givenName "Steven"^^xsd:string; foaf:name "Steven Laureys"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Martens"^^xsd:string; foaf:givenName "Géraldine"^^xsd:string; foaf:name "Géraldine Martens"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Thibaut"^^xsd:string; foaf:givenName "Aurore"^^xsd:string; foaf:name "Aurore Thibaut"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chennu"^^xsd:string; foaf:givenName "Srivas"^^xsd:string; foaf:name "Srivas Chennu"^^xsd:string; rdf:type foaf:Person . bibo:issn "1935861X"; foaf:name "Brain Stimulation"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "interspeech_sv.pdf"^^xsd:string . rdfs:label "interspeech_sv.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67451 \n\nAn Improved Deep Embedding Learning Method for Short Duration Speaker Verification\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An Improved Deep Embedding Learning Method for Short Duration Speaker Verification (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An Improved Deep Embedding Learning Method for Short Duration Speaker Verification (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Improved Deep Embedding Learning Method for Short Duration Speaker Verification (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Improved Deep Embedding Learning Method for Short Duration Speaker Verification (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Improved Deep Embedding Learning Method for Short Duration Speaker Verification (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Improved Deep Embedding Learning Method for Short Duration Speaker Verification (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "This paper presents an improved deep embedding learning method based on convolutional neural networks (CNN) for short-duration speaker verification (SV). Existing deep learning-based SV methods generally extract frontend embeddings from a feed-forward deep neural network, in which the long-term speaker characteristics are captured via a pooling operation over the input speech. The extracted embeddings are then scored via a backend model, such as Probabilistic Linear Discriminative Analysis (PLDA).\r\n\r\nTwo improvements are proposed for frontend embedding learning based on the CNN structure: (1) Motivated by the WaveNet for speech synthesis, dilated filters are designed to achieve a tradeoff between computational efficiency and receptive-filter size; and (2) A novel cross-convolutional-layer pooling method is exploited to capture $1^{st}$-order statistics for modelling long-term speaker characteristics. Specifically, the activations of one convolutional layer are aggregated with the guidance of the feature maps from the successive layer. To evaluate the effectiveness of our proposed methods, extensive experiments are conducted on the modified female portion of NIST SRE 2010 evaluations, with conditions ranging from 10s-10s to 5s-4s. Excellent performance has been achieved on each evaluation condition, significantly outperforming existing SV systems using i-vector and d-vector embeddings."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2018-09-06"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "An Improved Deep Embedding Learning Method for Short Duration Speaker Verification"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "Interspeech 2018"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Hyderabad, India"^^xsd:string . foaf:name "International Speech Communication Association"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Gao"^^xsd:string; foaf:givenName "Zhifu"^^xsd:string; foaf:name "Zhifu Gao"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Guo"^^xsd:string; foaf:givenName "Wu"^^xsd:string; foaf:name "Wu Guo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Song"^^xsd:string; foaf:givenName "Yan"^^xsd:string; foaf:name "Yan Song"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dai"^^xsd:string; foaf:givenName "Li-Rong"^^xsd:string; foaf:name "Li-Rong Dai"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . rdfs:label "Atten_pooling_v4.pdf"^^xsd:string . rdfs:label "Atten_pooling_v4.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67453 \n\nAn Attention Pooling based Representation Learning Method for Speech Emotion Recognition\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An Attention Pooling based Representation Learning Method for Speech Emotion Recognition (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An Attention Pooling based Representation Learning Method for Speech Emotion Recognition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Attention Pooling based Representation Learning Method for Speech Emotion Recognition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Attention Pooling based Representation Learning Method for Speech Emotion Recognition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Attention Pooling based Representation Learning Method for Speech Emotion Recognition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Attention Pooling based Representation Learning Method for Speech Emotion Recognition (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "This paper proposes an attention pooling based representation learning method for speech emotion recognition (SER). The emotional representation is learned in an end-to-end fashion by applying a deep convolutional neural network (CNN) directly to spectrograms extracted from speech utterances. Motivated by the success of GoogleNet, two groups of filters with different shapes are designed to capture both temporal and frequency domain context information from the input spectrogram. The learned features are concatenated and fed into the subsequent convolutional layers. To learn the final emotional representation, a novel attention pooling method is further proposed.\r\n\r\nCompared with the existing pooling methods, such as max-pooling and average-pooling, the proposed attention pooling can effectively incorporate class-agnostic bottom-up, and class-specific top-down, attention maps. We conduct extensive evaluations on benchmark IEMOCAP data to assess the effectiveness of the proposed representation. Results demonstrate a recognition performance of 71.8% weighted accuracy (WA) and 68% unweighted accuracy (UA) over four emotions, which outperforms the state-of-the-art method by about 3% absolute for WA and 4% for UA."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2018-09-06"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "An Attention Pooling based Representation Learning Method for Speech Emotion Recognition"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "Interspeech 2018"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Hyderabad, India"^^xsd:string . foaf:name "International Speech Communication Association"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Guo"^^xsd:string; foaf:givenName "Wu"^^xsd:string; foaf:name "Wu Guo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Pengcheng"^^xsd:string; foaf:name "Pengcheng Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Song"^^xsd:string; foaf:givenName "Yan"^^xsd:string; foaf:name "Yan Song"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dai"^^xsd:string; foaf:givenName "Li-Rong"^^xsd:string; foaf:name "Li-Rong Dai"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . rdfs:label "machine_hearing_v3.pdf.pdf"^^xsd:string . rdfs:label "machine_hearing_v3.pdf.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67448 \n\nEarly detection of continuous and partial audio events using CNN\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Early detection of continuous and partial audio events using CNN (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Early detection of continuous and partial audio events using CNN (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Early detection of continuous and partial audio events using CNN (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Early detection of continuous and partial audio events using CNN (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Early detection of continuous and partial audio events using CNN (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Early detection of continuous and partial audio events using CNN (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Sound event detection is an extension of the static auditory classification task into continuous environments, where performance depends jointly upon the detection of overlapping events and their correct classification. Several approaches have been published to date which either develop novel classifiers or employ well-trained static classifiers with a detection front-end. This paper takes the latter approach, by combining a proven CNN classifier acting on spectrogram image features, with time-frequency shaped energy detection that identifies seed regions within the spectrogram that are characteristic of auditory energy events. Furthermore, the shape detector is optimised to allow early detection of events as they are developing. Since some sound events naturally have longer durations than others, waiting until completion of entire events before classification may not be practical in a deployed system. The early detection capability of the system is thus evaluated for the classification of partial events. Performance for continuous event detection is shown to be good, with accuracy being maintained well when detecting partial events."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "2018-S"; dc:hasVersion ; dct:creator , , , , , , , , , , , , , , ; dct:date "2018-09-06"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Early detection of continuous and partial audio events using CNN"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "19th Annual Conference of the International Speech Communication (INTERSPEECH 2018)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Hyderabad, India"^^xsd:string . foaf:name "Yegnanarayana B."^^xsd:string; rdf:type foaf:Organization . foaf:name "Umesh S."^^xsd:string; rdf:type foaf:Organization . foaf:name "Narayanan S."^^xsd:string; rdf:type foaf:Organization . foaf:name "Sekhar C.C."^^xsd:string; rdf:type foaf:Organization . foaf:name "Ghosh P.K."^^xsd:string; rdf:type foaf:Organization . foaf:name "International Speech Communication Association"^^xsd:string; rdf:type foaf:Organization . foaf:name "Rao P."^^xsd:string; rdf:type foaf:Organization . foaf:name "Murthy H.A."^^xsd:string; rdf:type foaf:Organization . foaf:name "Prasanna S.R.M."^^xsd:string; rdf:type foaf:Organization . foaf:name "Alku P."^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Song"^^xsd:string; foaf:givenName "Yan"^^xsd:string; foaf:name "Yan Song"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lang"^^xsd:string; foaf:givenName "Yue"^^xsd:string; foaf:name "Yue Lang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pham"^^xsd:string; foaf:givenName "Lam Dang"^^xsd:string; foaf:name "Lam Dang Pham"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . bibo:issn "19909772"; foaf:name "Proceedings of Interspeech"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "template_v10.pdf"^^xsd:string . rdfs:label "template_v10.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67452 \n\nAcoustic Modeling with Densely Connected Residual Network for Multichannel Speech Recognition\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Acoustic Modeling with Densely Connected Residual Network for Multichannel Speech Recognition (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Acoustic Modeling with Densely Connected Residual Network for Multichannel Speech Recognition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Acoustic Modeling with Densely Connected Residual Network for Multichannel Speech Recognition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Acoustic Modeling with Densely Connected Residual Network for Multichannel Speech Recognition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Acoustic Modeling with Densely Connected Residual Network for Multichannel Speech Recognition (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Acoustic Modeling with Densely Connected Residual Network for Multichannel Speech Recognition (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Motivated by recent advances in computer vision research, this paper proposes a novel acoustic model called Densely Connected Residual Network (DenseRNet) for multichannel speech recognition. This combines the strength of both DenseNet and ResNet. It adopts the basic \"building blocks\" of ResNet with different convolutional layers, receptive field sizes and growth rates as basic components that are densely connected to form so-called denseR blocks. By concatenating the feature maps of all preceding layers as inputs, DenseRNet can not only strengthen gradient back-propagation for the vanishing-gradient problem, but also exploit multi-resolution feature maps. Preliminary experimental results on CHiME-3 have shown that DenseRNet achieves a word error rate (WER) of 7.58% on beamforming-enhanced speech with six channel real test data by cross entropy criteria training while WER is 10.23% for the official baseline. Besides, additional experimental results are also presented to demonstrate that DenseRNet exhibits the robustness to beamforming-enhanced speech as well as near and far-field speech."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2018-09-06"; dct:isPartOf ; dct:subject ; dct:title "Acoustic Modeling with Densely Connected Residual Network for Multichannel Speech Recognition"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "Interspeech 2018"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Hyderabad, India"^^xsd:string . foaf:familyName "Dai"^^xsd:string; foaf:givenName "Li-Rong"^^xsd:string; foaf:name "Li-Rong Dai"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tang"^^xsd:string; foaf:givenName "Jian"^^xsd:string; foaf:name "Jian Tang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Song"^^xsd:string; foaf:givenName "Yan"^^xsd:string; foaf:name "Yan Song"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . rdfs:label "article.pdf"^^xsd:string . rdfs:label "article.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #68499 \n\nAutomatic reordering for dataflow safety of Datalog\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Automatic reordering for dataflow safety of Datalog (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Automatic reordering for dataflow safety of Datalog (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Clauses and subgoals in a Datalog program can be given in any order without affecting program meaning. However, practical applications of the language require the use of built-in or external predicates with particular dataflow requirements. These can be expressed as input or output “modes” on arguments. We describe a static analysis of moding for Datalog which calculates how to transform an ill-moded program into a well-moded program by reordering clause subgoals to satisfy dataflow requirements. We de- scribe an incremental algorithm which efficiently finds a reordering if it exists. This frees the programmer to focus on the declarative specification of a program rather than implementation details of external predicates. We prove that our computed reorderings yield well-moded programs (soundness) and if a program can be made well-moded, then we compute a reordering to do so (completeness)."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-09-03"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Automatic reordering for dataflow safety of Datalog"^^xsd:string; ep:hasAccepted ; ep:hasDocument , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "20th International Symposium on Principles and Practice of Declarative Programming"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Frankfurt am Main, Germany"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Rice"^^xsd:string; foaf:givenName "Andrew C."^^xsd:string; foaf:name "Andrew C. Rice"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Orchard"^^xsd:string; foaf:givenName "Dominic A."^^xsd:string; foaf:name "Dominic A. Orchard"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Contrastin"^^xsd:string; foaf:givenName "Mistral"^^xsd:string; foaf:name "Mistral Contrastin"^^xsd:string; rdf:type foaf:Person . foaf:name "Proceedings of the 20th International Symposium on Principles and Practice of Declarative Programming"^^xsd:string; rdf:type bibo:Collection . rdfs:label "DGP_R2-correctedTypo.pdf"^^xsd:string . rdfs:label "DGP_R2-correctedTypo.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67024 \n\nDecomposition Genetic Programming: An Extensive Evaluation on Rainfall Prediction in the Context of Weather Derivatives\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Decomposition Genetic Programming: An Extensive Evaluation on Rainfall Prediction in the Context of Weather Derivatives (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Decomposition Genetic Programming: An Extensive Evaluation on Rainfall Prediction in the Context of Weather Derivatives (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Decomposition Genetic Programming: An Extensive Evaluation on Rainfall Prediction in the Context of Weather Derivatives (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Decomposition Genetic Programming: An Extensive Evaluation on Rainfall Prediction in the Context of Weather Derivatives (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Decomposition Genetic Programming: An Extensive Evaluation on Rainfall Prediction in the Context of Weather Derivatives (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Decomposition Genetic Programming: An Extensive Evaluation on Rainfall Prediction in the Context of Weather Derivatives (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Regression problems provide some of the most challenging research opportunities in the area of machine learning,\r\nwhere the predictions of some target variables are critical to a specific application. Rainfall is a prime example, as it\r\nexhibits unique characteristics of high volatility and chaotic patterns that do not exist in other time series data. Moreover,\r\nrainfall is essential for applications that surround financial securities, such as rainfall derivatives. This paper\r\nextensively evaluates a novel algorithm called Decomposition Genetic Programming (DGP), which is an algorithm\r\nthat decomposes the problem of rainfall into subproblems. Decomposition allows the GP to focus on each subproblem,\r\nbefore combining back into the full problem. The GP does this by having a separate regression equation for\r\neach subproblem, based on the level of rainfall. As we turn our attention to subproblems, this reduces the difficulty\r\nwhen dealing with data sets with high volatility and extreme rainfall values, since these values can be focused on\r\nindependently. We extensively evaluate our algorithm on 42 cities from Europe and the USA, and compare its performance\r\nto the current state-of-the-art (Markov chain extended with rainfall prediction), and six other popular machine\r\nlearning algorithms (Genetic Programming without decomposition, Support Vector Regression, Radial Basis Neural\r\nNetworks, M5 Rules, M5 Model trees, and k-Nearest Neighbours). Results show that the DGP is able to consistently\r\nand significantly outperform all other algorithms. Lastly, another contribution of this work is to discuss the effect that\r\nDGP has had on the coverage of the rainfall predictions and whether it shows robust performance across different\r\nclimates."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "70"; dc:hasVersion ; dct:creator , , ; dct:date "2018-09-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Decomposition Genetic Programming: An Extensive Evaluation on Rainfall Prediction in the Context of Weather Derivatives"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kampouridis"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Kampouridis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cramer"^^xsd:string; foaf:givenName "Sam"^^xsd:string; foaf:name "Sam Cramer"^^xsd:string; rdf:type foaf:Person . bibo:issn "15684946"; foaf:name "Applied Soft Computing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90202 \n\nA method for autonomous data partitioning\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "In this paper, we propose a fully autonomous, local-modes-based data partitioning algorithm, which is able to automatically recognize local maxima of the data density from empirical observations and use them as focal points to form shape-free data clouds, i.e. a form of Voronoi tessellation. The method is free from user- and problem- specific parameters and prior assumptions. The proposed algorithm has two versions: i) offline for static data and ii) evolving for streaming data. Numerical results based on benchmark datasets prove the validity of the proposed algorithm and demonstrate its excellent performance and high computational efficiency compared with the state-of-art clustering algorithms."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "460-46"; dct:creator , , ; dct:date "2018-09-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A method for autonomous data partitioning"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P."^^xsd:string; foaf:name "Plamen P. Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Príncipe"^^xsd:string; foaf:givenName "José C."^^xsd:string; foaf:name "José C. Príncipe"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "00200255"; foaf:name "Information Sciences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Comodo-ESWA-2018.pdf"^^xsd:string . rdfs:label "Comodo-ESWA-2018.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66566 \n\nComodo: Collaborative Monitoring of Commitment Delegations\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Comodo: Collaborative Monitoring of Commitment Delegations (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Comodo: Collaborative Monitoring of Commitment Delegations (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Comodo: Collaborative Monitoring of Commitment Delegations (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Comodo: Collaborative Monitoring of Commitment Delegations (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Comodo: Collaborative Monitoring of Commitment Delegations (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Comodo: Collaborative Monitoring of Commitment Delegations (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Understanding accountability in contract violations, e.g., whom is accountable for what, is a tedious, time-consuming, and costly task for human decision-making, especially when contractual responsibilities are delegated among parties. Intelligent software agents equipped with expert capabilities such as monitoring and diagnosis help save time and improve accuracy of diagnosis by formal reasoning upon electronic contracts. Such contracts are represented as commitment norms, a well studied artifact in multi-agent systems, which provide semantics for agent interactions. Due to the open and heterogeneous nature of multi-agent systems, commitments are often violated. When a commitment is violated, e.g., an exception occurs, agents need to collaborate to understand what went wrong and which agent is responsible. We propose Comodo: a framework for monitoring commitment delegations and detecting violations. We define a complete set of possible rational delegation schemes for commitments, identifying for each combination of delegations what critical situations may lead to an improper delegation and potentially to a commitment violation. Comodo provides a sound and complete distributed reasoning procedure that is able to find all improper delegations of a given commitment. We provide the complete implementation of Comodo using the Reactive Event Calculus, and present an e-commerce case study to demonstrate its workings. Due to its generic nature, we discuss the application of our approach to other distributed diagnosis problems in emergency healthcare, Internet of Things and smart environments, and security, privacy, and accountability in the context of socio-technical systems"^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "105"; dc:hasVersion ; dct:creator , ; dct:date "2018-09-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Comodo: Collaborative Monitoring of Commitment Delegations"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76.E95 Expert Systems (Intelligent Knowledge Based Systems) "@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Torroni"^^xsd:string; foaf:givenName "Paolo"^^xsd:string; foaf:name "Paolo Torroni"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kafalı"^^xsd:string; foaf:givenName "Özgur"^^xsd:string; foaf:name "Özgur Kafalı"^^xsd:string; rdf:type foaf:Person . bibo:issn "09574174"; foaf:name "Expert Systems with Applications"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Michelmann_et_al_Data_driven_re_referencing_Journal_of_Neuroscience_Methods_2018 ACCEPTED VERSION(1).pdf"^^xsd:string . rdfs:label "Michelmann_et_al_Data_driven_re_referencing_Journal_of_Neuroscience_Methods_2018 ACCEPTED VERSION(1).pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67587 \n\nData-driven re-referencing of intracranial EEG based on independent component analysis (ICA)\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Data-driven re-referencing of intracranial EEG based on independent component analysis (ICA) (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Data-driven re-referencing of intracranial EEG based on independent component analysis (ICA) (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data-driven re-referencing of intracranial EEG based on independent component analysis (ICA) (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data-driven re-referencing of intracranial EEG based on independent component analysis (ICA) (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data-driven re-referencing of intracranial EEG based on independent component analysis (ICA) (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Data-driven re-referencing of intracranial EEG based on independent component analysis (ICA) (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 ; rdf:_11 ; rdf:_12 ; rdf:_13 ; rdf:_14 ; rdf:_15 . bibo:abstract "Background: Intracranial recordings from patients implanted with depth electrodes are a valuable source of information in neuroscience. They allow for the unique opportunity to record brain activity with high spatial and temporal resolution. A common pre-processing choice in stereotactic EEG (S-EEG) is to re-reference the data with a bipolar montage. In this, each channel is subtracted from its neighbor, to reduce commonalities between channels and isolate activity that is spatially confined.\r\n\r\nNew Method: We challenge the assumption that bipolar reference effectively performs this task. To extract local activity, the distribution of the signal source of interest, interfering distant signals, and noise need to be considered. Referencing schemes with fixed coefficients can decrease the signal to noise ratio (SNR) of the data, they can lead to mislocalization of activity and consequently to misinterpretation of results. We propose to use Independent Component Analysis (ICA), to derive filter coefficients that reflect the statistical dependencies of the data at hand.\r\n\r\nResults: We describe and demonstrate this on human S-EEG recordings. In a simulation with real data, we quantitatively show that ICA outperforms the bipolar referencing operation in sensitivity and importantly in specificity when revealing local time series from the superposition of neighboring channels.\r\n\r\nComparison with Existing Method: We argue that ICA already performs the same task that bipolar referencing pursues, namely undoing the linear superposition of activity and will identify activity that is local.\r\n\r\nConclusions: When investigating local sources in human S-EEG, ICA should be preferred over re-referencing the data with a bipolar montage."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "307"; dc:hasVersion ; dct:creator , , , , , , , , , , , , , , ; dct:date "2018-09-01"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Data-driven re-referencing of intracranial EEG based on independent component analysis (ICA)"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "R Medicine"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hanslmayr"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Hanslmayr"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chelvarajah"^^xsd:string; foaf:givenName "Ramesh"^^xsd:string; foaf:name "Ramesh Chelvarajah"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Treder"^^xsd:string; foaf:givenName "Matthias S."^^xsd:string; foaf:name "Matthias S. Treder"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Michelmann"^^xsd:string; foaf:givenName "Sebastian"^^xsd:string; foaf:name "Sebastian Michelmann"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Griffiths"^^xsd:string; foaf:givenName "Benjamin"^^xsd:string; foaf:name "Benjamin Griffiths"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rollings"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Rollings"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Staresina"^^xsd:string; foaf:givenName "Bernhard"^^xsd:string; foaf:name "Bernhard Staresina"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kreiselmeyer"^^xsd:string; foaf:givenName "Gernot"^^xsd:string; foaf:name "Gernot Kreiselmeyer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Roux"^^xsd:string; foaf:givenName "Frédéric"^^xsd:string; foaf:name "Frédéric Roux"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kerrén"^^xsd:string; foaf:givenName "Casper"^^xsd:string; foaf:name "Casper Kerrén"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hamer"^^xsd:string; foaf:givenName "Hajo"^^xsd:string; foaf:name "Hajo Hamer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sawlani"^^xsd:string; foaf:givenName "Vijay"^^xsd:string; foaf:name "Vijay Sawlani"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gollwitzer"^^xsd:string; foaf:givenName "Stephanie"^^xsd:string; foaf:name "Stephanie Gollwitzer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wimber"^^xsd:string; foaf:givenName "Maria"^^xsd:string; foaf:name "Maria Wimber"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . bibo:issn "01650270"; foaf:name "Journal of Neuroscience Methods"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #74214 \n\nCommutative Watermarking-Encryption of Multimedia Data Based on Histograms\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Commutative Watermarking-Encryption of Multimedia Data Based on Histograms (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Commutative Watermarking-Encryption of Multimedia Data Based on Histograms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Commutative Watermarking-Encryption of Multimedia Data Based on Histograms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Commutative Watermarking-Encryption of Multimedia Data Based on Histograms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Commutative Watermarking-Encryption of Multimedia Data Based on Histograms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Commutative Watermarking-Encryption of Multimedia Data Based on Histograms (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . rdf:_1 . ; bibo:abstract "In this chapter, histogram-based watermarking schemes which are capable of being integrated into a CWE scheme are described. For still images, it is well known that histogram-based watermarking schemes are resistant to permutations of image pixels. In particular, using histograms implies robustness against rotation, scaling and translation (RST) of images. In (Schmitz, 2012) this fact has been utilized to devise a commutative watermarking-encryption (CWE) scheme by choosing a permutation cipher for encryption and a histogram-based scheme for watermarking."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2018-09"; dct:isPartOf ; dct:publisher ; dct:subject , , , , ; dct:title "Commutative Watermarking-Encryption of Multimedia Data Based on Histograms"^^xsd:string; ep:hasDocument , , , , , ; ep:hasUpdated ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.575 Multimedia systems"@en . rdf:type skos:Concept; skos:prefLabel "TA1637 Image processing"@en . rdf:type skos:Concept; skos:prefLabel "TK5102.9 Signal processing" . rdf:type skos:Concept; skos:prefLabel "TK7885 Computer engineering. Computer hardware"@en . foaf:name "IGI Global"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bhattacharyya"^^xsd:string; foaf:givenName "Siddhartha"^^xsd:string; foaf:name "Siddhartha Bhattacharyya"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grecos"^^xsd:string; foaf:givenName "Christos"^^xsd:string; foaf:name "Christos Grecos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Schmitz"^^xsd:string; foaf:givenName "Roland"^^xsd:string; foaf:name "Roland Schmitz"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhang"^^xsd:string; foaf:givenName "Xinpeng"^^xsd:string; foaf:name "Xinpeng Zhang"^^xsd:string; rdf:type foaf:Person . rdfs:label "main.pdf"^^xsd:string . rdfs:label "main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #70572 \n\nClosing the Performance Gap between Doubles and Rationals for Octagons\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Closing the Performance Gap between Doubles and Rationals for Octagons (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Closing the Performance Gap between Doubles and Rationals for Octagons (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Closing the Performance Gap between Doubles and Rationals for Octagons (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Closing the Performance Gap between Doubles and Rationals for Octagons (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Closing the Performance Gap between Doubles and Rationals for Octagons (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Closing the Performance Gap between Doubles and Rationals for Octagons (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . rdf:_1 . ; bibo:abstract "Octagons have enduring appeal because their domain opera- tions are simple, readily mapping to for-loops which apply max, min and sum to the entries of a Difference Bound Matrix (DBM). In the quest for efficiency, arithmetic is often realised with double-precision floating- point, albeit at the cost of the certainty provided by arbitrary-precision rationals. In this paper we show how Compact DBMs (CoDBMs), which have recently been proposed as a memory refinement for DBMs, enable arithmetic calculation to be short-circuited in various domain operations. We also show how comparisons can be avoided by changing the tables which underpin CoDBMs. From the perspective of implementation, the optimisations are attractive because they too are conceptually simple, following the ethos of Octagons. Yet they can halve the running time on rationals, putting CoDBMs on rationals on a par with DBMs on doubles."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; bibo:volume "11002"; dc:hasVersion ; dct:creator , ; dct:date "2018-08-30"; dct:isPartOf ; dct:publisher ; dct:title "Closing the Performance Gap between Doubles and Rationals for Octagons"^^xsd:string; ep:hasDocument , , , , , ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chawdhary"^^xsd:string; foaf:givenName "Aziem"^^xsd:string; foaf:name "Aziem Chawdhary"^^xsd:string; rdf:type foaf:Person . foaf:familyName "King"^^xsd:string; foaf:givenName "Andy"^^xsd:string; foaf:name "Andy King"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Podelski"^^xsd:string; foaf:givenName "Andreas"^^xsd:string; foaf:name "Andreas Podelski"^^xsd:string; rdf:type foaf:Person . rdfs:label "main.pdf"^^xsd:string . rdfs:label "main.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67227 \n\nClosing the Performance Gap between Doubles and Rationals for Octagons\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Closing the Performance Gap between Doubles and Rationals for Octagons (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Closing the Performance Gap between Doubles and Rationals for Octagons (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Closing the Performance Gap between Doubles and Rationals for Octagons (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Closing the Performance Gap between Doubles and Rationals for Octagons (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Closing the Performance Gap between Doubles and Rationals for Octagons (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Closing the Performance Gap between Doubles and Rationals for Octagons (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . rdf:_1 . ; bibo:abstract "Octagons have enduring appeal because their domain operations are simple, readily mapping to for-loops which apply max, min and sum to the entries of a Difference Bound Matrix (DBM). In the quest for efficiency, arithmetic is often realised with double-precision floating-point, albeit at the cost of the certainty provided by arbitrary-precision rationals. In this paper we show how Compact DBMs (CoDBMs), which has recently been proposed as a memory refinement for DBMs, enable arithmetic calculation to be short-circuited in various domain operations. We also show how comparisons can be avoided by changing the tables which underpin CoDBMs. From the perspective of implementation, the optimisations are attractive because they too are conceptually simple, following the ethos of Octagons. Yet they halve the running time on rationals, putting CoDBMs on rationals on a par with DBMs on doubles."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "11002"; dc:hasVersion ; dct:creator , ; dct:date "2018-08-29"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Closing the Performance Gap between Doubles and Rationals for Octagons"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "T Technology (General)"@en . dct:title "SAS 2018: 25th International Static Analysis Symposium"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Freiburg, Germany"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Podelski"^^xsd:string; foaf:givenName "Andreas"^^xsd:string; foaf:name "Andreas Podelski"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chawdhary"^^xsd:string; foaf:givenName "Aziem"^^xsd:string; foaf:name "Aziem Chawdhary"^^xsd:string; rdf:type foaf:Person . foaf:familyName "King"^^xsd:string; foaf:givenName "Andy"^^xsd:string; foaf:name "Andy King"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "sensors-18-02804.pdf"^^xsd:string . rdfs:label "sensors-18-02804.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69341 \n\nDigital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Existence of mobile devices with high performance cameras and powerful image processing applications eases the alteration of digital images for malicious purposes. This work presents a new approach to detect digital image tamper detection technique based on CFA artifacts arising from the differences in the distribution of acquired and interpolated pixels. The experimental evidence supports the capabilities of the proposed method for detecting a broad range of manipulations, e.g., copy-move, resizing, rotation, filtering and colorization. This technique exhibits tampered areas by computing the probability of each pixel of being interpolated and then applying the DCT on small blocks of the probability map. The value of the coefficient for the highest frequency on each block is used to decide whether the analyzed region has been tampered or not. The results shown here were obtained from tests made on a publicly available dataset of tampered images for forensic analysis. Affected zones are clearly highlighted if the method detects CFA inconsistencies. The analysis can be considered successful if the modified zone, or an important part of it, is accurately detected. By analizing a publicly available dataset with images modified with different methods we reach an 86% of accuracy, which provides a good result for a method that does not require previous training."^^xsd:string; bibo:authorList ; bibo:issue "9"; bibo:status , ; bibo:volume "18"; dc:hasVersion ; dct:creator , , , ; dct:date "2018-08-25"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science (General)"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "MDPI"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Sandoval Orozco"^^xsd:string; foaf:givenName "Ana"^^xsd:string; foaf:name "Ana Sandoval Orozco"^^xsd:string; rdf:type foaf:Person . foaf:familyName "González Fernández"^^xsd:string; foaf:givenName "Edgar"^^xsd:string; foaf:name "Edgar González Fernández"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio C."^^xsd:string; foaf:name "Julio C. Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . foaf:familyName "García Villalba"^^xsd:string; foaf:givenName "Luis"^^xsd:string; foaf:name "Luis García Villalba"^^xsd:string; rdf:type foaf:Person . bibo:issn "14248220"; foaf:name "Sensors (Basel, Switzerland)"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "1710.10454.pdf"^^xsd:string . rdfs:label "1710.10454.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67362 \n\nInformation ratchets exploiting spatially structured information reservoirs\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Information ratchets exploiting spatially structured information reservoirs (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Information ratchets exploiting spatially structured information reservoirs (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Information ratchets exploiting spatially structured information reservoirs (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Information ratchets exploiting spatially structured information reservoirs (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Information ratchets exploiting spatially structured information reservoirs (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Information ratchets exploiting spatially structured information reservoirs (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Fully mechanized Maxwell's demons, also called information ratchets, are an important conceptual link between computation, information theory, and statistical physics. They exploit low-entropy information reservoirs to extract work from a heat reservoir. Previous models of such demons have either ignored the cost of delivering bits to the demon from the information reservoir or assumed random access or infinite-dimensional information reservoirs to avoid such an issue. In this work we account for this cost when exploiting information reservoirs with physical structure and show that the dimensionality of the reservoir has a significant impact on the performance and phase diagram of the demon. We find that for conventional one-dimensional tapes the scope for work extraction is greatly reduced. An expression for the net-extracted work by demons exploring information reservoirs by means of biased random walks on d-dimensional, \\(\\mathbb Z^d\\), information reservoirs is presented. Furthermore, we derive exact probabilities of recurrence in these systems, generalizing previously known results. We find that the demon is characterized by two critical dimensions. First, to extract work at zero bias the dimensionality of the information reservoir must be larger than d=2, corresponding to the dimensions where a simple random walker is transient. Second, for integer dimensions d>4 the unbiased random walk optimizes work extraction corresponding to the dimensions where a simple random walker is strongly transient."^^xsd:string; bibo:authorList ; bibo:issue "2"; bibo:status , ; bibo:volume "98"; dc:hasVersion ; dct:creator , , ; dct:date "2018-08-23"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Information ratchets exploiting spatially structured information reservoirs"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "American Physical Society"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Spinney"^^xsd:string; foaf:givenName "Richard E."