The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Knowledge hoarding in Requirements Elicitation (RE) phase could lead to Information Systems Development (ISD) project failure. Many researchers have discussed important factors in knowledge sharing. Nevertheless, the success rate for ISD projects is low and there are other major factors for consideration. Review was conducted to identify potential gaps in existing literature and to explore new factors...
Pervasive computing technologies offer solutions to many of the problems people face in aging. In doing so, they have the potential to support certain values such as human welfare. However, these solutions also have the potential to diminish human values such as trust, privacy and autonomy. Many of such value issues are recurrent, general problems that play out in specific application contexts. By...
Dental recognition is very important for forensic human identification, mainly regarding the mass disasters, which have frequently happened due to tsunamis, airplanes crashes, etc. Algorithms for automatic, precise, and robust teeth segmentation from radiograph images are crucial for dental recognition. In this work we propose the use of a graph-based algorithm to extract the teeth contours from panoramic...
Document summarization algorithms are most commonly evaluated according to the intrinsic quality of the summaries they produce. An alternate approach is to examine the extrinsic utility of a summary, measured by the ability of the summary to aid a human in the completion of a specific task. In this paper, we use topic identification as a proxy for relevancy determination in the context of an information...
Natural pitch fluctuations are essential to human singing. To effectively synthesize singing voice, the generation of these pitch fluctuations is necessary. Previous synthesis methods classify and reproduce them individually. These fluctuations, however, are found to be dependent and vary under different contexts. This paper proposes a generalized framework for F0 modelling to learn and generate these...
One of the great benefits VR systems offer is their ability to simulate a number of virtual humans when their presence is needed in the context of some learning or training experience. Being that the real humans may not be available to play different roles and support virtual sessions, the ability of a system to generate highly believable representations of autonomous virtual humans — virtual intelligent...
Multiple research has shown the advantage of patch-based or local representation for face recognition. This paper builds on a novel way of putting the patches in context, using a foveated representation. While humans focus on local regions and move between them, they always see these regions in “context”. We hypothesize that using foveated context can improve performance of local region or patch based...
In this paper, we discuss alternative paths towards system support for Pervasive Computing that are based on a balanced combination between global services and situated devices that we hypothesise will be the key to widespread deployment of Pervasive Computing: global services provide functionality that can be relevant anywhere, thus obviating the need to create dedicated services on a case-by-case...
Problematic command and control situations are often characterized with high levels of uncertainty and severe time constraints. In time compressed situations where only a limited number of information can be considered by the decision-maker, it becomes critical that the information available is the most relevant for taking action in that situation. This paper presents a Framework for the Analysis...
Vast amounts of information are generated, shared, and processed in tactical networks. In such systems, human cooperation is a crucial component for effective processing of information. However, human behavior is often mediated by social and organizational relationships, i.e. trust between team members and system level characteristics, such as network delays. The impact these different processes have...
This paper describes an existing proof-of-concept prototype of an automated reasoning service exploiting ontologies expressed in description logic to support the intelligence staff in detecting and categorizing threats. The key concepts of threat analysis are first presented and they are then organized into a reasoning framework. The development of a suitable ontology for threat analysis is discussed,...
This paper contributes to the efficiency oriented assessment of system architecture. It proposes to use function modeling to support system analysis aiming at the development of efficiency oriented assessment approaches for complex system architectures. Efficiency orientation implicates the processes executed by the systems as focused assessment dimension. The two-level function modeling approach...
The Command and Control (C2) system that provide information to the actors in a conflict has always been a key target for technology advancement. The ongoing development of automated digital military information systems has enabled, and is demanding the development of specific functional area support systems. The focus of communication systems and methods is shifting away from human to human communication...
Situation-aware case-based decision support (SACBDS) systems comprise two distinct parts: situation awareness (SA) and case-based reasoning (CBR). The SA part keeps a finite history of the time space information of the domain and uses rules to interpret cues from the environment with respect to an individual user's context, and then anticipates future situations by performing statistical inference...
Swiftness and robustness of natural communication is tied to the redundancy and complementarity found in our multimodal communication. Swiftness and robustness of human-computer interaction (HCI) is also a key to the success of a virtual reality (VR) environment. The interpretation of multimodal interaction signals has therefore been considered a high goal in VR research, e.g. following the visions...
The Time-Dependent Execution Design Pattern describes a way of temporally decoupling a client and a server instance, based on the possibility to specify a point in time at which the operation required by the client instance will be executed on the server instance.
In this paper we argue for ICT technologies to play a more prominent role in supporting the governance of our society. The Internet together with Web2.0 technologies such as social media have enabled a shift of power towards individuals in recent years, making governance of our societies increasingly difficult with our outdated government structures. We explore the vision of how a pervasively deployed...
This paper proposes a novel nonlinear manifold learning method for addressing the ill-posed problem of occluded human action analysis. As we know, a person can perform a broad variety of movements. To capture the multiplicity of a human action, this paper creates a low-dimensional manifold for capturing the intra-path and inter-path contexts of an event. Then, an action path matching scheme can be...
Seeded segmentation methods attempt to solve the segmentation problem in the presence of prior knowledge in the form of a partial segmentation, where a small subset of the image elements (seed-points) have been assigned correct segmentation labels. Common for most of the leading methods in this area is that they seek to find a segmentation where the boundaries of the segmented regions coincide with...
This paper introduces a vision-based motion capture system. Motion capturing technology consists of two categories: model-based tracking and example-based indexing. The motion capturing systems face two challenges: parameter estimation in high-dimensional space and self-occlusion. Our algorithm extends the locality sensitive hashing (LSH) method to find the approximate examples and then estimates...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.