Loading...
Search for: information-services
0.01 seconds
Total 32 records

    Memory effects in spin-chain channels for information transmission

    , Article Physical Review A - Atomic, Molecular, and Optical Physics ; Volume 77, Issue 5 , 2008 ; 10502947 (ISSN) Bayat, A ; Burgarth, D ; Mancini, S ; Bose, S ; Sharif University of Technology
    2008
    Abstract
    We investigate the multiple use of a ferromagnetic spin chain for quantum and classical communications without resetting. We find that the memory of the state transmitted during the first use makes the spin chain a qualitatively different quantum channel during the second transmission, for which we find the relevant Kraus operators. We propose a parameter to quantify the amount of memory in the channel and find that it influences the quality of the channel, as reflected through fidelity and entanglement transmissible during the second use. For certain evolution times, the memory allows the channel to exceed the memoryless classical capacity (achieved by separable inputs) and in some cases it... 

    Evaluation of test collection construction methods: A case study

    , Article 2008 International Conference on Information and Knowledge Engineering, IKE 2008, Las Vegas, NV, 14 July 2008 through 17 July 2008 ; January , 2008 , Pages 16-22 ; 1601320752 (ISBN); 9781601320759 (ISBN) Sheykh Esmaili, K ; Hosseini, M ; Rostami, A ; Abolhassani, H ; Sharif University of Technology
    2008
    Abstract
    Currently there is no standard test collection for evaluation of Farsi information retrieval systems. In this paper we introduce Mahak, the first complete test collection generally available for evaluating Farsi information retrieval systems. In addition, we have used different methods for constructing Mahak qrels and we have compared performance of these methods  

    A geographical question answering system

    , Article 3rd International Conference on Web Information Systems and Technologies, Webist 2007, Barcelona, 3 March 2007 through 6 March 2007 ; Volume WIA , 2007 , Pages 308-314 Behrangi, E ; Ghasemzadeh, H ; Sheykh Esmaili, K ; Minaei Bidgoli, B ; Sharif University of Technology
    2007
    Abstract
    Question Answering systems are one of the hot topics in context of information retrieval. In this paper, we develop an open-domain Question Answering system for spatial queries. We use Google for gathering raw data from the Web and then in a few iterations density of potential answers will be increased, finally based on a couple of evaluators the best answers are selected to be returned to user. Our proposed algorithm uses fuzzy methods to be more precise. Some experiments have been designed in order to evaluate the performance of our algorithm and results are totally promising. We will describe that how this algorithm can be applied to other type of questions as well  

    DNE: A method for extracting cascaded diffusion networks from social networks

    , Article Proceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011, 9 October 2011 through 11 October 2011 ; October , 2011 , Pages 41-48 ; 9780769545783 (ISBN) Eslami, M ; Rabiee, H. R ; Salehi, M ; Sharif University of Technology
    2011
    Abstract
    The spread of information cascades over social networks forms the diffusion networks. The latent structure of diffusion networks makes the problem of extracting diffusion links difficult. As observing the sources of information is not usually possible, the only available prior knowledge is the infection times of individuals. We confront these challenges by proposing a new method called DNE to extract the diffusion networks by using the time-series data. We model the diffusion process on information networks as a Markov random walk process and develop an algorithm to discover the most probable diffusion links. We validate our model on both synthetic and real data and show the low dependency... 

    Towards a self-adaptive service-oriented methodology based on extended SOMA

    , Article Journal of Zhejiang University: Science C ; Volume 16, Issue 1 , 2015 , Pages 43-69 ; 18691951 (ISSN) Parvizi Mosaed, A ; Moaven, S ; Habibi, J ; Beigi, G ; Naser Shariat, M ; Sharif University of Technology
    Abstract
    We propose a self-adaptive process (SAP) that maintains the software architecture quality using the MAPE-K standard model. The proposed process can be plugged into various software development processes and service-oriented methodologies due to its explicitly defined inputs and outputs. To this aim, the proposed SAP is integrated with the service-oriented modeling and application (SOMA) methodology in a two-layered structure to create a novel methodology, named self-adaptive service-oriented architecture methodology (SASOAM), which provides a semi-automatic self-aware method by the composition of architectural tactics. Moreover, the maintenance activity of SOMA is improved using... 