^^xsd:string; foaf:name "Richard E. Spinney"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Prokopenko"^^xsd:string; foaf:givenName "Mikhail"^^xsd:string; foaf:name "Mikhail Prokopenko"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chu"^^xsd:string; foaf:givenName "Dominique"^^xsd:string; foaf:name "Dominique Chu"^^xsd:string; rdf:type foaf:Person . bibo:issn "24700045"; foaf:name "Physical Review E: Statistical, Nonlinear, and Soft Matter Physics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "CSMC2018_paper_8 (1).pdf"^^xsd:string . rdfs:label "CSMC2018_paper_8 (1).pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67600 \n\nComputational Music Aesthetics: a survey and some thoughts\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Computational Music Aesthetics: a survey and some thoughts (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Computational Music Aesthetics: a survey and some thoughts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Computational Music Aesthetics: a survey and some thoughts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Computational Music Aesthetics: a survey and some thoughts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Computational Music Aesthetics: a survey and some thoughts (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Computational Music Aesthetics: a survey and some thoughts (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "While computational aesthetic evaluation has been applied to images and visual output, it is not as widely employed for generative music systems. Computational aesthetic evaluation is not to be confounded with numerical evaluation of the system’s output; such a notion is in danger of offering a reduced and impoverished interpretation of the aesthetic experience, which is innately dialogical, between the creator or the user, the sociological context, and the creative process or product.\r\nThis paper reviews common computational aesthetic measures that have been used for musical applications, whilst arguing for a pragmatist perspective and a framework foregrounding the primacy of intentionality and agency in inducing aesthetic responses."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2018-08-22"; dct:isPartOf ; dct:subject , , , ; dct:title "Computational Music Aesthetics: a survey and some thoughts"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BH Aesthetics"@en . rdf:type skos:Concept; skos:prefLabel "M Music"@en . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . dct:title "3rd Conference on Computational Simulation of Musical Creativity"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Dublin, Ireland"^^xsd:string . foaf:familyName "Jordanous"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Jordanous"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kalonaris"^^xsd:string; foaf:givenName "Stefano"^^xsd:string; foaf:name "Stefano Kalonaris"^^xsd:string; rdf:type foaf:Person . rdfs:label "fneur-09-00676.pdf"^^xsd:string . rdfs:label "fneur-09-00676.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #68448 \n\nLongitudinal Bedside Assessments of Brain Networks in Disorders of Consciousness: Case Reports from the Field\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Longitudinal Bedside Assessments of Brain Networks in Disorders of Consciousness: Case Reports from the Field (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Longitudinal Bedside Assessments of Brain Networks in Disorders of Consciousness: Case Reports from the Field (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Longitudinal Bedside Assessments of Brain Networks in Disorders of Consciousness: Case Reports from the Field (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Longitudinal Bedside Assessments of Brain Networks in Disorders of Consciousness: Case Reports from the Field (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Longitudinal Bedside Assessments of Brain Networks in Disorders of Consciousness: Case Reports from the Field (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Longitudinal Bedside Assessments of Brain Networks in Disorders of Consciousness: Case Reports from the Field (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "Clinicians are regularly faced with the difficult challenge of diagnosing consciousness after severe brain injury. As such, as many as 40% of minimally conscious patients who demonstrate fluctuations in arousal and awareness are known to be misdiagnosed as unresponsive/vegetative based on clinical consensus. Further, a significant minority of patients show evidence of hidden awareness not evident in their behaviour. Despite this, clinical assessments of behaviour are commonly used as bedside indicators of consciousness. Recent advances in functional high-density electroencephalography (hdEEG) have indicated that specific patterns of resting brain connectivity measured at the bedside are strongly correlated with the re-emergence of consciousness after brain injury. We report case studies of four patients with traumatic brain injury who underwent regular assessments of hdEEG connectivity and Coma Recovery Scale-Revised (CRS-R) at the bedside, as part of an ongoing longitudinal study. The first, a patient in an unresponsive wakefulness state (UWS), progressed to a minimally-conscious state several years after injury. HdEEG measures of alpha network centrality in this patient tracked this behavioural improvement. The second patient, contrasted with patient 1, presented with a persistent UWS diagnosis that paralleled with stability on the same alpha network centrality measure. Patient 3, diagnosed as minimally conscious minus (MCS-), demonstrated a significant late increase in behavioural awareness to minimally conscious plus (MCS+). This patient’s hdEEG connectivity across the previous 18 months showed a trajectory consistent with this increase alongside a decrease in delta power. Patient 4 contrasted with patient 3, with a persistent MCS- diagnosis that was similarly tracked by consistently high delta power over time. Across these contrasting cases, hdEEG connectivity captures both stability and recovery of behavioural trajectories both within and between patients. Our preliminary findings highlight the feasibility of bedside hdEEG assessments in the rehabilitation context and suggest that they can complement clinical evaluation with portable, accurate and timely generation of brain-based patient profiles. Further, such hdEEG assessments could be used to estimate the potential utility of complementary neuroimaging assessments, and to evaluate the efficacy of interventions."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2018-08-21"; dct:isPartOf , ; dct:publisher ; dct:title "Longitudinal Bedside Assessments of Brain Networks in Disorders of Consciousness: Case Reports from the Field"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Frontiers Media"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Roberts"^^xsd:string; foaf:givenName "Neil"^^xsd:string; foaf:name "Neil Roberts"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bareham"^^xsd:string; foaf:givenName "Corinne"^^xsd:string; foaf:name "Corinne Bareham"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Allanson"^^xsd:string; foaf:givenName "Judith"^^xsd:string; foaf:name "Judith Allanson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hutchinson"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Hutchinson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pickard"^^xsd:string; foaf:givenName "John D."^^xsd:string; foaf:name "John D. Pickard"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Menon"^^xsd:string; foaf:givenName "David K."^^xsd:string; foaf:name "David K. Menon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chennu"^^xsd:string; foaf:givenName "Srivas"^^xsd:string; foaf:name "Srivas Chennu"^^xsd:string; rdf:type foaf:Person . bibo:issn "16642295"; foaf:name "Longitudinal Bedside Assessments of Brain Networks in Disorders of Consciousness: Case Reports from the Field"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Music Emotion Capture- sonifying emotions in EEG data.pdf"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66564 \n\nMusic Emotion Capture: sonifying emotions in EEG data\n\n"; foaf:primaryTopic . dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Music Emotion Capture: sonifying emotions in EEG data (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Music Emotion Capture: sonifying emotions in EEG data (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Music Emotion Capture: sonifying emotions in EEG data (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Music Emotion Capture: sonifying emotions in EEG data (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Music Emotion Capture: sonifying emotions in EEG data (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Music Emotion Capture: sonifying emotions in EEG data (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "People’s emotions are not always obviously detectable, due to difficulties expressing emotions, or geographic distance (e.g. if people are communicating online). There are also many occasions where it would be useful for a computer to be able to detect users’ emotions and respond to them appropriately. A person’s brain activity gives vital clues as to emotions they are experiencing at any one time. The aim of this project is to detect, model and sonify people’s emotions. To achieve this, there are two tasks: (1) to detect emotions based on current brain activity as measured by an EEG device; (2) to play appropriate music in real-time, representing the current emotional state of the user. Here we report a pilot study implementing the Music Emotion Capture system. In future work we plan to improve how this project performs emotion detection through EEG, and to generate new music based on emotion-based characteristics of music. Potential applications arise in collaborative/assistive software and brain-computer interfaces for non-verbal communication."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-08-21"; dct:isPartOf ; dct:subject , , , , , , , ; dct:title "Music Emotion Capture: sonifying emotions in EEG data"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76.I59 Interactive media, hypermedia"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . rdf:type skos:Concept; skos:prefLabel "QA76.87 Neural computers, neural networks"@en . rdf:type skos:Concept; skos:prefLabel "QA76.575 Multimedia systems"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "Emotion Modelling and Detection in Social Media and Online Interaction symposium at the AISB 2018 Convention"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Liverpool, UK"^^xsd:string . foaf:familyName "Jordanous"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Jordanous"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Langroudi"^^xsd:string; foaf:givenName "George"^^xsd:string; foaf:name "George Langroudi"^^xsd:string; rdf:type foaf:Person . rdfs:label "PPSN-2018-de-Sa.pdf"^^xsd:string . rdfs:label "PPSN-2018-de-Sa.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #68970 \n\nAutomated Selection and Configuration of Multi-Label Classification Algorithms with Grammar-Based Genetic Programming\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Automated Selection and Configuration of Multi-Label Classification Algorithms with Grammar-Based Genetic Programming (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Automated Selection and Configuration of Multi-Label Classification Algorithms with Grammar-Based Genetic Programming (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automated Selection and Configuration of Multi-Label Classification Algorithms with Grammar-Based Genetic Programming (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automated Selection and Configuration of Multi-Label Classification Algorithms with Grammar-Based Genetic Programming (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automated Selection and Configuration of Multi-Label Classification Algorithms with Grammar-Based Genetic Programming (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automated Selection and Configuration of Multi-Label Classification Algorithms with Grammar-Based Genetic Programming (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . , , , , , ; bibo:abstract "This paper proposes Auto-MEKAGGP, an Automated Machine Learning (Auto-ML) method for Multi-Label Classification (MLC) based on the MEKA tool, which offers a number of MLC algorithms. In\r\nMLC, each example can be associated with one or more class labels, making MLC problems harder than conventional (single-label) classification problems. Hence, it is essential to select an MLC algorithm and its configuration tailored (optimized) for the input dataset. Auto-MEKAGGP addresses this problem with two key ideas. First, a large number of choices of MLC algorithms and configurations from MEKA are represented into a grammar. Second, our proposed Grammar-based Genetic Programming (GGP) method uses that grammar to search for the best MLC algorithm and configuration for the input dataset. Auto-MEKAGGP was tested in 10 datasets and compared to two well-known MLC methods, namely Binary Relevance and Classifier Chain, and also compared to GA-AutoMLC, a genetic algorithm we recently proposed for the same task. Two versions of Auto-MEKAGGP were tested: a full version with the proposed grammar, and a simplified version where the grammar includes only the algorithmic components used by GA-Auto-MLC. Overall, the full version of Auto-MEKAGGP achieved the best predictive accuracy among all five evaluated methods, being the winner in six out of the 10 datasets."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-08-21"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Automated Selection and Configuration of Multi-Label Classification Algorithms with Grammar-Based Genetic Programming"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "PPSN: 15th International Conference on Parallel Problem Solving from Nature"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Coimbra, Portugal"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Pappa"^^xsd:string; foaf:givenName "Gisele L."^^xsd:string; foaf:name "Gisele L. Pappa"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Paquete"^^xsd:string; foaf:givenName "Luís"^^xsd:string; foaf:name "Luís Paquete"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Sá"^^xsd:string; foaf:givenName "Alex G. C."^^xsd:string; foaf:name "Alex G. C. de Sá"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Auger"^^xsd:string; foaf:givenName "Anne"^^xsd:string; foaf:name "Anne Auger"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fonseca"^^xsd:string; foaf:givenName "Carlos M."^^xsd:string; foaf:name "Carlos M. Fonseca"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lourenço"^^xsd:string; foaf:givenName "Nuno"^^xsd:string; foaf:name "Nuno Lourenço"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Machado"^^xsd:string; foaf:givenName "Penousal"^^xsd:string; foaf:name "Penousal Machado"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Whitley"^^xsd:string; foaf:givenName "Darrell"^^xsd:string; foaf:name "Darrell Whitley"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #68802 \n\nA Study of Concurrency Bugs and Advanced Development Support for Actor-based Programs\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "A Study of Concurrency Bugs and Advanced Development Support for Actor-based Programs (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Study of Concurrency Bugs and Advanced Development Support for Actor-based Programs (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Study of Concurrency Bugs and Advanced Development Support for Actor-based Programs (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Study of Concurrency Bugs and Advanced Development Support for Actor-based Programs (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Study of Concurrency Bugs and Advanced Development Support for Actor-based Programs (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Study of Concurrency Bugs and Advanced Development Support for Actor-based Programs (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . rdf:_1 ; rdf:_2 . , ; bibo:abstract "The actor model is an attractive foundation for developing\r\nconcurrent applications because actors are isolated concurrent entities\r\nthat communicate through asynchronous messages and do not share\r\nstate. Thereby, they avoid concurrency bugs such as data races, but are\r\nnot immune to concurrency bugs in general.\r\nThis study taxonomizes concurrency bugs in actor-based programs reported\r\nin literature. Furthermore, it analyzes the bugs to identify the\r\npatterns causing them as well as their observable behavior. Based on\r\nthis taxonomy, we further analyze the literature and find that current\r\napproaches to static analysis and testing focus on communication deadlocks\r\nand message protocol violations. However, they do not provide\r\nsolutions to identify livelocks and behavioral deadlocks.\r\nThe insights obtained in this study can be used to improve debugging\r\nsupport for actor-based programs with new debugging techniques to identify\r\nthe root cause of complex concurrency bugs."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:status , ; bibo:volume "10789"; dc:hasVersion ; dct:creator , , , ; dct:date "2018-08-20"; dct:isPartOf , ; dct:publisher ; dct:title "A Study of Concurrency Bugs and Advanced Development Support for Actor-based Programs"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Mössenböck"^^xsd:string; foaf:givenName "Hanspeter"^^xsd:string; foaf:name "Hanspeter Mössenböck"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gonzalez Boix"^^xsd:string; foaf:givenName "Elisa"^^xsd:string; foaf:name "Elisa Gonzalez Boix"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Torres Lopez"^^xsd:string; foaf:givenName "Carmen"^^xsd:string; foaf:name "Carmen Torres Lopez"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ricci"^^xsd:string; foaf:givenName "Alessandro"^^xsd:string; foaf:name "Alessandro Ricci"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Haller"^^xsd:string; foaf:givenName "Philipp"^^xsd:string; foaf:name "Philipp Haller"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . foaf:name "Programming with Actors: State-of-the-Art and research Perspectives"^^xsd:string; rdf:type bibo:Collection . rdfs:label "p223-dziallas.pdf"^^xsd:string . rdfs:label "p223-dziallas.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #68567 \n\n“I told you this last time, right?”: Re-visiting narratives of STEM education\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "“I told you this last time, right?”: Re-visiting narratives of STEM education (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "“I told you this last time, right?”: Re-visiting narratives of STEM education (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "“I told you this last time, right?”: Re-visiting narratives of STEM education (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "“I told you this last time, right?”: Re-visiting narratives of STEM education (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "“I told you this last time, right?”: Re-visiting narratives of STEM education (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "“I told you this last time, right?”: Re-visiting narratives of STEM education (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "The stories we tell ourselves and others - both as individuals and as a community - reflect how we make sense of our lives. Our work using narrative methods has explored how university graduates make sense of their learning experiences and how these fit within their wider learning trajectories. In this paper, we discuss work we conducted with a group of a dozen students who, when first interviewed, were in the second half of their undergraduate education at Olin College of Engineering. All twelve participants were re-interviewed four years later, after they had graduated, using the same narrative protocol that asked them to describe their learning 'life' as if it was a book, and to identify and describe individual chapters of their experience. The pairs of interviews were analysed with respect to their form and their content. In regard to form, a classification of these repeated stories is derived. Thematic analysis of the content examines a) how students come to study and practice computing and b) the continuing, and changing influence of a university education over time, as students construct an individual sense of coherence."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2018-08-15"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "“I told you this last time, right?”: Re-visiting narratives of STEM education"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "LB2300 Higher Education"@en . dct:title "14th International Computing Education Research (ICER) conference"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Espoo, Finland"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Fincher"^^xsd:string; foaf:givenName "Sally"^^xsd:string; foaf:name "Sally Fincher"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dziallas"^^xsd:string; foaf:givenName "Sebastian"^^xsd:string; foaf:name "Sebastian Dziallas"^^xsd:string; rdf:type foaf:Person . foaf:name "ICER'18"^^xsd:string; rdf:type bibo:Collection . rdfs:label "paper_11.pdf"^^xsd:string . rdfs:label "paper_11.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #71298 \n\nProgram Verification in the Presence of I/O\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Program Verification in the Presence of I/O (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Program Verification in the Presence of I/O (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Program Verification in the Presence of I/O (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Program Verification in the Presence of I/O (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Program Verification in the Presence of I/O (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Program Verification in the Presence of I/O (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Software veri?cation tools that build machine-checked proofs of functional correctness usually focus on the algorithmic content of the code. Their proofs are not grounded in a formal semantic model of the environment that the program runs in, or the program’s interaction with that environment. As a result, several layers of translation and wrapper code must be trusted. In contrast, the CakeML project focuses on endto-end veri?cation to replace this trusted code with veri?ed code in a cost-e?ective manner. In this paper, we present infrastructure for developing and verifying impure functional programs with I/O and imperative ?le handling. Specifically, we extend CakeML with a low-level model of ?le I/O, and verify a high-level ?le I/O library in terms of the model. We use this library to develop and verify several Unix-style command-line utilities: cat, sort, grep, di? and patch. The work?ow we present is built around the HOL4 theorem prover, and therefore all our results have machine-checked proofs."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , ; dct:date "2018-08-15"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Program Verification in the Presence of I/O"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "10th International Conference on Verified Software: Theories, Tools, and Experiments"^^xsd:string; rdf:type bibo:Conference . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Pohjola"^^xsd:string; foaf:givenName "Johannes Aman"^^xsd:string; foaf:name "Johannes Aman Pohjola"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ho"^^xsd:string; foaf:givenName "Son"^^xsd:string; foaf:name "Son Ho"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Myreen"^^xsd:string; foaf:givenName "Magnus O."^^xsd:string; foaf:name "Magnus O. Myreen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kumar"^^xsd:string; foaf:givenName "Ramana"^^xsd:string; foaf:name "Ramana Kumar"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Férée"^^xsd:string; foaf:givenName "Hugo"^^xsd:string; foaf:name "Hugo Férée"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Owens"^^xsd:string; foaf:givenName "Scott"^^xsd:string; foaf:name "Scott Owens"^^xsd:string; rdf:type foaf:Person . rdfs:label "paper_two.pdf"^^xsd:string . rdfs:label "paper_two.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69760 \n\nShort-Time Velocity Identification and Coherent-Like Detection of Ultrahigh Speed Targets\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Short-Time Velocity Identification and Coherent-Like Detection of Ultrahigh Speed Targets (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Short-Time Velocity Identification and Coherent-Like Detection of Ultrahigh Speed Targets (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Short-Time Velocity Identification and Coherent-Like Detection of Ultrahigh Speed Targets (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Short-Time Velocity Identification and Coherent-Like Detection of Ultrahigh Speed Targets (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Short-Time Velocity Identification and Coherent-Like Detection of Ultrahigh Speed Targets (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Short-Time Velocity Identification and Coherent-Like Detection of Ultrahigh Speed Targets (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Finding a balance between observation duration and detection rates is the ultimate goal of the detection of ultrahigh speed targets. However, short observation durations, both across range unit, and Doppler frequency migration, may severely limit the detection performance of ultrahigh speed targets. Although, traditional coherent integration methods can efficiently accumulate signal energy to produce a high signal-to-noise-ratio measurement, they often need to search for unknown motion parameters. This search is time consuming and unacceptable for the real-time detection of ultrahigh speed targets. In this paper, a coherent-like detection method is designed based on the finite-dimension theory of Wigner matrices along with velocity identification. The proposed method can efficiently integrate signal energy without rendering motion parameters. We use the distribution and mean of the eigenvalues of the constructed matrix, i.e., an additive Wigner matrix, to identify velocities and detect ultrahigh speed targets, respectively. Simulation results validate the theoretical derivation, superiority and operability of the proposed method."^^xsd:string; bibo:authorList ; bibo:issue "18"; bibo:status , ; bibo:volume "66"; dc:hasVersion ; dct:creator , , , , , ; dct:date "2018-08-03"; dct:isPartOf , ; dct:title "Short-Time Velocity Identification and Coherent-Like Detection of Ultrahigh Speed Targets"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:familyName "Chen"^^xsd:string; foaf:givenName "J."^^xsd:string; foaf:name "J. Chen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhou"^^xsd:string; foaf:givenName "H."^^xsd:string; foaf:name "H. Zhou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "F."^^xsd:string; foaf:name "F. Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhou"^^xsd:string; foaf:givenName "J."^^xsd:string; foaf:name "J. Zhou"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "L."^^xsd:string; foaf:name "L. Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Crookes"^^xsd:string; foaf:givenName "D."^^xsd:string; foaf:name "D. Crookes"^^xsd:string; rdf:type foaf:Person . bibo:issn "1053587X"; foaf:name "IEEE Transactions on Signal Processing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90115 \n\nAutonomous Learning Multimodel Systems From Data Streams\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "In this paper, an approach to autonomous learning of a multimodel system from streaming data, named ALMMo, is proposed. The proposed approach is generic and can easily be applied also to probabilistic or other types of local models forming multimodel systems. It is fully data driven and its structure is decided by the nonparametric data clouds extracted from the empirically observed data without making any prior assumptions concerning data distribution and other data properties. All metaparameters of the proposed system are obtained directly from the data and can be updated recursively, which improves memory and calculation efficiencies of the proposed algorithm. The structural evolution mechanism and online data cloud quality monitoring mechanism of the ALMMo system largely enhance the ability of handling shifts and/or drifts in the streaming data pattern. Numerical examples of the use of ALMMo system for streaming data analytics, classification, and prediction are presented as a proof of the proposed concept."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "26"; dct:creator , , ; dct:date "2018-08-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Autonomous Learning Multimodel Systems From Data Streams"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P."^^xsd:string; foaf:name "Plamen P. Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Principe"^^xsd:string; foaf:givenName "Jose C."^^xsd:string; foaf:name "Jose C. Principe"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "10636706"; foaf:name "IEEE Transactions on Fuzzy Systems"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "2018-USEC-NDSS-aangc-preprint.pdf"^^xsd:string . rdfs:label "2018-USEC-NDSS-aangc-preprint.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67468 \n\nSonification in security operations centres: what do security practitioners think?\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Sonification in security operations centres: what do security practitioners think? (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Sonification in security operations centres: what do security practitioners think? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sonification in security operations centres: what do security practitioners think? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sonification in security operations centres: what do security practitioners think? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sonification in security operations centres: what do security practitioners think? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Sonification in security operations centres: what do security practitioners think? (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "In Security Operations Centres (SOCs) security practitioners work using a range of tools to detect and mitigate malicious computer-network activity. Sonification, in which data is represented as sound, is said to have potential as an approach to addressing some of the unique challenges faced by SOCs. For example, sonification has been shown to enable peripheral monitoring of processes, which could aid practitioners multitasking in busy SOCs. The perspectives of security practitioners on incorporating sonification into their actual working environments have not yet been examined, however. The aim of this paper therefore is to address this gap by exploring attitudes to using sonification in SOCs. We report on the results of a study consisting of an online survey (N=20) and interviews (N=21) with security practitioners working in a range of different SOCs. Our contribution is a refined appreciation of the contexts in which sonification could aid in SOC working practice, and an understanding of the areas in which sonification may not be beneficial or may even be problematic.We also analyse the critical requirements for the design of sonification systems and their integration into the SOC setting. Our findings clarify insights into the potential benefits and challenges of introducing sonification to support work in this vital security-monitoring environment."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2018-08-01"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Sonification in security operations centres: what do security practitioners think?"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "San Diego, California, USA"^^xsd:string . foaf:name "Internet Society"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Creese"^^xsd:string; foaf:givenName "Sadie"^^xsd:string; foaf:name "Sadie Creese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Goldsmith"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Goldsmith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Axon"^^xsd:string; foaf:givenName "Louise M."^^xsd:string; foaf:name "Louise M. Axon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Alahmadi"^^xsd:string; foaf:givenName "Bushra"^^xsd:string; foaf:name "Bushra Alahmadi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . rdfs:label "6. Semantic-based Policy Composition for Privacy-demanding Data Linkage.pdf"^^xsd:string . rdfs:label "6. Semantic-based Policy Composition for Privacy-demanding Data Linkage.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80961 \n\nSemantic-Based Policy Composition for Privacy-Demanding Data Linkage\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Semantic-Based Policy Composition for Privacy-Demanding Data Linkage (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Semantic-Based Policy Composition for Privacy-Demanding Data Linkage (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Semantic-Based Policy Composition for Privacy-Demanding Data Linkage (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Semantic-Based Policy Composition for Privacy-Demanding Data Linkage (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Semantic-Based Policy Composition for Privacy-Demanding Data Linkage (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Semantic-Based Policy Composition for Privacy-Demanding Data Linkage (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Record linkage can be used to support current and future health research across populations however such approaches give rise to many challenges related to patient privacy and confidentiality including inference attacks. To address this, we present a semantic-based policy framework where linkage privacy detects attribute associations that can lead to inference disclosure issues. To illustrate the effectiveness of the approach, we present a case study exploring health data combining spatial, ethnicity and language information from several major on-going projects occurring across Australia. Compared with classic access control models, the results show that our proposal outperforms other approaches with regards to effectiveness, reliability and subsequent data utility."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-08"; dct:isPartOf , ; dct:publisher ; dct:subject , , , , , , ; dct:title "Semantic-Based Policy Composition for Privacy-Demanding Data Linkage"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . rdf:type skos:Concept; skos:prefLabel "R858 Computer applications to medicine. Medical informatics. Medical information technology" . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.5 Computer networks"@en . rdf:type skos:Concept; skos:prefLabel "TK5105 Data transmission systems"@en . dct:title "17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "New York, USA"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Verspoor"^^xsd:string; foaf:givenName "Karin"^^xsd:string; foaf:name "Karin Verspoor"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sinnott"^^xsd:string; foaf:givenName "Richard O."^^xsd:string; foaf:name "Richard O. Sinnott"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lu"^^xsd:string; foaf:givenName "Yang"^^xsd:string; foaf:name "Yang Lu"^^xsd:string; rdf:type foaf:Person . bibo:issn "23249013"; foaf:name "17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "7. Privacy-Preserving Access Control in Electronic Health Record Linkage.pdf"^^xsd:string . rdfs:label "7. Privacy-Preserving Access Control in Electronic Health Record Linkage.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80959 \n\nPrivacy-Preserving Access Control in Electronic Health Record Linkage\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Privacy-Preserving Access Control in Electronic Health Record Linkage (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Privacy-Preserving Access Control in Electronic Health Record Linkage (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy-Preserving Access Control in Electronic Health Record Linkage (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy-Preserving Access Control in Electronic Health Record Linkage (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy-Preserving Access Control in Electronic Health Record Linkage (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Privacy-Preserving Access Control in Electronic Health Record Linkage (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Sharing aggregated electronic health records (EHRs) for integrated health care and public health studies is increasingly demanded. Patient privacy demands that anonymisation procedures are in place for data sharing. However traditional methods such as k-anonymity and its derivations are often over-generalizing resulting in lower data accuracy. To tackle this issue, we present the Semantic Linkage K-Anonymity (SLKA) approach supporting ongoing record linkages. We show how SLKA balances privacy and utility preservation through detecting risky combinations hidden in data releases."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2018-08"; dct:isPartOf ; dct:publisher ; dct:subject , , , , , , ; dct:title "Privacy-Preserving Access Control in Electronic Health Record Linkage"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . rdf:type skos:Concept; skos:prefLabel "R858 Computer applications to medicine. Medical informatics. Medical information technology" . rdf:type skos:Concept; skos:prefLabel "TK5105.888 World Wide Web"@en . rdf:type skos:Concept; skos:prefLabel "TK5105 Data transmission systems"@en . rdf:type skos:Concept; skos:prefLabel "ZA4045 Electronic information resources"@en . rdf:type skos:Concept; skos:prefLabel "ZA4450 Databases"@en . dct:title "17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "New York, USA"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Verspoor"^^xsd:string; foaf:givenName "Karin"^^xsd:string; foaf:name "Karin Verspoor"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sinnott"^^xsd:string; foaf:givenName "Richard O."^^xsd:string; foaf:name "Richard O. Sinnott"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Parampalli"^^xsd:string; foaf:givenName "Udaya"^^xsd:string; foaf:name "Udaya Parampalli"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lu"^^xsd:string; foaf:givenName "Yang"^^xsd:string; foaf:name "Yang Lu"^^xsd:string; rdf:type foaf:Person . rdfs:label "307thesis_Thomas_Sloan.pdf"^^xsd:string . rdfs:label "307thesis_Thomas_Sloan.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #75280 \n\nSystem Steganalysis: Implementation Vulnerabilities and Side-Channel Attacks Against Digital Steganography Systems\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "System Steganalysis: Implementation Vulnerabilities and Side-Channel Attacks Against Digital Steganography Systems (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "System Steganalysis: Implementation Vulnerabilities and Side-Channel Attacks Against Digital Steganography Systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "System Steganalysis: Implementation Vulnerabilities and Side-Channel Attacks Against Digital Steganography Systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "System Steganalysis: Implementation Vulnerabilities and Side-Channel Attacks Against Digital Steganography Systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "System Steganalysis: Implementation Vulnerabilities and Side-Channel Attacks Against Digital Steganography Systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "System Steganalysis: Implementation Vulnerabilities and Side-Channel Attacks Against Digital Steganography Systems (Other)"^^xsd:string . rdf:_1 . ; bibo:abstract "Steganography is the process of hiding information in plain sight, it is a technology that can be used to hide data and facilitate secret communications. Steganography is commonly seen in the digital domain where the pervasive nature of media content (image, audio, video) provides an ideal avenue for hiding secret information. In recent years, video steganography has shown to be a highly suitable alternative to image and audio steganography due to its potential advantages (capacity, flexibility, popularity). An increased interest towards research in video steganography has led to the development of video stego-systems that are now available to the public. Many of these stego-systems have not yet been subjected to analysis or evaluation, and their capabilities for performing secure, practical, and effective video steganography are unknown.\r\nThis thesis presents a comprehensive analysis of the state-of-the-art in practical video steganography. Video-based stego-systems are identified and examined using steganalytic techniques (system steganalysis) to determine the security practices of relevant stego-systems. The research in this thesis is conducted through a series of case studies that aim to provide novel insights in the field of steganalysis and its capabilities towards practical video steganography. \r\nThe results of this work demonstrate the impact of system attacks over the practical state-of-the-art in video steganography. Through this research, it is evident that video-based stego-systems are highly vulnerable and fail to follow many of the well-understood security practices in the field. Consequently, it is possible to confidently detect each stego-system with a high rate of accuracy. As a result of this research, it is clear that current work in practical video steganography demonstrates a failure to address key principles and best practices in the field. Continued efforts to address this will provide safe and secure steganographic technologies."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2018-08"; dct:isPartOf ; dct:issuer , ; dct:title "System Steganalysis: Implementation Vulnerabilities and Side-Channel Attacks Against Digital Steganography Systems"^^xsd:string; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio"^^xsd:string; foaf:name "Julio Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sloan"^^xsd:string; foaf:givenName "Thomas"^^xsd:string; foaf:name "Thomas Sloan"^^xsd:string; rdf:type foaf:Person . rdfs:label "2018-hcis-knam.pdf"^^xsd:string . rdfs:label "2018-hcis-knam.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "s13673-018-0145-6.pdf"^^xsd:string . rdfs:label "s13673-018-0145-6.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67656 \n\nUsing semantic clustering to support situation awareness on Twitter: The case of World Views\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Using semantic clustering to support situation awareness on Twitter: The case of World Views (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Using semantic clustering to support situation awareness on Twitter: The case of World Views (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using semantic clustering to support situation awareness on Twitter: The case of World Views (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using semantic clustering to support situation awareness on Twitter: The case of World Views (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using semantic clustering to support situation awareness on Twitter: The case of World Views (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using semantic clustering to support situation awareness on Twitter: The case of World Views (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Using semantic clustering to support situation awareness on Twitter: The case of World Views (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Using semantic clustering to support situation awareness on Twitter: The case of World Views (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using semantic clustering to support situation awareness on Twitter: The case of World Views (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using semantic clustering to support situation awareness on Twitter: The case of World Views (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using semantic clustering to support situation awareness on Twitter: The case of World Views (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Using semantic clustering to support situation awareness on Twitter: The case of World Views (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "In recent years, situation awareness has been recognised as a critical part of effective decision making, in particular for crisis management. One way to extract value and allow for better situation awareness is to develop a system capable of analysing a dataset of multiple posts, and clustering consistent posts into different views or stories (or, world views). However, this can be challenging as it requires an understanding of the data, including determining what is consistent data, and what data corroborates other data. Attempting to address these problems, this article proposes Subject-Verb-Object Semantic Suffix Tree Clustering (SVOSSTC) and a system to support it, with a special focus on Twitter content. The novelty and value of SVOSSTC is its emphasis on utilising the Subject-Verb-Object (SVO) typology in order to construct semantically consistent world views, in which individuals---particularly those involved in crisis response---might achieve an enhanced picture of a situation from social media data. To evaluate our system and its ability to provide enhanced situation awareness, we tested it against existing approaches, including human data analysis, using a variety of real-world scenarios. The results indicated a noteworthy degree of evidence (e.g., in cluster granularity and meaningfulness) to affirm the suitability and rigour of our approach. Moreover, these results highlight this article's proposals as innovative and practical system contributions to the research field."