The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Future Internet (FI) constitutes a complex and dynamic environment, the requirements of which cannot be adrressed by traditional management schemes. The alternative is the approach of autonomic network and service management. In this context, the UniverSelf research project proposes a promising solution, called Unified Management Framework (UMF), which targets the unification of autonomic network...
The concept of a bipolar query, meant as a database query that involves both mandatory and optional conditions, is discussed from the point of view of, first, flexible database querying and, second, some newer approaches to decision making involving affects and judgments, unconventional multicriteria decision making and the modeling of sophisticated user's intentions and preferences of a positive...
How do organizations know they are designing products and services that their customers will value? This paper describes the initial results of the first four stages of a methodology for integrating customer Values in Experience design (ViEx). The theory of universal value structure was adapted to examine customer values in two contexts: online interaction (N=725) and shopping experience (N=742)....
We propose a new method for audio-visual sensor fusion and apply it to automatic aggression detection. While a variety of definitions of aggression exist, in this paper we see it as any kind of behavior that has a disturbing effect on others. We have collected multi- and unimodal assessments by humans, who have given aggression scores on a 3 point scale. There are no trivial fusion algorithms to predict...
Spatio-Temporal Interest Point (STIP) has been widely used for human action recognition. However, the performance of the STIP based methods are still limited in realistic datasets which often include large variations in illuminations, viewpoints and camera motions. One reason of the low performance is that the STIPs only reflect the local change in videos, which is not enough to obtain stable informative...
In the ever growing literature on countering the cyber threat, the so-called JDL model of data fusion, well established in the information fusion community, has been applied to characterize the inner structure of problems within cyber defence and their mutual relationship. The overarching goal is to provide contributions to comprehensive cyber situational awareness by producing timely situation pictures...
The psychological overcharge issue related to human inadequacy to maintain a constant level of attention in simultaneously monitoring multiple visual information sources makes necessary to develop enhanced video surveillance systems that automatically understand human behaviors and identify dangerous situations. This paper introduces a semantic human behavioral analysis (HBA) system based on a neuro-fuzzy...
In this paper, an approach for semantic compositionbased on space projection operations over basic geometriclexical representations is proposed. Syntactic bi-grams arehere projected in the so called Support Subspace, aimed atemphasizing the semantic features shared by the compoundword. Empirical results are discussed over two tasks: a finegrainedsimilarity estimation task over syntactically typedword...
Communication in online social networks has been analyzed for some time regarding the expression of sentiments. So far, very little is known about the relationship between sentiments and network emergence, dissemination patterns and possible differences between positive and negative sentiments. The dissemination patterns analyzed in this study consist of network motifs based on triples of actors and...
The growing number of textual reports poses a great challenge for investigative analysis. However, text visualization has the potential to address this problem by automating the analysis of text reports, thus reducing workloads and providing new insights for crime analysts. We are developing a crime report visualization system for such investigative analysis. Our system leverages natural language...
Grooming is the process by which pedophiles try to find children on the internet for sex-related purposes. In chat conversations they may try to establish a connection and escalate the conversation towards a physical meeting. Till date no effective methods exist for quickly analyzing the contents, evolution over time, the present state and threat level of these chat conversations. In this paper we...
Availability of low cost sensor nodes has made Wireless Sensor Networks (WSNs) a viable choice for monitoring critical infrastructure such as power grid, civil structures and others. There are quite a few approaches in the literature that use WSN to monitor pipelines (water, gas, oil, and various other types of pipelines). The primary goal of all these protocols is to detect device malfunctions such...
In the field of Human-Computer Interaction, the Personas methodology is used to communicate the user's preferences, goals, frustrations and requirements. Although a widely used method, little progress has been made in creating a personas model. This paper aims to provide such a conceptual model, which includes concepts and properties used in the personas methodology, via an OWL specification.
When large values are at stake, the attacker and the attacker's motives cannot be easily modeled, since both the organization at stake and the possible attackers are unique and have complex motives. Hence, rather than using stereotypical attacker models, recent work proposes realistic profiling of the opponent by the use of user-centered design principles in form of the persona methodology. Today,...
Over the last decades it has been observed that many companies around the world have started to adopt Distributed Software Development (DSD) to create competitive advantages. Aiming to increase such advantages, many of these companies add some team motivation techniques to DSD. However, the motivation of DSD teams reveals some peculiarities that should be taken into account. This paper presents a...
Users' experience of interacting with a robot is mediated by the context that characterizes the co-existence of the human and the robot. However, it has been difficult to study the role of social context in human-robot interaction (HRI) in experimental settings. In this research, we evaluated how social context influenced user acceptance of social robots in a controlled experiment. Using video scenarios...
Recommender systems automatically determine suitable items for users. Although preferences or context of users have been widely utilized in order to evaluate the suitability of the items for users, the surrounding context have little been considered. Focusing on that many ordinary human beings voluntarily report their observations of the current situation of the world to microblogs, this paper proposes...
Culture is a critical influential factor in online learning environments. In the present scenario a designer from a particular cultural background conceptualizes a globalized educational product to be delivered across geographical boundaries through the online medium. Design of such products is influenced by the designer's pre-suppositions about how he / she visualizes the reality and conceptualizes...
Recognizing human interactions is a challenging task due to partially occluded body parts and motion ambiguities in interactions. We observe that the interdependencies existing at both action level and body part level greatly help disambiguate similar individual movements and facilitate human interaction recognition. In this paper, we propose a novel hierarchical model to capture such interdependencies...
This paper introduces a proposal for a smart environment capable of deploying enhanced services by using a synergic approach based on Adaptive Neuro-Fuzzy Inference System (ANFIS) and Fuzzy Markup Language (FML). In detail, this approach realizes a long-life learning strategy able to generate context-aware services and actualize them through abstraction techniques in order to maximize the users' comfort...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.