ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL

نویسندگان

  • Renata Burbaitė
  • Vytautas Štuikys
  • Vida Drąsutė
  • Kristina Bespalova
  • Sigitas Drąsutis
  • Giedrius Ziberkas
چکیده

We discuss the Personal Generative Library (PGL) concept that covers models to describe some structural, functional and managerial aspects. Since the concept, to some extent, was realized in our previous research, in this paper, we focus more on the managerial aspects. In this regard, we propose the feature model-driven approach to implement those aspects using meta-programming techniques. First, we present the basic idea and theoretical background of the approach. Then we discuss the PGL architecture, its functionality and management procedures that are supported by the developed meta-programs. We outline the process of designing meta-programs through the series transformations of feature models. The main contribution of the paper is the implementation of the concept itself that enables, to some extent, to resolve the well known problems: library scaling and excluding synonymy in search. Furthermore, we have extended the potential of generative reuse (meaning a higher extent of automation as compared to the component-based reuse) by applying it not only at the library entity level (a great deal of PGL items are generative learning objects (GLOs)), but also at the whole library, i.e. its management level. Therefore, the approach enables the automatic formation of annotations for PGL entities and generation of queries to support managing procedures. We have approved the approach by presenting a case study and some experimental results.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL

This paper describes a new two-task approach for extracting the centerline from simple 2D polygons. An algorithm of the first task, which generates a set of points for future centerline, is presented. The idea of the algorithm is to use the polygon hatching by parallel lines and creating paths from its middle points in different polygon rotations. The centerline is derived from the intersection...

متن کامل

ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL

Abstract. In this work, we investigate a multi-risk model describing insurance business with two or more independent series of claim amounts. Each series of claim amounts consists of independent nonnegative random variables. Claims of each series occur periodically with some fixed inter-arrival time. Claim amounts occur until they can be compensated by a common premium rate and the initial insu...

متن کامل

ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL

Speech recognition is one of the fundamental requirements for fully autonomous robotic systems nowadays. The objective of the presented work is to offer a smartphone based speech recognition system for ROS (Robot Operating System) based autonomous robotic systems. The proposed recognition process consists of three steps, namely acquisition, preprocessing, and result extraction. In the contribut...

متن کامل

ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL

The elliptic curve cryptosystem (ECC) achieves the security level equivalent to that of digital signature algorithm (DSA), but has a lower computational cost and a smaller key size than the DSA. Till now so many proxy multi-signature schemes based on ECC without pairings have been proposed. To the best of our knowledge, none of them are provable secure. Having motivated, we first define a forma...

متن کامل

ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL

Certificate-based signature (CBS) is an attractive paradigm since it simultaneously solves the certificate revocation problem in conventional signatures and the key escrow problem in ID-based signatures. In particular, short certificate-based signatures are useful in bandwidth reduction for communication due to their short signature lengths. However, it is still a challenging and open problem t...

متن کامل

ISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL

We studied outlier document filtering (ODF) for extractive sentence summarization. Our results are superior compared to the average of the participant systems’ using DUC 2006. Furthermore, we add extractive paragraph summarization to the same system. It is surprising that the results are nearly the same for ROUGE metrics. Although extractive paragraph summarization has a better performance for ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016