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion , ; dct:creator , , , ; dct:date "2018-07-30"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Using semantic clustering to support situation awareness on Twitter: The case of World Views"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "H Social Sciences (General)"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Milich"^^xsd:string; foaf:givenName "Andrew"^^xsd:string; foaf:name "Andrew Milich"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Agrafiotis"^^xsd:string; foaf:givenName "Ioannis"^^xsd:string; foaf:name "Ioannis Agrafiotis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kingston"^^xsd:string; foaf:givenName "Charlie"^^xsd:string; foaf:name "Charlie Kingston"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R. C."^^xsd:string; foaf:name "Jason R. C. Nurse"^^xsd:string; rdf:type foaf:Person . bibo:issn "21921962"; foaf:name "Human-centric Computing and Information Sciences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Andreotti_2018b.pdf"^^xsd:string . rdfs:label "Andreotti_2018b.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72666 \n\nVisualising Convolutional Neural Network Decisions in Automatic Sleep Scoring\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Visualising Convolutional Neural Network Decisions in Automatic Sleep Scoring (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Visualising Convolutional Neural Network Decisions in Automatic Sleep Scoring (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Visualising Convolutional Neural Network Decisions in Automatic Sleep Scoring (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Visualising Convolutional Neural Network Decisions in Automatic Sleep Scoring (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Visualising Convolutional Neural Network Decisions in Automatic Sleep Scoring (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Visualising Convolutional Neural Network Decisions in Automatic Sleep Scoring (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Current sleep medicine relies on the supervised analysis of polysomnographic recordings, which comprise amongst others electroencephalogram (EEG), electromyogram (EMG), and electrooculogram (EOG) signals. Convolutional neural networks (CNN) provide an interesting framework for automated sleep classification, however, the lack of interpretability of its results has hampered CNN's further use in medicine. In this study, we train a CNN using as input Continuous Wavelet transformed EEG, EOG and EMG recordings from a publicly available dataset. The network achieved a 10-fold cross-validation Cohen's Kappa score of $\\kappa = 0.71 \\pm 0.01$. Further, we provide insights on how this network classifies individual epochs of sleep using Guided Gradient-weighted Class Activation Maps (Guided Grad-CAM). The proposed approach is able to produce fine-grained activation maps on time-frequency domain for each signal providing a useful tool for identifying relevant features in CNNs."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-07-23"; dct:isPartOf , ; dct:publisher ; dct:title "Visualising Convolutional Neural Network Decisions in Automatic Sleep Scoring"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "Joint Workshop on Artificial Intelligence in Health (AIH)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Stockholm, Sweden"^^xsd:string . foaf:name "CEUR Workshop Proceedings"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "De Vos"^^xsd:string; foaf:givenName "Maarten"^^xsd:string; foaf:name "Maarten De Vos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Andreotti"^^xsd:string; foaf:givenName "Fernando"^^xsd:string; foaf:name "Fernando Andreotti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . bibo:issn "16130073"; foaf:name "CEUR Workshop Proceedings"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Andreotti_2018a.pdf"^^xsd:string . rdfs:label "Andreotti_2018a.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72663 \n\nMultichannel Sleep Stage Classification and Transfer Learning using Convolutional Neural Networks\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Multichannel Sleep Stage Classification and Transfer Learning using Convolutional Neural Networks (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Multichannel Sleep Stage Classification and Transfer Learning using Convolutional Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multichannel Sleep Stage Classification and Transfer Learning using Convolutional Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multichannel Sleep Stage Classification and Transfer Learning using Convolutional Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multichannel Sleep Stage Classification and Transfer Learning using Convolutional Neural Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Multichannel Sleep Stage Classification and Transfer Learning using Convolutional Neural Networks (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Current sleep medicine relies on the analysis of polysomnographic measurements, comprising amongst others electroencephalogram (EEG), electromyogram (EMG), and electrooculogram (EOG) signals. This analysis currently requires supervision of a trained expert. Convolutional neural networks (CNN) provide an interesting framework to automated classification of sleep epochs based on raw EEG, EOG and EMG waveforms. In this study, we apply CNN approaches from the literature to four databases from pathological and physiological subjects. The best performing model resulted in Cohen’s Kappa of k = 0.75 on healthy subjects and k = 0.64 on patients suffering from a variety of sleep disorder. Further, we show the advantages of using additional sensor data such as EOG and EMG. Last, to cope with smaller datasets of less prevalent diseases, we propose a transfer learning procedure using large freely available databases for pre-training. This procedure is demonstrated using a private REM Behaviour Disorder database, improving sleep classification by 24.4%."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , ; dct:date "2018-07-21"; dct:isPartOf ; dct:publisher ; dct:title "Multichannel Sleep Stage Classification and Transfer Learning using Convolutional Neural Networks"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2018)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Honolulu, Hawaii"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Cooray"^^xsd:string; foaf:givenName "Navin"^^xsd:string; foaf:name "Navin Cooray"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lo"^^xsd:string; foaf:givenName "Christine"^^xsd:string; foaf:name "Christine Lo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Andreotti"^^xsd:string; foaf:givenName "Fernando"^^xsd:string; foaf:name "Fernando Andreotti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hu"^^xsd:string; foaf:givenName "Michele T.M."^^xsd:string; foaf:name "Michele T.M. Hu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Vos"^^xsd:string; foaf:givenName "Maarten"^^xsd:string; foaf:name "Maarten De Vos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . rdfs:label "Koch2018a.pdf"^^xsd:string . rdfs:label "Koch2018a.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72664 \n\nRecurrent Neural Network Based Early Prediction of Future Hand Movements\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Recurrent Neural Network Based Early Prediction of Future Hand Movements (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Recurrent Neural Network Based Early Prediction of Future Hand Movements (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Recurrent Neural Network Based Early Prediction of Future Hand Movements (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Recurrent Neural Network Based Early Prediction of Future Hand Movements (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Recurrent Neural Network Based Early Prediction of Future Hand Movements (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Recurrent Neural Network Based Early Prediction of Future Hand Movements (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "This work focuses on a system for hand prostheses that can overcome the delay problem introduced by classical approaches while being reliable. The proposed approach based on a recurrent neural network enables us to incorporate the sequential nature of the surface electromyogram data and the proposed system can be used either for classification or early prediction of hand movements. Especially the latter is a key to a latency free steering of a prosthesis. The experiments conducted on the first three Ninapro databases reveal that the prediction up to 200 ms ahead in the future is possible without a significant drop in accuracy. Furthermore, for classification, our proposed approach outperforms the state of the art classifiers even though we used significantly shorter windows for feature extraction."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2018-07-21"; dct:isPartOf ; dct:publisher ; dct:title "Recurrent Neural Network Based Early Prediction of Future Hand Movements"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2018)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Honolulu, Hawaii"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Katzberg"^^xsd:string; foaf:givenName "Fabrice"^^xsd:string; foaf:name "Fabrice Katzberg"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Koch"^^xsd:string; foaf:givenName "Philipp"^^xsd:string; foaf:name "Philipp Koch"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Maass"^^xsd:string; foaf:givenName "Marco"^^xsd:string; foaf:name "Marco Maass"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mertins"^^xsd:string; foaf:givenName "Alfred"^^xsd:string; foaf:name "Alfred Mertins"^^xsd:string; rdf:type foaf:Person . rdfs:label "SMSociety2018.pdf"^^xsd:string . rdfs:label "SMSociety2018.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66861 \n\nAutomatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Recent studies have revealed that cyber criminals tend to exchange knowledge about cyber attacks in online social networks (OSNs). Cyber security experts are another set of information providers on OSNs who frequently share information about cyber security incidents and their personal opinions and analyses. Therefore, in order to improve our knowledge about evolving cyber attacks and the underlying human behavior for different purposes (e.g., crime investigation, understanding career development and business models of cyber criminals and cyber security professionals, prediction and prevention of impeding cyber attacks), it will be very useful to detect cyber security related accounts on OSNs automatically, and monitor their activities. This paper reports our preliminary work on automatic detection of cyber security related accounts on OSNs using Twitter as an example, which may allow us to discover unknown cyber security experts and cyber criminals for monitoring purposes. Three machine learning based classification algorithms were applied and compared: decision trees, random forests, and SVM (support vector machines). Experimental results showed that both decision trees and random forests had performed well with an overall accuracy over 95%, and when random forests were used with behavioral features the accuracy had reached as high as 97.877%."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-07-18"; dct:isPartOf ; dct:publisher ; dct:subject , , , ; dct:title "Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.875.I57 Internet"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.888 World Wide Web"@en . dct:title "9th International Conference on Social Media & Society (SM&Society 2017)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Copenhagen, Denmark"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Aslan"^^xsd:string; foaf:givenName "Çağrı B."^^xsd:string; foaf:name "Çağrı B. Aslan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sağlam"^^xsd:string; foaf:givenName "Rahime Belen"^^xsd:string; foaf:name "Rahime Belen Sağlam"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . rdfs:label "ml4pl18-paper4.pdf"^^xsd:string . rdfs:label "ml4pl18-paper4.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #71461 \n\nSubtype Polymorphism à la carte via Machine Learning on Dependent Types\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Subtype Polymorphism à la carte via Machine Learning on Dependent Types (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Subtype Polymorphism à la carte via Machine Learning on Dependent Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Subtype Polymorphism à la carte via Machine Learning on Dependent Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Subtype Polymorphism à la carte via Machine Learning on Dependent Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Subtype Polymorphism à la carte via Machine Learning on Dependent Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Subtype Polymorphism à la carte via Machine Learning on Dependent Types (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The ability to write 'closed' frameworks in terms of abstract supertypes and subsequently extend them via contractually-conforming subtypes is a ubiquitous programming paradigm (e.g. underpinning Object-Orientation). While the motivation for such abstraction is to insulate against requirements change, any change of contract requires extensive (typically manual) refactoring, potentially throughout the entire class hierarchy. As an alternative to defining such abstractions a priori, we describe the broad role that Machine Learning can play in inducing abstractions from a pre-existing codebase. Concrete examples are given in which contacts are enforced by dependent types in the Idris language."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-07-18"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Subtype Polymorphism à la carte via Machine Learning on Dependent Types"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "2nd International Workshop on Machine Learning Techniques for Programming Languages"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Amsterdam, Netherlands"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Johnson"^^xsd:string; foaf:givenName "Colin G."^^xsd:string; foaf:name "Colin G. Johnson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Swan"^^xsd:string; foaf:givenName "Jerry"^^xsd:string; foaf:name "Jerry Swan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Edwin"^^xsd:string; foaf:givenName "Brady"^^xsd:string; foaf:name "Brady Edwin"^^xsd:string; rdf:type foaf:Person . foaf:name "ML4PL"^^xsd:string; rdf:type bibo:Collection . rdfs:label "Subtype_polymorphism_a_la_carte.pdf"^^xsd:string . rdfs:label "Subtype_polymorphism_a_la_carte.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #73791 \n\nSubtype polymorphism à la carte via machine learning on dependent types\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Subtype polymorphism à la carte via machine learning on dependent types (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Subtype polymorphism à la carte via machine learning on dependent types (Other)"^^xsd:string . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Subtype polymorphism à la carte via machine learning on dependent types (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Subtype polymorphism à la carte via machine learning on dependent types (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Subtype polymorphism à la carte via machine learning on dependent types (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Subtype polymorphism à la carte via machine learning on dependent types (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Subtype polymorphism à la carte via machine learning on dependent types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Subtype polymorphism à la carte via machine learning on dependent types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Subtype polymorphism à la carte via machine learning on dependent types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Subtype polymorphism à la carte via machine learning on dependent types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Subtype polymorphism à la carte via machine learning on dependent types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Subtype polymorphism à la carte via machine learning on dependent types (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The essential rationale for subtype polymorphism is adherence to the 'Open/Closed Principle' [12]: the ability to write framework code in terms of superclasses and subsequently invoke it with any subclass that exhibits 'proper subtyping' via the Liskov Substitution Principle (LSP) [11]. Formally, the LSP states that if ø(t : T) is a provable property of objects t of type T, then ø(s) should be true for objects s of subtype S of T. In practice, such properties have typically been those expressible via 'Design by Contract' [12], specifically preconditions, postconditions and invariants. Such abstraction via subtype polymorphism is intended to insulate against requirements change. However, when new requirements do necessitate a change of contract, the maintenance consequences can be severe. In the (typical) absence of explicit language or tool support, enforcement of proper subtyping is laborious and error-prone: contractual changes typically require manual inspection/repair of the class hierarchy to determine/address violations of the LSP."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion , ; dct:creator , , ; dct:date "2018-07-16"; dct:isPartOf ; dct:publisher ; dct:title "Subtype polymorphism à la carte via machine learning on dependent types"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "ISSTA '18 Companion Proceedings for the ISSTA/ECOOP 2018 Workshops"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Amsterdam, Netherlands"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Brady"^^xsd:string; foaf:givenName "Edwin C."^^xsd:string; foaf:name "Edwin C. Brady"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Swan"^^xsd:string; foaf:givenName "Jerry"^^xsd:string; foaf:name "Jerry Swan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Johnson"^^xsd:string; foaf:givenName "Colin G."^^xsd:string; foaf:name "Colin G. Johnson"^^xsd:string; rdf:type foaf:Person . rdfs:label "Michelmannetal_2018_JoCN_ms(1).pdf"^^xsd:string . rdfs:label "Michelmannetal_2018_JoCN_ms(1).pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67257 \n\nReplay of Stimulus-specific Temporal Patterns during Associative Memory Formation\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Replay of Stimulus-specific Temporal Patterns during Associative Memory Formation (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Replay of Stimulus-specific Temporal Patterns during Associative Memory Formation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Replay of Stimulus-specific Temporal Patterns during Associative Memory Formation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Replay of Stimulus-specific Temporal Patterns during Associative Memory Formation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Replay of Stimulus-specific Temporal Patterns during Associative Memory Formation (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Replay of Stimulus-specific Temporal Patterns during Associative Memory Formation (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Forming a memory often entails the association of recent experience with present events. This recent experience is usually an information rich and dynamic representation of the world around us. We here show that associating a static cue with a previously shown dynamic stimulus, yields a detectable, dynamic representation of this stimulus. We further implicate this representation in the decrease of low-frequency power (~4-30 Hz) in the ongoing electroencephalogram (EEG), which is a well-known correlate of successful memory formation. The reappearance of content specific patterns in desynchronizing brain oscillations was observed in two sensory domains, i.e. in a visual and in an auditory condition. Together with previous results, these data suggest a mechanism that generalizes across domains and processes, in which the decrease in oscillatory power allows for the dynamic representation of information in ongoing brain oscillations."^^xsd:string; bibo:authorList ; bibo:issue "11"; bibo:status , ; bibo:volume "30"; dc:hasVersion ; dct:creator , , ; dct:date "2018-07-13"; dct:isPartOf , ; dct:publisher ; dct:title "Replay of Stimulus-specific Temporal Patterns during Associative Memory Formation"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "MIT Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hanslmayr"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Hanslmayr"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Michelmann"^^xsd:string; foaf:givenName "Sebastian"^^xsd:string; foaf:name "Sebastian Michelmann"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . bibo:issn "0898929X"; foaf:name "Journal of Cognitive Neuroscience"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Final.pdf"^^xsd:string . rdfs:label "Final.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67245 \n\nPlacing Meta-stable States of Consciousness within the Predictive Coding Hierarchy: the Deceleration of the Accelerated Prediction Error\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Placing Meta-stable States of Consciousness within the Predictive Coding Hierarchy: the Deceleration of the Accelerated Prediction Error (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Placing Meta-stable States of Consciousness within the Predictive Coding Hierarchy: the Deceleration of the Accelerated Prediction Error (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Placing Meta-stable States of Consciousness within the Predictive Coding Hierarchy: the Deceleration of the Accelerated Prediction Error (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Placing Meta-stable States of Consciousness within the Predictive Coding Hierarchy: the Deceleration of the Accelerated Prediction Error (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Placing Meta-stable States of Consciousness within the Predictive Coding Hierarchy: the Deceleration of the Accelerated Prediction Error (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Placing Meta-stable States of Consciousness within the Predictive Coding Hierarchy: the Deceleration of the Accelerated Prediction Error (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 . bibo:abstract "While many studies have linked prediction errors and event related potentials1\r\nat a single processing level, few consider how these responses interact across\r\nlevels. In response, we present a factorial analysis of a multi-level oddball task\r\n– the local-global task – and we explore it when participants are sedated\r\nversus recovered. We found that the local and global levels in fact interact.\r\nThis is of considerable current interest, since it has recently been argued that\r\nthe MEEG response evoked by the global effect corresponds to a distinct\r\nprocessing mode that moves beyond predictive coding. This interaction\r\nsuggests that the two processing modes are not distinct. Additionally, we\r\nobserved that sedation modulates this interaction, suggesting that conscious awareness may not be completely restricted to a single (global) processing\r\nlevel."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "63"; dc:hasVersion ; dct:creator , , , , , , , , , ; dct:date "2018-07-10"; dct:isPartOf , ; dct:publisher ; dct:title "Placing Meta-stable States of Consciousness within the Predictive Coding Hierarchy: the Deceleration of the Accelerated Prediction Error"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Menon"^^xsd:string; foaf:givenName "David K."^^xsd:string; foaf:name "David K. Menon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bekinschtein"^^xsd:string; foaf:givenName "Tristan"^^xsd:string; foaf:name "Tristan Bekinschtein"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Shirazibeheshti"^^xsd:string; foaf:givenName "Amirali"^^xsd:string; foaf:name "Amirali Shirazibeheshti"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Witon"^^xsd:string; foaf:givenName "Adrien"^^xsd:string; foaf:name "Adrien Witon"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Ling"^^xsd:string; foaf:name "Ling Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Adapa"^^xsd:string; foaf:givenName "Ram"^^xsd:string; foaf:name "Ram Adapa"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cooke"^^xsd:string; foaf:givenName "Jennifer"^^xsd:string; foaf:name "Jennifer Cooke"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hojjatoleslami"^^xsd:string; foaf:givenName "Ali"^^xsd:string; foaf:name "Ali Hojjatoleslami"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chennu"^^xsd:string; foaf:givenName "Srivas"^^xsd:string; foaf:name "Srivas Chennu"^^xsd:string; rdf:type foaf:Person . bibo:issn "10538100"; foaf:name "Consciousness and Cognition"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90641 \n\nTypes for Information Flow Control: Labeling Granularity and Semantic Models\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "Language-based information flow control (IFC) tracks dependencies within a program using sensitivity labels and prohibits public outputs from depending on secret inputs. In particular, literature has proposed several type systems for tracking these dependencies. On one extreme, there are fine-grained type systems (like Flow Caml) that label all values individually and track dependence at the level of individual values. On the other extreme are coarse-grained type systems (like HLIO) that track dependence coarsely, by associating a single label with an entire computation context and not labeling all values individually. In this paper, we show that, despite their glaring differences, both these styles are, in fact, equally expressive. To do this, we show a semantics- and type-preserving translation from a coarse-grained type system to a fine-grained one and vice-versa. The forward translation isn't surprising, but the backward translation is: It requires a construct to arbitrarily limit the scope of a context label in the coarse-grained type system (e.g., HLIO's \"toLabeled\" construct). As a separate contribution, we show how to extend work on logical relation models of IFC types to higher-order state. We build such logical relations for both the fine-grained type system and the coarse-grained type system. We use these relations to prove the two type systems and our translations between them sound."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , ; dct:date "2018-07-09"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Types for Information Flow Control: Labeling Granularity and Semantic Models"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "2018 IEEE 31st Computer Security Foundations Symposium (CSF)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Oxford, UK"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Garg"^^xsd:string; foaf:givenName "Deepak"^^xsd:string; foaf:name "Deepak Garg"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rajani"^^xsd:string; foaf:givenName "Vineet"^^xsd:string; foaf:name "Vineet Rajani"^^xsd:string; rdf:type foaf:Person . foaf:name "2018 IEEE 31st Computer Security Foundations Symposium (CSF)"^^xsd:string; rdf:type bibo:Collection . rdfs:label "Brookhouse-WCCI-2018_preprint.pdf"^^xsd:string . rdfs:label "Brookhouse-WCCI-2018_preprint.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67177 \n\nPost-Processing Methods to Enforce Monotonic Constraints in Ant Colony Classification Algorithms\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Post-Processing Methods to Enforce Monotonic Constraints in Ant Colony Classification Algorithms (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Post-Processing Methods to Enforce Monotonic Constraints in Ant Colony Classification Algorithms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Post-Processing Methods to Enforce Monotonic Constraints in Ant Colony Classification Algorithms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Post-Processing Methods to Enforce Monotonic Constraints in Ant Colony Classification Algorithms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Post-Processing Methods to Enforce Monotonic Constraints in Ant Colony Classification Algorithms (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Post-Processing Methods to Enforce Monotonic Constraints in Ant Colony Classification Algorithms (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Most classification algorithms ignore existing domain knowledge during model construction, which can decrease the model's comprehensibility and increase the likelihood of model rejection due to users losing trust in the models they use. One approach to encapsulate this domain knowledge is monotonic constraints. This paper proposes new monotonic pruners to enforce monotonic constraints on models created by an existing ACO algorithm in a post-processing stage. We compare the effectiveness of the new pruners against an existing post-processing approach that also enforce constraints. Additionally, we also compare the effectiveness of both these post-processing procedures in isolation and in conjunction with favouring constraints in the learning phase. Our results show that our proposed pruners outperform the existing post-processing approach and the combination of favouring and enforcing constraints at different stages of the model construction process is the most effective solution."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2018-07-08"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Post-Processing Methods to Enforce Monotonic Constraints in Ant Colony Classification Algorithms"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "2018 International Joint Conference on Neural Networks"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Rio de Janeiro, Brazil"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando E.B."^^xsd:string; foaf:name "Fernando E.B. Otero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Brookhouse"^^xsd:string; foaf:givenName "James"^^xsd:string; foaf:name "James Brookhouse"^^xsd:string; rdf:type foaf:Person . bibo:issn "21614393"; foaf:name "Proceedings of International Joint Conference on Neural Networks"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Helal-WCCI-2018_preprint.pdf"^^xsd:string . rdfs:label "Helal-WCCI-2018_preprint.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67178 \n\nArchive-Based Pheromone Model for Discovering Regression Rules with Ant Colony Optimization\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Archive-Based Pheromone Model for Discovering Regression Rules with Ant Colony Optimization (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Archive-Based Pheromone Model for Discovering Regression Rules with Ant Colony Optimization (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Archive-Based Pheromone Model for Discovering Regression Rules with Ant Colony Optimization (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Archive-Based Pheromone Model for Discovering Regression Rules with Ant Colony Optimization (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Archive-Based Pheromone Model for Discovering Regression Rules with Ant Colony Optimization (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Archive-Based Pheromone Model for Discovering Regression Rules with Ant Colony Optimization (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "In this paper we introduce a new algorithm, called Ant-Miner-Reg_MA, to tackle the regression problem using an archive-based pheromone model. Existing regression algorithms handle continuous attribute using a discretisation procedure, either in a preprocessing stage or during rule creation. Using an archive as a pheromone model, inspired by the ACO for Mixed-Variable (ACO_MV), we eliminate the need for a discretisation procedure. We compare the proposed Ant-Miner-Reg_MA against Ant-Miner-Reg, an ACO-based regression algorithm that uses a dynamic discretisation procedure, inspired on M5 algorithm, during rule construction process. Our results show that Ant-Miner-Reg_MA achieved a significant improvement in the relative root mean square error of the models created, overcoming the limitations of the dynamic discretisation procedure."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-07-08"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Archive-Based Pheromone Model for Discovering Regression Rules with Ant Colony Optimization"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "2018 IEEE Congress on Evolutionary Computation"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Rio de Janeiro, Brazil"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Helal"^^xsd:string; foaf:givenName "Ayah"^^xsd:string; foaf:name "Ayah Helal"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Otero"^^xsd:string; foaf:givenName "Fernando E.B."^^xsd:string; foaf:name "Fernando E.B. Otero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Brookhouse"^^xsd:string; foaf:givenName "James"^^xsd:string; foaf:name "James Brookhouse"^^xsd:string; rdf:type foaf:Person . rdfs:label "manlang18-aumayr-et-al-efficient-and-deterministic-record-and-replay-for-actor-languages.pdf"^^xsd:string . rdfs:label "manlang18-aumayr-et-al-efficient-and-deterministic-record-and-replay-for-actor-languages.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #68801 \n\nEfficient and Deterministic Record & Replay for Actor Languages\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Efficient and Deterministic Record & Replay for Actor Languages (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Efficient and Deterministic Record & Replay for Actor Languages (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Efficient and Deterministic Record & Replay for Actor Languages (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Efficient and Deterministic Record & Replay for Actor Languages (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Efficient and Deterministic Record & Replay for Actor Languages (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Efficient and Deterministic Record & Replay for Actor Languages (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "With the ubiquity of parallel commodity hardware, developers turn to high-level concurrency models such as the actor model to lower the complexity of concurrent software. However, debugging concurrent software is hard, especially for concurrency models with a limited set of supporting tools. Such tools often deal only with the underlying threads and locks, which obscures the view on e.g. actors and messages and thereby introduces additional complexity. To improve on this situation, we present a low-overhead record & replay approach for actor languages. It allows one to debug concurrency issues deterministically based on a previously recorded trace. Our evaluation shows that the average run-time overhead for tracing on benchmarks from the Savina suite is 10% (min. 0%, max. 20%). For Acme-Air, a modern web application, we see a maximum increase of 1% in latency for HTTP requests and about 1.4 MB/s of trace data. These results are a first step towards deterministic replay debugging of actor systems in production."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2018-07-06"; dct:isPartOf ; dct:title "Efficient and Deterministic Record & Replay for Actor Languages"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "15th International Conference on Managed Languages and Runtimes"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Linz, Austria"^^xsd:string . foaf:familyName "Gonzalez Boix"^^xsd:string; foaf:givenName "Elisa"^^xsd:string; foaf:name "Elisa Gonzalez Boix"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Aumayr"^^xsd:string; foaf:givenName "Dominik"^^xsd:string; foaf:name "Dominik Aumayr"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mössenböck"^^xsd:string; foaf:givenName "Hanspeter"^^xsd:string; foaf:name "Hanspeter Mössenböck"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Béra"^^xsd:string; foaf:givenName "Clément"^^xsd:string; foaf:name "Clément Béra"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "18tr070013.pdf"^^xsd:string . rdfs:label "Meta-Learning-for-Hierarchical-Classification-and-Applications-in-Bioinformatics.pdf"^^xsd:string . rdfs:label "Meta-Learning-for-Hierarchical-Classification-and-Applications-in-Bioinformatics.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69105 \n\nMeta-Learning for Hierarchical Classification and Applications in Bioinformatics\n\n"; foaf:primaryTopic . dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Meta-Learning for Hierarchical Classification and Applications in Bioinformatics (PDF)"^^xsd:string . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Meta-Learning for Hierarchical Classification and Applications in Bioinformatics (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Hierarchical Classification and Applications in Bioinformatics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Hierarchical Classification and Applications in Bioinformatics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Hierarchical Classification and Applications in Bioinformatics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Hierarchical Classification and Applications in Bioinformatics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Hierarchical Classification and Applications in Bioinformatics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Hierarchical Classification and Applications in Bioinformatics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Hierarchical Classification and Applications in Bioinformatics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Hierarchical Classification and Applications in Bioinformatics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Hierarchical Classification and Applications in Bioinformatics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Meta-Learning for Hierarchical Classification and Applications in Bioinformatics (Other)"^^xsd:string . rdf:_1 . bibo:abstract "Hierarchical classification is a special type of\r\nclassification task where the class labels are organised into a\r\nhierarchy, with more generic class labels being ancestors of more\r\nspecific ones. Meta-learning for classification-algorithm\r\nrecommendation consists of recommending to the user a classification\r\nalgorithm, from a pool of candidate algorithms, for a dataset, based on\r\nthe past performance of the candidate algorithms in other datasets.\r\nMeta-learning is normally used in conventional, non-hierarchical\r\nclassification. By contrast, this paper proposes a meta-learning\r\napproach for more challenging task of hierarchical classification, and\r\nevaluates it in a large number of bioinformatics datasets. Hierarchical\r\nclassification is especially relevant for bioinformatics problems, as\r\nprotein and gene functions tend to be organised into a hierarchy of\r\nclass labels.\r\nThis work proposes meta-learning approach for\r\nrecommending the best hierarchical classification algorithm to a\r\nhierarchical classification dataset. This work’s contributions are: 1)\r\nproposing an algorithm for splitting hierarchical datasets into\r\nnew datasets to increase the number of meta-instances, 2) proposing\r\nmeta-features for hierarchical classification, and 3) interpreting\r\ndecision-tree meta-models for hierarchical classification algorithm\r\nrecommendation."^^xsd:string; bibo:authorList ; bibo:issue "7"; bibo:status , ; bibo:volume "12"; dc:hasVersion , ; dct:creator ; dct:date "2018-07-01"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Meta-Learning for Hierarchical Classification and Applications in Bioinformatics"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "World Academy of Science, Engineering and Technology"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Fabris"^^xsd:string; foaf:givenName "Fabio"^^xsd:string; foaf:name "Fabio Fabris"^^xsd:string; rdf:type foaf:Person . bibo:issn "20103921"; foaf:name "International Journal of Computer and Information Engineering"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90203 \n\nSemi-supervised deep rule-based approach for image classification\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "In this paper, a semi-supervised learning approach based on a deep rule-based (DRB) classifier is introduced. With its unique prototype-based nature, the semi-supervised DRB (SSDRB) classifier is able to generate human interpretable IF...THEN...rules through the semi-supervised learning process in a self-organising and highly transparent manner. It supports online learning on a sample-by-sample basis or on a chunk-by-chunk basis. It is also able to perform classification on out-of-sample images. Moreover, the SSDRB classifier can learn new classes from unlabelled images in an active way becoming dynamically self-evolving. Numerical examples based on large-scale benchmark image sets demonstrate the strong performance of the proposed SSDRB classifier as well as its distinctive features compared with the “state-of-the-art” approaches."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "68"; dct:creator , ; dct:date "2018-07-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Semi-supervised deep rule-based approach for image classification"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P."^^xsd:string; foaf:name "Plamen P. Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "15684946"; foaf:name "Applied Soft Computing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "ACL_2018_Shoaib.pdf"^^xsd:string . rdfs:label "ACL_2018_Shoaib.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66991 \n\nUnsupervised Learning of Distributional Relation Vectors\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Unsupervised Learning of Distributional Relation Vectors (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Unsupervised Learning of Distributional Relation Vectors (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Unsupervised Learning of Distributional Relation Vectors (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Unsupervised Learning of Distributional Relation Vectors (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Unsupervised Learning of Distributional Relation Vectors (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Unsupervised Learning of Distributional Relation Vectors (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Word embedding models such as GloVe rely on co-occurrence statistics to learn vector representations of word meaning. While we may similarly expect that cooccurrence statistics can be used to capture rich information about the relationships between different words, existing approaches for modeling such relationships are based on manipulating pre-trained word vectors. In this paper, we introduce a novel method which directly learns relation vectors from co-occurrence statistics. To this end, we first introduce a variant of GloVe, in which there is an explicit connection between word vectors and PMI weighted co-occurrence vectors. We then show how relation vectors can be naturally embedded into the resulting vector space."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "1"; dc:hasVersion ; dct:creator , , ; dct:date "2018-07-01"; dct:isPartOf ; dct:publisher ; dct:title "Unsupervised Learning of Distributional Relation Vectors"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . dct:title "56th Annual Meeting of the Association for Computational Linguistics"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Melbourne, Australia"^^xsd:string . foaf:name "Association for Computational Linguistics"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Schockaert"^^xsd:string; foaf:givenName "Steven"^^xsd:string; foaf:name "Steven Schockaert"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bouraoui"^^xsd:string; foaf:givenName "Zied"^^xsd:string; foaf:name "Zied Bouraoui"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jameel"^^xsd:string; foaf:givenName "Shoaib"^^xsd:string; foaf:name "Shoaib Jameel"^^xsd:string; rdf:type foaf:Person . rdfs:label "5. Semantic privacy-preserving framework for electronic healthrecord linkage.pdf"^^xsd:string . rdfs:label "5. Semantic privacy-preserving framework for electronic healthrecord linkage.