The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computing occupations increasingly dominate the workforce, but the discipline fails to attract sufficient and diverse students (i.e., women, underrepresented minorities) to meet workforce needs. To address this issue, LIGHTHOUSE projects provide computer science instructors with professional development MOOCs to recruit and retain more and diverse students in computing. We present how a professional...
In this paper, which describes a work in progress, we wish to propose context aware service delivery, and we focus on distributed human computer interface, in order to exploit the variety of interaction mode/capabilities according to current situation, users, and context. Our aim is providing new kind of more dynamic interaction modes. We particularly focus on the domain of smart-home (including digital...
How can students be included as critical stakeholders in the systems and services provided by a university? To address the whole student experience, we engaged students and employees at a large Swedish university in a vision seminar process to elicit how these groups envisioned an ideal future university, and the necessary changes to technology and organisational structures required to achieve this...
Soft skills, societal awareness and the ability to work in interdisciplinary teams are crucial traits for future software engineers. Still, these social skills seem to be underrepresented in the education of software engineers. To support a practical integration of such aspects also into education, a so-called “Diversity Framework” has been developed that helps to externalize implicit factors such...
Representation of cooperating systems in recent products and collecting organized engineering knowledge in organizational intellectual property are currently actual issues on the long way of engineering model integration. Engineering model with those representations inherently includes components from various discipline areas in a single structure and recently uses requirements, functional, logical,...
We report on the second design cycle of Acropolis, a social computing platform that allows citizens to build and share their own narratives about long-running news stories. A key goal of this research project is to explore the following design opportunity: how can we re-design news stories in order to engage citizens in their reading and curation? In this paper, we describe an asymmetric collaboration...
Self-adaptive systems are able to modify their behavior and/or structure to deal with their continuously changing environment and internal dynamics. MAPE control loops, based on these four steps: Monitoring, Analysis, Planning, and Execution, have been identified as crucial elements in realizing self-adaptation of software systems. Adaptive systems are generally more difficult to design, specify and...
In this paper we present a decision process to auto-adapt and improve human-machine interaction, simplifying the integration of algorithms and functionalities. The decision process is part of an innovative approach that integrates contextual information to orchestrate behaviours of an interactive system (i.e. perception and actuation features involved during interaction). Classical approaches focus...
In this paper, we are proposing a new formal framework for reasoning on authentication in security protocols based on analytic functions. We give sufficient conditions that, if satisfied, the protocol is declared correct with respect to authentication. We validate our approach on the Yahalom-Lowe protocol. First, we show that it satisfies these few conditions, thus, we conclude that it is correct...
Theory exploration has been investigated as the lemma generation methods which play important role in automation of theorem provers. In order to enlarge the scope of provable theorems in the exploration, in this paper we propose an approach of applying the rewriting induction technique in exploration of inductive theorems. Especially, we propose some heuristics for proof search in the rewriting induction...
In this paper, we present a system to recognize text in traffic signs, along with its context based recognition result corrections that we developed. This system detects text in traffic signs region using contour detection and using KNN Classifier to recognize letters in it. The result of the recognitions that may contain errors will be corrected using Forward Reverse Dictionary that has Contextual...
Information overload is one of the most important problems in context of personalized document retrieval systems. In this paper we propose to use ontology-based user profile. Ontological structures are appropriate to represent relations between concepts in user profile. We present a method for determining user profile based on his current activities. Results obtained in experimental evaluation are...
DBpia is the largest digital-bibliography service provider in Korea. It provides several convenience functions for researchers. DBpia users (i.e., researchers) can search for papers via several search routes such as publications, publishers, authors, and keywords. Although the researchers can exploit the search functions, they may still have a number of search results as candidate papers to read....
Emergency command and control centers (CC) are integrated facilities to assist and handle crisis situations. In these CCs, operators suffer both with information shortage and overload. This paper focuses on the information overload problem. Operators often do not have adequate access to information that may be relevant in the decision-making process. In many CC centers, information is stored without...
This paper presents an approach, based on the multi-criteria method SMARTER, that can be useful to support decisions involving the selection of the best-fit agile software development methodology for small and medium enterprises. The kickoff of this study was a research regarding measurable criteria that should be considered in this type of decision aiming to answer the needs of specific projects...
Restructuring legacy code to improve its structure and understandability is difficult and adequate tool support is required. While the advantages of the Null Object pattern are widely recognized, the first tool support has only recently emerged. We complement it with NullTerminator, a prototype tool to assist developers in the instantiation of the Null Object design pattern in Java programs. We describe...
Effect of frame size and color histogram bins on shot boundary detection performance in terms of precision and recall is experimentally analyzed in this paper. An HS histogram-based shot boundary detector is used for Korean soap operas with eight kinds of frame sizes an bins, respectively, applying various thresholds. The biggest image size and bins are more than one hundred higher than the smallest...
The proposed paper describes our experimental work with the dialogue corpus DiaCoSk, which is a small corpus of dialogue interactions in the Slovak language. The original corpus consists of recordings, transcriptions and dialogue act labels that can be used for training dialogue act labeling machine. Emotions in DiaCoSK utterances were labeled additionally to observe their frequency and relation to...
An efficient, static type resolution tool is presented. The tool is implemented on top of srcML, an XML representation of source code and abstract syntax. The approach computes the type of every identifier (i.e., function names and variable names) within the provided body of code. The result is a dictionary that can be used to lookup the type of each name. Type information includes metadata such as...
Service Composition is playing a pivotal role in diverse industries to approach more cost effective solutions in an efficient manner. Web service selection is playing a key role in the domain of the composition and it considers as the most important last informant of successful Automatic service composition. Since it is growing the web services in tremendous speed due to the innovation of cloud computing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.