The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multiple research has shown the advantage of patch-based or local representation for face recognition. This paper builds on a novel way of putting the patches in context, using a foveated representation. While humans focus on local regions and move between them, they always see these regions in “context”. We hypothesize that using foveated context can improve performance of local region or patch based...
In this paper, we discuss alternative paths towards system support for Pervasive Computing that are based on a balanced combination between global services and situated devices that we hypothesise will be the key to widespread deployment of Pervasive Computing: global services provide functionality that can be relevant anywhere, thus obviating the need to create dedicated services on a case-by-case...
Problematic command and control situations are often characterized with high levels of uncertainty and severe time constraints. In time compressed situations where only a limited number of information can be considered by the decision-maker, it becomes critical that the information available is the most relevant for taking action in that situation. This paper presents a Framework for the Analysis...
Vast amounts of information are generated, shared, and processed in tactical networks. In such systems, human cooperation is a crucial component for effective processing of information. However, human behavior is often mediated by social and organizational relationships, i.e. trust between team members and system level characteristics, such as network delays. The impact these different processes have...
This paper describes an existing proof-of-concept prototype of an automated reasoning service exploiting ontologies expressed in description logic to support the intelligence staff in detecting and categorizing threats. The key concepts of threat analysis are first presented and they are then organized into a reasoning framework. The development of a suitable ontology for threat analysis is discussed,...
This paper contributes to the efficiency oriented assessment of system architecture. It proposes to use function modeling to support system analysis aiming at the development of efficiency oriented assessment approaches for complex system architectures. Efficiency orientation implicates the processes executed by the systems as focused assessment dimension. The two-level function modeling approach...
The Command and Control (C2) system that provide information to the actors in a conflict has always been a key target for technology advancement. The ongoing development of automated digital military information systems has enabled, and is demanding the development of specific functional area support systems. The focus of communication systems and methods is shifting away from human to human communication...
Situation-aware case-based decision support (SACBDS) systems comprise two distinct parts: situation awareness (SA) and case-based reasoning (CBR). The SA part keeps a finite history of the time space information of the domain and uses rules to interpret cues from the environment with respect to an individual user's context, and then anticipates future situations by performing statistical inference...
Swiftness and robustness of natural communication is tied to the redundancy and complementarity found in our multimodal communication. Swiftness and robustness of human-computer interaction (HCI) is also a key to the success of a virtual reality (VR) environment. The interpretation of multimodal interaction signals has therefore been considered a high goal in VR research, e.g. following the visions...
The Time-Dependent Execution Design Pattern describes a way of temporally decoupling a client and a server instance, based on the possibility to specify a point in time at which the operation required by the client instance will be executed on the server instance.
In this paper we argue for ICT technologies to play a more prominent role in supporting the governance of our society. The Internet together with Web2.0 technologies such as social media have enabled a shift of power towards individuals in recent years, making governance of our societies increasingly difficult with our outdated government structures. We explore the vision of how a pervasively deployed...
This paper proposes a novel nonlinear manifold learning method for addressing the ill-posed problem of occluded human action analysis. As we know, a person can perform a broad variety of movements. To capture the multiplicity of a human action, this paper creates a low-dimensional manifold for capturing the intra-path and inter-path contexts of an event. Then, an action path matching scheme can be...
Seeded segmentation methods attempt to solve the segmentation problem in the presence of prior knowledge in the form of a partial segmentation, where a small subset of the image elements (seed-points) have been assigned correct segmentation labels. Common for most of the leading methods in this area is that they seek to find a segmentation where the boundaries of the segmented regions coincide with...
This paper introduces a vision-based motion capture system. Motion capturing technology consists of two categories: model-based tracking and example-based indexing. The motion capturing systems face two challenges: parameter estimation in high-dimensional space and self-occlusion. Our algorithm extends the locality sensitive hashing (LSH) method to find the approximate examples and then estimates...
Human movements are important cues for recognizing human actions, which can be captured by explicit modeling and tracking of actor or through space-time low-level features. However, relying solely on human dynamics is not enough to discriminate between actions which have similar human dynamics, such as smoking and drinking, irrespective of the modeling method. Object perception plays an important...
As behavioral research has expanded in Information Systems and other scientific fields, researchers are recognizing that construct proliferation increases the difficulty in identifying the nomological networks of constructs pertaining to any given research question. An Inter-Nomological Network uses semantic analysis to systematically identify, categorize, and predict relationships among the constructs...
In public advisory services, the individual's satisfaction depends less on extrinsic factors (e.g., monetary rewards) than on their inner needs fulfillment. Currently used IT-systems supporting citizen advisory services neglect these intrinsic needs of their users, hence insufficiently fostering their satisfaction. In this paper, we aim to close this gap by assessing the design requirements needed...
The present research sought to identify linguistic markers of sensitive self-disclosure in Twitter for three main purposes: (1) to support the development of software tools that can identify text as sensitive disclosure or not, (2) to contribute to the literature by establishing what is considered more sensitive disclosure in a specific CMC environment, and (3) to contribute to the methodological...
Business Process (BP) Improvement remains one of the core activities of Business Process Management (BPM) today. It is often expected to result in cost reductions and process efficiency, typically achieved through automation. Research described in this paper focuses on ongoing improvement of healthcare BPs involving knowledge work. Through an exploratory case study, conducted in a real life organization...
In the service economy, as markets change from offering physical products to offering services, organizations across many industries must embrace this transformation to remain competitive. Mobile technology plays an important role in this transformation because of characteristics such as mobility. However, high levels of mobility may not always contribute to service performance. Due to customer variability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.