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #80957 \n\nSemantic privacy-preserving framework for electronic health record linkage\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Semantic privacy-preserving framework for electronic health record linkage (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Semantic privacy-preserving framework for electronic health record linkage (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Semantic privacy-preserving framework for electronic health record linkage (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Semantic privacy-preserving framework for electronic health record linkage (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Semantic privacy-preserving framework for electronic health record linkage (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Semantic privacy-preserving framework for electronic health record linkage (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "The combination of digitized health information and web-based technologies offers many possibilities for data analysis and business intelligence. In the healthcare and biomedical research domain, applications depending on electronic health records (EHRs) identify privacy preservation as a major concern. Existing solutions cannot always satisfy the evolving research demands such as linking patient records across organizational boundaries due to the potential for patient re-identification. In this work, we show how semantic methods can be applied to support the formulation and enforcement of access control policy whilst ensuring that privacy leakage can be detected and prevented. The work is illustrated through a case study associated with the Australasian Diabetes Data Network (ADDN – www.addn.org.au), the national paediatric type-1 diabetes data registry, and the Australian Urban Research Infrastructure Network (AURIN – www.aurin.org.au) platform that supports Australia-wide access to urban and built environment data sets. We demonstrate that through extending the eXtensible Access Control Markup Language (XACML) with semantic capabilities, finer-grained access control encompassing data risk disclosure mechanisms can be supported. We discuss the contributions that can be made using this approach to socio-economic development and political management within business systems, and especially those situations where secure data access and data linkage is required."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "35"; dc:hasVersion ; dct:creator , ; dct:date "2018-07-01"; dct:isPartOf , ; dct:publisher ; dct:subject , , , ; dct:title "Semantic privacy-preserving framework for electronic health record linkage"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "R858 Computer applications to medicine. Medical informatics. Medical information technology" . rdf:type skos:Concept; skos:prefLabel "T Technology (General)"@en . rdf:type skos:Concept; skos:prefLabel "ZA4045 Electronic information resources"@en . rdf:type skos:Concept; skos:prefLabel "ZA Information resources"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Sinnott"^^xsd:string; foaf:givenName "Richard O."^^xsd:string; foaf:name "Richard O. Sinnott"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lu"^^xsd:string; foaf:givenName "Yang"^^xsd:string; foaf:name "Yang Lu"^^xsd:string; rdf:type foaf:Person . bibo:issn "07365853"; foaf:name "Telematics and Informatics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "EarwormsMakeBadPasswords.pdf"^^xsd:string . rdfs:label "EarwormsMakeBadPasswords.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #64302 \n\nEarworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "This paper presents a security analysis of the manual override feature of the Noke smart lock. The Noke allows its user to operate, monitor and even share his smart lock with others through a smartphone. To counter the risk of being unable to open the lock when the smartphone is unavailable, it provides an override mechanism. Noke implements this override feature using a quick-click scheme, whereby its user can choose a sequence of eight to sixteen short and long shackle presses (similar to a Morse code). To explore the security implications of this feature, we conducted a study collecting human-generated quick-click codes from 100 participants, and analysed and modelled the resulting dataset. Our analysis shows that the override mechanism, at least in its current implementation, presents a significant opportunity for successful guessing attacks. We demonstrate this by building a mechanical brute force tool that on average can test one quick-click code in under three seconds. We conclude that this speed, together with the low entropy of human-generated passcodes, makes this manual override feature one of the most significant weaknesses of the system and constitutes a promising attack vector. We responsibly disclosed our findings to the Noke manufacturer. We also provide a list of potential countermeasures that can help to address this risk. We believe that alternative authentication methods such as quick-click codes will become increasingly popular in ever-expanding Internet of Things devices, so the weaknesses and the countermeasures discussed in this paper are timely and relevant, as they can also apply to other devices and security systems that rely on unconventional user-generated authentication codes."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-06-25"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "International Workshop on Secure Internet of Things 2017 (SIoT 2017)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Oslo, Norway"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "McBride"^^xsd:string; foaf:givenName "Jack"^^xsd:string; foaf:name "Jack McBride"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Arief"^^xsd:string; foaf:givenName "Budi"^^xsd:string; foaf:name "Budi Arief"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio"^^xsd:string; foaf:name "Julio Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . rdfs:label "ICCC_2018_paper_7.pdf"^^xsd:string . rdfs:label "ICCC_2018_paper_7.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67599 \n\nAn Evaluation of the Impact of Constraints on the Perceived Creativity of Narrative Generating Software\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An Evaluation of the Impact of Constraints on the Perceived Creativity of Narrative Generating Software (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An Evaluation of the Impact of Constraints on the Perceived Creativity of Narrative Generating Software (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Evaluation of the Impact of Constraints on the Perceived Creativity of Narrative Generating Software (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Evaluation of the Impact of Constraints on the Perceived Creativity of Narrative Generating Software (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Evaluation of the Impact of Constraints on the Perceived Creativity of Narrative Generating Software (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Evaluation of the Impact of Constraints on the Perceived Creativity of Narrative Generating Software (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . rdf:_1 ; rdf:_2 ; rdf:_3 . , , ; bibo:abstract "This work investigates the impact of constraints on the\r\nperceived creativity of the output of narrative generating\r\nsystems, in order to understand what level of constraint\r\napplication results in the most creative output.\r\nTo achieve this, software is written that generates short\r\nstories, using adjustable levels of constraint meant to\r\nreflect those utilised by other narrative generating systems.\r\nThese systems are presented at different positions\r\nalong a spectrum, which we posit arises from the application\r\nof constraint. The creativity of the output is then\r\nassessed by human evaluators. The results are promising\r\nand show a clear variation of response based on the\r\nlevel of constraint imposed on the narrative generation\r\nprocess. The results show a sweet spot for maximal creativity\r\ncloser to the less constrained end of the spectrum,\r\nwhich demonstrates the potential for more creative software\r\nby the relaxing of constraints."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2018-06-24"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "An Evaluation of the Impact of Constraints on the Perceived Creativity of Narrative Generating Software"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "9th International Conference on Computational Creativity"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Salamanca, Spain"^^xsd:string . foaf:name "Association of Computational Creativity"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Jordanous"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Jordanous"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pachet"^^xsd:string; foaf:givenName "François"^^xsd:string; foaf:name "François Pachet"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jordanous"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Jordanous"^^xsd:string; rdf:type foaf:Person . foaf:familyName "León"^^xsd:string; foaf:givenName "Carlos"^^xsd:string; foaf:name "Carlos León"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McKeown"^^xsd:string; foaf:givenName "Lewis"^^xsd:string; foaf:name "Lewis McKeown"^^xsd:string; rdf:type foaf:Person . rdfs:label "petras-2018-ethics.pdf"^^xsd:string . rdfs:label "petras-2018-ethics.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67467 \n\nAn Ethics Framework for Research into Heterogeneous Systems\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An Ethics Framework for Research into Heterogeneous Systems (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An Ethics Framework for Research into Heterogeneous Systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Ethics Framework for Research into Heterogeneous Systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Ethics Framework for Research into Heterogeneous Systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Ethics Framework for Research into Heterogeneous Systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Ethics Framework for Research into Heterogeneous Systems (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "Heterogeneous systems often found in the Internet of Things (IoT) have a wide range of challenges in ethics and law. Any device with an IP address can potentially collect, process, store and share data and make automated decisions in unpredictable ways. When conducting research and development in IoT, it is necessary to have a comprehensive socio-technical understanding of decision-making and data-handling, as well as procedures in place to pre-empt and address unforeseen consequences. In this paper we propose a comprehensive conceptual-modelling approach to help researchers systematically identify, consider and respond to challenges in ethics and law when conducting research and development of heterogeneous systems. Our framework is a six-layered model that addresses these concerns with regards to proximity to the data and actions in question. Using our framework, researchers should be able to deliver use-case scenarios that should be peer-reviewed by a large number of experts in dissimilar domains with the aim of identifying issues to why the research and development proposed is not done responsibly, so researchers can address these concerns. Finally, we explore a IoT use-case scenario, and we propose future directions for this work."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2018-06-14"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "An Ethics Framework for Research into Heterogeneous Systems"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "Living in the Internet of Things: Cybersecurity of the IoT - 2018"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "London, UK"^^xsd:string . foaf:name "IET"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Creese"^^xsd:string; foaf:givenName "Sadie"^^xsd:string; foaf:name "Sadie Creese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Williams"^^xsd:string; foaf:givenName "Rebecca"^^xsd:string; foaf:name "Rebecca Williams"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Happa"^^xsd:string; foaf:givenName "Jassim"^^xsd:string; foaf:name "Jassim Happa"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Goldsmith"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Goldsmith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R.C."^^xsd:string; foaf:name "Jason R.C. Nurse"^^xsd:string; rdf:type foaf:Person . rdfs:label "2018-petrasiet-nurse-et-al-preprint.pdf"^^xsd:string . rdfs:label "2018-petrasiet-nurse-et-al-preprint.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67466 \n\nIf you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Security risk assessment methods have served us well over the last two decades. As the complexity, pervasiveness and automation of technology systems increases, particularly with the Internet of Things (IoT), there is a convincing argument that we will need new approaches to assess risk and build system trust. In this article, we report on a series of scoping workshops and interviews with industry professionals (experts in enterprise systems, IoT and risk) conducted to investigate the validity of this argument. Additionally, our research aims to consult with these professionals to understand two crucial aspects. Firstly, we seek to identify the wider concerns in adopting IoT systems into a corporate environment, be it a smart manufacturing shop floor or a smart office. Secondly, we investigate the key challenges for approaches in industry that attempt to effectively and efficiently assess cyber-risk in the IoT."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2018-06-14"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "Living in the Internet of Things: Cybersecurity of the IoT - 2018"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "London, UK"^^xsd:string . foaf:name "IET"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "De Roure"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David De Roure"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Radanliev"^^xsd:string; foaf:givenName "Petar"^^xsd:string; foaf:name "Petar Radanliev"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Creese"^^xsd:string; foaf:givenName "Sadie"^^xsd:string; foaf:name "Sadie Creese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R.C."^^xsd:string; foaf:name "Jason R.C. Nurse"^^xsd:string; rdf:type foaf:Person . rdfs:label "Integration+of+Cyber+Security+Frameworks+Models+and+Approaches+for+Building+Design+Principles+for+the+Internet_of_Things+in+.pdf"^^xsd:string . rdfs:label "Integration+of+Cyber+Security+Frameworks+Models+and+Approaches+for+Building+Design+Principles+for+the+Internet_of_Things+in+.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67464 \n\nIntegration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0 (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0 (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0 (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0 (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0 (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0 (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 . bibo:abstract "This research article reports the results of a qualitative case study that correlates academic literature with five Industry 4.0 cyber trends, seven cyber risk frameworks and two cyber risk models. While there is a strong interest in industry and academia to standardise existing cyber risk frameworks, models and methodologies, an attempt to combine these approaches has not been done until present. We apply the grounded theory approach to derive with integration criteria for the reviewed frameworks, models and methodologies. Then, we propose a new architecture for the integration of the reviewed frameworks, models and methodologies. We therefore advance the efforts of integrating standards and governance into Industry 4.0 and offer a better understanding of a holistic economic impact assessment model for IoT cyber risk."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , ; dct:date "2018-06-14"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "Living in the Internet of Things: Cybersecurity of the IoT - 2018"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "London, UK"^^xsd:string . foaf:name "IET"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Radanliev"^^xsd:string; foaf:givenName "Petar"^^xsd:string; foaf:name "Petar Radanliev"^^xsd:string; rdf:type foaf:Person . foaf:familyName "De Roure"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David De Roure"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Montalvo"^^xsd:string; foaf:givenName "Rafael Mantilla"^^xsd:string; foaf:name "Rafael Mantilla Montalvo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cannady"^^xsd:string; foaf:givenName "Stacy"^^xsd:string; foaf:name "Stacy Cannady"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Huth"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Huth"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nicolescu"^^xsd:string; foaf:givenName "Razvan"^^xsd:string; foaf:name "Razvan Nicolescu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R.C."^^xsd:string; foaf:name "Jason R.C. Nurse"^^xsd:string; rdf:type foaf:Person . rdfs:label "2018-petras-iet-snz_author-final.pdf"^^xsd:string . rdfs:label "2018-petras-iet-snz_author-final.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67465 \n\nA capability-oriented approach to assessing privacy risk in smart home ecosystems\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A capability-oriented approach to assessing privacy risk in smart home ecosystems (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A capability-oriented approach to assessing privacy risk in smart home ecosystems (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A capability-oriented approach to assessing privacy risk in smart home ecosystems (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A capability-oriented approach to assessing privacy risk in smart home ecosystems (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A capability-oriented approach to assessing privacy risk in smart home ecosystems (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A capability-oriented approach to assessing privacy risk in smart home ecosystems (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Smart devices are increasingly ubiquitous; the multitude of risks they pose to user privacy continues to grow, but assessing such risks has proven difficult. In this paper, we discuss three factors which complicate the assessment of privacy risks in the context of the smart home. Firstly, smart devices are highly heterogeneous and hard to categorise, so top-down, taxonomy-oriented approaches to risk assessment do not fit well. Secondly, the threat landscape is vast, varied, and growing. Thirdly, the chief asset, personal information, is difficult to value-especially given that its value can be hugely affected by aggregation. To address these factors, we propose a novel, bottom-up approach in which the smart home ecosystem is reduced to its data-collecting capabilities (such as sensors and apps) and then privacy risk is assessed based on the information that the user exposes. We define a capability-oriented model which is system-neutral, extensible, and therefore well-suited to the fast-evolving nature of the smart home."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-06-14"; dct:isPartOf ; dct:publisher ; dct:subject , ; dct:title "A capability-oriented approach to assessing privacy risk in smart home ecosystems"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "Living in the Internet of Things: Cybersecurity of the IoT - 2018"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "London, UK"^^xsd:string . foaf:name "IET"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Zhao"^^xsd:string; foaf:givenName "Jun"^^xsd:string; foaf:name "Jun Zhao"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sturgess"^^xsd:string; foaf:givenName "Jack"^^xsd:string; foaf:name "Jack Sturgess"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nurse"^^xsd:string; foaf:givenName "Jason R.C."^^xsd:string; foaf:name "Jason R.C. Nurse"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90205 \n\nSelf-organising fuzzy logic classifier\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:abstract "In this paper, we present a self-organising nonparametric fuzzy rule-based classifier. The proposed approach identifies prototypes from the observed data through an offline training process and uses them to build a 0-order AnYa type fuzzy rule-based system for classification. Once primed offline, it is able to continuously learn from the streaming data afterwards to follow the changing data pattern by updating the system structure and meta-parameters recursively. The meta-parameters of the proposed approach are derived from data directly. By changing the level of granularity, the proposed approach can make a trade-off between performance and computational efficiency, and, thus, the classifier is able to address a wide variety of problems with specific needs. The classifier also supports different types of distance measures. Numerical examples based on benchmark datasets demonstrate the high performance of the proposed approach and its ability of handling high-dimensional, complex, large-scale problems."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "447"; dct:creator , ; dct:date "2018-06-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Self-organising fuzzy logic classifier"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P."^^xsd:string; foaf:name "Plamen P. Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "00200255"; foaf:name "Information Sciences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Periodic_Tridiagonal.pdf"^^xsd:string . rdfs:label "Periodic_Tridiagonal.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66997 \n\nAn analytical approach: Explicit inverses of periodic tridiagonal matrices\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An analytical approach: Explicit inverses of periodic tridiagonal matrices (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An analytical approach: Explicit inverses of periodic tridiagonal matrices (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An analytical approach: Explicit inverses of periodic tridiagonal matrices (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An analytical approach: Explicit inverses of periodic tridiagonal matrices (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An analytical approach: Explicit inverses of periodic tridiagonal matrices (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An analytical approach: Explicit inverses of periodic tridiagonal matrices (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "We derive an explicit formula for the inverse of a general, periodic, tridiagonal matrix. Our approach is to derive its factorization using backward continued fractions (BCF) which are an essential tool in number theory. We then use these formulae to construct an algorithm for inverting a general, periodic, tridiagonal matrix which we implement in Maple.1 Finally, we present the results of testing the efficiency of our new algorithm against another published implementation and against the library procedures available within Maple to invert a general matrix and to compute its determinant."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "335"; dc:hasVersion ; dct:creator , ; dct:date "2018-06-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "An analytical approach: Explicit inverses of periodic tridiagonal matrices"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Kılıç"^^xsd:string; foaf:givenName "Emrah"^^xsd:string; foaf:name "Emrah Kılıç"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hopkins"^^xsd:string; foaf:givenName "Tim"^^xsd:string; foaf:name "Tim Hopkins"^^xsd:string; rdf:type foaf:Person . bibo:issn "03770427"; foaf:name "Journal of Computational and Applied Mathematics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #68803 \n\nConference Companion of the 2nd International Conference on Art, Science, and Engineering of Programming\n\n"; foaf:primaryTopic . rdf:_1 . rdf:_1 ; rdf:_2 . , ; bibo:authorList ; bibo:editorList ; bibo:status , ; dct:creator ; dct:date "2018-06-01"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Conference Companion of the 2nd International Conference on Art, Science, and Engineering of Programming"^^xsd:string; rdf:type bibo:Article, ep:EPrint, ep:EdbookEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Sartor"^^xsd:string; foaf:givenName "Jennifer B."^^xsd:string; foaf:name "Jennifer B. Sartor"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "Dismantling OpenPuff PDF steganography.pdf"^^xsd:string . rdfs:label "Dismantling OpenPuff PDF steganography.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67242 \n\nDismantling OpenPuff PDF steganography\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Dismantling OpenPuff PDF steganography (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Dismantling OpenPuff PDF steganography (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Dismantling OpenPuff PDF steganography (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Dismantling OpenPuff PDF steganography (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Dismantling OpenPuff PDF steganography (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Dismantling OpenPuff PDF steganography (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "We present a steganalytic attack against the PDF component of the popular OpenPuff tool. We show that our findings allow us to accurately detect the presence of OpenPuff steganography over the PDF format by using a simple script. OpenPuff is a prominent multi-format and semi-open-source stego-system with a large user base. Because of its popularity, we think our results could potentially have relevant security and privacy implications. The relative simplicity of our attack, paired with its high accuracy and the existence of previous steganalytic findings against this software, warrants major concerns over the real security offered by this steganography tool."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "25"; dc:hasVersion ; dct:creator , ; dct:date "2018-06-01"; dct:isPartOf , ; dct:publisher ; dct:title "Dismantling OpenPuff PDF steganography"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio"^^xsd:string; foaf:name "Julio Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sloan"^^xsd:string; foaf:givenName "Tom"^^xsd:string; foaf:name "Tom Sloan"^^xsd:string; rdf:type foaf:Person . bibo:issn "17422876"; foaf:name "Digital Investigation"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "13Fadi Dib Thesis.pdf"^^xsd:string . rdfs:label "13Fadi Dib Thesis.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69286 \n\nImproved Neighbourhood Search-Based Methods for Graph Layout\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Improved Neighbourhood Search-Based Methods for Graph Layout (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Improved Neighbourhood Search-Based Methods for Graph Layout (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improved Neighbourhood Search-Based Methods for Graph Layout (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improved Neighbourhood Search-Based Methods for Graph Layout (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improved Neighbourhood Search-Based Methods for Graph Layout (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Improved Neighbourhood Search-Based Methods for Graph Layout (Other)"^^xsd:string . rdf:_1 . ; bibo:abstract "Graph drawing, or the automatic layout of graphs, is a challenging problem. There are several search-based methods for graph drawing that are based on optimising a fitness function which is formed from a weighted sum of multiple criteria. This thesis proposes a new neighbourhood search-based method that uses a tabu search coupled with path relinking in order to optimise such fitness functions for general graph layouts with undirected straight lines. None of these methods have been previously used in general multi-criteria graph drawing. Tabu search uses a memory list to speed up searching by avoiding previously tested solutions, while the path relinking method generates new solutions by exploring paths that connect high quality solutions. We use path relinking periodically within the tabu search procedure to speed up the identification of good solutions. \r\nWe have evaluated our new method against the commonly used neighbourhood search optimisation techniques: hill climbing and simulated annealing. Our evaluation examines the quality of the graph layout (fitness function's value) and the speed of the layout in terms of the number of the evaluated solutions required to draw a graph. We also examine the relative scalability of our method. Our experimental results were applied to both random graphs and a real-world dataset. We show that our method outperforms both hill climbing and simulated annealing by producing a better layout in a lower number of evaluated solutions. In addition, we demonstrate that our method has greater scalability as it can lay out larger graphs than the state-of-the-art neighbourhood search-based methods. Finally, we show that similar results can be produced in a real world setting by testing our method against a standard public graph dataset."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2018-06"; dct:isPartOf ; dct:issuer , ; dct:subject ; dct:title "Improved Neighbourhood Search-Based Methods for Graph Layout"^^xsd:string; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Dib"^^xsd:string; foaf:givenName "Fadi"^^xsd:string; foaf:name "Fadi Dib"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rodgers"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Rodgers"^^xsd:string; rdf:type foaf:Person . rdfs:label "14thesis-deposit-final.pdf"^^xsd:string . rdfs:label "14thesis-deposit-final.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69292 \n\nCharacterising Graduateness in Computing Education: A Narrative Approach\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Characterising Graduateness in Computing Education: A Narrative Approach (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Characterising Graduateness in Computing Education: A Narrative Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Characterising Graduateness in Computing Education: A Narrative Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Characterising Graduateness in Computing Education: A Narrative Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Characterising Graduateness in Computing Education: A Narrative Approach (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Characterising Graduateness in Computing Education: A Narrative Approach (Other)"^^xsd:string . rdf:_1 . ; bibo:abstract "This thesis examines the concept of graduateness in computing education. Graduateness is related to efforts to articulate the outcomes of a university education. It is commonly defined as the attributes all graduates should develop by the time they graduate regardless of university attended or discipline studied (Glover, Law and Youngman 2002). This work takes a different perspective grounded in disciplinary and institutional contexts. It aims to explore how graduates make sense of their experiences studying computing within their wider learning trajectories.\r\n\r\nThe research presented here uses a narrative approach. Whilst narrative methodologies are not commonly used in computing education, people construct stories both to make sense of their experiences and to integrate the \"past, present, and an anticipated future\" (McAdams 1985, p.120). Stories are then a particularly appropriate way of examining the sense people make of their learning experiences. This work draws on narrative interviews with graduates from the School of Computing at the University of Kent and Olin College of Engineering in the United States.\r\n\r\nIt contributes a new perspective about the effect of a computing education beyond short-term outcome measures and proposes several analytic constructs that expose significant aspects in participants' learning experiences. In this, it describes themes related to students' acquisition of disciplinary knowledge and examines the evolution of their stories of learning computing over time."^^xsd:string; bibo:authorList ; bibo:degree ; bibo:status ; dct:creator ; dct:date "2018-06"; dct:isPartOf ; dct:issuer , ; dct:subject ; dct:title "Characterising Graduateness in Computing Education: A Narrative Approach"^^xsd:string; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:Thesis, ep:EPrint, ep:ThesisEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:hasPart ; foaf:name "University of Kent,"^^xsd:string; rdf:type foaf:Organization . dct:isPartOf ; foaf:name "School of Computing, University of Kent,"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Fincher"^^xsd:string; foaf:givenName "Sally"^^xsd:string; foaf:name "Sally Fincher"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dziallas"^^xsd:string; foaf:givenName "Sebastian"^^xsd:string; foaf:name "Sebastian Dziallas"^^xsd:string; rdf:type foaf:Person . rdfs:label "seams2018_03RDL.pdf"^^xsd:string . rdfs:label "seams2018_03RDL.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66569 \n\nSelf-adaptation made easy with Blockchains\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Self-adaptation made easy with Blockchains (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptation made easy with Blockchains (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptation made easy with Blockchains (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptation made easy with Blockchains (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptation made easy with Blockchains (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Self-adaptation made easy with Blockchains (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "This position paper describes how blockchains facilitate the implementation of distributed self-adaptive systems. We demonstrate how the master/slave decentralised control pattern for self-adaptive systems, integrated with a permissioned blockchain, can protect nodes of a network against attacks by continuously adapting the membership of an access control list. Whenever malicious behaviour is detected, consensus on an updated access control list is reached, and that node is removed from the network. Using a smart home, as an example, we demonstrate that a permissioned blockchain is able to maintain a consistent view of a network of Internet of Things (IoT) devices in the presence of malicious nodes."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2018-05-28"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Self-adaptation made easy with Blockchains"^^xsd:string; ep:hasDocument , , , , , ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . dct:title "SEAMS 2018: 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Gothenburg, Sweden"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Sedgewick"^^xsd:string; foaf:givenName "Peter E."^^xsd:string; foaf:name "Peter E. Sedgewick"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Lemos"^^xsd:string; foaf:givenName "Rogério"^^xsd:string; foaf:name "Rogério de Lemos"^^xsd:string; rdf:type foaf:Person . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "p1137-lange.pdf"^^xsd:string . rdfs:label "p1137-lange.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #65587 \n\nA Static Verification Framework for Message Passing in Go using Behavioural Types\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "A Static Verification Framework for Message Passing in Go using Behavioural Types (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Static Verification Framework for Message Passing in Go using Behavioural Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Static Verification Framework for Message Passing in Go using Behavioural Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Static Verification Framework for Message Passing in Go using Behavioural Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Static Verification Framework for Message Passing in Go using Behavioural Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Static Verification Framework for Message Passing in Go using Behavioural Types (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Static Verification Framework for Message Passing in Go using Behavioural Types (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Static Verification Framework for Message Passing in Go using Behavioural Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Static Verification Framework for Message Passing in Go using Behavioural Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Static Verification Framework for Message Passing in Go using Behavioural Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Static Verification Framework for Message Passing in Go using Behavioural Types (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Static Verification Framework for Message Passing in Go using Behavioural Types (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "The Go programming language has been heavily adopted in industry as a language that efficiently combines systems programming with concurrency. Go’s concurrency primitives, inspired by process calculi such as CCS and CSP, feature channel-based communication and lightweight threads, providing a distinct means of structuring concurrent software. Despite its popularity, the Go programming ecosystem offers little to no support for guarantee- ing the correctness of message-passing concurrent programs. \r\nThis work proposes a practical verification framework for message passing concurrency in Go by developing a robust static analysis that infers an abstract model of a program’s communication behaviour in the form of a behavioural type, a powerful process calculi typing discipline. We make use of our analysis to deploy a model and termination checking based verification of the inferred behavioural type that is suitable for a range of safety and liveness properties of Go programs, providing several improvements over existing approaches. We evaluate our framework and its implementation on publicly available real-world Go code."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion , ; dct:creator , , , ; dct:date "2018-05-27"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "A Static Verification Framework for Message Passing in Go using Behavioural Types"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "ICSE '18: 40th International Conference on Software Engineering"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Gothenburg, Sweden"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Toninho"^^xsd:string; foaf:givenName "Bernardo"^^xsd:string; foaf:name "Bernardo Toninho"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ng"^^xsd:string; foaf:givenName "Nicholas"^^xsd:string; foaf:name "Nicholas Ng"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lange"^^xsd:string; foaf:givenName "Julien"^^xsd:string; foaf:name "Julien Lange"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yoshida"^^xsd:string; foaf:givenName "Nobuko"^^xsd:string; foaf:name "Nobuko Yoshida"^^xsd:string; rdf:type foaf:Person . rdfs:label "08365677.pdf"^^xsd:string . rdfs:label "08365677.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77177 \n\nTEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Vehicular ad-hoc network (VANET) provides a unique platform for vehicles to intelligently exchange critical information, such as collision avoidance messages. It is, therefore, paramount that this information remains reliable and authentic, i.e., originated from a legitimate and trusted vehicle. Trust establishment among vehicles can ensure security of a VANET by identifying dishonest vehicles and revoking messages with malicious content. For this purpose, several trust models (TMs) have been proposed but, currently, there is no effective way to compare how they would behave in practice under adversary conditions. To this end, we propose a novel trust evaluation and management (TEAM) framework, which serves as a unique paradigm for the design, management, and evaluation of TMs in various contexts and in presence of malicious vehicles. Our framework incorporates an asset-based threat model and ISO-based risk assessment for the identification of attacks against critical risks. The TEAM has been built using VEINS, an open source simulation environment which incorporates SUMO traffic simulator and OMNET++ discrete event simulator. The framework created has been tested with the implementation of three types of TMs (data oriented, entity oriented, and hybrid) under four different contexts of VANET based on the mobility of both honest and malicious vehicles. Results indicate that the TEAM is effective to simulate a wide range of TMs, where the efficiency is evaluated against different quality of service and security-related criteria. Such framework may be instrumental for planning smart cities and for car manufacturers."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "6"; dc:hasVersion ; dct:creator , , ; dct:date "2018-05-25"; dct:isPartOf , ; dct:publisher ; dct:title "TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Adnane"^^xsd:string; foaf:givenName "Asma"^^xsd:string; foaf:name "Asma Adnane"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ahmad"^^xsd:string; foaf:givenName "Farhan"^^xsd:string; foaf:name "Farhan Ahmad"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N.L."^^xsd:string; foaf:name "Virginia N.L. Franqueira"^^xsd:string; rdf:type foaf:Person . foaf:name "IEEE Access"^^xsd:string; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #79610 \n\nComparison of Fuzzy Integral-Fuzzy Measure based Ensemble Algorithms with the State-of-the-art Ensemble Algorithms\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Comparison of Fuzzy Integral-Fuzzy Measure based Ensemble Algorithms with the State-of-the-art Ensemble Algorithms (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Comparison of Fuzzy Integral-Fuzzy Measure based Ensemble Algorithms with the State-of-the-art Ensemble Algorithms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Comparison of Fuzzy Integral-Fuzzy Measure based Ensemble Algorithms with the State-of-the-art Ensemble Algorithms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Comparison of Fuzzy Integral-Fuzzy Measure based Ensemble Algorithms with the State-of-the-art Ensemble Algorithms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Comparison of Fuzzy Integral-Fuzzy Measure based Ensemble Algorithms with the State-of-the-art Ensemble Algorithms (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Comparison of Fuzzy Integral-Fuzzy Measure based Ensemble Algorithms with the State-of-the-art Ensemble Algorithms (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "The Fuzzy Integral (FI) is a non-linear aggregation operator which enables the fusion of information from multiple sources in respect to a Fuzzy Measure (FM) which captures the worth of both the individual sources and all their possible combinations. Based on the expected potential of non-linear aggregation offered by the FI, its application to decision-level fusion in ensemble classifiers, i.e. to fuse multiple classifiers outputs towards one superior decision level output, has recently been explored. A key example of such a FI-FM ensemble classification method is the Decision-level Fuzzy Integral Multiple Kernel Learning (DeFIMKL) algorithm, which aggregates the outputs of kernel based classifiers through the use of the Choquet FI with respect to a FM learned through a regularised quadratic programming approach. While the approach has been validated against a number of classifiers based on multiple kernel learning, it has thus far not been compared to the state-of-the-art in ensemble classification. Thus, this paper puts forward a detailed comparison of FI-FM based ensemble methods, specifically the DeFIMKL algorithm, with state-of-the art ensemble methods including Adaboost, Bagging, Random Forest and Majority Voting over 20 public datasets from the UCI machine learning repository. The results on the selected datasets suggest that the FI based ensemble classifier performs both well and efficiently, indicating that it is a viable alternative when selecting ensemble classifiers and indicating that the non-linear fusion of decision level outputs offered by the FI provides expected potential and warrants further study."