Search Results

1 - 10 of 57 items :

  • "temporality" x
  • Computer Sciences, other x
Clear All
Estimating the maximum rise in temperature according to climate models using abstract interpretation

[10] L. Li, P. Z. Revesz, Interpolation methods for spatio-temporal geographic data, Computers, Environment and Urban Systems , 28, 3 (2004) 201–227. ⇒22 [11] B. Matthews, Java Climate Model , 2011. [Online]. Available: ⇒13 [12] S. C. B. Raper, J. M. Gregory, T. J. Osborn, Use of an upwelling-diffusion energy balance climate model to simulate and diagnose A/OGCM results, Climate Dynamics , 17 (2001) 601–613. ⇒12 [13] P. Z. Revesz, A closed form evaluation for Datalog queries with integer (gap

Open access
Connecting the Dataset to LyricWiki and MusicBrainz. Lyrics-based experiments in genre classification

. Klapuri and C. Leider, editors, ISMIR , pages 591–596. University of Miami, 2011. ⇒159, 160 [4] M. Besson, F. Faita, I. Peretz, A.-M. Bonnel, and J. Requin. Singing in the brain: Independence of lyrics and tunes. Psychological Science , 9(6):494–498, 1998. ⇒160, 169 [5] C. M. Bishop. Pattern recognition and machine learning. Springer, 2006. ⇒174 [6] M. J. T. Carneiro. Towards the discovery of temporal patterns in music listening using profiles. Master’s thesis, Faculdade de Engenharia da Universidade do Porto, 2011. ⇒170 [7] O. Chapelle

Open access
Monocular indoor localization techniques for smartphones

Robotics: Science and Systems Conference, Sydney, NSW, Australia, 2012, pp. 504-509. ⇒209 [30] M. Li, A. I. Mourikis, 3-d motion estimation and online temporal calibration for camera-imu systems, Proc. of IEEE International Conference on Robotics and Automation (ICRA'13), Karlsruhe, Germany, 2013, pp. 5709-5716. ⇒208 [31] M. Li, A. I. Mourikis, High-precision, consistent ekf-based visual-inertial odometry, International Journal of Robotics Research 32, 6 (2013) 690-711. ⇒208 [32] M. Li, H. Yu, X. Zheng, A. I. Mourikis, High

Open access
Tempest: Temporal Dynamics in Anonymity Systems


Many recent proposals for anonymous communication omit from their security analyses a consideration of the effects of time on important system components. In practice, many components of anonymity systems, such as the client location and network structure, exhibit changes and patterns over time. In this paper, we focus on the effect of such temporal dynamics on the security of anonymity networks. We present Tempest, a suite of novel attacks based on (1) client mobility, (2) usage patterns, and (3) changes in the underlying network routing. Using experimental analysis on real-world datasets, we demonstrate that these temporal attacks degrade user privacy across a wide range of anonymity networks, including deployed systems such as Tor; pathselection protocols for Tor such as DeNASA, TAPS, and Counter-RAPTOR; and network-layer anonymity protocols for Internet routing such as Dovetail and HORNET. The degradation is in some cases surprisingly severe. For example, a single host failure or network route change could quickly and with high certainty identify the client’s ISP to a malicious host or ISP. The adversary behind each attack is relatively weak – generally passive and in control of one network location or a small number of hosts. Our findings suggest that designers of anonymity systems should rigorously consider the impact of temporal dynamics when analyzing anonymity.

Open access
Data Mining in Elite Beach Volleyball – Detecting Tactical Patterns Using Market Basket Analysis

. Baesens, B., Viaene, S., & Vanthienen, J. (2000) Post-processing of association rules. At The Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'2000). 20 - 23 Aug 2000. Bermingham, L., & Lee, I. (2014). Spatio-temporal sequential pattern mining for tourism sciences. Procedia Computer Science , 29, 379-389. Bhandari, I., Colet, E., Parker, J., Pines, Z., Pratap, R., & Ramanujam, K. K. (1997). Advanced scout: Data mining and knowledge discovery in NBA data. Data Mining and Knowledge Discovery , 1 (1), 121

Open access
SoC as IoT sensor network hub

, R. Culmone, L. Mostarda, “Modeling temporal aspects of sensor data for MongoDB NoSQL database”, J. Big Data, 2017, pp. 4:8 [5] L. Atzori, A. Iera, G. Morabito, “The Internet of Things: A Survey”, Computer Networks, vol. 54, no. 15, pp. 2787-2805, Oct., 2010. N.Q. Mehmood, R. Culmone, L. Mostarda, “Modeling temporal aspects of sensor data for MongoDB NoSQL database”, J. Big Data, 2017, pp. 4:8 [6] M. Roopaei, P. Rad and K. R. Choo, “Cloud of Things in Smart Agriculture: Intelligent Irrigation Monitoring by Thermal Imaging,” in IEEE Cloud Computing, vol

Open access
An Influence Prediction Model for Microblog Entries on Public Health Emergencies

belongs to the medical industry, and temporal features include period of time, day of the week, whether the publishing date is an official holiday, and the development stage of epidemics. As the topical features are seldom investigated in similar studies, content features are also considered and represented by the topics involved in microblog entries. First, in the category of publishers’ features, the publisher’s type is determined by the certification information and the name of the publisher. According to the Sina Weibo’s certification system, all of the certified

Open access
What Motives Users to Participate in Danmu on Live Streaming Platforms? The Impact of Technical Environment and Effectance

the time of Danmu comments sent by users is actually different ( Johnson, 2013 ). Pseudo-proximity captures the space dimension and has been further classified into spatial proximity and temporal proximity ( Fan et al. 2018 ). Spatial proximity refers to the physical closeness between the Danmu comment area and the focal area of the video section, whereas temporal proximity refers to the temporal closeness between the Danmu and the video ( Fan et al., 2018 ). Comment-content congruency reflects the support dimension and refers to the consistency between the content

Open access
Investigating Weak Supervision in Deep Ranking

( Dupret & Piwowarski, 2008 ). Furthermore, Wang et al. (2015) looked into the revisiting behaviors of users in SERPs and incorporated non-sequential behaviors into the PSCM. Liu et al. (2017) proposed the time-aware click model (TACM), which can better capture the temporal information. 2.2 Document Ranking A lot of learning-to-rank approaches have been proposed to address document ranking problem, such as RankNet ( Burges et al., 2005 ), RankBoost ( Freund et al., 2003 ), and LambdaMART (Wu, Burges, Svore, & Gao, 2010). All these learning-to-rank algorithms

Open access
Filtering and Classifying Relevant Short Text with a Few Seed Words

Research and Development in Information Retrieval 595 602 10.1145/1390334.1390436 Efron, M., Lin, J. J., He, J., & de Vries, A. P. (2014). Temporal feedback for tweet search with non-parametric density estimation. International Conference on Research and Development in Information Retrieval , 33–42. Efron M. Lin J. J. He J. de Vries A. P. 2014 Temporal feedback for tweet search with non-parametric density estimation International Conference on Research and Development in Information Retrieval 33 42 Ghosh, S., & Desarkar, M. S. (2018). Class specific TF-IDF boosting

Open access