    Towards a self-adaptive service-oriented methodology based on extended SOMA

    , Article Frontiers of Information Technology and Electronic Engineering ; Volume 16, Issue 1 , 2015 , Pages 43-69 ; 20959184 (ISSN) Parvizi Mosaed, A ; Moaven, S ; Habibi, J ; Beigi, G ; Naser Shariat, M ; Sharif University of Technology
    Abstract
    We propose a self-adaptive process (SAP) that maintains the software architecture quality using the MAPE-K standard model. The proposed process can be plugged into various software development processes and service-oriented methodologies due to its explicitly defined inputs and outputs. To this aim, the proposed SAP is integrated with the service-oriented modeling and application (SOMA) methodology in a two-layered structure to create a novel methodology, named self-adaptive service-oriented architecture methodology (SASOAM), which provides a semi-automatic self-aware method by the composition of architectural tactics. Moreover, the maintenance activity of SOMA is improved using... 

    Inferring dynamic diffusion networks in online media

    , Article ACM Transactions on Knowledge Discovery from Data ; Volume 10, Issue 4 , 2016 ; 15564681 (ISSN) Tahani, M ; Hemmatyar, A. M. A ; Rabiee, H. R ; Ramezani, M ; Sharif University of Technology
    Association for Computing Machinery 
    Abstract
    Online media play an important role in information societies by providing a convenient infrastructure for different processes. Information diffusion that is a fundamental process taking place on social and information networks has been investigated in many studies. Research on information diffusion in these networks faces two main challenges: (1) In most cases, diffusion takes place on an underlying network, which is latent and its structure is unknown. (2) This latent network is not fixed and changes over time. In this article, we investigate the diffusion network extraction (DNE) problem when the underlying network is dynamic and latent. We model the diffusion behavior (existence... 

    On the uniform sampling of the web: An improvement on bucket based sampling

    , Article 2009 International Conference on Communication Software and Networks, ICCSN 2009, Macau, 27 February 2009 through 28 February 2009 ; 2009 , Pages 205-209 ; 9780769535227 (ISBN) Heidari, S ; Mousavi, H ; Movaghar, A ; Sharif University of Technology
    2009
    Abstract
    Web is one of the biggest sources of information. The tremendous size, the dynamicity, and the structure of the Web have made the information retrieval process of the web a challenging issue. Web Search Engines (WSEs) have started to help users with this matter. However, these types of application, to perform more effectively, always need current information about many characteristics of the Web. To determine these characteristics, one way is to use statistical sampling of the Web pages. In this kind of approaches, instead of analyzing a large number of Web pages, a rather smaller and more uniform set of Web pages is used. This research attempts to analyze the presented methods for... 

    A novel cloud manufacturing service composition platform enabled by Blockchain technology

    , Article International Journal of Production Research ; Volume 58, Issue 17 , 2020 , Pages 5280-5298 Aghamohammadzadeh, E ; Fatahi Valilai, O ; Sharif University of Technology
    Taylor and Francis Ltd  2020
    Abstract
    In the near future, manufacturing industries will be mostly recognised with characteristics like IoT, and massive data transactions. To fulfil these characteristics, paradigms like Cloud manufacturing, Industry 4.0 and smart factory have passed their preliminary steps to become the primary inspirations. Considering the nature of Cloud manufacturing which consists of a vast number of service providers and Service demanders being introduced to the manufacturing cloud, service composition problem is introduced. However, there is a big challenge for fulfilling the dynamic behaviour of parameters which change rapidly over time in the service composition problem. This paper challenges the... 

    Deep Private-feature extraction

    , Article IEEE Transactions on Knowledge and Data Engineering ; Volume 32, Issue 1 , 2020 , Pages 54-66 Osia, S. A ; Taheri, A ; Shamsabadi, A. S ; Katevas, K ; Haddadi, H ; Rabiee, H. R ; Sharif University of Technology
    IEEE Computer Society  2020
    Abstract
    We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is trained and evaluated based on information theoretic constraints. Using the selective exchange of information between a user's device and a service provider, DPFE enables the user to prevent certain sensitive information from being shared with a service provider, while allowing them to extract approved information using their model. We introduce and utilize the log-rank privacy, a novel measure to assess the effectiveness of DPFE in removing sensitive information and compare different models based on their accuracy-privacy trade-off. We then implement and evaluate the performance of DPFE on smartphones to... 