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , ; dct:date "2018-05-18"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Comparison of Fuzzy Integral-Fuzzy Measure based Ensemble Algorithms with the State-of-the-art Ensemble Algorithms"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "17th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Cádiz, Spain"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Havens"^^xsd:string; foaf:givenName "Timothy C."^^xsd:string; foaf:name "Timothy C. Havens"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Garibaldi"^^xsd:string; foaf:givenName "Jonathan M."^^xsd:string; foaf:name "Jonathan M. Garibaldi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Agrawal"^^xsd:string; foaf:givenName "Utkarsh"^^xsd:string; foaf:name "Utkarsh Agrawal"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Pinar"^^xsd:string; foaf:givenName "Anthony J."^^xsd:string; foaf:name "Anthony J. Pinar"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Soria"^^xsd:string; foaf:givenName "Daniele"^^xsd:string; foaf:name "Daniele Soria"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wagner"^^xsd:string; foaf:givenName "Christian"^^xsd:string; foaf:name "Christian Wagner"^^xsd:string; rdf:type foaf:Person . rdfs:label "Diagrams2018.pdf"^^xsd:string . rdfs:label "Diagrams2018.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "diagams2018Errata.pdf"^^xsd:string . rdfs:label "diagrams2018-corrected.pdf"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66595 \n\nMetro Map Colour-Coding: Effect on Usability in Route Tracing\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (PDF)"^^xsd:string . cc:license ; dct:hasPart ; ep:hasFile ; rdf:type bibo:Document, ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Metro Map Colour-Coding: Effect on Usability in Route Tracing (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . , , , , ; bibo:abstract "Does the choice of colour-coding scheme affect the usability of metro\r\nmaps, as measured by the accuracy and speed of navigation? Using colour to\r\ndifferentiate lines or services in maps of metro rail networks has been a common\r\npractice around the world for many decades. Broadly speaking, there are two\r\nbasic schemes: ‘route colouring’, in which each end-to-end route has a distinct\r\ncolour, and ‘trunk colouring’, in which each major trunk has a distinct colour,\r\nand the individual routes inherit the colour of the main trunk that they run along.\r\nA third, intermediate scheme is ‘shaded colouring’, in which each trunk has a\r\ndistinct colour, and each route has a distinct shade of that colour. In this study,\r\n285 volunteers in the US were randomised to these three colour-coding schemes\r\nand performed seventeen navigational tasks. Each task involved tracing a route\r\nin the New York City subway map. Overall, we found that route colouring was\r\nsignificantly more accurate than the trunk- and shaded-colouring schemes. A\r\nplanned subset analysis, however, revealed major differences between specific\r\nnavigational hazards: route colouring performed better only against certain navigational\r\nhazards; trunk colouring performed best against one hazard; and other\r\nhazards showed no effect of colour coding. Route colouring was significantly\r\nfaster only in one subset."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "10871"; dc:hasVersion ; dct:creator , , ; dct:date "2018-05-17"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Metro Map Colour-Coding: Effect on Usability in Route Tracing"^^xsd:string; ep:hasDocument , , , , , , , , , , , , , , , , , ; ep:hasSupplemental ; ep:hasUpdated ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "10th International Conference on the Theory and Application of Diagrams (Diagrams 2018)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Edinburgh"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chapman"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Chapman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bellucci"^^xsd:string; foaf:givenName "Francesco"^^xsd:string; foaf:name "Francesco Bellucci"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Moktefi"^^xsd:string; foaf:givenName "Amirouche"^^xsd:string; foaf:name "Amirouche Moktefi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Stapleton"^^xsd:string; foaf:givenName "Gem"^^xsd:string; foaf:name "Gem Stapleton"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Perez-Kriz"^^xsd:string; foaf:givenName "Sarah"^^xsd:string; foaf:name "Sarah Perez-Kriz"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Roberts"^^xsd:string; foaf:givenName "Maxwell J."^^xsd:string; foaf:name "Maxwell J. Roberts"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rodgers"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Rodgers"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lloyd"^^xsd:string; foaf:givenName "Peter B."^^xsd:string; foaf:name "Peter B. Lloyd"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Shoaib-COLING-2018.pdf"^^xsd:string . rdfs:label "Shoaib-COLING-2018.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67263 \n\nRelation Induction in Word Embeddings Revisited\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Relation Induction in Word Embeddings Revisited (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Relation Induction in Word Embeddings Revisited (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Relation Induction in Word Embeddings Revisited (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Relation Induction in Word Embeddings Revisited (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Relation Induction in Word Embeddings Revisited (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Relation Induction in Word Embeddings Revisited (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Given a set of instances of some relation, the relation induction task is to predict which other word pairs are likely to be related in the same way. While it is natural to use word embeddingsfor this task, standard approaches based on vector translations turn out to perform poorly. To address this issue, we propose two probabilistic relation induction models. The first model is based on translations, but uses Gaussians to explicitly model the variability of these translations and to encode soft constraints on the source and target words that may be chosen. In the second model, we use Bayesian linear regression to encode the assumption that there is a linear relationship between the vector representations of related words, which is considerably weaker than the assumption underlying translation based models."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-05-16"; dct:isPartOf ; dct:publisher ; dct:title "Relation Induction in Word Embeddings Revisited"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . dct:title "27th International Conference on Computational Linguistics (COLING 2018)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Santa Fe, New Mexico, USA"^^xsd:string . foaf:name "Association for Computational Linguistics"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Schockaert"^^xsd:string; foaf:givenName "Steven"^^xsd:string; foaf:name "Steven Schockaert"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bouraoui"^^xsd:string; foaf:givenName "Zied"^^xsd:string; foaf:name "Zied Bouraoui"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jameel"^^xsd:string; foaf:givenName "Shoaib"^^xsd:string; foaf:name "Shoaib Jameel"^^xsd:string; rdf:type foaf:Person . rdfs:label "paper.pdf"^^xsd:string . rdfs:label "paper.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "1-s2.0-S0890540118300804-main.pdf"^^xsd:string . rdfs:label "1-s2.0-S0890540118300804-main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66631 \n\nComplexity bounds for container functors and comonads\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Complexity bounds for container functors and comonads (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Complexity bounds for container functors and comonads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Complexity bounds for container functors and comonads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Complexity bounds for container functors and comonads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Complexity bounds for container functors and comonads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Complexity bounds for container functors and comonads (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Complexity bounds for container functors and comonads (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Complexity bounds for container functors and comonads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Complexity bounds for container functors and comonads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Complexity bounds for container functors and comonads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Complexity bounds for container functors and comonads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Complexity bounds for container functors and comonads (Other)"^^xsd:string . rdf:_1 . bibo:abstract "The notion of containers, due to Abbott et al., characterises a subset of parametric data types which can be described by a set of shapes and a set of positions for each shape. This includes common data types such as tuples, lists, trees, arrays, and graphs. Various useful categorical structures can be derived for containers that have some additional structure on their shapes and positions. For example, the notion of a directed container (due to Ahman et al.) gives rise to container comonads. Containers, and refinements such as directed containers, provide a useful reasoning tool for data types and an abstraction mechanism for programming, e.g., building libraries parameterised over containers. This paper studies the performance characteristics of traversal schemes over containers modelled by additional functor and comonad structure. A cost model for container transformations is defined from which complexity bounds for the operations of container functors and comonads are derived. This provides a reasoning principle for the performance of programs structured using these idioms, suggesting optimisations which follow from the underling mathematical structure. Due to the abstract interface provided by the syntax of containers and category theory, the complexity bounds and subsequent optimisations they imply are implementation agnostic (machine free). As far as we are aware, this is the first such study of the performance characteristics of containers."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion , ; dct:creator ; dct:date "2018-05-15"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Complexity bounds for container functors and comonads"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 9 Formal systems, logics"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Orchard"^^xsd:string; foaf:givenName "Dominic A."^^xsd:string; foaf:name "Dominic A. Orchard"^^xsd:string; rdf:type foaf:Person . bibo:issn "08905401"; foaf:name "Information and Computation"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #67028 \n\nProceedings of the Sixth Workshop on Trends in Functional Programming in Education\n\n"; foaf:primaryTopic . rdf:_1 . rdf:_1 . ; bibo:authorList ; bibo:editorList ; bibo:status , ; dct:creator ; dct:date "2018-05-11"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "Proceedings of the Sixth Workshop on Trends in Functional Programming in Education"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, ep:EPrint, ep:EdbookEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 11 Studying and teaching mathematics"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "EPTCS"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Thompson"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Thompson"^^xsd:string; rdf:type foaf:Person . rdfs:label "journal.pone.0197103.pdf"^^xsd:string . rdfs:label "journal.pone.0197103.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67399 \n\nGraph drawing using tabu search coupled with path relinking\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Graph drawing using tabu search coupled with path relinking (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Graph drawing using tabu search coupled with path relinking (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Graph drawing using tabu search coupled with path relinking (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Graph drawing using tabu search coupled with path relinking (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Graph drawing using tabu search coupled with path relinking (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Graph drawing using tabu search coupled with path relinking (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Graph drawing, or the automatic layout of graphs, is a challenging problem. There are several search based methods for graph drawing which are based on optimizing an objective function which is formed from a weighted sum of multiple criteria. In this paper, we propose a new neighbourhood search method which uses a tabu search coupled with path relinking to optimize such objective functions for general graph layouts with undirected straight lines. To our knowledge, before our work, neither of these methods have been previously used in general multi-criteria graph drawing. Tabu search uses a memory list to speed up searching by avoiding previously tested solutions, while the path relinking method generates new solutions by exploring paths that connect high quality solutions. We use path relinking periodically within the tabu search procedure to speed up the identification of good solutions. We have evaluated our new method against the commonly used neighbourhood search optimization techniques: hill climbing and simulated annealing. Our evaluation examines the quality of the graph layout (objective function’s value) and the speed of layout in terms of the number of evaluated solutions required to draw a graph. We also examine the relative scalability of each method. Our experimental results were applied to both random graphs and a real-world dataset. We show that our method outperforms both hill climbing and simulated annealing by producing a better layout in a lower number of evaluated solutions. In addition, we demonstrate that our method has greater scalability as it can layout larger graphs than the state-of-the-art neighbourhood search methods. Finally, we show that similar results can be produced in a real world setting by testing our method against a standard public graph dataset."^^xsd:string; bibo:authorList ; bibo:issue "5"; bibo:status , ; bibo:volume "13"; dc:hasVersion ; dct:creator , ; dct:date "2018-05-10"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Graph drawing using tabu search coupled with path relinking"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Public Library of Science"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Dib"^^xsd:string; foaf:givenName "Fadi K."^^xsd:string; foaf:name "Fadi K. Dib"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rodgers"^^xsd:string; foaf:givenName "Peter"^^xsd:string; foaf:name "Peter Rodgers"^^xsd:string; rdf:type foaf:Person . bibo:issn "19326203"; foaf:name "PLOS ONE"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "An Architecture for Privacy-preserving Sharing of CTI with 3rd party Ana....pdf"^^xsd:string . rdfs:label "An Architecture for Privacy-preserving Sharing of CTI with 3rd party Ana....pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #65817 \n\nAn Architecture for Privacy-preserving Sharing of CTI with 3rd party Analysis Services\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An Architecture for Privacy-preserving Sharing of CTI with 3rd party Analysis Services (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An Architecture for Privacy-preserving Sharing of CTI with 3rd party Analysis Services (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Architecture for Privacy-preserving Sharing of CTI with 3rd party Analysis Services (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Architecture for Privacy-preserving Sharing of CTI with 3rd party Analysis Services (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Architecture for Privacy-preserving Sharing of CTI with 3rd party Analysis Services (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Architecture for Privacy-preserving Sharing of CTI with 3rd party Analysis Services (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 . bibo:abstract "Increasing numbers of Small and Medium Enterprises (SME) are outsourcing or hosting their services on different Cloud Service Providers (CSP). They are also using different security services from these CSPs such as firewalls, intrusion detection/prevention systems and anti-malware. Although for the SMEs the main purpose of using these security services is to protect their cyber assets, either physical or virtual, from security threats and compromises, a very useful and valuable by-product of these security services is the wealth of Cyber Threat Information (CTI) that is collected over time. However, a common problem faced by SMEs is that they lack the resources and expertise for monitoring, analysing and reacting to any security notifications, alerts or events generated by the security services they have subscribed to. An obvious solution to this problem is that the SMEs outsource this problem to a cloud based service as well, by sharing their CTI with this service and allowing it to analyse the information and generate actionable reports or patches. The more CTI obtained from different SMEs, the better the analysis result. In this paper, we try to address some of the privacy and confidentiality issues that arise as a result of different SMEs sharing their CTI with such a third party analysis service for the aggregate analysis scenario we just described. We present the design and architecture of our solution that aims to allow SMEs to perform policy-based sharing of CTI, while also offering them flexible privacy and confidentiality controls."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , ; dct:date "2018-05-10"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "An Architecture for Privacy-preserving Sharing of CTI with 3rd party Analysis Services"^^xsd:string; ep:hasDocument , , , , , ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.9.C58 Computational grids" . dct:title "12th International Conference for Internet Technology and Secured Transactions (ICITST)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Cambridge, UK"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Giubilo"^^xsd:string; foaf:givenName "Fabio"^^xsd:string; foaf:name "Fabio Giubilo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chadwick"^^xsd:string; foaf:givenName "David W."^^xsd:string; foaf:name "David W. Chadwick"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sajjad"^^xsd:string; foaf:givenName "Ali"^^xsd:string; foaf:name "Ali Sajjad"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Shackleton"^^xsd:string; foaf:givenName "Mark"^^xsd:string; foaf:name "Mark Shackleton"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Lemos"^^xsd:string; foaf:givenName "Rogério"^^xsd:string; foaf:name "Rogério de Lemos"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fan"^^xsd:string; foaf:givenName "Wenjun"^^xsd:string; foaf:name "Wenjun Fan"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #67129 \n\nA Novel Genetic Algorithm for Feature Selection in Hierarchical Feature Spaces\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , ; dct:date "2018-05-03"; dct:isPartOf ; dct:subject ; dct:title "A Novel Genetic Algorithm for Feature Selection in Hierarchical Feature Spaces"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "SIAM International Conference on Data Mining (SDM18)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "San Diego, CA, USA"^^xsd:string . foaf:familyName "da Silva"^^xsd:string; foaf:givenName "P.N."^^xsd:string; foaf:name "P.N. da Silva"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Plastino"^^xsd:string; foaf:givenName "Alexandre"^^xsd:string; foaf:name "Alexandre Plastino"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #80287 \n\nPassInfinity: A software prototype system\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "PassInfinity: A software prototype system (Archive (ZIP))"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "This is a software research prototype system implemented to demonstrate a new \"all-in-one\" and backward compatible user authentication framework, which can generate passwords from all authentication factors. It was originally developed at the University of Surrey when Shujun Li was still working there, but the IPRs were transferred to the University of Kent in 2018."^^xsd:string; bibo:authorList ; bibo:status ; dct:creator , , ; dct:date "2018-05-01"; dct:isPartOf ; dct:publisher ; dct:subject , , , , ; dct:title "PassInfinity: A software prototype system"^^xsd:string; ep:hasDocument ; rdf:type bibo:Article, ep:EPrint, ep:SoftwareEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA76.9.H85 Human computer interaction"@en . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . rdf:type skos:Concept; skos:prefLabel "QA76.575 Multimedia systems"@en . rdf:type skos:Concept; skos:prefLabel "TK5105.888 World Wide Web"@en . foaf:name "NA"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Aljaffan"^^xsd:string; foaf:givenName "Nouf"^^xsd:string; foaf:name "Nouf Aljaffan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Liu"^^xsd:string; foaf:givenName "Junjie"^^xsd:string; foaf:name "Junjie Liu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Shujun"^^xsd:string; foaf:name "Shujun Li"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #77173 \n\nA Tutorial Introduction to IoT Design and Prototyping with Examples\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "A Tutorial Introduction to IoT Design and Prototyping with Examples (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Tutorial Introduction to IoT Design and Prototyping with Examples (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Tutorial Introduction to IoT Design and Prototyping with Examples (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Tutorial Introduction to IoT Design and Prototyping with Examples (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Tutorial Introduction to IoT Design and Prototyping with Examples (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Tutorial Introduction to IoT Design and Prototyping with Examples (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "The dramatic drop in price of computing hardware, coupled with the recent breakthroughs in embedded systems design that enabled the integration of high‐level software and low‐level electronics, have created a paradigm shift in embedded systems development. This has led to the development of different varieties of user‐friendly Internet of Things (IoT) hardware development platforms for IoT prototyping. The ubiquity of such prototyping platforms has undoubtedly contributed toward the explosive growth of the IoT, which is already seeping into all areas of human endeavor, including transportation, logistics, business, and healthcare. Building IoT projects that can be controlled over the Internet can be challenging, especially for beginners. This chapter discusses the design and development of prototypes for IoT applications with focus on Arduino and Raspberry Pi platforms. The aim is to provide insightful information on best practices for designing and prototyping IoT projects, as well as to serve as step‐by‐step guidelines for beginners."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2018-05-01"; dct:isPartOf ; dct:publisher ; dct:title "A Tutorial Introduction to IoT Design and Prototyping with Examples"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "John Wiley & Sons, Inc."^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Inacio"^^xsd:string; foaf:givenName "Pedro Ricardo Morais"^^xsd:string; foaf:name "Pedro Ricardo Morais Inacio"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Meruje"^^xsd:string; foaf:givenName "Manuel"^^xsd:string; foaf:name "Manuel Meruje"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freire"^^xsd:string; foaf:givenName "Mario Marques"^^xsd:string; foaf:name "Mario Marques Freire"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Samaila"^^xsd:string; foaf:givenName "Musa Gwani"^^xsd:string; foaf:name "Musa Gwani Samaila"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N. L."^^xsd:string; foaf:name "Virginia N. L. Franqueira"^^xsd:string; rdf:type foaf:Person . rdfs:label "remark.pdf"^^xsd:string . rdfs:label "remark.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67205 \n\nRemark on Algorithm 539: A Modern Fortran Reference Implementation for Carefully Computing the Euclidean Norm\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Remark on Algorithm 539: A Modern Fortran Reference Implementation for Carefully Computing the Euclidean Norm (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Remark on Algorithm 539: A Modern Fortran Reference Implementation for Carefully Computing the Euclidean Norm (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Remark on Algorithm 539: A Modern Fortran Reference Implementation for Carefully Computing the Euclidean Norm (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Remark on Algorithm 539: A Modern Fortran Reference Implementation for Carefully Computing the Euclidean Norm (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Remark on Algorithm 539: A Modern Fortran Reference Implementation for Carefully Computing the Euclidean Norm (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Remark on Algorithm 539: A Modern Fortran Reference Implementation for Carefully Computing the Euclidean Norm (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "We propose a set of new Fortran reference implementations, based on an algorithm proposed by Kahan,\r\nfor the Level 1 BLAS routines *NRM2 that compute the Euclidean norm of a real or complex input vector.\r\nThe principal advantage of these routines over the current offerings is that, rather than losing accuracy\r\nas the length of the vector increases, they generate results that are accurate to almost machine precision\r\nfor vectors of length N < Nmax where Nmax depends upon the precision of the floating point arithmetic\r\nbeing used. In addition we make use of intrinsic modules, introduced in the latest Fortran standards, to\r\ndetect occurrences of non-finite numbers in the input data and return suitable values as well as setting\r\nIEEE floating point status flags as appropriate. A set of C interface routines is also provided to allow simple,\r\nportable access to the new routines.\r\nTo improve execution speed, we advocate a hybrid algorithm; a simple loop is used first and, only if IEEE\r\nfloating point exception flags signal, do we fall back on Kahan’s algorithm. Since most input vectors are\r\n‘easy’, i.e., they do not require the sophistication of Kahan’s algorithm, the simple loop improves performance\r\nwhile the use of compensated summation ensures high accuracy.\r\nWe also report on a comprehensive suite of test problems that has been developed to test both our new\r\nimplementation and existing codes for both accuracy and the appropriate settings of the IEEE arithmetic\r\nstatus flags."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "44"; dc:hasVersion ; dct:creator , ; dct:date "2018-04-26"; dct:isPartOf , ; dct:publisher ; dct:title "Remark on Algorithm 539: A Modern Fortran Reference Implementation for Carefully Computing the Euclidean Norm"^^xsd:string; ep:hasDocument , , , , , ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hanson"^^xsd:string; foaf:givenName "Richard J."^^xsd:string; foaf:name "Richard J. Hanson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hopkins"^^xsd:string; foaf:givenName "Tim"^^xsd:string; foaf:name "Tim Hopkins"^^xsd:string; rdf:type foaf:Person . bibo:issn "00983500"; foaf:name "ACM Transactions on Mathematical Software"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "journal.pone.0195737.pdf"^^xsd:string . rdfs:label "journal.pone.0195737.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67066 \n\nSystem steganalysis with automatic fingerprint extraction\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "System steganalysis with automatic fingerprint extraction (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "System steganalysis with automatic fingerprint extraction (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "This paper tries to tackle the modern challenge of practical steganalysis over large data by presenting a novel approach whose aim is to perform with perfect accuracy and in a completely automatic manner. The objective is to detect changes introduced by the steganographic process in those data objects, including signatures related to the tools being used. Our approach achieves this by first extracting reliable regularities by analyzing pairs of modified and unmodified data objects; then, combines these findings by creating general patterns present on data used for training. Finally, we construct a Naive Bayes model that is used to perform classification, and operates on attributes extracted using the aforementioned patterns. This technique has been be applied for different steganographic tools that operate in media files of several types. We are able to replicate or improve on a number or previously published results, but more importantly, we in addition present new steganalytic findings over a number of popular tools that had no previous known attacks."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "13"; dc:hasVersion ; dct:creator , , , ; dct:date "2018-04-25"; dct:isPartOf , ; dct:publisher ; dct:title "System steganalysis with automatic fingerprint extraction"^^xsd:string; ep:hasDocument , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Public Library of Science"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Cervantes"^^xsd:string; foaf:givenName "Alejandro"^^xsd:string; foaf:name "Alejandro Cervantes"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Isasi"^^xsd:string; foaf:givenName "Pedro"^^xsd:string; foaf:name "Pedro Isasi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sloan"^^xsd:string; foaf:givenName "Tom"^^xsd:string; foaf:name "Tom Sloan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio C."^^xsd:string; foaf:name "Julio C. Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . bibo:issn "19326203"; foaf:name "PLOS ONE"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "flops18.pdf"^^xsd:string . rdfs:label "flops18.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66447 \n\nA functional perspective on machine learning via programmable induction and abduction\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A functional perspective on machine learning via programmable induction and abduction (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A functional perspective on machine learning via programmable induction and abduction (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A functional perspective on machine learning via programmable induction and abduction (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A functional perspective on machine learning via programmable induction and abduction (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A functional perspective on machine learning via programmable induction and abduction (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A functional perspective on machine learning via programmable induction and abduction (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "We present a programming language for machine learning\r\nbased on the concepts of ‘induction’ and ‘abduction’ as encountered in\r\nPeirce’s logic of science. We consider the desirable features such a language\r\nmust have, and we identify the ‘abductive decoupling’ of parameters\r\nas a key general enabler of these features. Both an idealised abductive\r\ncalculus and its implementation as a PPX extension of OCaml are\r\npresented, along with several simple examples."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2018-04-24"; dct:isPartOf , ; dct:publisher ; dct:title "A functional perspective on machine learning via programmable induction and abduction"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "Fourteenth International Symposium on Functional and Logic Programming (FLOPS 2018)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Nagoya, Japan"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Darvariu"^^xsd:string; foaf:givenName "Victor"^^xsd:string; foaf:name "Victor Darvariu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ghica"^^xsd:string; foaf:givenName "Dan R."^^xsd:string; foaf:name "Dan R. Ghica"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Muroya"^^xsd:string; foaf:givenName "Koko"^^xsd:string; foaf:name "Koko Muroya"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cheung"^^xsd:string; foaf:givenName "Steven"^^xsd:string; foaf:name "Steven Cheung"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rowe"^^xsd:string; foaf:givenName "Reuben"^^xsd:string; foaf:name "Reuben Rowe"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Artificial Intelligence"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "common-framework-expected.pdf"^^xsd:string . rdfs:label "common-framework-expected.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66352 \n\nA Common Framework Using Expected Types for Several Type Debugging Approaches\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Common Framework Using Expected Types for Several Type Debugging Approaches (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Common Framework Using Expected Types for Several Type Debugging Approaches (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Common Framework Using Expected Types for Several Type Debugging Approaches (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Common Framework Using Expected Types for Several Type Debugging Approaches (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Common Framework Using Expected Types for Several Type Debugging Approaches (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Common Framework Using Expected Types for Several Type Debugging Approaches (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Many different approaches to type error debugging were developed independently.\r\nIn this paper, we describe a new common framework\r\nfor several type error debugging approaches.\r\nFor this purpose, we introduce expected types from the outer context\r\nand propose a method for obtaining them.\r\nUsing expected types, we develop three type error debugging approaches:\r\nenumeration of type error messages, type error slicing and\r\n(improved) interactive type error debugging.\r\nBased on our idea we implemented prototypes\r\nand confirm that the framework works well for type debugging."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "10818"; dc:hasVersion ; dct:creator , ; dct:date "2018-04-24"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A Common Framework Using Expected Types for Several Type Debugging Approaches"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "FLOPS 2018: Fourteenth International Symposium on Functional and Logic Programming"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Nagoya, Japan"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Tsushima"^^xsd:string; foaf:givenName "Kanae"^^xsd:string; foaf:name "Kanae Tsushima"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chitil"^^xsd:string; foaf:givenName "Olaf"^^xsd:string; foaf:name "Olaf Chitil"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "Phan2018a.pdf"^^xsd:string . rdfs:label "Phan2018a.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #72667 \n\nWeighted and Multi-Task Loss for Rare Audio Event Detection\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Weighted and Multi-Task Loss for Rare Audio Event Detection (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Weighted and Multi-Task Loss for Rare Audio Event Detection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Weighted and Multi-Task Loss for Rare Audio Event Detection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Weighted and Multi-Task Loss for Rare Audio Event Detection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Weighted and Multi-Task Loss for Rare Audio Event Detection (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Weighted and Multi-Task Loss for Rare Audio Event Detection (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "We present in this paper two loss functions tailored for rare audio event detection in audio streams. The weighted loss is designed to tackle the common issue of imbalanced data in background/foreground classification while the multi-task loss enables the networks to simultaneously model the class distribution and the temporal structures of the target events for recognition. We study the proposed loss functions with deep neural networks (DNNs) and convolutional neural networks (CNNs) coupled with state-of-the-art phase-aware signal enhancement. Experiments on the DCASE 2017 challenge’s data show that our system with the proposed losses significantly outperforms not only the DCASE 2017 baseline but also our baseline which has a similar network architecture and a standard loss function."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2018-04-20"; dct:isPartOf ; dct:publisher ; dct:title "Weighted and Multi-Task Loss for Rare Audio Event Detection"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "43rd IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2018)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Calgary, Canada"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Gerkmann"^^xsd:string; foaf:givenName "Timo"^^xsd:string; foaf:name "Timo Gerkmann"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mertins"^^xsd:string; foaf:givenName "Alfred"^^xsd:string; foaf:name "Alfred Mertins"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Krawczyk-Becker"^^xsd:string; foaf:givenName "Martin"^^xsd:string; foaf:name "Martin Krawczyk-Becker"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Phan"^^xsd:string; foaf:givenName "Huy"^^xsd:string; foaf:name "Huy Phan"^^xsd:string; rdf:type foaf:Person . rdfs:label "08341486.pdf"^^xsd:string . rdfs:label "08341486.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69642 \n\nAccelerometry-Based Estimation of Respiratory Rate for Post-Intensive Care Patient Monitoring\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Accelerometry-Based Estimation of Respiratory Rate for Post-Intensive Care Patient Monitoring (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Accelerometry-Based Estimation of Respiratory Rate for Post-Intensive Care Patient Monitoring (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Accelerometry-Based Estimation of Respiratory Rate for Post-Intensive Care Patient Monitoring (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Accelerometry-Based Estimation of Respiratory Rate for Post-Intensive Care Patient Monitoring (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Accelerometry-Based Estimation of Respiratory Rate for Post-Intensive Care Patient Monitoring (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Accelerometry-Based Estimation of Respiratory Rate for Post-Intensive Care Patient Monitoring (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "This paper evaluates the use of accelerometers for continuous monitoring of respiratory rate (RR), which is an important vital sign in post-intensive care patients or those inside the intensive care unit (ICU). The respiratory rate can be estimated from accelerometer and photoplethysmography (PPG) signals for patients following ICU discharge. Due to sensor faults, sensor detachment, and various artifacts arising from motion, RR estimates derived from accelerometry and PPG may not be sufficiently reliable for use with existing algorithms. This paper described a case study of 10 selected patients, for which fewer RR estimates have been obtained from PPG signals in comparison to those from accelerometry. We describe an algorithm for which we show a maximum mean absolute error between estimates derived from PPG and accelerometer of 2.56 breaths/min. Our results obtained using the 10 selected patients are highly promising for estimation of RR from accelerometers, where significant agreements have been observed with the PPG-based RR estimates in many segments and across various patients. We present this research as a step towards producing reliable RR monitoring systems using low-cost mobile accelerometers for monitoring patients inside the ICU or on the ward (post-ICU)."^^xsd:string; bibo:authorList ; bibo:issue "12"; bibo:status , ; bibo:volume "18"; dc:hasVersion ; dct:creator , , , ; dct:date "2018-04-19"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Accelerometry-Based Estimation of Respiratory Rate for Post-Intensive Care Patient Monitoring"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "R Medicine"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Tarassenko"^^xsd:string; foaf:givenName "Lionel"^^xsd:string; foaf:name "Lionel Tarassenko"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rodgers"^^xsd:string; foaf:givenName "Sarah J."^^xsd:string; foaf:name "Sarah J. Rodgers"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jarchi"^^xsd:string; foaf:givenName "Delaram"^^xsd:string; foaf:name "Delaram Jarchi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Clifton"^^xsd:string; foaf:givenName "David A."^^xsd:string; foaf:name "David A. Clifton"^^xsd:string; rdf:type foaf:Person . bibo:issn "1530437X"; foaf:name "IEEE Sensors Journal"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67241 \n\nCertifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "This paper reports the first in-depth analysis of the DESFire EV1’s EAL4+ certified TRNG and raises some difficult questions regarding the certification of non-deterministic random number generators. We start by analyzing the quality of the purportedly true random number generator (TRNG) on the DESFire EV1 card. Clear and consistent biases are identified, despite good performance in most randomness tests.\r\nThese statistical tests, commonly used in popular certification processes, such as Common Criteria EAL4+, are found not to be able to detect these anomalies. \r\n\r\nThe means we employ for the detection and characterization of the bias are explored, highlighting both novel and existing ways of spotting deficient\r\nTRNG output. Further analysis shows systemic issues affecting TRNG output at the byte level, for which we have developed an accurate explanation. Our results have been acknowledged by the manufacturer, after responsible disclosure."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "13"; dc:hasVersion ; dct:creator , ; dct:date "2018-04-18"; dct:isPartOf , ; dct:publisher ; dct:title "Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Institute Electrical Electronics Engineers"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hurley-Smith"^^xsd:string; foaf:givenName "Darren"^^xsd:string; foaf:name "Darren Hurley-Smith"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio"^^xsd:string; foaf:name "Julio Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . bibo:issn "15566013"; foaf:name "IEEE Transactions on Information Forensics and Security"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "2845031.pdf"^^xsd:string . rdfs:label "2845031.