A General-Purpose Mechanism of Visual Feature Association at the Core of Word Learning

2020 ◽  
Author(s):  
Yamil Vidal ◽  
Eva Viviani ◽  
Davide Zoccolan ◽  
Davide Crepaldi
Author(s):  
Alex Ng ◽  
Shiping Chen

Performance testing is one of the vital activities spanning the whole life cycle of software engineering. As a result, there are a considerable number of performance testing products and open source tools available. It has been observed that most of the existing performance testing products and tools are either too expensive and complicated for small projects, or too specific and simple for diverse performance tests. In this chapter, we will present an overview of existing performance test products/tools, provide a summary of some of the contemporary system performance testing frameworks, and capture the key requirements for a general-purpose performance testing framework. Based on our previous works, we propose a system performance testing framework which is suitable for both simple and small, as well as complicated and large-scale performance testing projects. The core of our framework contains an abstraction to facilitate performance testing by separating the application logic from the common performance testing functionality, and a set of general-purpose data model.


Information ◽  
2020 ◽  
Vol 11 (4) ◽  
pp. 193 ◽  
Author(s):  
Sebastian Raschka ◽  
Joshua Patterson ◽  
Corey Nolet

Smarter applications are making better use of the insights gleaned from data, having an impact on every industry and research discipline. At the core of this revolution lies the tools and the methods that are driving it, from processing the massive piles of data generated each day to learning from and taking useful action. Deep neural networks, along with advancements in classical machine learning and scalable general-purpose graphics processing unit (GPU) computing, have become critical components of artificial intelligence, enabling many of these astounding breakthroughs and lowering the barrier to adoption. Python continues to be the most preferred language for scientific computing, data science, and machine learning, boosting both performance and productivity by enabling the use of low-level libraries and clean high-level APIs. This survey offers insight into the field of machine learning with Python, taking a tour through important topics to identify some of the core hardware and software paradigms that have enabled it. We cover widely-used libraries and concepts, collected together for holistic comparison, with the goal of educating the reader and driving the field of Python machine learning forward.


Author(s):  
Pierangelo Masarati ◽  
Marco Morandini ◽  
Paolo Mantegazza

This paper presents a formulation for the efficient solution of general-purpose multibody/multiphysics problems. The core equations and details on structural dynamics and finite rotations handling are presented. The solution phases are illustrated. Highlights of the implementation are presented, and special features are discussed.


Author(s):  
Aurélien Francillon ◽  
Sam L. Thomas ◽  
Andrei Costin

AbstractThe goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapter discusses how software vulnerabilities can be identified, at different stages of the software life-cycle, for example during development, during integration of the different components, during testing, during the deployment of the device, or in the field by third parties.


Author(s):  
Alex Ng ◽  
Shiping Chen

Performance testing is one of the vital activities spanning the whole life cycle of software engineering. As a result, there are a considerable number of performance testing products and open source tools available. It has been observed that most of the existing performance testing products and tools are either too expensive and complicated for small projects or too specific and simple for diverse performance tests. In this chapter, the authors present an overview of existing performance test products/tools, provide a summary of some of the contemporary system performance testing frameworks, and capture the key requirements for a general-purpose performance testing framework. Based on previous works, the authors propose a system performance testing framework that is suitable for both simple and small as well as complicated and large-scale performance testing projects. The core of the framework contains an abstraction to facilitate performance testing by separating the application logic from the common performance testing functionality and a general-purpose data model.


Africa ◽  
1973 ◽  
Vol 43 (1) ◽  
pp. 27-40 ◽  
Author(s):  
Humphrey J. Fisher

Opening ParagraphThis paper had its genesis in the recent thoughtful and stimulating article by Robin Horton, on African conversion; the core of his argument is summarized below. Horton's evidence is chiefly drawn from Christian African experience, though he seeks to generalize from it for both Islam and Christianity. My specific purpose here is to look more closely at the phenomenon of Muslim conversion, and to see what light this may throw on Horton's argument. In particular, he has, I think, over-estimated the survival, admittedly in considerably developed forms, of original African elements of religion; and more important, has under-estimated the willingness and ability of Africans to make even rigorous Islam and Christianity their own. My other, general, purpose is to suggest that such Muslim/Christian comparisons may considerably enlarge our perspectives upon black Africa. The comparative approach is extended further, I hope not rashly, with brief considerations of conversion in the ancient world, and of the effects of literacy.


Author(s):  
Simon Rey ◽  
Ulle Endriss ◽  
Ronald de Haan

We introduce a new approach for designing rules for participatory budgeting, the problem of deciding on the use of public funds based directly on the views expressed by the citizens concerned. The core idea is to embed instances of the participatory budgeting problem into judgment aggregation, a powerful general-purpose framework for modelling collective decision making. Taking advantage of the possibilities offered by judgment aggregation, we enrich the familiar setting of participatory budgeting with additional constraints, namely dependencies between projects and quotas regarding different types of projects. We analyse the rules obtained both in algorithmic and in axiomatic terms.


Author(s):  
Nikhilesh Dholakia ◽  
Morten Rask

M-commerce entails transactions conducted via mobile telecommunications networks using communication, information, and payment devices such as mobile phones or palmtop units. Geographic positioning and location capabilities are also being added to such networks and devices. Rather than using general-purpose browsers, customers accessing mobile commerce applications often rely on specific mobile portals, or m-portals. These m-portals could be specific to the device that the user has, to the communications infrastructure provider, to the financial infrastructure provider, or to other service aggregators who act as gateways to a variety of mobile services. As the experience of the iMode platform of NTT DoCoMo has already shown, the ability to connect end customers and service providers through an m-portal is a key element for the success of m-commerce. To be commercially viable, such m-portals must attract and retain customers. Success in mobile portal markets will depend on dynamic strategies that blend elements of personalization, permission, and specification of content. This chapter reviews the key differences between traditional e-commerce and the emergent m-commerce. It reviews the core concepts of personalization, permission, and content specification as they apply to e-commerce and m-commerce. The chapter presents a framework for developing effective business strategies for developing and managing mobile portals.


2021 ◽  
Vol 2 (3) ◽  
pp. 1-22
Author(s):  
Leigh Metcalf ◽  
Jonathan M. Spring

Malware authors use domain generation algorithms to establish more reliable communication methods that can avoid reactive defender blocklisting techniques. Network defense has sought to supplement blocklists with methods for detecting machine-generated domains. We present a repeatable evaluation and comparison of the available open source detection methods. We designed our evaluation with multiple interrelated aspects, to improve both interpretability and realism. In addition to evaluating detection methods, we assess the impact of the domain generation ecosystem on prior results about the nature of blocklists and how they are maintained. The results of the evaluation of open source detection methods finds all methods are inadequate for practical use. The results of the blocklist impact study finds that generated domains decrease the overlap among blocklists; however, while the effect is large in relative terms, the baseline is so small that the core conclusions of the prior work are sustained. Namely, that blocklist construction is very targeted, context-specific, and as a result blocklists do no overlap much. We recommend that Domain Generation Algorithm detection should also be similarly narrowly targeted to specific algorithms and specific malware families, rather than attempting to create general-purpose detection for machine-generated domains.


Sign in / Sign up

Export Citation Format

Share Document