    Development of grid resource discovery service based on semantic information

    , Article SpringSim '07: Proceedings of the 2007 spring simulaiton multiconference ; Volume 1 , 2007 , Pages 141-148 ; 07359276 (ISSN) ; 1565553128 (ISBN); 9781565553125 (ISBN) Beheshti, S. M. R ; Moshkenani, M. S ; Sharif University of Technology
    2007
    Abstract
    Grid computing is a type of parallel and distributed system that provides the possibility of sharing, choosing and collecting the autonomous resources (such as computer, software, databases, and equipments) that are distributed geographically. Resource discovery is one of the key subjects in distributed systems and especially Grids. We should consider that Grid consists of different applications that each of them consist of different hardware and software resources, therefore recognizing these resources is important in a Grid system. Classical approaches to Grid resource discovery are either centralized or hierarchical [1] (and will maybe prove inefficient as the scale of Grid systems... 

    Dynamic mutual manufacturing and transportation routing service selection for cloud manufacturing with multi-period service-demand matching

    , Article PeerJ Computer Science ; Volume 7 , 2021 , Pages 1-30 ; 23765992 (ISSN) Sadeghi Aghili, S. A ; Fatahi Valilai, O ; Haji, A ; Khalilzadeh, M ; Sharif University of Technology
    PeerJ Inc  2021
    Abstract
    Recently, manufacturing firms and logistics service providers have been encouraged to deploy the most recent features of Information Technology (IT) to prevail in the competitive circumstances of manufacturing industries. Industry 4.0 and Cloud manufacturing (CMfg), accompanied by a service-oriented architecture model, have been regarded as renowned approaches to enable and facilitate the transition of conventional manufacturing business models into more efficient and productive ones. Furthermore, there is an aptness among the manufacturing and logistics businesses as service providers to synergize and cut down the investment and operational costs via sharing logistics fleet and production... 

    Dynamic mutual manufacturing and transportation routing service selection for cloud manufacturing with multi-period service-demand matching

    , Article PeerJ Computer Science ; Volume 7 , 2021 , Pages 1-30 ; 23765992 (ISSN) Sadeghi Aghili, S. A ; Valilai, O.F ; Haji, A ; Khalilzadeh, M ; Sharif University of Technology
    PeerJ Inc  2021
    Abstract
    Recently, manufacturing firms and logistics service providers have been encouraged to deploy the most recent features of Information Technology (IT) to prevail in the competitive circumstances of manufacturing industries. Industry 4.0 and Cloud manufacturing (CMfg), accompanied by a service-oriented architecture model, have been regarded as renowned approaches to enable and facilitate the transition of conventional manufacturing business models into more efficient and productive ones. Furthermore, there is an aptness among the manufacturing and logistics businesses as service providers to synergize and cut down the investment and operational costs via sharing logistics fleet and production... 

    On-demand test as a web service process (OTaaWS Process)

    , Article 7th International Conference on Web Research, ICWR 2021, 19 May 2021 through 20 May 2021 ; 2021 , Pages 16-23 ; 9781665404266 (ISBN) Habibi, E ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Service-Oriented Architecture (SOA) is a software design framework where distributed services are provided and used by applications over a network. By using this architecture new challenges appeared for software testing. Lack of access to the source code and runtime binding are examples of these challenges. Functional testing of services assures the quality of service-oriented applications. In this paper, we introduce a new 3-phase consumer and provider contract-based process for web service testing to overcome SOA testing challenges. Our proposed process, namely OTaaWS, consists of Test Automation, Test Execution and Test Management steps on the provider's side, which can be done on-demand.... 

    A model to support context-aware service migration in pervasive computing environments

    , Article 9th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2005, Orlando, FL, 10 July 2005 through 13 July 2005 ; Volume 3 , 2005 , Pages 394-399 ; 9806560558 (ISBN); 9789806560550 (ISBN) Hemmati, H ; Ranjbar, A ; Niamanesh, M ; Jalili, R ; Sharif University of Technology
    2005
    Abstract
    Continuous improvement and extension of pervasive computing environments, in which objects have high mobility and limited computing power, implies service migration to be considered as one of the main issues. On the other hand, context-awareness which is the most distinguishable feature of pervasive computing helps better serving of users. Accordingly, migration in the presence of context-awareness is considered as the underlying of our motivation. This improves the performance of migration, which is not easily achievable through traditional migration techniques. In this paper we introduce a model to support context-aware migration besides its migration process phases and framework. Our... 