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66766 \n\nDilution of Ferromagnets via a Random Graph-Based Strategy\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Dilution of Ferromagnets via a Random Graph-Based Strategy (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Dilution of Ferromagnets via a Random Graph-Based Strategy (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Dilution of Ferromagnets via a Random Graph-Based Strategy (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Dilution of Ferromagnets via a Random Graph-Based Strategy (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Dilution of Ferromagnets via a Random Graph-Based Strategy (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Dilution of Ferromagnets via a Random Graph-Based Strategy (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . ; bibo:abstract "Te dynamics and behavior of ferromagnets have a great relevance even beyond the domain of statistical physics. In this work, we\r\npropose a Monte Carlo method, based on random graphs, for modeling their dilution. In particular, we focus on ferromagnets with\r\ndimension D?4, which can be approximated by the Curie-Weiss model. Since the latter has as graphic counterpart, a complete\r\ngraph, a dilution can be in this case viewed as a pruning process. Hence, in order to exploit this mapping, the proposed strategy\r\nuses a modifed version of the Erdos-Renyi graph model. In doing so, we are able both to simulate a continuous dilution and to ?\r\nrealize diluted ferromagnets in one step. Te proposed strategy is studied by means of numerical simulations, aiming to analyze\r\nmain properties and equilibria of the resulting diluted ferromagnets. To conclude, we also provide a brief description of further\r\napplications of our strategy in the field of complex networks."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "2018"; dc:hasVersion ; dct:creator , ; dct:date "2018-04-15"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Dilution of Ferromagnets via a Random Graph-Based Strategy"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QC173.45 Condensed Matter" . rdf:type skos:Concept; skos:prefLabel "QA76.87 Neural computers, neural networks"@en . rdf:type skos:Concept; skos:prefLabel "QA273 Probabilities"@en . foaf:name "Hindawi"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Marinazzo"^^xsd:string; foaf:givenName "Daniele"^^xsd:string; foaf:name "Daniele Marinazzo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Javarone"^^xsd:string; foaf:givenName "Marco A."^^xsd:string; foaf:name "Marco A. Javarone"^^xsd:string; rdf:type foaf:Person . bibo:issn "10762787"; foaf:name "Complexity"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "main.pdf"^^xsd:string . rdfs:label "main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66630 \n\nCompositional Verification of Compiler Optimisations on Relaxed Memory\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Compositional Verification of Compiler Optimisations on Relaxed Memory (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Compositional Verification of Compiler Optimisations on Relaxed Memory (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Compositional Verification of Compiler Optimisations on Relaxed Memory (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Compositional Verification of Compiler Optimisations on Relaxed Memory (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Compositional Verification of Compiler Optimisations on Relaxed Memory (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Compositional Verification of Compiler Optimisations on Relaxed Memory (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "This paper is about verifying program transformations on an axiomatic\r\nrelaxed memory model of the kind used in C/C++ and Java. Relaxed models\r\npresent particular challenges for verifying program transformations, because\r\nthey generate many additional modes of interaction between code and context.\r\nFor a block of code being transformed, we define a denotation from its behaviour\r\nin a set of representative contexts. Our denotation summarises interactions of the\r\ncode block with the rest of the program both through local and global variables,\r\nand through subtle synchronisation effects due to relaxed memory. We can then\r\nprove that a transformation does not introduce new program behaviours by comparing\r\nthe denotations of the code block before and after. Our approach is compositional:\r\nby examining only representative contexts, transformations are verified\r\nfor any context. It is also fully abstract, meaning any valid transformation can be\r\nverified. We cover several tricky aspects of C/C++-style memory models, including\r\nrelease-acquire operations, sequentially consistent fences, and non-atomics.\r\nWe also define a variant of our denotation that is finite at the cost of losing full\r\nabstraction. Based on this variant, we have implemented a prototype verification\r\ntool and app"^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "10801"; dc:hasVersion ; dct:creator , , ; dct:date "2018-04-14"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Compositional Verification of Compiler Optimisations on Relaxed Memory"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . dct:title "ESOP 2018"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Thessaloniki, Greece"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Gotsman"^^xsd:string; foaf:givenName "Alexey"^^xsd:string; foaf:name "Alexey Gotsman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dodds"^^xsd:string; foaf:givenName "Mike"^^xsd:string; foaf:name "Mike Dodds"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Batty"^^xsd:string; foaf:givenName "Mark"^^xsd:string; foaf:name "Mark Batty"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #64248 \n\nFormant Smoothing for Quality Improvement of Post-Laryngectomised Speech Reconstruction\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "In this paper, we use the voice samples recorded from laryngectomised patients to develop a novel method for speech enhancement and regeneration of natural sounding speech for laryngectomees. By leveraging recent advances in computational methods for speech reconstruction, our proposed method takes advantages of both non-training and training-based approaches to improve the quality of reconstructed speech for voice-impaired individuals. Since the proposed method has been developed based on the samples obtained from post-laryngectomised patients (and not based on the characteristics of other alternative modes of speech such as whispers and pseudo-whispers), it can address the limitations of current computational methods to some extent. Furthermore, by focusing on English vowels, objective evaluations are carried out to show the efficiency of the proposed method."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , , , ; dct:date "2018-04-12"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Formant Smoothing for Quality Improvement of Post-Laryngectomised Speech Reconstruction"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "International Conference on Orange Technologies (ICOT)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Singapore"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Allen"^^xsd:string; foaf:givenName "Jacqueline"^^xsd:string; foaf:name "Jacqueline Allen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ardekani"^^xsd:string; foaf:givenName "Iman"^^xsd:string; foaf:name "Iman Ardekani"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mehdinezhad"^^xsd:string; foaf:givenName "Hanie"^^xsd:string; foaf:name "Hanie Mehdinezhad"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sharifzadeh"^^xsd:string; foaf:givenName "Hamid"^^xsd:string; foaf:name "Hamid Sharifzadeh"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian"^^xsd:string; foaf:name "Ian McLoughlin"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #71111 \n\nDetection of pathological condition of heart using texture complexity of the heart sound signals in kernel space\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 . bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , ; dct:date "2018-04-10"; dct:isPartOf ; dct:publisher ; dct:title "Detection of pathological condition of heart using texture complexity of the heart sound signals in kernel space"^^xsd:string; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "2nd International Conference on Biosignal Analysis, Processing and Systems"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Kuching, Malaysia"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Mondal"^^xsd:string; foaf:givenName "Ashok"^^xsd:string; foaf:name "Ashok Mondal"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . rdfs:label "px18-marr-daloze-few-versatile-vs-many-specialized-collections.pdf"^^xsd:string . rdfs:label "px18-marr-daloze-few-versatile-vs-many-specialized-collections.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66605 \n\nFew Versatile vs. Many Specialized Collections: How to design a collection library for exploratory programming?\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Few Versatile vs. Many Specialized Collections: How to design a collection library for exploratory programming? (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Few Versatile vs. Many Specialized Collections: How to design a collection library for exploratory programming? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Few Versatile vs. Many Specialized Collections: How to design a collection library for exploratory programming? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Few Versatile vs. Many Specialized Collections: How to design a collection library for exploratory programming? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Few Versatile vs. Many Specialized Collections: How to design a collection library for exploratory programming? (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Few Versatile vs. Many Specialized Collections: How to design a collection library for exploratory programming? (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "While an integral part of all programming languages, the design of collection libraries is rarely studied. This work briefly reviews the collection libraries of 14 languages to identify possible design dimensions. Some languages have surprisingly few but versatile collections, while others have large libraries with many specialized collections. Based on the identified design dimensions, we argue that a small collection library with only a sequence, a map, and a set type are a suitable choice to facilitate exploratory programming. Such a design minimizes the number of decisions programmers have to make when dealing with collections, and it improves discoverability of collection operations. We further discuss techniques that make their implementation practical from a performance perspective. Based on these arguments, we conclude that languages which aim to support exploratory programming should strive for small and versatile collection libraries."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2018-04-09"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Few Versatile vs. Many Specialized Collections: How to design a collection library for exploratory programming?"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "4th Programming Experience Workshop"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Nice, France"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Daloze"^^xsd:string; foaf:givenName "Benoit"^^xsd:string; foaf:name "Benoit Daloze"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . rdfs:label "final.pdf"^^xsd:string . rdfs:label "final.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66539 \n\nHeterogeneous update mechanisms in evolutionary games: mixing innovative and imitative dynamics\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Heterogeneous update mechanisms in evolutionary games: mixing innovative and imitative dynamics (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Heterogeneous update mechanisms in evolutionary games: mixing innovative and imitative dynamics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Heterogeneous update mechanisms in evolutionary games: mixing innovative and imitative dynamics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Heterogeneous update mechanisms in evolutionary games: mixing innovative and imitative dynamics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Heterogeneous update mechanisms in evolutionary games: mixing innovative and imitative dynamics (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Heterogeneous update mechanisms in evolutionary games: mixing innovative and imitative dynamics (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Innovation and evolution are two processes of paramount relevance for social and biological systems. In general, the former allows the introduction of elements of novelty, while the latter is responsible for the motion of a system in its phase space. Often, these processes are strongly related, since an innovation can trigger the evolution, and the latter can provide the optimal conditions for the emergence of innovations. Both processes can be studied by using the framework of Evolutionary Game Theory, where evolution constitutes an intrinsic mechanism. At the same time, the concept of innovation requires an opportune mathematical representation. Notably, innovation can be modeled as a strategy, or can constitute the underlying mechanism which allows agents to change strategy. Here, we analyze the second case, investigating the behavior of a heterogeneous population, composed of imitative and innovative agents. Imitative agents change strategy only by imitating that of their neighbors, whereas innovative ones change strategy without the need of a copying source. The proposed model is analyzed by means of analytical calculations and numerical simulations in different topologies. Remarkably, results indicate that the mixing of mechanisms can be detrimental to cooperation near phase transitions. In those regions, the spatial reciprocity from imitative mechanisms is destroyed by innovative agents, leading to the downfall of cooperation. Our investigation sheds some light on the complex dynamics emerging from the heterogeneity of strategy revision methods, highlighting the role of innovation in evolutionary games."^^xsd:string; bibo:authorList ; bibo:issue "4"; bibo:status , ; bibo:volume "97"; dc:hasVersion ; dct:creator , ; dct:date "2018-04-05"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Heterogeneous update mechanisms in evolutionary games: mixing innovative and imitative dynamics"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QC173.45 Condensed Matter" . rdf:type skos:Concept; skos:prefLabel "QC20 Mathematical Physics"@en . foaf:name "American Physical Society"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Amaral"^^xsd:string; foaf:givenName "Marco A"^^xsd:string; foaf:name "Marco A Amaral"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Javarone"^^xsd:string; foaf:givenName "Marco A."^^xsd:string; foaf:name "Marco A. Javarone"^^xsd:string; rdf:type foaf:Person . bibo:issn "1063651X"; foaf:name "Physical Review E: Statistical, Nonlinear, and Soft Matter Physics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "JNEUROSCI.2561-17.2018.full.pdf"^^xsd:string . rdfs:label "JNEUROSCI.2561-17.2018.full.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66377 \n\nThe Sync/deSync model: How a synchronized hippocampus and a de-synchronized neocortex code memories\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "The Sync/deSync model: How a synchronized hippocampus and a de-synchronized neocortex code memories (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The Sync/deSync model: How a synchronized hippocampus and a de-synchronized neocortex code memories (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Sync/deSync model: How a synchronized hippocampus and a de-synchronized neocortex code memories (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Sync/deSync model: How a synchronized hippocampus and a de-synchronized neocortex code memories (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Sync/deSync model: How a synchronized hippocampus and a de-synchronized neocortex code memories (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Sync/deSync model: How a synchronized hippocampus and a de-synchronized neocortex code memories (Other)"^^xsd:string . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "The Sync/deSync model: How a synchronized hippocampus and a de-synchronized neocortex code memories (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The Sync/deSync model: How a synchronized hippocampus and a de-synchronized neocortex code memories (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Sync/deSync model: How a synchronized hippocampus and a de-synchronized neocortex code memories (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Sync/deSync model: How a synchronized hippocampus and a de-synchronized neocortex code memories (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Sync/deSync model: How a synchronized hippocampus and a de-synchronized neocortex code memories (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The Sync/deSync model: How a synchronized hippocampus and a de-synchronized neocortex code memories (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Neural oscillations are important for memory formation in the brain. The de-synchronisation of Alpha (10Hz) oscillations in the neo-cortex has been shown to predict successful memory encoding and retrieval. However, when engaging in learning, it has been found that the hippocampus synchronises in Theta (4Hz) oscillations, and that learning is dependent on the phase of Theta. This inconsistency as to whether synchronisation is ‘good' for memory formation leads to confusion over which oscillations we should expect to see and where during learning paradigm experiments. This paper seeks to respond to this inconsistency by presenting a neural network model of how a well-functioning learning system could exhibit both of these phenomena, i.e. desynchronization of Alpha and synchronisation of Theta during successful memory encoding.\r\n\r\nWe present a spiking neural network (the Sync/deSync model) of the neo-cortical and hippocampal system. The simulated hippocampus learns through an adapted spike-time dependent plasticity rule, in which weight change is modulated by the phase of an extrinsically generated Theta oscillation. Additionally, a global passive weight decay is incorporated, which is also modulated by Theta phase. In this way, the Sync/deSync model exhibits Theta phase-dependent long-term potentiation and long-term depression. We simulated a learning paradigm experiment and compared the oscillatory dynamics of our model with those observed in single-cell and scalp-EEG studies of the medial temporal lobe. Our Sync/deSync model suggests that both the de-synchronisation of neo-cortical Alpha and the synchronisation of hippocampal Theta are necessary for successful memory encoding and retrieval."^^xsd:string; bibo:authorList ; bibo:issue "14"; bibo:status , ; bibo:volume "38"; dc:hasVersion , ; dct:creator , , ; dct:date "2018-04-04"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "The Sync/deSync model: How a synchronized hippocampus and a de-synchronized neocortex code memories"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "RC321 Neuroscience. Biological psychiatry. Neuropsychiatry"@en . foaf:name "Society for Neuroscience"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Parish"^^xsd:string; foaf:givenName "George"^^xsd:string; foaf:name "George Parish"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hanslmayr"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Hanslmayr"^^xsd:string; rdf:type foaf:Person . bibo:issn "02706474"; foaf:name "The Journal of Neuroscience"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #71098 \n\nOn the Mental Fatigue Analysis of SSVEP Entrainment\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , , ; dct:date "2018-04-01"; dct:isPartOf ; dct:publisher ; dct:title "On the Mental Fatigue Analysis of SSVEP Entrainment"^^xsd:string; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "2nd International Conference on Biosignal Analysis, Processing and Systems"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Kuching, Malaysia"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Mouli"^^xsd:string; foaf:givenName "Surej"^^xsd:string; foaf:name "Surej Mouli"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Balli"^^xsd:string; foaf:givenName "Tugce"^^xsd:string; foaf:name "Tugce Balli"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian"^^xsd:string; foaf:name "Ian McLoughlin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palaniappan"^^xsd:string; foaf:givenName "Ramaswamy"^^xsd:string; foaf:name "Ramaswamy Palaniappan"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #77174 \n\nInvestigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Investigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches (PDF)"^^xsd:string . rdf:type bibo:Document, ep:Document; rdfs:label "Investigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Investigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Investigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Investigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Previous studies examining the investigative challenges and needs of Digital Forensic (DF) practitioners have typically taken a sector-wide focus. This paper presents the results of a survey which collected text-rich comments about the challenges experienced and related suggestions for improvement in the investigation of Indecent Images of Children (IIOC) cases. The comments were provided by 153 international DF practitioners (28.1% survey response rate) and were processed using Thematic Analysis. This resulted in the identification of 4 IIOC-specific challenge themes, and 6 DF-generic challenges which directly affect IIOC. The paper discusses these identified challenges from a practitioner perspective, and outlines their suggestions for addressing them."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "24"; dc:hasVersion , ; dct:creator , , , ; dct:date "2018-03-30"; dct:isPartOf , ; dct:publisher ; dct:title "Investigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Marrington"^^xsd:string; foaf:givenName "Andrew"^^xsd:string; foaf:name "Andrew Marrington"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bryce"^^xsd:string; foaf:givenName "Joanne"^^xsd:string; foaf:name "Joanne Bryce"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mutawa"^^xsd:string; foaf:givenName "Noora Al"^^xsd:string; foaf:name "Noora Al Mutawa"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N. L."^^xsd:string; foaf:name "Virginia N. L. Franqueira"^^xsd:string; rdf:type foaf:Person . foaf:name "Digital Investigation"^^xsd:string; rdf:type bibo:Collection . rdfs:label "paper.pdf"^^xsd:string . rdfs:label "paper.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67137 \n\nWhat we talk about when we talk about monads\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "What we talk about when we talk about monads (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "What we talk about when we talk about monads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "What we talk about when we talk about monads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "What we talk about when we talk about monads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "What we talk about when we talk about monads (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "What we talk about when we talk about monads (Other)"^^xsd:string . rdf:_1 . bibo:abstract "Computer science provides an in-depth understanding of technical aspects of programming concepts, but if we want to understand how programming concepts evolve, how programmers think and talk about them and how they are used in practice, we need to consider a broader perspective that includes historical, philosophical and cognitive aspects. In this paper, we develop such broader understanding of monads, a programming concept that has an infamous formal definition, syntactic support in several programming languages and a reputation for being elegant and powerful, but also intimidating and difficult to grasp.\r\n\r\nThis paper is not a monad tutorial. It will not tell you what a monad is. Instead, it helps you understand how computer scientists and programmers talk about monads and why they do so. To answer these questions, we review the history of monads in the context of programming and study the development through the perspectives of philosophy of science, philosophy of mathematics and cognitive sciences.\r\n\r\nMore generally, we present a framework for understanding programming concepts that considers them at three levels: formal, metaphorical and implementation. We base such observations on established results about the scientific method and mathematical entities - cognitive sciences suggest that the metaphors used when thinking about monads are more important than widely accepted, while philosophy of science explains how the research paradigm from which monads originate influences and restricts their use.\r\n\r\nFinally, we provide evidence for why a broader philosophical, sociological look at programming concepts should be of interest for programmers. It lets us understand programming concepts better and, fundamentally, choose more appropriate abstractions as illustrated in a number of case studies that conclude the paper."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "2"; dc:hasVersion ; dct:creator ; dct:date "2018-03-29"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "What we talk about when we talk about monads"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "AOSA"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Petricek"^^xsd:string; foaf:givenName "Tomas"^^xsd:string; foaf:name "Tomas Petricek"^^xsd:string; rdf:type foaf:Person . bibo:issn "24737321"; foaf:name "The Art, Science, and Engineering of Programming"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #91266 \n\nExpressivity and Complexity of MongoDB Queries\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "In this paper, we consider MongoDB, a widely adopted but not formally understood database system managing JSON documents and equipped with a powerful query mechanism, called the aggregation framework. We provide a clean formal abstraction of this query language, which we call MQuery. We study the expressivity of MQuery, showing the equivalence of its well-typed fragment with nested relational algebra. We further investigate the computational complexity of significant fragments of it, obtaining several (tight) bounds in combined complexity, which range from LogSpace to alternating exponential-time with a polynomial number of alternations."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; bibo:volume "98"; dct:creator , , , ; dct:date "2018-03-26"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Expressivity and Complexity of MongoDB Queries"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "21st International Conference on Database Theory, ICDT 2018"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Vienna, Austria"^^xsd:string . foaf:name "Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Xiao"^^xsd:string; foaf:givenName "Guohui"^^xsd:string; foaf:name "Guohui Xiao"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cogrel"^^xsd:string; foaf:givenName "Benjamin"^^xsd:string; foaf:name "Benjamin Cogrel"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Calvanese"^^xsd:string; foaf:givenName "Diego"^^xsd:string; foaf:name "Diego Calvanese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Botoeva"^^xsd:string; foaf:givenName "Elena"^^xsd:string; foaf:name "Elena Botoeva"^^xsd:string; rdf:type foaf:Person . bibo:issn "18688969"; foaf:name "Leibniz International Proceedings in Informatics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "vee18-rigger-et-al-an-analysis-of-x86-64-inline-assembly-in-c-programs.pdf"^^xsd:string . rdfs:label "vee18-rigger-et-al-an-analysis-of-x86-64-inline-assembly-in-c-programs.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66147 \n\nAn Analysis of x86-64 Inline Assembly in C Programs\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "An Analysis of x86-64 Inline Assembly in C Programs (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "An Analysis of x86-64 Inline Assembly in C Programs (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Analysis of x86-64 Inline Assembly in C Programs (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Analysis of x86-64 Inline Assembly in C Programs (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Analysis of x86-64 Inline Assembly in C Programs (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "An Analysis of x86-64 Inline Assembly in C Programs (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "C codebases frequently embed nonportable and unstandardized elements such as inline assembly code. Such elements are not well understood, which poses a problem to tool developers who aspire to support C code. This paper investigates the use of x86-64 inline assembly in 1264 C projects from GitHub and combines qualitative and quantitative analyses to answer questions that tool authors may have. We found that 28.1% of the most popular projects contain inline assembly code, although the majority contain only a few fragments with just one or two instructions. The most popular instructions constitute a small subset concerned largely with multicore semantics, performance optimization, and hardware control. Our findings are intended to help developers of C-focused tools, those testing compilers, and language designers seeking to reduce the reliance on inline assembly. They may also aid the design of tools focused on inline assembly itself."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:presentedAt ; bibo:status , ; bibo:volume "53"; dc:hasVersion ; dct:creator , , , , ; dct:date "2018-03-25"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "An Analysis of x86-64 Inline Assembly in C Programs"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science (General)"@en . dct:title "14th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Williamsburg, VA, USA"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Mössenböck"^^xsd:string; foaf:givenName "Hanspeter"^^xsd:string; foaf:name "Hanspeter Mössenböck"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rigger"^^xsd:string; foaf:givenName "Manuel"^^xsd:string; foaf:name "Manuel Rigger"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Leopoldseder"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Leopoldseder"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kell"^^xsd:string; foaf:givenName "Stephen"^^xsd:string; foaf:name "Stephen Kell"^^xsd:string; rdf:type foaf:Person . bibo:issn "03621340"; foaf:name "ACM SIGPLAN Notices"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #69697 \n\nA Survey of x86-64 Inline Assembly in C Programs\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "C codebases frequently embed nonportable and unstandardized elements such as inline assembly code. Such elements are not well understood, which poses a problem to tool developers who aspire to support C code. This paper investigates the use of x86-64 inline assembly in 1264 C projects from GitHub and combines qualitative and quantitative analyses to answer questions that tool authors may have. We found that 28.1% of the most popular projects contain inline assembly code, although the majority contain only a few fragments with just one or two instructions. The most popular instructions constitute a small subset concerned largely with multicore semantics, performance optimization, and hardware control. Our findings are intended to help developers of C-focused tools, those testing compilers, and language designers seeking to reduce the reliance on inline assembly. They may also aid the design of tools focused on inline assembly itself."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , , , ; dct:date "2018-03-25"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "A Survey of x86-64 Inline Assembly in C Programs"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "14th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Williamsburg, VA, USA"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Rigger"^^xsd:string; foaf:givenName "Manuel"^^xsd:string; foaf:name "Manuel Rigger"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mössenböck"^^xsd:string; foaf:givenName "Hanspeter"^^xsd:string; foaf:name "Hanspeter Mössenböck"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Leopoldseder"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Leopoldseder"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kell"^^xsd:string; foaf:givenName "Stephen"^^xsd:string; foaf:name "Stephen Kell"^^xsd:string; rdf:type foaf:Person . rdfs:label "Lorca-Puls Neuropsychologia.pdf"^^xsd:string . rdfs:label "Lorca-Puls Neuropsychologia.pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66579 \n\nThe impact of sample size on the reproducibility of voxel-based lesion-deficit mappings\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "The impact of sample size on the reproducibility of voxel-based lesion-deficit mappings (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The impact of sample size on the reproducibility of voxel-based lesion-deficit mappings (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The impact of sample size on the reproducibility of voxel-based lesion-deficit mappings (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The impact of sample size on the reproducibility of voxel-based lesion-deficit mappings (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The impact of sample size on the reproducibility of voxel-based lesion-deficit mappings (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The impact of sample size on the reproducibility of voxel-based lesion-deficit mappings (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 ; rdf:_11 . bibo:abstract "This study investigated how sample size affects the reproducibility of findings from univariate voxel-based lesion-deficit analyses (e.g., voxel-based lesion-symptom mapping and voxel-based morphometry). Our effect of interest was the strength of the mapping between brain damage and speech articulation difficulties, as measured in terms of the proportion of variance explained. First, we identified a region of interest by searching on a voxel-by-voxel basis for brain areas where greater lesion load was associated with poorer speech articulation using a large sample of 360 right-handed English-speaking stroke survivors. We then randomly drew thousands of bootstrap samples from this data set that included either 30, 60, 90, 120, 180, or 360 patients. For each resample, we recorded effect size estimates and p values after conducting exactly the same lesion-deficit analysis within the previously identified region of interest and holding all procedures constant. The results show (1) how often small effect sizes in a heterogeneous population fail to be detected; (2) how effect size and its statistical significance varies with sample size; (3) how low-powered studies (due to small sample sizes) can greatly over-estimate as well as under-estimate effect sizes; and (4) how large sample sizes (N ? 90) can yield highly significant p values even when effect sizes are so small that they become trivial in practical terms. The implications of these findings for interpreting the results from univariate voxel-based lesion-deficit analyses are discussed."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , , , , , ; dct:date "2018-03-15"; dct:isPartOf , ; dct:publisher ; dct:title "The impact of sample size on the reproducibility of voxel-based lesion-deficit mappings"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Crinion"^^xsd:string; foaf:givenName "Jenny T."^^xsd:string; foaf:name "Jenny T. Crinion"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hope"^^xsd:string; foaf:givenName "Thomas M.H."^^xsd:string; foaf:name "Thomas M.H. Hope"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gajardo-Vidal"^^xsd:string; foaf:givenName "Andrea"^^xsd:string; foaf:name "Andrea Gajardo-Vidal"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Green"^^xsd:string; foaf:givenName "David W."^^xsd:string; foaf:name "David W. Green"^^xsd:string; rdf:type foaf:Person . foaf:familyName "White"^^xsd:string; foaf:givenName "Jitrachote"^^xsd:string; foaf:name "Jitrachote White"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Leff"^^xsd:string; foaf:givenName "Alexander P."^^xsd:string; foaf:name "Alexander P. Leff"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Seghier"^^xsd:string; foaf:givenName "Mohamed L."^^xsd:string; foaf:name "Mohamed L. Seghier"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lorca-Puls"^^xsd:string; foaf:givenName "Diego L."^^xsd:string; foaf:name "Diego L. Lorca-Puls"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Price"^^xsd:string; foaf:givenName "Cathy J."^^xsd:string; foaf:name "Cathy J. Price"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ludersdorfer"^^xsd:string; foaf:givenName "Philipp"^^xsd:string; foaf:name "Philipp Ludersdorfer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . bibo:issn "00283932"; foaf:name "Neuropsychologia"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "report.pdf"^^xsd:string . rdfs:label "report.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67197 \n\nModel Checking Transactional Sapphire\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Model Checking Transactional Sapphire (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Model Checking Transactional Sapphire (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Model Checking Transactional Sapphire (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Model Checking Transactional Sapphire (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Model Checking Transactional Sapphire (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Model Checking Transactional Sapphire (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "This report describes how we verified major aspects of the Transactional Sap- phire garbage collector for Java."^^xsd:string; bibo:authorList ; bibo:status ; dct:creator , ; dct:date "2018-03-15"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Model Checking Transactional Sapphire"^^xsd:string; ep:hasDocument , , , , , ; ep:hasSupplemental ; rdf:type bibo:Article, bibo:Manuscript, ep:EPrint, ep:MonographEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "School of Computing, University of Kent"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Jones"^^xsd:string; foaf:givenName "Richard"^^xsd:string; foaf:name "Richard Jones"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ugawa"^^xsd:string; foaf:givenName "Tomoharu"^^xsd:string; foaf:name "Tomoharu Ugawa"^^xsd:string; rdf:type foaf:Person . rdfs:label "version22_ivm_lzx.pdf"^^xsd:string . rdfs:label "version22_ivm_lzx.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66126 \n\nA Conditional Generative Model for Speech Enhancement\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Conditional Generative Model for Speech Enhancement (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Conditional Generative Model for Speech Enhancement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Conditional Generative Model for Speech Enhancement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Conditional Generative Model for Speech Enhancement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Conditional Generative Model for Speech Enhancement (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Conditional Generative Model for Speech Enhancement (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Deep learning based speech enhancement approaches like Deep Neural Networks (DNN) and Long-Short Term Memory (LSTM) have already demonstrated superior results to classical methods. \r\nHowever these methods do not take full advantage of temporal context information. While DNN and LSTM consider temporal context in the noisy source speech, it does not do so for the estimated clean speech. Both DNN and LSTM also have a tendency to over-smooth spectra, which causes the enhanced speech to sound muffled.\r\n\r\nThis paper proposes a novel architecture to address both issues, which we term a conditional generative model (CGM). By adopting an adversarial training scheme applied to a generator of deep dilated convolutional layers, CGM is designed to model the joint and symmetric conditions of both noisy and estimated clean spectra.We evaluate CGM against both DNN and LSTM in terms of Perceptual Evaluation of Speech Quality (PESQ) and Short-Time Objective Intelligibility (STOI) on TIMIT sentences corrupted by ITU-T P.501 and NOISEX-92 noise in a range of matched and mismatched noise conditions. Results show that both the CGM architecture and the adversarial training mechanism lead to better PESQ and STOI in all tested noise conditions. In addition to yielding significant improvements in PESQ and STOI, CGM and adversarial training both mitigate against over-smoothing."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "37"; dc:hasVersion ; dct:creator , , , ; dct:date "2018-03-13"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A Conditional Generative Model for Speech Enhancement"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Song"^^xsd:string; foaf:givenName "Yan"^^xsd:string; foaf:name "Yan Song"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dai"^^xsd:string; foaf:givenName "Li-Rong"^^xsd:string; foaf:name "Li-Rong Dai"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Li"^^xsd:string; foaf:givenName "Zheng-xi"^^xsd:string; foaf:name "Zheng-xi Li"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian Vince"^^xsd:string; foaf:name "Ian Vince McLoughlin"^^xsd:string; rdf:type foaf:Person . bibo:issn "0278081X"; foaf:name "Circuits, Systems, and Signal Processing"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "dsn2018_main.pdf"^^xsd:string . rdfs:label "dsn2018_main.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66570 \n\nEvaluating Self-Adaptive Authorisation Infrastructures through Gamification\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Evaluating Self-Adaptive Authorisation Infrastructures through Gamification (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Self-Adaptive Authorisation Infrastructures through Gamification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Self-Adaptive Authorisation Infrastructures through Gamification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Self-Adaptive Authorisation Infrastructures through Gamification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Self-Adaptive Authorisation Infrastructures through Gamification (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Evaluating Self-Adaptive Authorisation Infrastructures through Gamification (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Self-adaptive systems are able to modify their behaviour and/or structure in response to changes that occur to the system itself, its environment, or even its goals. In terms of authorisation infrastructures, self-adaptation has been shown to provide runtime capabilities for specifying and enforcing access control policies and subject access privileges, with a goal to mitigate insider threat. The evaluation of self-adaptive authorisation infrastructures, particularly, in the context of insider threats, is challenging because simulation of malicious behaviour can only demonstrate a fraction of the types of abuse that is representative of the real-world. In this paper, we present an innovative approach based on an ethical game of hacking, protected by an authorisation infrastructure. A key feature of the approach is the ability to observe user activity pre- and post-adaptation when evaluating runtime consequences of self- adaptation. Our live experiments captured a wide range of unpredictable changes, including malicious behaviour related to the exploitation of known vulnerabilities. As an outcome, we demonstrated the ability of our self-adaptive authorisation infrastructure to handle malicious behaviour given the existence of real and intelligent users, in addition to capturing how users responded to adaptation."