The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a new semi-supervised clustering framework to represent and integrate quantitative preferences on attributes. A new metric learning algorithm is derived that achieves a compromise clustering between a data-driven and a user-driven solution and converges with a good complexity. We observe experimentally that the addition of preferences may be essential to achieve a better clustering...
Social media applications have assumed an important role in decision-making process of users, affecting their choices about products and services. In this context, understanding and modeling opinions, as well as opinion-leaders, have implications for several tasks, such as recommendation, advertising, brand evaluation etc. Despite the intrinsic relation between opinions and opinion-leaders, most recent...
Managing the growing influx of notification data being pushed at mobile phone users is an increasing necessity in today's world of social media and ubiquitous computing. The challenge of effectively managing a diverse range of notification types, and analyzing their current context with relation to an individual user, is a difficult task. This paper proposes a notification management framework which...
In this paper, we show a System Self-Awareness concept and theory that can be used to discover authoritative and popular information as well as emerging and anomalous information when traditional connections among information nodes (e.g., hyperlinks or citations) are not available. The different categories of information can be all high-value depending on the application requirements. A System Self-Awareness...
Green Information Technology (IT) is the study of environment friendly practices in the IT context. Science and technology has brought in many benefits over the years but we failed to see the environmental degradation that is happening due to anthropogenic activities. In recent times, there exists an enthusiasm in sustainable activities among people but its relationship with their day to day work...
The decision-making process in the educational context has been widely investigated as an effective mechanism to support educators and administrators in distance and blended learning. Pattern discovery in data produced by Learning Management Systems (LMS) elicits important information about the educational process, especially when considering correlations between stakeholders interacting in different...
Faculty members' decisions to alter teaching practices is often driven and restricted by both institutional and personal factors [1]. When examining these factors, faculty make judgments as a mechanism to evaluate the cost-benefit of enacting such a change. Behavioral economics concepts, such as satisficing, meliorating, path dependence, and bounded rationality [2], provide a lens to examine if and...
Software-Driven Verification (SDV) has the promise to significantly reduce the overall time and effort for the task of IP integration and verification. With the help of SystemC Virtual Prototypes (VPs), SW tests to verify the (new) integrated IP blocks and the HW/SW integration can be developed in an early design stage and reused in the subsequent steps. However, the crucial question regarding the...
Online review is becoming more popular among the public when considering the purchase of a product or service. This also applies in tourism industry when potential tourists were making decisions about travel destination. This research aims to identify online review elements/features that will affect readers' intention to travel. Hence, the model was designed by categorized online review characteristics...
With the integration of SMT solvers into analysis frameworks aimed at ensuring a system's end-to-end correctness, having a high level of confidence in these solvers' results has become crucial. For unsatisfiable queries, a reasonable approach is to have the solver return an independently checkable proof of unsatisfiability. We propose a lazy, extensible and robust method for enhancing DPLL(T)-style...
The requirement of the credibility is analyzed for smart grid data and the traditional theories of data measurement and bad data identification are studied in power system. On the basis of that, this paper mainly studies the credibility between data sources, the construction of the trusted network generation algorithm, and the hierarchical and dynamic trusted network model innovatively which is based...
Criminal Intelligence Analysis often requires a search different from the semantic and keyword based searching to reveal the associations among semantically and operationally connected objects within a crime knowledge base. In this paper we introduce associative search as a search along the networks of association between objects like people, places, other organizations, products, events, services,...
Combining the role-based access control (RBAC) model with the attribute-based access control (ABAC) model is a popular direction of current research on access control models. At present, many RABAC (RBAC + ABAC) models have been proposed. On the basis of RBAC model, these models dynamically apply ABAC rules to user-role mapping, role-permission mapping and user-permission mapping, thus realizing the...
Software product lines often use preprocessor statements as a basis for representing variability, which makes understanding the artifacts rather complex. An approach that has been proposed in the past to improve the understanding of code with preprocessor statements is formal concept analysis. This approach has been applied to a number of causes in reengineering. However, the lattices constructed...
Data with vastly different access characteristics is efficiently stored in multi-tiered storage systems. A cost-effective way to retain large volumes of infrequently accessed data is to store it on tape. Steady developments in tape technology deliver ever increasing storage capacities at low cost. This has established tape as a viable solution to cope with the extreme data growth in the context of...
Specific requirements and characteristics of primary storage make designing desirable deduplication schemes a sophisticated task. In this paper, we propose DIODE, a Dynamic Inline-Offline DEduplication scheme that provides salient read/write performance and space-saving simultaneously for primary storage systems. DIODE orchestrates inline and offline processes in a dynamic manner. We propose two innovative...
In service marketing domain, internal marketing is critical for enhancing superior service quality. This study adopts internal marketing perspective to examine the effect of internal marketing mechanism on enhancing proactive customer service performance. Data from 233 valid data in Taiwan's tourism hotel frontline employee was adopted to examine research hypotheses. Results revealed that, authentic...
Innovation is widely recognized as one main contributor to a firm's competitiveness. To conduct innovation, an organization must utilize its tangible and intangibles resources. The current study is aimed at examining the effect of intangible resources, namely human, organizational and relational resources on innovation in the context of service firms (i.e., tutoring agencies) in Indonesia. In addition,...
In digital game based learning (DGBL), game mechanics and learning mechanics define the interactivity possibilities between the player and the game. While game and learning mechanics can facilitate the design and development of DGBL activities, they have not yet been analyzed from the perspective of the learning theories underlying the type of interactions between the player and the game. This study...
Being a complex topic Internet of Things (IoT) involves multiple disciplines and approaches. In this paper an initial overview of the modeling techniques within the IoT by the Information Systems researchers is provided. These descriptive results offer a basis for discussion about the research topics that are important in IoT for the Information Systems Research community as well as the first overview...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.