    Freshness of web search engines: Improving performance of web search engines using data mining techniques

    , Article International Conference for Internet Technology and Secured Transactions, ICITST 2009, 9 November 2009 through 12 November 2009, London ; 2009 ; 9781424456482 (ISBN) Kharazmi, S ; Farahmand Nejad, A ; Abolhassani, H ; Sharif University of Technology
    Abstract
    Progressive use of Web based information retrieval systems such as general purpose search engines and dynamic nature of the Web make it necessary to continually maintain Web based information retrieval systems. Crawlers facilitate this process by following hyperlinks in Web pages to automatically download new and updated Web pages. Freshness (recency) is one of the important maintaining factors of Web search engine crawlers that takes weeks to months. Many large Web crawlers start from seed pages, fetch every links from them, and continually repeat this process without any policies that help them to better crawling and improving performance of those. We believe that data mining techniques... 

    A novel solution for manufacturing interoperability fulfillment using interoperability service providers

    , Article 50th CIRP Conference on Manufacturing Systems, CIRP CMS 2017, 3 May 2017 through 5 May 2017 ; Volume 63 , 2017 , Pages 774-779 ; 22128271 (ISSN) Delaram, J ; Fatahi Valilai, O ; Sharif University of Technology
    Elsevier B.V  2017
    Abstract
    The cloud manufacturing paradigm has been known as one of the best solutions for today's competitive manufacturing environments. This paradigm insists on using a manufacturing service oriented approach for fulfilling the manufacturing enterprise resource management by the access to global availability of manufacturing services. The proposed service oriented approach covers a wide area of manufacturing resource management from infrastructures to platforms and applications. However, due to wide global distributions of manufacturing clouds, the service oriented architectures which are designed in the clouds cannot communicate with each other. This is mainly due to concentration of cloud... 

    Viral cascade probability estimation and maximization in diffusion networks

    , Article IEEE Transactions on Knowledge and Data Engineering ; 28 May , 2018 ; 10414347 (ISSN) Sepehr, A ; Beigy, H ; Sharif University of Technology
    IEEE Computer Society  2018
    Abstract
    People use social networks to share millions of stories every day, but these stories rarely become viral. Can we estimate the probability that a story becomes a viral cascade If so, can we find a set of users that are more likely to trigger viral cascades These estimation and maximization problems are very challenging since both rare-event nature of viral cascades and efficiency requirement should be considered. Unfortunately, this problem still remains largely unexplored to date. In this paper, given temporal dynamics of a network, we first develop an efficient viral cascade probability estimation method, VICE, that leverages an special importance sampling approximation to achieve high... 

    Steering social activity: a stochastic optimal control point of view

    , Article Journal of Machine Learning Research ; Volume 18 , 2018 , Pages 1-35 ; 15324435 (ISSN) Zarezade, A ; De, A ; Upadhyay, U ; Rabiee, H.R ; Gomez Rodriguez, M ; Sharif University of Technology
    Microtome Publishing  2018
    Abstract
    User engagement in online social networking depends critically on the level of social activity in the corresponding platform-the number of online actions, such as posts, shares or replies, taken by their users. Can we design data-driven algorithms to increase social activity? At a user level, such algorithms may increase activity by helping users decide when to take an action to be more likely to be noticed by their peers. At a network level, they may increase activity by incentivizing a few influential users to take more actions, which in turn will trigger additional actions by other users. In this paper, we model social activity using the framework of marked temporal point processes,... 

    Deep private-feature extraction

    , Article IEEE Transactions on Knowledge and Data Engineering ; 2018 ; 10414347 (ISSN) Osia, S. A ; Taheri, A ; Shamsabadi, A. S ; Katevas, M ; Haddadi, H ; Rabiee, H. R. R ; Sharif University of Technology
    IEEE Computer Society  2018
    Abstract
    We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is trained and evaluated based on information theoretic constraints. Using the selective exchange of information between a user's device and a service provider, DPFE enables the user to prevent certain sensitive information from being shared with a service provider, while allowing them to extract approved information using their model. We introduce and utilize the log-rank privacy, a novel measure to assess the effectiveness of DPFE in removing sensitive information and compare different models based on their accuracy-privacy trade-off. We then implement and evaluate the performance of DPFE on smartphones to...