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2018-03-09"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Evaluating Self-Adaptive Authorisation Infrastructures through Gamification"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "DSN 2018: 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Luxembourg"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Bailey"^^xsd:string; foaf:givenName "Christopher"^^xsd:string; foaf:name "Christopher Bailey"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Lemos"^^xsd:string; foaf:givenName "Rogerio"^^xsd:string; foaf:name "Rogerio de Lemos"^^xsd:string; rdf:type foaf:Person . bibo:issn "21583927"; foaf:name "International Conference on Dependable Systems and Networks Proceedings"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "indexcodes.txt"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69709 \n\nThe inevitable death of VMs: a progress report\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "The inevitable death of VMs: a progress report (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "The inevitable death of VMs: a progress report (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The inevitable death of VMs: a progress report (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The inevitable death of VMs: a progress report (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The inevitable death of VMs: a progress report (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "The inevitable death of VMs: a progress report (Other)"^^xsd:string . rdf:_1 . bibo:abstract "Language virtual machines (VMs), as implementation artifacts, are characterised by hard boundaries which limit their conduciveness to language interoperability, whole-system tooling, and other interactions with the `world outside'. Since the VM paradigm emerged, it has become increasingly clear that no single language or VM can succeed to the exclusion of others. This motivates a different approach in which languages are no longer implemented as VMs per se, but as participants in certain shared system-wide protocols, shared across diverse collection of languages and constituting a more porous boundary. One means of achieving such a shift is to evolve the underlying infrastructure from an essentially Unix-like environment to one that incorporates VM-like services, including memory management primitives, as a core protocol shared between many language implementations. Ongoing work towards these goals within the liballocs runtime is discussed, specifically concerning pointer identification, process-wide garbage collection, and speculative optimisations."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator ; dct:date "2018-03-09"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "The inevitable death of VMs: a progress report"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "2nd International Conference on Art, Science, and Engineering of Programming"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Nice, France"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Kell"^^xsd:string; foaf:givenName "Stephen"^^xsd:string; foaf:name "Stephen Kell"^^xsd:string; rdf:type foaf:Person . rdfs:label "Model extraction and test generation from JUnit test suites.pdf"^^xsd:string . rdfs:label "Model extraction and test generation from JUnit test suites.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66343 \n\nModel extraction and test generation from JUnit test suites\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Model extraction and test generation from JUnit test suites (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Model extraction and test generation from JUnit test suites (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Model extraction and test generation from JUnit test suites (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Model extraction and test generation from JUnit test suites (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Model extraction and test generation from JUnit test suites (Other)"^^xsd:string . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Model extraction and test generation from JUnit test suites (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Model extraction and test generation from JUnit test suites (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Model extraction and test generation from JUnit test suites (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Model extraction and test generation from JUnit test suites (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Model extraction and test generation from JUnit test suites (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Model extraction and test generation from JUnit test suites (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Model extraction and test generation from JUnit test suites (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "In this paper, we describe how to infer state machine models of systems from legacy unit test suites and how to generate new tests from those models. The novelty of our approach is to combine control dependencies and data dependencies in the same model, in contrast to most other work in this area. Combining both kinds of dependencies helps us to build more expressive models, which in turn allows us to produce smarter tests. We illustrate those techniques with real examples produced by our implementation, the James tool, designed to apply these techniques in practice to Java code and tests."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "26"; dc:hasVersion , ; dct:creator , , ; dct:date "2018-03-09"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Model extraction and test generation from JUnit test suites"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Francisco"^^xsd:string; foaf:givenName "Miguel Ángel"^^xsd:string; foaf:name "Miguel Ángel Francisco"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Seijas"^^xsd:string; foaf:givenName "Pablo Lamela"^^xsd:string; foaf:name "Pablo Lamela Seijas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Thompson"^^xsd:string; foaf:givenName "Simon"^^xsd:string; foaf:name "Simon Thompson"^^xsd:string; rdf:type foaf:Person . bibo:issn "09639314"; foaf:name "Software Quality Journal"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #66530 \n\nGuest Editors' Introduction - Artificial Intelligence for Security and Privacy\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "18"; dct:creator , , , , ; dct:date "2018-03-07"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Guest Editors' Introduction - Artificial Intelligence for Security and Privacy"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Rehak"^^xsd:string; foaf:givenName "Martin"^^xsd:string; foaf:name "Martin Rehak"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Yolum"^^xsd:string; foaf:givenName "Pinar"^^xsd:string; foaf:name "Pinar Yolum"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Criado"^^xsd:string; foaf:givenName "Natalia"^^xsd:string; foaf:name "Natalia Criado"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Such"^^xsd:string; foaf:givenName "Jose M."^^xsd:string; foaf:name "Jose M. Such"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kafalı"^^xsd:string; foaf:givenName "Özgür"^^xsd:string; foaf:name "Özgür Kafalı"^^xsd:string; rdf:type foaf:Person . bibo:issn "15335399"; foaf:name "ACM Transactions on Internet Technology"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "tse18-chari-et-al-fully-reflective-execution-environments.pdf"^^xsd:string . rdfs:label "tse18-chari-et-al-fully-reflective-execution-environments.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66604 \n\nFully Reflective Execution Environments: Virtual Machines for More Flexible Software\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Fully Reflective Execution Environments: Virtual Machines for More Flexible Software (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Fully Reflective Execution Environments: Virtual Machines for More Flexible Software (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fully Reflective Execution Environments: Virtual Machines for More Flexible Software (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fully Reflective Execution Environments: Virtual Machines for More Flexible Software (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fully Reflective Execution Environments: Virtual Machines for More Flexible Software (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fully Reflective Execution Environments: Virtual Machines for More Flexible Software (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "VMs are complex pieces of software that implement programming language semantics in an efficient, portable, and secure way. Unfortunately, mainstream VMs provide applications with few mechanisms to alter execution semantics or memory management at run time. We argue that this limits the evolvability and maintainability of running systems for both, the application domain, e.g., to support unforeseen requirements, and the VM domain, e.g., to modify the organization of objects in memory. This work explores the idea of incorporating reflective capabilities into the VM domain and analyzes its impact in the context of software adaptation tasks. We characterize the notion of a fully reflective VM, a kind of VM that provides means for its own observability and modifiability at run time. This enables programming languages to adapt the underlying VM to changing requirements. We propose a reference architecture for such VMs and present TruffleMATE as a prototype for this architecture. We evaluate the mechanisms TruffleMATE provides to deal with unanticipated dynamic adaptation scenarios for security, optimization, and profiling aspects. In contrast to existing alternatives, we observe that TruffleMATE is able to handle all scenarios, using less than 50 lines of code for each, and without interfering with the application's logic."^^xsd:string; bibo:authorList ; bibo:issue "9"; bibo:status , ; bibo:volume "45"; dc:hasVersion ; dct:creator , , , ; dct:date "2018-03-06"; dct:isPartOf , ; dct:publisher ; dct:title "Fully Reflective Execution Environments: Virtual Machines for More Flexible Software"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chari"^^xsd:string; foaf:givenName "Guido"^^xsd:string; foaf:name "Guido Chari"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Garbervetsky"^^xsd:string; foaf:givenName "Diego"^^xsd:string; foaf:name "Diego Garbervetsky"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ducasse"^^xsd:string; foaf:givenName "Stéphane"^^xsd:string; foaf:name "Stéphane Ducasse"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marr"^^xsd:string; foaf:givenName "Stefan"^^xsd:string; foaf:name "Stefan Marr"^^xsd:string; rdf:type foaf:Person . bibo:issn "00985589"; foaf:name "IEEE Transactions on Software Engineering"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "ccaisb.pdf"^^xsd:string . rdfs:label "ccaisb.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66563 \n\nCreativity vs quality: why the distinction matters when evaluating computational creativity systems\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Creativity vs quality: why the distinction matters when evaluating computational creativity systems (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Creativity vs quality: why the distinction matters when evaluating computational creativity systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Creativity vs quality: why the distinction matters when evaluating computational creativity systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Creativity vs quality: why the distinction matters when evaluating computational creativity systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Creativity vs quality: why the distinction matters when evaluating computational creativity systems (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Creativity vs quality: why the distinction matters when evaluating computational creativity systems (Other)"^^xsd:string . rdf:_1 . bibo:abstract "The evaluation of computational creativity systems is increasingly becoming part of standard practice in computational creativity research, particularly with recent development in evaluation tools. One matter that can cause confusion, however, is in distinguishing between the concepts of creativity and quality/value. These two concepts are highly interrelated, to the point that it is difficult (and perhaps inappropriate) to define creativity without incorporat- ing quality judgements into that definition. Several examples exist, however, where creativity evaluation has been confused with quality judgments, leading to less grounded evaluative results. Many computational creativity projects aim to produce high quality results; this is a worthy research aim. If, however, the aim of a computational creativity research project is to make as creative a system as possible, then a more careful approach is needed that acknowledges and understands the differences - and also the overlaps - between creativity and quality. This paper critically investigates the concepts of creativity and quality (and how they are related). It offers warning examples showing the dangers of conflating the two concepts. These are followed by practical examples of how to incorporate value judgements into the evaluation of creativity of software, to further our overall pursuit of building more creative computational systems."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator ; dct:date "2018-03-05"; dct:isPartOf ; dct:publisher ; dct:subject , , ; dct:title "Creativity vs quality: why the distinction matters when evaluating computational creativity systems"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "BF Psychology"@en . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "The 5th Computational Creativity Symposium at the AISB Convention 2018"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Liverpool, UK"^^xsd:string . foaf:name "AISB"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Jordanous"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Jordanous"^^xsd:string; rdf:type foaf:Person . rdfs:label "Gajardo-Vidal false-negatives stroke.pdf"^^xsd:string . rdfs:label "Gajardo-Vidal false-negatives stroke.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66586 \n\nHow distributed processing produces false negatives in voxel-based lesion-deficit analyses\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "How distributed processing produces false negatives in voxel-based lesion-deficit analyses (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "How distributed processing produces false negatives in voxel-based lesion-deficit analyses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "How distributed processing produces false negatives in voxel-based lesion-deficit analyses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "How distributed processing produces false negatives in voxel-based lesion-deficit analyses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "How distributed processing produces false negatives in voxel-based lesion-deficit analyses (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "How distributed processing produces false negatives in voxel-based lesion-deficit analyses (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 ; rdf:_11 . bibo:abstract "In this study, we hypothesized that if the same deficit can be caused by damage to one or another part of a\r\ndistributed neural system, then voxel-based analyses might miss critical lesion sites because preservation of each\r\nsite will not be consistently associated with preserved function. The first part of our investigation used voxelbased\r\nmultiple regression analyses of data from 359 right-handed stroke survivors to identify brain regions\r\nwhere lesion load is associated with picture naming abilities after factoring out variance related to object recognition,\r\nsemantics and speech articulation so as to focus on deficits arising at the word retrieval level. A highly\r\nsignificant lesion-deficit relationship was identified in left temporal and frontal/premotor regions. Post-hoc\r\nanalyses showed that damage to either of these sites caused the deficit of interest in less than half the affected\r\npatients (76/162 = 47%). After excluding all patients with damage to one or both of the identified regions, our\r\nsecond analysis revealed a new region, in the anterior part of the left putamen, which had not been previously\r\ndetected because many patients had the deficit of interest after temporal or frontal damage that preserved the\r\nleft putamen. The results illustrate how (i) false negative results arise when the same deficit can be caused by\r\ndifferent lesion sites; (ii) some of the missed effects can be unveiled by adopting an iterative approach that\r\nsystematically excludes patients with lesions to the areas identified in previous analyses, (iii) statistically significant\r\nvoxel-based lesion-deficit mappings can be driven by a subset of patients; (iv) focal lesions to the\r\nidentified regions are needed to determine whether the deficit of interest is the consequence of focal damage or\r\nmuch more extensive damage that includes the identified region; and, finally, (v) univariate voxel-based lesiondeficit\r\nmappings cannot, in isolation, be used to predict outcome in other patients."^^xsd:string; bibo:authorList ; bibo:status , ; dc:hasVersion ; dct:creator , , , , , , , , , , ; dct:date "2018-03-02"; dct:isPartOf , ; dct:publisher ; dct:title "How distributed processing produces false negatives in voxel-based lesion-deficit analyses"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Green"^^xsd:string; foaf:givenName "David W."^^xsd:string; foaf:name "David W. Green"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ludersdorfer"^^xsd:string; foaf:givenName "Philipp"^^xsd:string; foaf:name "Philipp Ludersdorfer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Crinion"^^xsd:string; foaf:givenName "Jennifer T."^^xsd:string; foaf:name "Jennifer T. Crinion"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Seghier"^^xsd:string; foaf:givenName "Mohamed L."^^xsd:string; foaf:name "Mohamed L. Seghier"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Leff"^^xsd:string; foaf:givenName "Alex P."^^xsd:string; foaf:name "Alex P. Leff"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Lorca-Puls"^^xsd:string; foaf:givenName "Diego L."^^xsd:string; foaf:name "Diego L. Lorca-Puls"^^xsd:string; rdf:type foaf:Person . foaf:familyName "White"^^xsd:string; foaf:givenName "Jitrachote"^^xsd:string; foaf:name "Jitrachote White"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hope"^^xsd:string; foaf:givenName "Thomas M.H."^^xsd:string; foaf:name "Thomas M.H. Hope"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Price"^^xsd:string; foaf:givenName "Cathy J."^^xsd:string; foaf:name "Cathy J. Price"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gajardo-Vidal"^^xsd:string; foaf:givenName "Andrea"^^xsd:string; foaf:name "Andrea Gajardo-Vidal"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bowman"^^xsd:string; foaf:givenName "Howard"^^xsd:string; foaf:name "Howard Bowman"^^xsd:string; rdf:type foaf:Person . bibo:issn "00283932"; foaf:name "Neuropsychologia"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #90206 \n\nA Massively Parallel Deep Rule-Based Ensemble Classifier for Remote Sensing Scenes\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "In this letter, we propose a new approach for remote sensing scene classification by creating an ensemble of the recently introduced massively parallel deep (fuzzy) rule-based (DRB) classifiers trained with different levels of spatial information separately. Each DRB classifier consists of a massively parallel set of human-interpretable, transparent zero-order fuzzy IF...THEN... rules with a prototype-based nature. The DRB classifier can self-organize “from scratch” and self-evolve its structure. By employing the pretrained deep convolution neural network as the feature descriptor, the proposed DRB ensemble is able to exhibit human-level performance through a transparent and parallelizable training process. Numerical examples using benchmark data set demonstrate the superior accuracy of the proposed approach together with human-interpretable fuzzy rules autonomously generated by the DRB classifier."^^xsd:string; bibo:authorList ; bibo:issue "3"; bibo:status , ; bibo:volume "15"; dct:creator , , , ; dct:date "2018-03-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A Massively Parallel Deep Rule-Based Ensemble Classifier for Remote Sensing Scenes"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Atkinson"^^xsd:string; foaf:givenName "Peter M."^^xsd:string; foaf:name "Peter M. Atkinson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zhang"^^xsd:string; foaf:givenName "Ce"^^xsd:string; foaf:name "Ce Zhang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen P."^^xsd:string; foaf:name "Plamen P. Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "1545598X"; foaf:name "IEEE Geoscience and Remote Sensing Letters"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #66201 \n\nPoster: Extraction of Security Requirements from Textual Artifacts\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:authorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , , , ; dct:date "2018-02-27"; dct:isPartOf ; dct:subject ; dct:title "Poster: Extraction of Security Requirements from Textual Artifacts"^^xsd:string; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . dct:title "Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS)"^^xsd:string; rdf:type bibo:Conference . foaf:familyName "Guo"^^xsd:string; foaf:givenName "Hui"^^xsd:string; foaf:name "Hui Guo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jeukeng"^^xsd:string; foaf:givenName "Anne-Liz"^^xsd:string; foaf:name "Anne-Liz Jeukeng"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Williams"^^xsd:string; foaf:givenName "Laurie"^^xsd:string; foaf:name "Laurie Williams"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Singh"^^xsd:string; foaf:givenName "Munindar P."^^xsd:string; foaf:name "Munindar P. Singh"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kafalı"^^xsd:string; foaf:givenName "Özgur"^^xsd:string; foaf:name "Özgur Kafalı"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #63217 \n\nFisher Vector based CNN architecture for Image Classification\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Fisher Vector based CNN architecture for Image Classification (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Fisher Vector based CNN architecture for Image Classification (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fisher Vector based CNN architecture for Image Classification (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fisher Vector based CNN architecture for Image Classification (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fisher Vector based CNN architecture for Image Classification (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Fisher Vector based CNN architecture for Image Classification (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "In this paper, we tackle the representation learning problem for small scale fine-grained object recognition and scene classification tasks. Conventional bag of features(BoF) methods exploit hand-crafted frontend local features, and learn the representations via various machine learning techniques. Convolutional neural networks(CNN) directly learn the representation from raw images and benefit from joint optimization of network parameters in an end-to-end manner. However, the performance of existing representation learning methods is still unsatisfactory for the small-scale recognition tasks. To address this issue, we present a FV coding based CNN(FV-CNN) architecture. FV-CNN has three main advantages in that firstly it is able to exploit activations from the intermediate convolutional layer and a probabilistic discriminative model to derive the FV coding. Secondly, it takes advantage of the end-to-end back-propagation of the gradients to jointly optimize the whole learning process. Finally, it can learn a compact representation. When evaluated on benchmark datasets of fine grain object recognition (Caltech-CUB200), and scene classification (MIT67), accuracies of 88.0% and 82.2% are achieved."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2018-02-22"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Fisher Vector based CNN architecture for Image Classification"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . dct:title "IEEE International Conference on Image Processing"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Beijing, China"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hong"^^xsd:string; foaf:givenName "Xinhai"^^xsd:string; foaf:name "Xinhai Hong"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Song"^^xsd:string; foaf:givenName "Yan"^^xsd:string; foaf:name "Yan Song"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Peiseng"^^xsd:string; foaf:name "Peiseng Wang"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McLoughlin"^^xsd:string; foaf:givenName "Ian"^^xsd:string; foaf:name "Ian McLoughlin"^^xsd:string; rdf:type foaf:Person . rdfs:label "Bioinformatics-2018-Fabris-Advance-Access.pdf"^^xsd:string . rdfs:label "Bioinformatics-2018-Fabris-Advance-Access.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66666 \n\nA new approach for interpreting Random Forest models and its application to the biology of ageing\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A new approach for interpreting Random Forest models and its application to the biology of ageing (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A new approach for interpreting Random Forest models and its application to the biology of ageing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A new approach for interpreting Random Forest models and its application to the biology of ageing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A new approach for interpreting Random Forest models and its application to the biology of ageing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A new approach for interpreting Random Forest models and its application to the biology of ageing (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A new approach for interpreting Random Forest models and its application to the biology of ageing (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "This work uses the Random Forest (RF) classification algorithm to predict if a gene is over-expressed, under-expressed or has no change in expression with age in the brain. RFs have high predictive power, and RF models can be interpreted using a feature (variable) importance measure. However, current feature importance measures evaluate a feature as a whole (all feature values). We show that, for a popular type of biological data (Gene Ontology-based), usually only one value of a feature is particularly important for classification and the interpretation of the RF model. Hence, we propose a new algorithm for identifying the most important and most informative feature values in an RF model."^^xsd:string; bibo:authorList ; bibo:issue "14"; bibo:status , ; bibo:volume "34"; dc:hasVersion ; dct:creator , , , , ; dct:date "2018-02-16"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "A new approach for interpreting Random Forest models and its application to the biology of ageing"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . foaf:name "Oxford University Press"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "de Magalhães"^^xsd:string; foaf:givenName "João Pedro"^^xsd:string; foaf:name "João Pedro de Magalhães"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Palmer"^^xsd:string; foaf:givenName "Daniel"^^xsd:string; foaf:name "Daniel Palmer"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Doherty"^^xsd:string; foaf:givenName "Aoife"^^xsd:string; foaf:name "Aoife Doherty"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Freitas"^^xsd:string; foaf:givenName "Alex A."^^xsd:string; foaf:name "Alex A. Freitas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fabris"^^xsd:string; foaf:givenName "Fabio"^^xsd:string; foaf:name "Fabio Fabris"^^xsd:string; rdf:type foaf:Person . bibo:issn "13674803"; foaf:name "Bioinformatics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "SecurityAnalysisOfContiki.pdf"^^xsd:string . rdfs:label "SecurityAnalysisOfContiki.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67379 \n\nSecurity Analysis of Contiki IoT Operating System\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Security Analysis of Contiki IoT Operating System (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Security Analysis of Contiki IoT Operating System (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Security Analysis of Contiki IoT Operating System (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Security Analysis of Contiki IoT Operating System (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Security Analysis of Contiki IoT Operating System (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Security Analysis of Contiki IoT Operating System (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "The Internet of Things (IoT) has introduced a myriad of ways in which devices can interact with each other. The IoT concept provides opportunities for novel and useful applications but at the same time, concerns have been raised over potential security issues caused by buggy IoT software. It is therefore imperative to detect and fix these bugs in order to minimise the risk of IoT devices becoming the target or source of attacks. In this paper, we focus our investigation on the underlying IoT operating system (OS), which is critical for the overall security of IoT devices. We picked Contiki as our case study since it is a very popular IoT OS and we have access to part of the development team, allowing us to discuss potential vulnerabilities with them so that fixes can be implemented quickly. Using static program analysis tools and techniques, we are able to scan the source code of the Contiki OS systematically in order to identify, analyse and patch vulnerabilities. Our main contribution is a holistic and systematic analysis of Contiki, starting with an exploration of its metrics, fundamental architecture, and finally some of its vulnerabilities. Our analysis produced relevant data on the number of unsafe functions in use, as well as the bug density; both of which provide an indication of the overall security of the inspected system. Our effort led to the finding of two major issues, described in two Common Vulnerabilities and Exposures (CVE) reports."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-02-16"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Security Analysis of Contiki IoT Operating System"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "International Conference on Embedded Wireless Systems and Networks (EWSN) 2018"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Madrid, Spain"^^xsd:string . foaf:name "Junction Publishing"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Arief"^^xsd:string; foaf:givenName "Budi"^^xsd:string; foaf:name "Budi Arief"^^xsd:string; rdf:type foaf:Person . foaf:familyName "McBride"^^xsd:string; foaf:givenName "Jack"^^xsd:string; foaf:name "Jack McBride"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio C."^^xsd:string; foaf:name "Julio C. Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . foaf:name "ACM Digital Library"^^xsd:string; rdf:type bibo:Collection . rdfs:label "CIFER_Adegboye2017.pdf"^^xsd:string . rdfs:label "CIFER_Adegboye2017.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #63368 \n\nRegression genetic programming for estimating trend end in foreign exchange market\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Regression genetic programming for estimating trend end in foreign exchange market (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Regression genetic programming for estimating trend end in foreign exchange market (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Regression genetic programming for estimating trend end in foreign exchange market (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Regression genetic programming for estimating trend end in foreign exchange market (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Regression genetic programming for estimating trend end in foreign exchange market (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Regression genetic programming for estimating trend end in foreign exchange market (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Most forecasting algorithms use a physical time scale for studying price movement in financial markets, making the flow of physical time discontinuous. The use of a physical time scale can make companies oblivious to significant activities in the market, which poses a risk. Directional changes is a different and newer approach, which uses an event-based time scale. This approach summarises data into alternating trends called upward directional change and downward directional change. Each of these trends are further dismembered into directional change (DC) event and overshoot (OS) event. We present a genetic programming (GP) algorithm that evolves equations that express linear and non-linear relationships between the length of DC and OS events in a given dataset. This allows us to have an expectation when a trend will reverse, which can lead to increased profitability. This novel trend reversal estimation approach is then used as part of a DC-based trading strategy. We aim to appraise whether the new knowledge can lead to greater excess return. We assess the efficiency of the modified trading strategy on 250 different datasets from five different currency pairs, consisting of intraday data from the foreign exchange (Forex) spot market. Results show that our algorithm is able to return profitable trading strategies and statistically outperform state-of-the-art financial trading strategies, such as technical analysis, buy and hold and other DC-based trading strategies."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018-02-05"; dct:isPartOf ; dct:publisher ; dct:title "Regression genetic programming for estimating trend end in foreign exchange market"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "IEEE Symposium Series on Computational Intelligence"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Hawaii, USA"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Adegboye"^^xsd:string; foaf:givenName "Adesola"^^xsd:string; foaf:name "Adesola Adegboye"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Johnson"^^xsd:string; foaf:givenName "Colin G."^^xsd:string; foaf:name "Colin G. Johnson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kampouridis"^^xsd:string; foaf:givenName "Michael"^^xsd:string; foaf:name "Michael Kampouridis"^^xsd:string; rdf:type foaf:Person . rdfs:label "1612.07184v1.pdf"^^xsd:string . rdfs:label "1612.07184v1.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "1612.07184(2).pdf"^^xsd:string . rdfs:label "1612.07184(2).pdf_nocoversheet"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #59768 \n\nPerformance limits and trade-offs in entropy-driven biochemical computers\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Performance limits and trade-offs in entropy-driven biochemical computers (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Performance limits and trade-offs in entropy-driven biochemical computers (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Performance limits and trade-offs in entropy-driven biochemical computers (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Performance limits and trade-offs in entropy-driven biochemical computers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Performance limits and trade-offs in entropy-driven biochemical computers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Performance limits and trade-offs in entropy-driven biochemical computers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Performance limits and trade-offs in entropy-driven biochemical computers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Performance limits and trade-offs in entropy-driven biochemical computers (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Performance limits and trade-offs in entropy-driven biochemical computers (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Performance limits and trade-offs in entropy-driven biochemical computers (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Performance limits and trade-offs in entropy-driven biochemical computers (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Performance limits and trade-offs in entropy-driven biochemical computers (Other)"^^xsd:string . rdf:_1 . bibo:abstract "The properties and fundamental limits of chemical computers have recently attracted significant interest as a model of computation, an unifying principle of cellular organisation and in the context of bio-engineering. As of yet, research in this topic is based on case-studies. There exists no generally accepted criterion to distinguish between chemical processes that compute and those that do not. Here, the concept of entropy driven computer (EDC) is proposed as a general model of chemical computation. It is found that entropy driven computation is subject to a trade-off between accuracy and entropy production, but unlike many biological systems, there are no trade-offs involving time. The latter only arise when it is taken into account that the observation of the state of the EDC is not energy neutral, but comes at a cost. The significance of this conclusion in relation to biological systems is discussed. Three examples of biological computers, including an implementation of a neural network as an EDC are given."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "443"; dc:hasVersion , ; dct:creator ; dct:date "2018-02-03"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Performance limits and trade-offs in entropy-driven biochemical computers"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasSubmitted ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chu"^^xsd:string; foaf:givenName "Dominique"^^xsd:string; foaf:name "Dominique Chu"^^xsd:string; rdf:type foaf:Person . bibo:issn "00225193"; foaf:name "Journal of Theoretical Biology"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #77175 \n\nFaith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-Hoc Network\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-Hoc Network (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-Hoc Network (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-Hoc Network (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-Hoc Network (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-Hoc Network (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-Hoc Network (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "Vehicular Ad-hoc Network (VANET) is a key technology in the domain of transportation which serves as a platform for vehicles to communicate with each other and intelligently exchange critical information, such as collision avoidance messages. Given that potentially life critical information could be exchanged in real time among network entities, it is paramount that this information is authentic (from a legitimate source), reliable and accurate. Moreover, mobility of vehicles creates different contexts in VANET resulting in a diversity of requirements for trust management. This work focuses on the effective modelling and management of trust both as a prerequisite to inter-vehicle communication and as a security measure. To this end, we propose a comprehensive set of criteria which work towards the effective modelling and management of trust in VANET to ensure that the unique characteristics of the network (such as high mobility, dispersion of vehicles, and lack of central architecture) are considered. The contribution of this paper is twofold. (1) We propose 16 criteria for effective trust management in VANET, and (2) evaluate various available trust models based on these proposed criteria."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , ; dct:date "2018-02-01"; dct:isPartOf ; dct:publisher ; dct:title "Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-Hoc Network"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . dct:title "2017 IEEE International Conference on Physical and Social Computing (CPSCom)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Exeter, UK"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Adnane"^^xsd:string; foaf:givenName "Asma"^^xsd:string; foaf:name "Asma Adnane"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ahmad"^^xsd:string; foaf:givenName "Farhan"^^xsd:string; foaf:name "Farhan Ahmad"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hall"^^xsd:string; foaf:givenName "Jordan"^^xsd:string; foaf:name "Jordan Hall"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N.L."^^xsd:string; foaf:name "Virginia N.L. Franqueira"^^xsd:string; rdf:type foaf:Person . rdfs:label "jcnv5i2_IzzidienChennu.pdf"^^xsd:string . rdfs:label "jcnv5i2_IzzidienChennu.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #66288 \n\nA Neuroscience Study on the Implicit Subconscious Perceptions of Fairness and Islamic Law in Muslims Using the EEG N400 Event Related Potential\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "A Neuroscience Study on the Implicit Subconscious Perceptions of Fairness and Islamic Law in Muslims Using the EEG N400 Event Related Potential (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "A Neuroscience Study on the Implicit Subconscious Perceptions of Fairness and Islamic Law in Muslims Using the EEG N400 Event Related Potential (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Neuroscience Study on the Implicit Subconscious Perceptions of Fairness and Islamic Law in Muslims Using the EEG N400 Event Related Potential (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Neuroscience Study on the Implicit Subconscious Perceptions of Fairness and Islamic Law in Muslims Using the EEG N400 Event Related Potential (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Neuroscience Study on the Implicit Subconscious Perceptions of Fairness and Islamic Law in Muslims Using the EEG N400 Event Related Potential (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "A Neuroscience Study on the Implicit Subconscious Perceptions of Fairness and Islamic Law in Muslims Using the EEG N400 Event Related Potential (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "We sought to compare the implicit and explicit views of a group of Muslim graduates on the fairness of Islamic\r\nlaw. In this preliminary investigation, we used the Electroencephalographic N400 Event Related Potential\r\nto detect the participant’s implicit beliefs. It was found that the majority of participants, eight out of ten,\r\nimplicitly held that Islamic Law was unfair despite explicitly stating the opposite. In seeking to understand\r\nwhat separated these eight participants from the remaining two – the two who both implicitly and explicitly\r\nheld that Islamic Law was fair – only two distinguishing characteristics could be identified. Both participants\r\nhad undertaken an in-depth study of a branch of Islamic law that places the spirit of the law above that of a\r\nliteral interpretation. They had also attended the same seminary, exclusive to the other participants. Of the\r\neight participants, it was discovered that, while they implicitly held Islamic law to be unfair, they also held it\r\nto be rational – in the same way they found that it was rational to push a person off a ship in order to save the\r\nremaining from drowning, yet unfair. We discuss these preliminary findings and consider theories on how an\r\ninnate sense of fairness, an aspect of nativism, may come into play when it is not congruent with a participant’s\r\nown beliefs. Further, we ask, where such an inconsistency occurs, how does the mind attempt to rectify it – if\r\nat all? As a possible contribution to the discussion on theories of nativism vs. empiricism we put forward\r\na hypothesis and methodology for investigation that may produce previously unconsidered data on human\r\nnature."^^xsd:string; bibo:authorList ; bibo:issue "2"; bibo:status , ; bibo:volume "5"; dc:hasVersion ; dct:creator , ; dct:date "2018-02-01"; dct:isPartOf , ; dct:title "A Neuroscience Study on the Implicit Subconscious Perceptions of Fairness and Islamic Law in Muslims Using the EEG N400 Event Related Potential"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:familyName "Izziden"^^xsd:string; foaf:givenName "Ahmed"^^xsd:string; foaf:name "Ahmed Izziden"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Chennu"^^xsd:string; foaf:givenName "Srivas"^^xsd:string; foaf:name "Srivas Chennu"^^xsd:string; rdf:type foaf:Person . bibo:issn "21665087"; foaf:name "Journal of Cognition and Neuroethics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "craze2018-accepted-version.pdf"^^xsd:string . rdfs:label "craze2018-accepted-version.