The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to a lack of professional training, teachers often face difficulties arising from their professional practice, and it is not easy for them to get help without using Web. But it's well known that this type of tool isn't very efficient for problem solving within a community of practice. So we propose to use a Case-Based Reasoning (CBR) approach not only to allow teachers to help each other solve...
Visual analytics (VA) combines the strengths of humans and computers such that joint cognitive systems are formed. To be effective, a VA tool should be designed such that the component parts of the whole system are strongly coupled and function in a harmonious fashion. These components include cognitive and perceptual issues, tasks, algorithms, data models, and other aspects of the systems that contribute...
Several works have been conducted on norms detection and identification, but almost none has been found to explore the concept of norm's benefit awareness that triggers agents' belief to adopt new norms. The literature discuss norms' adoption by agents which are not aware of the benefits of the adopted norms, but use some mining algorithms to identify the norms from a set of observed events. In this...
Military intelligence analysis (IA) support tools are often developed using generalized models of IA that fail to take into consideration the real-world constraints put on analysts by factors such as organizational structures and cultures. IA in domains where distributed collaboration is required because direct communication and coordination is infeasible represents a challenge for generalized models...
This study describes and evaluates a novel trust model for a range of collaborative applications. The model assumes that humans routinely choose to trust their peers by relying on few recurrent presumptions, which are domain independent and which form a recognisable trust expertise. We refer to these presumptions as trust schemes, a specialised version of Walton's argumentation schemes. Evidence is...
Distributed cognition is a psychological theory which assumes that knowledge lies not only within the individual but also in the individual's social and physical environment. Today, we tend to achieve cognitive results by means of a sequence of complex and subtly interwoven interactions, using technological devices, and with the help of other, more knowledgeable people. As dwellers of a new century,...
Qualia-based Exploitation of Sensing Technology (QuEST) is an approach to create a cognitive exoskeleton to improve human-machine decision quality. In this paper, we discuss the motivation of QuEST as it pertains to man-machine information fusion. Operator-based situation awareness includes both elements of external sensory perception and internal cognitive explanation. We outline QuEST elements and...
Participation actively is the key to the development of SNS. Based on the theory of perceived risk and involvement, the research model of user's participation behavior in SNS was built. Empirical data was collected from six domestic popular SNS website in China, and analyzed through structural equation model. The results show that trust and higher degree of involvement are contributed to users' participation...
Agile practices on requirements dependencies are a relatively unexplored topic in literature. Empirical studies on it are scarce. This research sets out to uncover concepts that practitioners in companies of various sizes across the globe and in various industries, use for dealing with requirements dependencies in their agile software projects. Concepts were revealed through online focus group research,...
Future pervasive environments will take into consideration not only individual users' interest, but also social relationships. In today's scenarios, the trend is to make use of collective intelligence, where the interpretation of context information can be harnessed as input for pervasive systems. Therefore, social CSCW applications represent new challenges and possibilities in terms of use of group...
This paper suggests a machine learning approach to preference generation in the context of privacy agents. With this solution, users are relieved from the complex task of specifying their preferences beforehand, disconnected from actual situations. Instead, historical privacy decisions are used as a basis for providing privacy recommendations to users in new situations. The solution also takes into...
Several works on agile methods discuss the use of team's workspace for displaying relevant information. The management of an Informative Workspace (IW) is a challenging task as it can involve many different subjects such as team adaptability, continuous reflection, workspace layout, human cognition, usability, etc. Our paper explores the IW management and it is divided in two phases. The first phase...
Since people are increasingly using online tools to share ideas and contact others, the importance of virtual communities is growing day by day. However, in the quest for exploring the relationship between psychological sense, trust, and knowledge sharing in virtual communities, there have been still very few studies. This study has revealed how knowledge sharing is fostered through trust in order...
Because of network connection and the relations among services and network devices, a network fault usually happens with a series of related faults. These conditions bring complications to find out the exact root fault that leads fault storms. We have proposed a knowledge-based fault diagnosis model and a rule-based reasoning algorithm in our previous work. As we all know, control strategy and rules...
Case Based Reasoning (CBR) methods have been used in various domain specific applications mainly dedicated to decision making. The aim of this paper is to present how CBR is integrated in an educative project, in order to contribute to life-long teacher training. In fact, the acquisition of professional know-how, for example in the management of project based activities, can constitute a major difficulty...
This paper discusses the adoption of bottom- up social software tools in formal learning environments. This is believed to enhance the learning experience of today's young generation characterized by being technology savvy and keen on social networking. As a first step towards this objective, the 3A interaction model that aims at aiding the design of personal and collaborative learning platforms is...
This paper presents a classification of widely studied approaches that focus interaction analysis and composition of multiple aspect(s) in aspect-oriented programs (AOP). It is evident that AOP has an ability to distort semantics of base-programs and aspects themselves due to advice-method or advice-advice interactions in terms of control flow and data sharing features. Thus, it entails a comprehensive...
In the recent past there has been a growing trend in delivering rich, interactive, multimedia and context aware services over wireless networks to intelligent mobile devices. In addition, context awareness has been on the evolution road map of all the next generation technologies, theories and concepts. The goal, common to all ideas, is to enable personalization and intelligent response/reaction spectrum...
Near Field Communication (NFC) is a two-way communication technology based on RFID. NFC-equipped phone (NFC phone) that embed the NFC technology into cellular phone earns increasingly attention in business, such as payment and ticketing. This paper presents a novel architecture for NFC phone driven context-aware smart spaces. Based on the architecture, users can take a NFC phone that carry predefined...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.