The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present an architecture for self-motivated agents to organize their behaviors according to possibilities of interactions proposed by the environment, and to modify the environment to construct new possibilities of interactions. The long-term goal is to design agents that construct their own knowledge of objects through experience, rather than exploiting pre-coded knowledge, and exploit this knowledge...
There are numerous widely disseminated beliefs in the rapidly growing domain of Mobile Game Analytics, notably within the context of the Free-to-Play model. However, the field remains in its infancy, as there is limited conclusive empirical knowledge available across industry and academia, to provide evidence for these beliefs. Additionally, the current knowledge base is highly fragmented. For Mobile...
Collaboration is a promising area of investigation for Augmented Reality (AR) applications. While there have been numerous examples of co-located and remote synchronous collaborative AR applications, there has not been the same interest in pursuing asynchronous interfaces. Asynchronous processes differ from their synchronous counterparts due to the collaboration occurring over a period of time, without...
Mobile devices equipped with cameras, such as smartphones, have become extremely popular in recent years, and have motivated users to capture an increasing number of digital photos in their daily lives. Users often invoke these photos during in-person interactions or conversations with others. In the context of a conversation between two people related to or involving reference to a photo, one of...
Customer Relationship Management (CRM) becamethe best practice for any business that wishes to create, develop and enhance the customer value and implicitly thebusiness shareholders value. Businesses became more aware that in the long term beyondthe first sale customer retention is of crucial importance. However, in most cases, the first sale creates the first impressionof the business. Being able...
The analysis and comparison of open source software can be improved by means of quality models supporting the evaluation of the software systems being compared and the final decision about which of them has to be adopted. Since software quality can mean different things in different scenarios, quality models should be flexible in order to accommodate the needs of different users. Over the years several...
Many studies have been conducted to analyse the influence diffusion in social networks, where the problem is normally modelled from a centralised perspective. In this paper, we propose an agent-based approach to model the bidirectional influence propagation in directed weighted networks in a distributed manner. In the proposed model, each user's personalised traits and individual's social context...
Social networks and location based social networks have many active users who provide various kind of data, such as where they have been, who their friends are, which items they like more, when they go to a venue. Location, social network and temporal information provided by them can be used by recommendation systems to give more accurate suggestions. Also, recommendation systems can provide dynamic...
In this study we investigate malicious spam emails in the context of educational institutes. The goal of the study is two folds, first, is to explore spam types of attacks and what their malicious contents may include and secondly, to analyze if these attacks exhibit discriminative characteristics. This study offers an empirical analysis of spam emails dataset and provides a rich set of features that...
[Background] Software Engineering (SE) is predominantly a team effort that needs close cooperation among several people who may be geographically distributed. It has been recognized that appropriate tool support is a prerequisite to improve cooperation within SE teams. In an effort to contribute to this line of research, we have designed and developed an infrastructure, called ABC4GSD, based on the...
Do case citations reflect the “real” importance of individual judgments for the legal system concerned? This question has long been puzzling empirical legal scholars. Existing research typically studies case citation networks as a whole applying traditional network metrics stemming from graph theory. Those approaches are able to detect globally important cases, but since they do not take time explicitly...
Massive open online courses (MOOCs) have high potential for improving education worldwide, but understanding of student behavior and situations is difficult to achieve in online settings. Network analytics and visualizations can assist instructors with supporting understanding of student behavior as courses unfold. In this work, we perform a visual comparative analysis of two different MOOC courses...
The participation inequality phenomenon in online social networks between the niche of super contributors and the crowd of silent users, a.k.a. lurkers, has been witnessed in many domains. Within this view, understanding the role that lurkers take in the network is essential to develop innovative strategies to delurk them, i.e., to engage such users into a more active participation in the social network...
This paper proposes an interval observer design for a large class of uncertain LTI systems. The proposed methodology estimates simultaneously the upper and lower bounds of unmeasurable states and unknown inputs. The initial model is transformed into a singular model representation without unknown input reducing the conservatism related to the propagation of uncertainties in set membership approach...
In this paper we evaluate the effect of noise on community scoring and centrality-based parameters with respect to two different aspects of network analysis: (i) sensitivity, that is how the parameter value changes as edges are removed and (ii) reliability in the context of message spreading, that is how the time taken to broadcast a message changes as edges are removed. Our experiments on synthetic...
Research in education has long established how children mutually influence and support each other's learning trajectories, eventually leading to the development and widespread use of learning methods based on peer activities. In order to explore children's learning behavior in the presence of a robotic facilitator during a collaborative writing activity, we investigated how they assess their peers...
Body language of robot arms, have rarely been explored as a medium of conveying robot intentions. An explorative study was done focusing on two questions: one, if robot arm postures can convey robot intentions, and two, if participants coming in contact with this robot arm for the first time can associate any meaning to the postures without watching the robot in action, or working with it. Thirty...
Social networks have become a new form of communication that allow students to share and collaborate. In this sense, they have joined forces with self-regulated learning (SRL) skills. This paper presents an experience at the University of Santiago de Compostela to analyze how SRL is developed in a course using a social network. This research used the following: 1) MSLQ questionnaire by Pintrich and...
We propose a high capacity reversible ternary embedding-watermarking algorithm based on a modification of full-context-prediction-errors (MFCPE) wherein the binary bit stream is converted to the ternary stream then error histogram shifting is utilized to embed the ternary stream. Unlike the existing predictor methods, we provide a full context prediction with a modification of each pixel at most by...
Similarity metric and distance metric are widely used in many research areas and applications. In this paper, for a given similarity metric, we will introduce a family of distance metrics of Minkowski type. We will then show general solutions to construct normalized similarity metric and normalized distance metric from a similarity metric and a distance metric. Applying the general solutions to a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.