Search results for " software"
showing 10 items of 1178 documents
SearchBot: Supporting voice conversations with proactive search
2018
Searching during conversations and social interactions is becoming increasingly common. Although searching could be helpful for solving arguments, building common ground, and reinforcing mutual assumptions, it can also cause inter-actional problems. Proactive search approaches can enrich conversations with additional information without neglecting the shared and established social norms of being attentive to ongoing interaction. This demo showcases SearchBot, a tool that minimizes the issues associated with the practice of searching during conversations. It accomplishes this by tracking conversational background speech and then providing continuous recommendations of related documents and e…
Adaptive framework for network traffic classification using dimensionality reduction and clustering
2012
Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then …
Fault-proneness of open source software: Exploring its relations to internal software quality and maintenance process
2013
The goal of this study is to explore how fault-proneness of open source software (OSS) could be explained in terms of internal quality attributes and maintenance process metrics. We reviewed earlier studies and performed a multiple case study of eight Java-based projects based on data available in the Source Forge repository. Overall, we studied 342 re- leases of those systems. As is usual, software quality was regarded as a set of internal and external quality attributes. A to- tal of 76 internal quality attributes were measured from the source code of the selected systems via the tool SoftCalc. Two external quality attributes contributing to fault-proneness were in turn obtained from the …
Understanding Social OER Environments—A Quantitative Study on Factors Influencing the Motivation to Share and Collaborate
2014
Social software environments are increasingly used for open education: teachers and learners share and collaborate in these environments. While there are various possibilities for the inclusion of such social functionalities for OER, many organizational, individual and technological challenges can hinder the motivation of teachers to share and collaborate in these environments. Current research cannot explain what barriers teachers face in social OER environments and how those challenges influence their motivation to engage in such environments. An exploratory factor analysis was used in the context of schools and higher education institutions to investigate the possible barriers to engagin…
Introduction to the designing and deploying next generation knowledge systems and knowledge intensive business processes minitrack
2013
Work systems and the knowledge systems enabling them need to be aligned with emerging technologies to ensure organizational acceptance and to support effective organizational value creation. Traditional, often monolithic knowledge system architectures need to be redesigned due to technological progress manifested by, for example, social software, mashups, and semantic technologies. In our view, these redesigns lead to a new class of knowledge systems that we call “Next Generation Knowledge Systems.” Project management (PM) involved in the design and deployment of knowledge systems differs from the PM involved in traditional IS projects. While design projects are essential in creating next g…
Potku – New analysis software for heavy ion elastic recoil detection analysis
2014
Time-of-flight elastic recoil detection (ToF-ERD) analysis software has been developed. The software combines a Python-language graphical front-end with a C code computing back-end in a user-friendly way. The software uses a list of coincident time-of- flight–energy (ToF–E) events as an input. The ToF calibration can be determined with a simple graphical procedure. The graphical interface allows the user to select different elements and isotopes from a ToF–E histogram and to convert the selections to individual elemental energy and depth profiles. The resulting sample composition can be presented as relative or absolute concentrations by integrating the depth profiles over user-defined rang…
Continuous Requirements Risk Profiling in Information Systems Development
2015
With the increasing adoption of agile, lean, and iterative development methods, information systems development (ISD) has become continuous, meaning that system development moves rapidly from release to release. This means that work practices and challenges that practitioners face have changed. Despite these changes, requirements development is still critical in ISD. However, IS literature is silent on how to manage requirements-related risks in the practice of continuous IS development. To fill this gap, we propose a continuous requirements risk profiling method. The study is informed by design science research methodology, and we apply focus group interviews and a Delphi study for data co…
A Serendipity-Oriented Greedy Algorithm for Recommendations
2017
Most recommender systems suggest items to a user that are popular among all users and similar to items the user usually consumes. As a result, a user receives recommendations that she/he is already familiar with or would find anyway, leading to low satisfaction. To overcome this problem, a recommender system should suggest novel, relevant and unexpected, i.e. serendipitous items. In this paper, we propose a serendipity-oriented algorithm, which improves serendipity through feature diversification and helps overcome the overspecialization problem. To evaluate our algorithm and compare it with others, we employ a serendipity metric that captures each component of serendipity, unlike the most …
Domain Specific Case Tool for ICT-Enabled Service Design
2014
One major problem in service design is the limited availability of information gathered during the development process. In particular, information on end-user requirements is difficult for designers, developers, and maintainers to access. Here, we provide a mechanism that supports the gathering and modeling of various types of information throughout the service and software development life cycle. As various existing tools focus on a particular part of the life cycle, essential information is not available, or it is more difficult to obtain in later stages. The linkage between information collected in the different stages is often lost. The implemented tool support enables the modeling of r…
Flexible entity search on surfaces
2016
Surface computing allows flexible search interaction where users can manipulate the representation of entities recommended for them to create new queries or augment existing queries by taking advantage of increased screen estate and almost physical tactile interaction. We demonstrate a search system based on 1) Direct Manipulation of Entity Representation on Surfaces and 2) Entity Recommendation and Document Retrieval. Entities are modeled as a knowledge-graph and the relevances of entities are computed using the graph structure. Users can manipulate the representation of entities via spatial grouping and assigning preferences on entities. Our contribution can help to design effective infor…