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #77398 \n\nMYC regulation of glutamine--proline regulatory axis is key in luminal B breast cancer\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "MYC regulation of glutamine--proline regulatory axis is key in luminal B breast cancer (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "MYC regulation of glutamine--proline regulatory axis is key in luminal B breast cancer (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "MYC regulation of glutamine--proline regulatory axis is key in luminal B breast cancer (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "MYC regulation of glutamine--proline regulatory axis is key in luminal B breast cancer (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "MYC regulation of glutamine--proline regulatory axis is key in luminal B breast cancer (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "MYC regulation of glutamine--proline regulatory axis is key in luminal B breast cancer (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 ; rdf:_11 ; rdf:_12 ; rdf:_13 . bibo:abstract "Background: Altered cellular metabolism is a hallmark of cancer and some are reliant on glutamine for sustained proliferation and survival. We hypothesise that the glutamine–proline regulatory axis has a key role in breast cancer (BC) in the highly proliferative classes. Methods: Glutaminase (GLS), pyrroline-5-carboxylate synthetase (ALDH18A1), and pyrroline-5-carboxylate reductase 1 (PYCR1) were assessed at DNA/mRNA/protein levels in large, well-characterised cohorts. Results: Gain of PYCR1 copy number and high PYCR1 mRNA was associated with Luminal B tumours. High ALDH18A1 and high GLS protein expression was observed in the oestrogen receptor (ER)+/human epidermal growth factor receptor (HER2)– high proliferation class (Luminal B) compared with ER+/HER2– low proliferation class (Luminal A) (P=0.030 and P=0.022 respectively), however this was not observed with mRNA. Cluster analysis of the glutamine–proline regulatory axis genes revealed significant associations with molecular subtypes of BC and patient outcome independent of standard clinicopathological parameters (P=0.012). High protein expression of the glutamine–proline enzymes were all associated with high MYC protein in Luminal B tumours only (P<0.001). Conclusions: We provide comprehensive clinical data indicating that the glutamine–proline regulatory axis plays an important role in the aggressive subclass of luminal BC and is therefore a potential therapeutic target."^^xsd:string; bibo:authorList ; bibo:issue "2"; bibo:status , ; bibo:volume "118"; dc:hasVersion ; dct:creator , , , , , , , , , , , , ; dct:date "2018-01-23"; dct:isPartOf , ; dct:publisher ; dct:title "MYC regulation of glutamine--proline regulatory axis is key in luminal B breast cancer"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Nature Publishing Group"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Coimbra"^^xsd:string; foaf:givenName "Nuno DM"^^xsd:string; foaf:name "Nuno DM Coimbra"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cheung"^^xsd:string; foaf:givenName "Hayley"^^xsd:string; foaf:name "Hayley Cheung"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cheng"^^xsd:string; foaf:givenName "Kiu Wai"^^xsd:string; foaf:name "Kiu Wai Cheng"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Craze"^^xsd:string; foaf:givenName "Madeleine L"^^xsd:string; foaf:name "Madeleine L Craze"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ellis"^^xsd:string; foaf:givenName "Ian O."^^xsd:string; foaf:name "Ian O. Ellis"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jewa"^^xsd:string; foaf:givenName "Natasha"^^xsd:string; foaf:name "Natasha Jewa"^^xsd:string; rdf:type foaf:Person . foaf:familyName "El-Ansari"^^xsd:string; foaf:givenName "Rokaya"^^xsd:string; foaf:name "Rokaya El-Ansari"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Diez-Rodriguez"^^xsd:string; foaf:givenName "Maria"^^xsd:string; foaf:name "Maria Diez-Rodriguez"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Aleskandarany"^^xsd:string; foaf:givenName "Mohammed A"^^xsd:string; foaf:name "Mohammed A Aleskandarany"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nolan"^^xsd:string; foaf:givenName "Christopher C"^^xsd:string; foaf:name "Christopher C Nolan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Soria"^^xsd:string; foaf:givenName "Daniele"^^xsd:string; foaf:name "Daniele Soria"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Green"^^xsd:string; foaf:givenName "Andrew R."^^xsd:string; foaf:name "Andrew R. Green"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rakha"^^xsd:string; foaf:givenName "Emad A"^^xsd:string; foaf:name "Emad A Rakha"^^xsd:string; rdf:type foaf:Person . bibo:issn "00070920"; foaf:name "British Journal of Cancer"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "ComplexCloud2.pdf"^^xsd:string . rdfs:label "ComplexCloud2.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . rdfs:label "Entropy4Cloud.pdf"^^xsd:string . rdfs:label "Entropy4Cloud.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #63355 \n\nEntropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management (Other)"^^xsd:string . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management (Other)"^^xsd:string . rdf:_1 . bibo:abstract "In cloud service resource management system, complexity limits the system’s ability to better satisfy the application’s QoS requirements, e.g. cost budget, average response time and reliability. Numerousness, diversity, variety, uncertainty, etc. are some of the complexity factors which lead to the variation between expected plan and actual running performance of cloud applications. In this paper, after defining the complexity clearly, we identify the origin of complexity in cloud service resource management system through the study of ”Local Activity Principle”. In order to manage complexity, an Entropy-based methodology is presented to use which covers identifying, measuring, analysing and controlling (avoid and reduce) of complexity. Finally, we implement such idea in a popular cloud engine, Apache Spark, for running Analysis as a Service (AaaS). Experiments demonstrate that the new, Entropy-based resource management approach can significantly improve the performance of Spark applications. Compare with the Fair Scheduler in Apache Spark, our proposed Entropy Scheduler is able to reduce overall cost by 23%, improve the average service response time by 15% - 20% and minimized the standard deviation of service response time by 30% - 45%."^^xsd:string; bibo:authorList ; bibo:issue "1"; bibo:status , ; bibo:volume "2"; dc:hasVersion , ; dct:creator ; dct:date "2018-01-23"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , , , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QC20 Mathematical Physics"@en . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Wang"^^xsd:string; foaf:givenName "Frank Z."^^xsd:string; foaf:name "Frank Z. Wang"^^xsd:string; rdf:type foaf:Person . bibo:issn "2471285X"; foaf:name "IEEE Transactions on Emerging Topics in Computational Intelligence"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #65859 \n\nSoftware Engineering for Self-Adaptive Systems: Research Challenges in the Provision of Assurances\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 ; rdf:_6 ; rdf:_7 ; rdf:_8 ; rdf:_9 ; rdf:_10 ; rdf:_11 ; rdf:_12 ; rdf:_13 ; rdf:_14 ; rdf:_15 ; rdf:_16 ; rdf:_17 ; rdf:_18 ; rdf:_19 ; rdf:_20 ; rdf:_21 ; rdf:_22 ; rdf:_23 ; rdf:_24 ; rdf:_25 ; rdf:_26 ; rdf:_27 ; rdf:_28 ; rdf:_29 ; rdf:_30 ; rdf:_31 ; rdf:_32 . rdf:_1 ; rdf:_2 ; rdf:_3 . , , ; bibo:abstract "The important concern for modern software systems is to become more cost-effective, while being versatile, flexible, resilient, dependable, energy-efficient, customisable, configurable and self-optimising when reacting to run-time changes that may occur within the system itself, its environment or requirements. One of the most promising approaches to achieving such properties is to equip software systems with self-managing capabilities using self-adaptation mechanisms. Despite re-cent advances in this area, one key aspect of self-adaptive systems that remains to be tackled in depth is the provision of assurances, i.e., the collection, analysis and synthesis of evidence that the system satisfies its stated functional and non-functional requirements during its operation in the presence of self-adaptation. The provision of assurances for self- adaptive systems is challenging since run-time changes introduce a high degree of uncertainty. This paper on research challenges complements previous roadmap papers on software engineering for self-adaptive systems covering a different set of topics, which are related to assurances, namely, perpetual assurances, composition and decomposition of assurances, and assurances obtained from control theory. This research challenges paper is one of the many results of the Dagstuhl Seminar 13511 on Software Engineering for Self-Adaptive Systems: Assurances which took place in December 2013."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:presentedAt ; bibo:status , ; dct:creator , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ; dct:date "2018-01-18"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Software Engineering for Self-Adaptive Systems: Research Challenges in the Provision of Assurances"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA76.76 Computer software"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "Software Engineering for Self-Adaptive Systems III: Assurances"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Dagstuhl Castle, Germany"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Mori"^^xsd:string; foaf:givenName "Marco"^^xsd:string; foaf:name "Marco Mori"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rubira"^^xsd:string; foaf:givenName "Cecília M. F."^^xsd:string; foaf:name "Cecília M. F. Rubira"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Schmerl"^^xsd:string; foaf:givenName "Bradley"^^xsd:string; foaf:name "Bradley Schmerl"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Müller"^^xsd:string; foaf:givenName "Hausi A."^^xsd:string; foaf:name "Hausi A. Müller"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Zambonelli"^^xsd:string; foaf:givenName "Franco"^^xsd:string; foaf:name "Franco Zambonelli"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tamburrelli"^^xsd:string; foaf:givenName "Giordano"^^xsd:string; foaf:name "Giordano Tamburrelli"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Brun"^^xsd:string; foaf:givenName "Yuriy"^^xsd:string; foaf:name "Yuriy Brun"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Cohen"^^xsd:string; foaf:givenName "Myra B."^^xsd:string; foaf:name "Myra B. Cohen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Camara"^^xsd:string; foaf:givenName "Javier"^^xsd:string; foaf:name "Javier Camara"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Garlan"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Garlan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grassi"^^xsd:string; foaf:givenName "Vincenzo"^^xsd:string; foaf:name "Vincenzo Grassi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Bencomo"^^xsd:string; foaf:givenName "Nelly"^^xsd:string; foaf:name "Nelly Bencomo"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Calinescu"^^xsd:string; foaf:givenName "Radu"^^xsd:string; foaf:name "Radu Calinescu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Andersson"^^xsd:string; foaf:givenName "Jesper"^^xsd:string; foaf:name "Jesper Andersson"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rutten"^^xsd:string; foaf:givenName "Eric"^^xsd:string; foaf:name "Eric Rutten"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Malek"^^xsd:string; foaf:givenName "Sam"^^xsd:string; foaf:name "Sam Malek"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Grunske"^^xsd:string; foaf:givenName "Lars"^^xsd:string; foaf:name "Lars Grunske"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Villegas"^^xsd:string; foaf:givenName "Norha M."^^xsd:string; foaf:name "Norha M. Villegas"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Litoiu"^^xsd:string; foaf:givenName "Marin"^^xsd:string; foaf:name "Marin Litoiu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rouvoy"^^xsd:string; foaf:givenName "Romain"^^xsd:string; foaf:name "Romain Rouvoy"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ghezzi"^^xsd:string; foaf:givenName "Carlo"^^xsd:string; foaf:name "Carlo Ghezzi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Garlan"^^xsd:string; foaf:givenName "D."^^xsd:string; foaf:name "D. Garlan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Tamura"^^xsd:string; foaf:givenName "Gabriel"^^xsd:string; foaf:name "Gabriel Tamura"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Giese"^^xsd:string; foaf:givenName "Holger"^^xsd:string; foaf:name "Holger Giese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jezequel"^^xsd:string; foaf:givenName "Jean-Marc"^^xsd:string; foaf:name "Jean-Marc Jezequel"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mirandola"^^xsd:string; foaf:givenName "Raffaela"^^xsd:string; foaf:name "Raffaela Mirandola"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Shaw"^^xsd:string; foaf:givenName "Mary"^^xsd:string; foaf:name "Mary Shaw"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Baresi"^^xsd:string; foaf:givenName "Luciano"^^xsd:string; foaf:name "Luciano Baresi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Inverardi"^^xsd:string; foaf:givenName "Paola"^^xsd:string; foaf:name "Paola Inverardi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Weyns"^^xsd:string; foaf:givenName "Danny"^^xsd:string; foaf:name "Danny Weyns"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gorla"^^xsd:string; foaf:givenName "Alessandra"^^xsd:string; foaf:name "Alessandra Gorla"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Giese"^^xsd:string; foaf:givenName "H."^^xsd:string; foaf:name "H. Giese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Vogel"^^xsd:string; foaf:givenName "Thomas"^^xsd:string; foaf:name "Thomas Vogel"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Lemos"^^xsd:string; foaf:givenName "Rogerio"^^xsd:string; foaf:name "Rogerio de Lemos"^^xsd:string; rdf:type foaf:Person . bibo:issn "03029743"; foaf:name "Lecture Notes in Computer Science"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #66330 \n\nFormal Proof of Polynomial-Time Complexity with Quasi-Interpretations\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Formal Proof of Polynomial-Time Complexity with Quasi-Interpretations (PDF)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Formal Proof of Polynomial-Time Complexity with Quasi-Interpretations (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Formal Proof of Polynomial-Time Complexity with Quasi-Interpretations (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Formal Proof of Polynomial-Time Complexity with Quasi-Interpretations (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Formal Proof of Polynomial-Time Complexity with Quasi-Interpretations (Other)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Formal Proof of Polynomial-Time Complexity with Quasi-Interpretations (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 ; rdf:_5 . bibo:abstract "We present a Coq library that allows for readily proving that a function is computable in polynomial time. It is based on quasi-interpretations that, in combination with termination ordering, provide a characterisation of the class FP of functions computable in polynomial time. At the heart of this formalisation is a proof of soundness and extensional completeness. Compared to the original paper proof, we had to fill a lot of not so trivial details that were left to the reader and fix a few glitches. To demonstrate the usability of our library, we apply it to the modular exponentiation."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , , , ; dct:date "2018-01-08"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Formal Proof of Polynomial-Time Complexity with Quasi-Interpretations"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA Mathematics (inc Computing science)"@en . dct:title "CPP 2018 - The 7th ACM SIGPLAN International Conference on Certified Programs and Proofs"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Los Angeles, USA"^^xsd:string . foaf:name "ACM"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Hym"^^xsd:string; foaf:givenName "Samuel"^^xsd:string; foaf:name "Samuel Hym"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Nowak"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Nowak"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Moyen"^^xsd:string; foaf:givenName "Jean-Yves"^^xsd:string; foaf:name "Jean-Yves Moyen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Mayero"^^xsd:string; foaf:givenName "Micaela"^^xsd:string; foaf:name "Micaela Mayero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Férée"^^xsd:string; foaf:givenName "Hugo"^^xsd:string; foaf:name "Hugo Férée"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #77176 \n\nOn Locky Ransomware, Al Capone and Brexit\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "On Locky Ransomware, Al Capone and Brexit (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "On Locky Ransomware, Al Capone and Brexit (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On Locky Ransomware, Al Capone and Brexit (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On Locky Ransomware, Al Capone and Brexit (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On Locky Ransomware, Al Capone and Brexit (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "On Locky Ransomware, Al Capone and Brexit (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "The highly crafted lines of code which constitute the Locky cryptolocker ransomware are there to see in plain text in an infected machine. Yet, this forensic evidence does not lead investigators to the identity of the extortionists nor to the destination of the ransom payments. Perpetrators of this ransomware remain unknown and unchallenged and so the ransomware cyber crimewave gathers pace. This paper examines what Locky is, how it works, and the mechanics of this malware to understand how ransom payments are made. The financial impact of Locky is found to be substantial. The paper describes methods for “following the money” to assess how effectively such a digital forensic trail can assist ransomware investigators. The legal instruments that are being established by the authorities as they attempt to shut down ransomware attacks and secure prosecutions are evaluated. The technical difficulty of following the money coupled with a lack of registration and disclosure legislation mean that investigators of this cybercrime are struggling to secure prosecutions and halt Locky."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2018-01-06"; dct:isPartOf ; dct:publisher ; dct:title "On Locky Ransomware, Al Capone and Brexit"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . dct:title "International Conference on Digital Forensics and Cyber Crime (ICDF2C 2017)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Prague, Czech Republic"^^xsd:string . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "MacRae"^^xsd:string; foaf:givenName "John"^^xsd:string; foaf:name "John MacRae"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Franqueira"^^xsd:string; foaf:givenName "Virginia N.L."^^xsd:string; foaf:name "Virginia N.L. Franqueira"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #90207 \n\nSelf-Organised direction aware data partitioning algorithm\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "In this paper, a novel fully data-driven algorithm, named Self-Organised Direction Aware (SODA) data partitioning and forming data clouds is proposed. The proposed SODA algorithm employs an extra cosine similarity-based directional component to work together with a traditional distance metric, thus, takes the advantages of both the spatial and angular divergences. Using the nonparametric Empirical Data Analytics (EDA) operators, the proposed algorithm automatically identifies the main modes of the data pattern from the empirically observed data samples and uses them as focal points to form data clouds. A streaming data processing extension of the SODA algorithm is also proposed. This extension of the SODA algorithm is able to self-adjust the data clouds structure and parameters to follow the possibly changing data patterns and processes. Numerical examples provided as a proof of the concept illustrate the proposed algorithm as an autonomous algorithm and demonstrate its high clustering performance and computational efficiency."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "423"; dct:creator , , , ; dct:date "2018-01-01"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Self-Organised direction aware data partitioning algorithm"^^xsd:string; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Kangin"^^xsd:string; foaf:givenName "Dmitry"^^xsd:string; foaf:name "Dmitry Kangin"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Principe"^^xsd:string; foaf:givenName "Jose"^^xsd:string; foaf:name "Jose Principe"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Angelov"^^xsd:string; foaf:givenName "Plamen"^^xsd:string; foaf:name "Plamen Angelov"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Gu"^^xsd:string; foaf:givenName "Xiaowei"^^xsd:string; foaf:name "Xiaowei Gu"^^xsd:string; rdf:type foaf:Person . bibo:issn "00200255"; foaf:name "Information Sciences"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #91355 \n\nBiometric authentication and data security in cloud computing\n\n"; foaf:primaryTopic . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "Two important topics related to the cloud security are discussed in this chapter: the authentication of logical users accessing the cloud, and the security of data stored on public cloud servers. A real cloud platform is used as example; it is designed and implemented to support basic web applications, and to be shared by small and medium companies. Such platform is built using the OpenStack architecture. The user authentication is based on an original biometric approach exploiting fingerprints and open to multimodal improvements. The platform guarantees secure access of multiple users and complete logical separation of computational and data resources, related to different companies. High level of protection of the data, stored in the cloud, is ensured by adopting a peculiar data fragmentation approach. Details are given about the authentication process and of the service modules involved in the biometric authentication. Furthermore are discussed the key issues, related to the integration of the biometric authentication, in the cloud platform."^^xsd:string; bibo:authorList ; bibo:status , ; dct:creator , , ; dct:date "2018-01-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Biometric authentication and data security in cloud computing"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Grosso"^^xsd:string; foaf:givenName "E."^^xsd:string; foaf:name "E. Grosso"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Ruiu"^^xsd:string; foaf:givenName "P."^^xsd:string; foaf:name "P. Ruiu"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Masala"^^xsd:string; foaf:givenName "G.L."^^xsd:string; foaf:name "G.L. Masala"^^xsd:string; rdf:type foaf:Person . foaf:name "Computer and Network Security Essentials"^^xsd:string; rdf:type bibo:Collection . rdfs:label "jlamp.pdf"^^xsd:string . rdfs:label "jlamp.pdf_nocoversheet"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67658 \n\nFormally verifying Exceptions for Low-level code with Separation Logic\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Formally verifying Exceptions for Low-level code with Separation Logic (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Formally verifying Exceptions for Low-level code with Separation Logic (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Formally verifying Exceptions for Low-level code with Separation Logic (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Formally verifying Exceptions for Low-level code with Separation Logic (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Formally verifying Exceptions for Low-level code with Separation Logic (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Formally verifying Exceptions for Low-level code with Separation Logic (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Exceptions in low-level architectures are implemented as synchronous interrupts: upon the execution of a faulty instruction the processor jumps to a piece of code that handles the error. Previous work has shown that assembly programs can be written, verified and run using higher-order separation logic. However, execution of faulty instructions is then specified as either being undefined or terminating with an error. In this paper, we study synchronous interrupts and show their usefulness by implementing a memory allocator. This shows that it is indeed possible to write positive specifications of programs that fault. All of our results are mechanised in the interactive proof assistant Coq."^^xsd:string; bibo:authorList ; bibo:status , ; bibo:volume "94"; dc:hasVersion ; dct:creator , ; dct:date "2018-01"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Formally verifying Exceptions for Low-level code with Separation Logic"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Elsevier"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Jesper"^^xsd:string; foaf:givenName "Bengtson"^^xsd:string; foaf:name "Bengtson Jesper"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Marco"^^xsd:string; foaf:givenName "Paviotti"^^xsd:string; foaf:name "Paviotti Marco"^^xsd:string; rdf:type foaf:Person . bibo:issn "23522208"; foaf:name "Journal of Logical and Algebraic Methods in Programming"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #65848 \n\nSoftware Engineering for Self-Adaptive Systems III. Assurances\n\n"; foaf:primaryTopic . rdf:_1 . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . , , , ; bibo:authorList ; bibo:editorList ; bibo:status , ; dct:creator ; dct:date "2018-01"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Software Engineering for Self-Adaptive Systems III. Assurances"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, ep:EPrint, ep:EdbookEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "Springer, Cham"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Ghezzi"^^xsd:string; foaf:givenName "Carlo"^^xsd:string; foaf:name "Carlo Ghezzi"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Giese"^^xsd:string; foaf:givenName "Holger"^^xsd:string; foaf:name "Holger Giese"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Garlan"^^xsd:string; foaf:givenName "David"^^xsd:string; foaf:name "David Garlan"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Lemos"^^xsd:string; foaf:givenName "Rogerio"^^xsd:string; foaf:name "Rogerio de Lemos"^^xsd:string; rdf:type foaf:Person . rdfs:label "sensors-18-03372.pdf"^^xsd:string . rdfs:label "sensors-18-03372.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #69864 \n\nDigital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 ; rdf:_4 . bibo:abstract "In the last few years, the world has witnessed a ground-breaking growth in the use of digital images and their applications in the modern society. In addition, image editing applications have downplayed the modification of digital photos and this compromises the authenticity and veracity of a digital image. These applications allow for tampering the content of the image without leaving visible traces. In addition to this, the easiness of distributing information through the Internet has caused society to accept everything it sees as true without questioning its integrity. This paper proposes a digital image authentication technique that combines the analysis of local texture patterns with the discrete wavelet transform and the discrete cosine transform to extract features from each of the blocks of an image. Subsequently, it uses a vector support machine to create a model that allows verification of the authenticity of the image. Experiments were performed with falsified images from public databases widely used in the literature that demonstrate the efficiency of the proposed method."^^xsd:string; bibo:authorList ; bibo:issue "10"; bibo:status , ; bibo:volume "18"; dc:hasVersion ; dct:creator , , , ; dct:date "2018"; dct:isPartOf , ; dct:publisher ; dct:subject , ; dct:title "Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . rdf:type skos:Concept; skos:prefLabel "T Technology"@en . foaf:name "MDPI"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "García Villalba"^^xsd:string; foaf:givenName "Luis"^^xsd:string; foaf:name "Luis García Villalba"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Armas Vega"^^xsd:string; foaf:givenName "Esteban"^^xsd:string; foaf:name "Esteban Armas Vega"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Sandoval Orozco"^^xsd:string; foaf:givenName "Ana"^^xsd:string; foaf:name "Ana Sandoval Orozco"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Hernandez-Castro"^^xsd:string; foaf:givenName "Julio C."^^xsd:string; foaf:name "Julio C. Hernandez-Castro"^^xsd:string; rdf:type foaf:Person . bibo:issn "14248220"; foaf:name "Sensors"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "1706.02206.pdf"^^xsd:string . rdfs:label "1706.02206.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #65961 \n\nThermodynamics of quasideterministic digital computers\n\n"; foaf:primaryTopic . dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Thermodynamics of quasideterministic digital computers (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Thermodynamics of quasideterministic digital computers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Thermodynamics of quasideterministic digital computers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Thermodynamics of quasideterministic digital computers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Thermodynamics of quasideterministic digital computers (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Thermodynamics of quasideterministic digital computers (Other)"^^xsd:string . rdf:_1 . bibo:abstract "A central result of stochastic thermodynamics is that irreversible state transitions of Markovian systems entail a cost in terms of an infinite entropy production. A corollary of this is that strictly deterministic computation is not possible. Using a thermodynamically consistent model, we show that quasideterministic computation can be achieved at finite, and indeed modest cost with accuracies that are indistinguishable from deterministic behavior for all practical purposes. Concretely, we consider the entropy production of stochastic (Markovian) systems that behave like and and a not gates. Combinations of these gates can implement any logical function. We require that these gates return the correct result with a probability that is very close to 1, and additionally, that they do so within finite time. The central component of the model is a machine that can read and write binary tapes. We find that the error probability of the computation of these gates falls with the power of the system size, whereas the cost only increases linearly with the system size."^^xsd:string; bibo:authorList ; bibo:issue "2"; bibo:status , ; bibo:volume "97"; dc:hasVersion ; dct:creator ; dct:date "2018"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Thermodynamics of quasideterministic digital computers"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ArticleEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q Science"@en . foaf:name "American Physical Society"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Chu"^^xsd:string; foaf:givenName "Dominique"^^xsd:string; foaf:name "Dominique Chu"^^xsd:string; rdf:type foaf:Person . bibo:issn "1063651X"; foaf:name "Physical Review E: Statistical, Nonlinear, and Soft Matter Physics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "cyclicTC-CSL.pdf"^^xsd:string . rdfs:label "cyclicTC-CSL.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #67460 \n\nUniform Inductive Reasoning in Transitive Closure Logic via Infinite Descent\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Uniform Inductive Reasoning in Transitive Closure Logic via Infinite Descent (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Uniform Inductive Reasoning in Transitive Closure Logic via Infinite Descent (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Uniform Inductive Reasoning in Transitive Closure Logic via Infinite Descent (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Uniform Inductive Reasoning in Transitive Closure Logic via Infinite Descent (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Uniform Inductive Reasoning in Transitive Closure Logic via Infinite Descent (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Uniform Inductive Reasoning in Transitive Closure Logic via Infinite Descent (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Transitive closure logic is a known extension of first-order logic obtained by introducing a\r\ntransitive closure operator. While other extensions of first-order logic with inductive definitions\r\nare a priori parametrized by a set of inductive definitions, the addition of the transitive closure\r\noperator uniformly captures all finitary inductive definitions. In this paper we present an\r\ninfinitary proof system for transitive closure logic which is an infinite descent-style counterpart\r\nto the existing (explicit induction) proof system for the logic. We show that, as for similar\r\nsystems for first-order logic with inductive definitions, our infinitary system is complete for the\r\nstandard semantics and subsumes the explicit system. Moreover, the uniformity of the transitive\r\nclosure operator allows semantically meaningful complete restrictions to be defined using simple\r\nsyntactic criteria. Consequently, the restriction to regular infinitary (i.e. cyclic) proofs provides\r\nthe basis for an effective system for automating inductive reasoning."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , ; dct:date "2018"; dct:isPartOf , ; dct:publisher ; dct:subject ; dct:title "Uniform Inductive Reasoning in Transitive Closure Logic via Infinite Descent"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . dct:title "27th EACSL Annual Conference on Computer Science Logic, CSL 2018"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "Birmingham, UK"^^xsd:string . foaf:name "LIPICS"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Cohen"^^xsd:string; foaf:givenName "Liron"^^xsd:string; foaf:name "Liron Cohen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rowe"^^xsd:string; foaf:givenName "Reuben"^^xsd:string; foaf:name "Reuben Rowe"^^xsd:string; rdf:type foaf:Person . bibo:issn "18688969"; foaf:name "Leibniz International Proceedings in Informatics"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . rdfs:label "cyclic_tc-TR.pdf"^^xsd:string . rdfs:label "cyclic_tc-TR.pdf_nocoversheet"^^xsd:string . rdfs:label "indexcodes.txt"^^xsd:string . rdfs:label "lightbox.jpg"^^xsd:string . rdfs:label "preview.jpg"^^xsd:string . rdfs:label "medium.jpg"^^xsd:string . rdfs:label "small.jpg"^^xsd:string . dc:format "text/html"; dc:title "HTML Summary of #65886 \n\nInfinitary and Cyclic Proof Systems for Transitive Closure Logic\n\n"; foaf:primaryTopic . cc:license ; dct:hasPart , ; ep:hasFile , ; rdf:type bibo:Document, ep:Document; rdfs:label "Infinitary and Cyclic Proof Systems for Transitive Closure Logic (PDF)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Infinitary and Cyclic Proof Systems for Transitive Closure Logic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Infinitary and Cyclic Proof Systems for Transitive Closure Logic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Infinitary and Cyclic Proof Systems for Transitive Closure Logic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Infinitary and Cyclic Proof Systems for Transitive Closure Logic (Other)"^^xsd:string . dct:hasPart ; ep:hasFile ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Infinitary and Cyclic Proof Systems for Transitive Closure Logic (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . bibo:abstract "Transitive closure logic is a known extension of first-order logic obtained by introducing a transitive closure operator. While other extensions of first-order logic with inductive definitions are a priori parametrized by a set of inductive definitions, the addition of the transitive closure operator uniformly captures all finitary inductive definitions. In this paper we present an infinitary proof system for transitive closure logic which is an infinite descent-style counterpart to the existing (explicit induction) proof system for the logic. We show that, as for similar systems for first-order logic with inductive definitions, our infinitary system is complete for the standard semantics and subsumes the explicit system. Moreover, the uniformity of the transitive closure operator allows semantically meaningful complete restrictions to be defined using simple syntactic criteria. Consequently, the restriction to regular infinitary (i.e. cyclic) proofs provides the basis for an effective system for automating inductive reasoning."^^xsd:string; bibo:authorList ; bibo:status ; dct:creator , ; dct:date "2018"; dct:isPartOf ; dct:publisher ; dct:subject ; dct:title "Infinitary and Cyclic Proof Systems for Transitive Closure Logic"^^xsd:string; ep:hasDocument , , , , , ; rdf:type bibo:Article, bibo:Manuscript, ep:EPrint, ep:MonographEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "QA 9 Formal systems, logics"@en . foaf:name "arXiv"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Cohen"^^xsd:string; foaf:givenName "Liron"^^xsd:string; foaf:name "Liron Cohen"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Rowe"^^xsd:string; foaf:givenName "Reuben N. S."^^xsd:string; foaf:name "Reuben N. S. Rowe"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #69708 \n\nUnix, Plan 9 and the Lurking Smalltalk\n\n"; foaf:primaryTopic . rdf:_1 . rdf:_1 ; rdf:_2 . , ; bibo:authorList ; bibo:editorList ; bibo:status , ; dct:creator ; dct:date "2018"; dct:isPartOf ; dct:publisher ; dct:title "Unix, Plan 9 and the Lurking Smalltalk"^^xsd:string; owl:sameAs ; rdf:type bibo:Article, bibo:BookSection, ep:BookSectionEPrint, ep:EPrint; rdfs:seeAlso . foaf:name "Springer"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Primiero"^^xsd:string; foaf:givenName "Giuseppe"^^xsd:string; foaf:name "Giuseppe Primiero"^^xsd:string; rdf:type foaf:Person . foaf:familyName "de Mol"^^xsd:string; foaf:givenName "Liesbeth"^^xsd:string; foaf:name "Liesbeth de Mol"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Kell"^^xsd:string; foaf:givenName "Stephen"^^xsd:string; foaf:name "Stephen Kell"^^xsd:string; rdf:type foaf:Person . dc:format "text/html"; dc:title "HTML Summary of #64189 \n\nReport on the Eighth International Conference on Computational Creativity\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Report on the Eighth International Conference on Computational Creativity (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Report on the Eighth International Conference on Computational Creativity (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Report on the Eighth International Conference on Computational Creativity (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Report on the Eighth International Conference on Computational Creativity (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Report on the Eighth International Conference on Computational Creativity (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Report on the Eighth International Conference on Computational Creativity (Other)"^^xsd:string . rdf:_1 ; rdf:_2 . rdf:_1 . ; bibo:abstract "The Eighth International Conference on Computational Creativity (ICCC’17)1 was hosted at the Georgia Institute of Technology in Atlanta, Georgia, USA from June 19th - June 23rd, 2017. The ICCC’17 organising committee consisted of Ashok Goel (General Chair), Kazjon Grace (Workshop Co-chair), Matthew Guzdial (Media Chair), Mikhail Jacob (Local Chair), Anna Jordanous (Program Co-chair), Ruli Manurung (Workshop Co-chair) and Alison Pease (Program Co-chair). This report summarises the main topics addressed."^^xsd:string; bibo:authorList ; bibo:editorList ; bibo:issue "1"; bibo:status , ; bibo:volume "39"; dc:hasVersion ; dct:creator , ; dct:date "2018"; dct:isPartOf , ; dct:publisher ; dct:subject , , ; dct:title "Report on the Eighth International Conference on Computational Creativity"^^xsd:string; ep:hasAccepted ; ep:hasDocument , , , , , ; rdf:type bibo:Article, ep:EPrint, ep:ReviewEPrint; rdfs:seeAlso . rdf:type skos:Concept; skos:prefLabel "Q335 Artificial intelligence"@en . rdf:type skos:Concept; skos:prefLabel "QA 75 Electronic computers. Computer science"@en . rdf:type skos:Concept; skos:prefLabel "QA 76 Software, computer programming,"@en . foaf:name "AAAI"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Pease"^^xsd:string; foaf:givenName "Alison"^^xsd:string; foaf:name "Alison Pease"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Jordanous"^^xsd:string; foaf:givenName "Anna"^^xsd:string; foaf:name "Anna Jordanous"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Goel"^^xsd:string; foaf:givenName "Ashok"^^xsd:string; foaf:name "Ashok Goel"^^xsd:string; rdf:type foaf:Person . bibo:issn "07384602"; foaf:name "AI Magazine"^^xsd:string; owl:sameAs ; rdf:type bibo:Collection . dc:format "text/html"; dc:title "HTML Summary of #73946 \n\nNon-Traditional Novices’ Perceptions of Learning to Program: A Framework of Developing Mental Models\n\n"; foaf:primaryTopic . rdf:type bibo:Document, ep:Document; rdfs:label "Non-Traditional Novices’ Perceptions of Learning to Program: A Framework of Developing Mental Models (PDF)"^^xsd:string . eprel:isIndexCodesVersionOf ; eprel:isVersionOf ; eprel:isVolatileVersionOf ; rdf:type ep:Document; rdfs:label "Non-Traditional Novices’ Perceptions of Learning to Program: A Framework of Developing Mental Models (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:islightboxThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Non-Traditional Novices’ Perceptions of Learning to Program: A Framework of Developing Mental Models (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ispreviewThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Non-Traditional Novices’ Perceptions of Learning to Program: A Framework of Developing Mental Models (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:ismediumThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Non-Traditional Novices’ Perceptions of Learning to Program: A Framework of Developing Mental Models (Other)"^^xsd:string . eprel:isVersionOf ; eprel:isVolatileVersionOf ; eprel:issmallThumbnailVersionOf ; rdf:type ep:Document; rdfs:label "Non-Traditional Novices’ Perceptions of Learning to Program: A Framework of Developing Mental Models (Other)"^^xsd:string . rdf:_1 ; rdf:_2 ; rdf:_3 . bibo:abstract "In this research full paper, we present a study of a cohort of non-traditional students learning to program as part of an intercalated computer science year named Year in Computing at University of Kent, Canterbury in the UK. The study uses focus group interviews with students to explore their articulations and perceptions of learning to program. During the interviews, we used Bebras puzzles as a tool for students to reflect on their own experiences in learning to program. By observing the students working with the puzzle, some of the tacit information of problem-solving strategies became apparent. We see Bebras puzzles as a way to gain valuable insights that are not as easily available when relying on conventional self-reflection in a qualitative study. Another contribution grounded in this study is the proposal of a framework describing the students' developing mental models in the beginning of their studies. The results presented here are a first iteration in an ongoing endeavour of exploring students' development of mental models. We hope that these contributions will provide teachers and researchers with a new perspective for developing introductory programming curricula and to engage in further development of our framework."^^xsd:string; bibo:authorList ; bibo:presentedAt ; bibo:status , ; dc:hasVersion ; dct:creator , , ; dct:date "2018"; dct:isPartOf ; dct:publisher ; dct:title "Non-Traditional Novices’ Perceptions of Learning to Program: A Framework of Developing Mental Models"^^xsd:string; ep:hasDocument , , , , , ; ep:hasPublished ; owl:sameAs ; rdf:type bibo:AcademicArticle, bibo:Article, ep:ConferenceItemEPrint, ep:EPrint; rdfs:seeAlso . dct:title "IEEE Frontiers in Education Conference (FIE)"^^xsd:string; event:place ; rdf:type bibo:Conference, event:Event . rdf:type geo:SpatialThing; rdfs:label "San Jose, CA, USA"^^xsd:string . foaf:name "IEEE"^^xsd:string; rdf:type foaf:Organization . foaf:familyName "Spangsberg"^^xsd:string; foaf:givenName "Thomas Hvid"^^xsd:string; foaf:name "Thomas Hvid Spangsberg"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Fincher"^^xsd:string; foaf:givenName "Sally"^^xsd:string; foaf:name "Sally Fincher"^^xsd:string; rdf:type foaf:Person . foaf:familyName "Dziallas"^^xsd:string; foaf:givenName "Sebastian"^^xsd:string; foaf:name "Sebastian Dziallas"^^xsd:string; rdf:type foaf:Person .