Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In recent years, reality mining experiments have provided several novel insights into human social behavior that would not have been possible without the novel use of smart phone sensing. In this work, we leverage the latest reality mining experiment to study social behavior from a public health perspective. In particular, we focus on sleep and mood as they have a considerable public health impact...
Signal transduction pathways control cellular responses to stimuli, but it is unclear how molecular information is processed as a network. Large-scale collection and systematization of such data is likely to have a great impact on cell biology as complete genome sequencing has had on genetics. Cell signaling pathways interact with one another to form networks. Such networks are complex in their organization...
Reconfiguration, a new technique to realize fault-tolerance and respond to changes in external environment, has been adopted in the design of Integrated Modular Avionics (IMA). The benefits brought to the system include: reducing the cost of hardware redundancy and improving system's ability to perform various tasks under different situations. The complexity of such reconfigurable system has made...
Designing systems in such a way that as much functions as possible are automated has been the driving direction of research and engineering in aviation, space and more generally in computer science for many years. In the 90's many studies (e.g. [12] related to the notion of mode confusion) have demonstrated that fully automated systems are out of the grasp of current technologies and that additionally...
It is common to introduce computer art to people with a background about computer science or art. However, the rising importance of computer-based creativity demands methods of talking about computer art to people who have no professional experience in any of these fields. This paper describes and evaluates "Vanishing Point" computer art workshop, designed both for children and adults with...
Effective relationships between people and technology are essential for organizational response (agility, adaptation, and innovation). Advances in computing power, and the rise of complex ubiquitous systems, raise a challenge for managing this relationship given limits of human physical and cognitive capacities. To re-align people with computing technology involves either improved human training,...
This paper presents an improvement of deterministic WLAN location determination system using finite element method for calculated HEF constant, ones to add the last value before decision of conventional method. From the results, when using HEF, constant improved the value before decision position for LLR and RADAR yielded to be obvious. It had minimum error distance below 2 meters.
The software industry is becoming increasingly important and complex, demanding investment of software organizations in the quality of their software processes. Requirements Engineering is one of the disciplines that can help software organizations to deal with this scenario, specially defining initiatives that can improve the requirements elicitation and analysis activities. In order to contribute...
Successful enforcement of information security requires an understanding of a complex interplay of social and technological forces. Drawing on socio-technical literature to develop an analytical framework, we examine the relationship between security policies and power in organizations. We use our framework to study three examples of security policy from a large empirical study n an international...
As the popularity of text-based source code analysis grows, the use of stemmers to strip suffixes has increased. Stemmers have been used to more accurately determine relevance between a keyword query and methods in source code for search, exploration, and bug localization. In this paper, we investigate which traditional stemmers perform best on the domain of software, specifically, Java source code...
Nowadays, almost every task involving Web traversing and information retrieval recurs to Web robots. Web robots are software programs that automatically traverse the Web's hypertext structure. They proliferate rapidly aside with the growth of the Web and are extremely valuable and important means not only for the large search engines, but also for many specialized services such as investment portals,...
Our research addresses the question as to whether automatically collected quantitative data about people's behavior online can be analyzed to spot patterns that indicate behaviors of interest. Based on ethnographic studies, we find that people, going about their routine work, exhibit patterns in terms of their routine online activities and work rhythms. Such patterns can be comprised of many diverse...
Information Security Management is related to the design of socio-technical work processes. The development and reflection of this kind of processes can be supported with the field-tested method of the socio-technical walkthrough (STWT). Within a project of raising security standards for a university administration infrastructure, STWT was combined with common ISMS methodology. During this project...
Unpredictable user behaviors in a physical process represent one of the fundamental obstacles to the realization of a Cyber-Physical System. In this paper, we propose the use of social cues such as body shape, expressions, and verbal timing to control user behaviors in the physical world. Social cues can control user behaviors in both their spatial and temporal aspects. As a result, user actions become...
Integral of single variable functions is an important issue in calculus. This problem is widely applied in many fields such as physics, economics, etc. Systems for automatic solving integral problems are necessary tools in education. They support students and teachers in learning and teaching mathematics. Current computer algebra systems such as Maple, Mathematica, etc can solve integral problems...
Computer Language Courses are one kind of computer course that is very important to foster Chinese computer talents. The paper discusses author's some puzzle and thinking about courses offered, teaching and contents of textbooks in China.
The paper indicates a self-developed testing system of reaction time based on the theory of mesopic vision. The system is supposed to simulate the actual effects of tunnel lighting with varies of light sources, which could be attributed to mesopic visual environment. By adopting lights of different brightness, projecting designated graphs on the screen and capturing reaction time with a button, the...
Traditional educational methods often focus on the teacher's role and teaching form in the class is vary monotonous. This paper proposed a method to apply ICT into the human machine interface course, which can provoke the interests of students to this course. ICT makes the educational method become variable and colorful therefore promotes the quality of education. In addition, ICT is applied into...
This paper analyzes the role of product engineering department and relationship with relevant other departments.from the communication management, project management, personnel allocation management, service management, etc., this paper analyzes, summarizes and concludes the department's management tasks. It also tease out management framework for business process optimization. It Integrates "BBSXP...
Human space flight and exploration continues to be a key goal of the NASA, with an emphasis on utilizing new technologies to improve the effectiveness, efficiencies and safety associated with this endeavor, including the ground-based mission support. This search for improvement has led to cross-fertilization between the advanced software development community and the manned spaceflight operations...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.