The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Crowdsourcing coordinates a large group of workers online to do self-contained small tasks that are published by job requesters on a crowdsourcing platform. Many papers propose incentive strategies to motivate workers to participate in crowdsourcing. In this paper, we shift the focus from the workers to the job requesters by addressing two of their issues: how to design a good payment scheme to maximize...
The concept of a team collective intelligence is based on the series of focused expert interviews with enterprise managers and entrepreneurs. The theoretical analysis helped to formulate the main positions of the concept of collective intelligence, compared with collected intelligence as a simplified sum of the knowledge, visions, perception and understandings of the team members. The team's collective...
Firstly, the definitions of software combination coverage test and several combinatorial coverage algorithms are briefly introduced, and the advantages and defects of the combinatorial testing methods are compared. Then the concepts of input parameters constraints are descripted in detail. At last, a method of reducing the combinatorial test case sets based on parameter constraint relations is presented,...
One of the fundamental applications for a practically useful system of money is remuneration. Information pertaining to the amount of compensation awarded to different individuals is often considered sensitive, commanding a certain degree of privacy. As Bitcoin and similarly designed cryptocurrencies evolve into a recognized medium of exchange for larger swaths of the world economy, an increasing...
Privacy preserving of multi-sensitive attributes datasets (MSA-Datasets) has received increasing attention because of its huge social and economic benefits. In this paper, we introduce a novel and general privacy framework called Transparent Link. The Transparent Link framework can be used to anonymize MSA-Datasets by designing an algorithm based on probabilistic graphical model, which is referred...
In software engineering, project scheduling is an essential factor that determines success of projects. Success is influenced by various project scheduling estimates, such as accurate estimates of project's duration and budget. These estimates highly depend on uncertainties related to commonly occurring unpredictable events during a project's duration. Furthermore, budget and duration estimates depend...
The task of assigning a bug report to the developer “best” able to address it involves identifying a list of developers qualified to understand and address the bug report and ranking them according to their expertise. Most research in this area addresses this task by matching the description of the bug report and the developers’ prior development and bugfixing activities. This thesis puts forward...
Nowadays, Demands of web scale are in increasing and growing rapidly. Mobile applications, web technologies, social media always generates unstructured data that had lead to the advent of various NoSQL databases. Therefore, Big data applications are necessary to have an efficient technology to collect these data. However, a relational database is the traditional database that always uses in many applications...
Data quality is the most important variables for data warehousing. Numerous data warehouse ventures fall flat because of low quality of the data. It is trusted that the issues can be altered later and hence, a great deal of the reality of the situation will become obvious eventually spent to settle the errors. In the event that low-quality data nourished in the data warehouse, the outcome will be...
Encrypted databases store data as ciphertexts. Encryption schemes with functionalities (such as deterministic and order-preserving schemes) are often used, in order to operate and compare the encrypted data directly. However, the secrecy of the data may decrease because information on plaintexts such as equivalence and order relationships are revealed from ciphertexts. In our previous study, we formalized...
The proliferating usage of cloud environments to store databases poses new challenges. Traditional encryption protects the user's data privacy, but prevents the server from executing computations on behalf of the user (client). By contrast, Partially Homomorphic Encryption schemes, such as the Paillier cryptosystem, facilitate some server queries but involve heavy computations that make them relatively...
The study is entitled Work Motivations Affecting Self-Efficacy and Work Effectiveness of Flight Attendants of Airlines in Thailand with the objectives to (1) investigate flight attendants' perception of work motivation (2) investigate flight attendants' perception of self-efficacy and (3) investigate work motivation influencing self-efficacy and work effectiveness. The research samples are flight...
The corpus-based method has been proven to be useful in the translation field, but the size of most of the corpora is relatively small, so the variety and validity remain a problem. However, the Web consists of various types and unlimited amount of knowledge, so it meaningful to combine Web with corpora. This paper intends to show how to develop Web-based corpora and how to use it to help translation...
Power systems evolution to an intelligent energy system - smart grid, encounters several issues when integrating distributed generation and demand response. At the aggregator level, activities such as the energy resource management, capacities aggregation and resources remuneration are needed. The present paper addresses the previous needs of the aggregator by considering an optimization of the resources...
Recommendation emails are among the best ways to re-engage with customers after they have left a website. While on-site recommendation systems focus on finding the most relevant items for a user at the moment (right item), email recommendations add two critical additional dimensions: who to send recommendations to (right person) and when to send them (right time). It is critical that a recommendation...
Development in information systems has brought the need for universal access to data stored in computer systems using database approach. It should ensure quality, reliability, performance with emphasis on rising data amount. The first part of the paper deals with the index structure definition, index access methods, which delimit access type. However, another significant factor is the data security...
Every year football clubs trade players in order to build competitive rosters able to compete for success, increase the number of their supporters and amplify sponsors and media attention. In the complex system described by the football transfer market can we identify the strategies pursued by successful teams? Where do they search for new talents? Does it pay to constantly change the club roster?...
As intelligent automation and large-scale distributed monitoring and control systems become more widespread, concerns are growing about the way these systems collect and make use of privacy-sensitive data obtained from individuals. This tutorial paper gives a systems and control perspective on the topic of privacy preserving data analysis, with a particular emphasis on the processing of dynamic data...
This paper presents a salary prediction system using a profile of graduated students as a model. A data mining technique is applied to generate a model to predict a salary for individual students who have similar attributes to the training data. In this work, we also made an experiment to compare five data mining techniques including Decision trees, Naive Bayes, K-Nearest neighbor, Support vector...
The study will briefly sketch the most recent trends in hiring skilled professionals in the area of Information Technology (IT) in Slovakia. The primary focus will be made on current tendencies in recruitment: how the job requirements of companies are changing and how their hiring strategies respond to challenges on the labor market. Due to increase in the number of new vacancies and ongoing drop...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.