References of "Communications in Computer and Information Science"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailThe Effect of Noise Level on the Accuracy of Causal Discovery Methods with Additive Noise Models
Kap, Benjamin; Aleksandrova, Marharyta UL; Engel, Thomas UL

in Communications in Computer and Information Science (2022), 1530

In recent years a lot of research was conducted within the area of causal inference and causal learning. Many methods were developed to identify the cause-effect pairs. These methods also proved their ... [more ▼]

In recent years a lot of research was conducted within the area of causal inference and causal learning. Many methods were developed to identify the cause-effect pairs. These methods also proved their ability to successfully determine the direction of causal relationships from observational real-world data. Yet in bivariate situations, causal discovery problems remain challenging. A class of methods, that also allows tackling the bivariate case, is based on Additive Noise Models (ANMs). Unfortunately, one aspect of these methods has not received much attention until now: what is the impact of different noise levels on the ability of these methods to identify the direction of the causal relationship? This work aims to bridge this gap with the help of an empirical study. We consider a bivariate case and two specific methods Regression with Subsequent Independence Test and Identification using Conditional Variances. We perform a set of experiments with an exhaustive range of ANMs where the additive noises’ levels gradually change from 1% to 10000% of the causes’ noise level (the latter remains fixed). Additionally, we consider several different types of distributions as well as linear and non-linear ANMs. The results of the experiments show that these causal discovery methods can fail to capture the true causal direction for some levels of noise. [less ▲]

Detailed reference viewed: 87 (2 UL)
Full Text
Peer Reviewed
See detailEvolving a Deep Neural Network Training Time Estimator
Pinel, Frédéric UL; Yin, Jian-xiong; Hundt, Christian UL et al

in Communications in Computer and Information Science (2020, February)

We present a procedure for the design of a Deep Neural Net- work (DNN) that estimates the execution time for training a deep neural network per batch on GPU accelerators. The estimator is destined to be ... [more ▼]

We present a procedure for the design of a Deep Neural Net- work (DNN) that estimates the execution time for training a deep neural network per batch on GPU accelerators. The estimator is destined to be embedded in the scheduler of a shared GPU infrastructure, capable of providing estimated training times for a wide range of network architectures, when the user submits a training job. To this end, a very short and simple representation for a given DNN is chosen. In order to compensate for the limited degree of description of the basic network representation, a novel co-evolutionary approach is taken to fit the estimator. The training set for the estimator, i.e. DNNs, is evolved by an evolutionary algorithm that optimizes the accuracy of the estimator. In the process, the genetic algorithm evolves DNNs, generates Python-Keras programs and projects them onto the simple representation. The genetic operators are dynamic, they change with the estimator’s accuracy in order to balance accuracy with generalization. Results show that despite the low degree of information in the representation and the simple initial design for the predictor, co-evolving the training set performs better than near random generated population of DNNs. [less ▲]

Detailed reference viewed: 167 (15 UL)
Full Text
Peer Reviewed
See detailFaye: An Empathy Probe to Investigate Motivation Among Novice Runners
Menheere, D.; Lallemand, Carine UL; Funk, M. et al

in Communications in Computer and Information Science (2020), 1294

The popularity of recreational sports such as running, has increased substantially due to its low threshold to start and it is attractive for a wide range of people. However, despite the growing ... [more ▼]

The popularity of recreational sports such as running, has increased substantially due to its low threshold to start and it is attractive for a wide range of people. However, despite the growing popularity, running has a high drop-out rate due to injuries and motivational loss, especially among novice runners. To investigate factors influencing motivation among novice runners and design opportunities, we deployed an empathy probe at a women-only running event. Faye is a running shirt that reveals motivational feedback on the shirt, during the warm-up phase of the run. In this paper, we both inform on the impact of motivational feedback while warming up on running motivation and reflect on the use of an empathy probe to investigate motivational strategies among novice runners. © 2020, Springer Nature Switzerland AG. [less ▲]

Detailed reference viewed: 38 (2 UL)
Full Text
Peer Reviewed
See detailFormal Security Analysis of Traditional and Electronic Exams
Dreier, Jannik; Giustosi, Rosario; Kassem, Ali et al

in Communications in Computer and Information Science (2015), 554

Nowadays, students can be assessed not only by means of pencil-and-paper tests but also by electronic exams which they take in examination centers or even from home. Electronic exams are appealing as they ... [more ▼]

Nowadays, students can be assessed not only by means of pencil-and-paper tests but also by electronic exams which they take in examination centers or even from home. Electronic exams are appealing as they can reach larger audiences, but they are exposed to new threats that can potentially ruin the whole exam business. These threats are amplified by two issues: the lack of understanding of what security means for electronic exams (except the old concern about students cheating), and the absence of tools to verify whether an exam process is secure. This paper addresses both issues by introducing a formal description of several fundamental authentication and privacy properties, and by establishing the first theoretical framework for an automatic analysis of exam security. It uses the applied π-calculus as a framework and ProVerif as a tool. Three exam protocols are checked in depth: two Internet exam protocols of recent design, and the pencil-and-paper exam used by the University of Grenoble. The analysis highlights several weaknesses. Some invalidate authentication and privacy even when all parties are honest; others show that security depends on the honesty of parties, an often unjustified assumption in modern exams. [less ▲]

Detailed reference viewed: 263 (11 UL)
Full Text
Peer Reviewed
See detailOn Clustering the Criteria in an Outranking Based Decision Aid Approach
Bisdorff, Raymond UL

in Communications in Computer and Information Science (2008), 14

Detailed reference viewed: 114 (2 UL)