Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The IEEE 802.15.4 standard is considered as the most notorious MAC layer for Wireless Sensor Networks (WSNs) in both single hop and multi-hop contexts. For instance, in a multi-hop environment, the unslotted IEEE 802.15.4 is adopted as the medium access scheme. Several works evaluated the performance of the unslotted IEEE 802.15.4 in terms of average delay, exact average energy consumption, reliability,...
During the last years, universities, and other educational organizations, have increased the use of analytics in order to improve the efficiency of their internal management and to increase their teaching and research quality. In this paper we present the results of a survey we conducted to determine the analytical level of educational organizations and how it differs from the analytical level of...
Social network connectivity data that is anonymized and publicized for academic or commercial purposes are often vulnerable to de-anonymization attacks from attackers utilizing side information in the form of a second, public or crawled social network. Correlation between the two networks is the key factor allowing this attack scheme to work successfully. In this work, the best attack strategy available...
Goal-oriented analysis allows performing trade-off analysis among competing solutions to a problem by determining which proposed solution strikes a more appropriate balance of stakeholder objectives and desired qualities of a system. Standard language definitions of common goal-oriented languages such as i*, the Goal-oriented Requirement Language (GRL), the NFR Framework, and KAOS offer varying support...
The quality of Software Requirements Specifications (SRS) is important to gain a competitive advantage in the software industry. Although the use of agile methods has grown in recent years, empirical studies conducted in industry identified several problems related to SRS in the context of agile projects. The goal of this study is to investigate the phenomenon of the quality of SRS in Agile Software...
The analysis and comparison of open source software can be improved by means of quality models supporting the evaluation of the software systems being compared and the final decision about which of them has to be adopted. Since software quality can mean different things in different scenarios, quality models should be flexible in order to accommodate the needs of different users. Over the years several...
Many studies have been conducted to analyse the influence diffusion in social networks, where the problem is normally modelled from a centralised perspective. In this paper, we propose an agent-based approach to model the bidirectional influence propagation in directed weighted networks in a distributed manner. In the proposed model, each user's personalised traits and individual's social context...
We present a new method for detecting descriptive community patterns capturing exceptional (sequential) link trails. For that, we provide a novel problem formalization: We model sequential data as first-order Markov chain models, mapped to an attributed weighted network represented as a graph. Then, we detect subgraphs (communities) using exceptional model mining techniques: We target subsets of sequential...
This paper proposes the use of graph pattern matching for investigative graph search, which is the process of searching for and prioritizing persons of interest who may exhibit part or all of a pattern of suspicious behaviors or connections. While there are a variety of applications, our principal motivation is to aid law enforcement in the detection of homegrown violent extremists. We introduce investigative...
With the rapid development of regional economy in Shandong Province, the demand of electric power increases rapidly. So, the development of the substation construction and its status information detection system has led to the massive power equipment status information data, which needs to be sorted out and standardized work. In this paper, the MapReduce technology is used for the degradation processing...
In companies from retail banking or telecommunication sector are continually developed information systems (IS). The core of these IS resides in efficient and elegant usage of database tools. In this paper we present a new approach of analyzing database objects with DB Object Mapper Tool that is being developed for mapping objects from large and complex database systems. The term “object” in this...
Sensemaking has been described as a process involving information structuring. However, there are few detailed accounts of how this manifests in practice, particularly in relation to the creation and use of external representations such as data visualisations, and how such structuring aids sensemaking. To explore these questions in depth, we present an interview study of police crime analysts from...
Organizational culture is context-specific and it can impact organizational effectiveness in certain mechanism. From Competing Values Framework (CVF) prospective, this study examines the correlations among organizational culture, organizational citizenship behavior (OCB), and organizational effectiveness. Furthermore, this study analyzes the possible mediating role of OCB in the relationship between...
Text-based information from human sources contains not just content, but also clues to where the information originated from as well as how strongly the writer believes in that information. That is, the actual content of HUMINT may be from direct observation by the writer or derived through inference by the writer, or the writer may be passing on information which has come from another source. Along...
Literature indicates that SME (Small to Medium) farmers in peri-urban Sydney, Australia region are faced with uncertainties when selling their produce. Majority of farmers sell produce via agents, some sell produce via markets however in either case farmers do not get the full overview or the transparency of the expected market demands and prices. To identify if a suitable business model could be...
Providing appropriate tool-supported guidance to students is an essential aspect of technology-supported inquiry-based STEM education, in order to facilitate them in engaging in diverse inquiry tasks. However, analyzing educational designs and evaluating the level of tool-supported guidance provided towards reflective remedying actions is not a trivial task, especially for novice STEM teachers. In...
The increasing use of social network resources has increased the users demands through these networks. Analyzing social media enables us to benefit from the rich source of multimedia in a personalized, adaptive and systematic way for building smart cities environments. This paper proposes an algorithm to fill the gap between the social media resources, user personalized preferences and the collaborative...
Various methodologies explore the use of Web resources in educational practices. The WebQuests model, which has been used in educational practices since the nineties, employs these resources in inquiry-oriented lessons in classrooms. The literature emphasizes that WebQuests are more effective when exploring the higher levels of Bloom's Taxonomy (i.e., the capacity to create, evaluate and analyze)...
It is mandatory for organizations to keep up with rapid and continuous changes to their business processes to be competitive. Business process simulation is a preferred way to improve these changes. Many business processes can start with partially filled data and run for a few days or even longer. Such business processes are defined as long running business processes. However, business process simulation...
Program anomaly detection models legitimate behaviors of complex software and detects deviations during execution. Behavior deviations may be caused by malicious exploits, design flaws, or operational errors. Probabilistic detection computes the likelihood of occurrences of observed call sequences. However, maintaining context sensitivity in detection incurs high modeling complexity and runtime overhead...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.