Search results for " software"

showing 10 items of 1178 documents

SearchBot: Supporting voice conversations with proactive search

2018

Searching during conversations and social interactions is becoming increasingly common. Although searching could be helpful for solving arguments, building common ground, and reinforcing mutual assumptions, it can also cause inter-actional problems. Proactive search approaches can enrich conversations with additional information without neglecting the shared and established social norms of being attentive to ongoing interaction. This demo showcases SearchBot, a tool that minimizes the issues associated with the practice of searching during conversations. It accomplishes this by tracking conversational background speech and then providing continuous recommendations of related documents and e…

ta113Computer science05 social sciencesCommon ground020207 software engineering02 engineering and technologyVoice user interfaceHuman–computer interaction0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesProactive searchTracking (education)Background speechSpoken conversation support050107 human factorsVoice user interface
researchProduct

Adaptive framework for network traffic classification using dimensionality reduction and clustering

2012

Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then …

ta113Computer scienceNetwork securitybusiness.industryDimensionality reductionintrusion detectionk-meansdiffusion mapServer logcomputer.software_genreanomaly detectionTraffic classificationkoneoppiminenWeb log analysis softwareAnomaly detectionData miningWeb servicetiedonlouhintaCluster analysisbusinesscomputern-grams
researchProduct

Fault-proneness of open source software: Exploring its relations to internal software quality and maintenance process

2013

The goal of this study is to explore how fault-proneness of open source software (OSS) could be explained in terms of internal quality attributes and maintenance process metrics. We reviewed earlier studies and performed a multiple case study of eight Java-based projects based on data available in the Source Forge repository. Overall, we studied 342 re- leases of those systems. As is usual, software quality was regarded as a set of internal and external quality attributes. A to- tal of 76 internal quality attributes were measured from the source code of the selected systems via the tool SoftCalc. Two external quality attributes contributing to fault-proneness were in turn obtained from the …

ta113Engineeringfault-pronenessbusiness.industryopen-source softwareSoftware developmentohjelmiston ylläpitoprosessiSoftware peer reviewsoftware qualityohjelmiston laatuSoftware qualityavoimen lähdekoodin ohjelmistoSoftware analyticsvirhealttiusSoftware sizingPersonal software processohjelmistomittaritSoftware quality analystsoftware metricsSoftware verification and validationSoftware engineeringbusinesssoftware maintenance processThe Open Software Engineering Journal
researchProduct

Understanding Social OER Environments—A Quantitative Study on Factors Influencing the Motivation to Share and Collaborate

2014

Social software environments are increasingly used for open education: teachers and learners share and collaborate in these environments. While there are various possibilities for the inclusion of such social functionalities for OER, many organizational, individual and technological challenges can hinder the motivation of teachers to share and collaborate in these environments. Current research cannot explain what barriers teachers face in social OER environments and how those challenges influence their motivation to engage in such environments. An exploratory factor analysis was used in the context of schools and higher education institutions to investigate the possible barriers to engagin…

ta113Knowledge managementHigher educationComputer sciencebusiness.industrySocial softwareGeneral EngineeringContext (language use)computer.software_genreExploratory factor analysisComputer Science ApplicationsEducationKnowledge sharingOpen educationta516Social mediabusinessInclusion (education)computerIEEE Transactions on Learning Technologies
researchProduct

Introduction to the designing and deploying next generation knowledge systems and knowledge intensive business processes minitrack

2013

Work systems and the knowledge systems enabling them need to be aligned with emerging technologies to ensure organizational acceptance and to support effective organizational value creation. Traditional, often monolithic knowledge system architectures need to be redesigned due to technological progress manifested by, for example, social software, mashups, and semantic technologies. In our view, these redesigns lead to a new class of knowledge systems that we call “Next Generation Knowledge Systems.” Project management (PM) involved in the design and deployment of knowledge systems differs from the PM involved in traditional IS projects. While design projects are essential in creating next g…

ta113Knowledge managementbusiness.industryProcess (engineering)Technological changeComputer scienceBusiness processSocial softwareSocial changeNoveltyOntology (information science)computer.software_genreOrganizational knowledgeKnowledge sharingBody of knowledgeKnowledge-based systemsHealth careOntologySemantic technologyProject managementWork systemsbusinesscomputer
researchProduct

Potku – New analysis software for heavy ion elastic recoil detection analysis

2014

Time-of-flight elastic recoil detection (ToF-ERD) analysis software has been developed. The software combines a Python-language graphical front-end with a C code computing back-end in a user-friendly way. The software uses a list of coincident time-of- flight–energy (ToF–E) events as an input. The ToF calibration can be determined with a simple graphical procedure. The graphical interface allows the user to select different elements and isotopes from a ToF–E histogram and to convert the selections to individual elemental energy and depth profiles. The resulting sample composition can be presented as relative or absolute concentrations by integrating the depth profiles over user-defined rang…

ta113Nuclear and High Energy PhysicsIon beam analysista114business.industryComputer scienceEvent (computing)Reference data (financial markets)ion beam analysisERDelastic recoil detectionComputational scienceTOF-ERDElastic recoil detectionSoftwareCoincidentHistogramgraphical open source softwarebusinessInstrumentationGraphical user interfaceNuclear Instruments and Methods in Physics Research Section B: Beam Interactions with Materials and Atoms
researchProduct

Continuous Requirements Risk Profiling in Information Systems Development

2015

With the increasing adoption of agile, lean, and iterative development methods, information systems development (ISD) has become continuous, meaning that system development moves rapidly from release to release. This means that work practices and challenges that practitioners face have changed. Despite these changes, requirements development is still critical in ISD. However, IS literature is silent on how to manage requirements-related risks in the practice of continuous IS development. To fill this gap, we propose a continuous requirements risk profiling method. The study is informed by design science research methodology, and we apply focus group interviews and a Delphi study for data co…

ta113Requirements managementIterative and incremental developmentProcess managementKnowledge managementbusiness.industryComputer sciencerisk profilingRisk management information systemsvaatimusmäärittelytinformation systemsrisk managementinformation systems developmentohjelmistosuunnitteluSoftwareISDInformation systemriskianalyysiohjelmistokehitysbusinessDesign methodsRisk managementsoftware engineeringtietojärjestelmätAgile software development2015 48th Hawaii International Conference on System Sciences
researchProduct

A Serendipity-Oriented Greedy Algorithm for Recommendations

2017

Most recommender systems suggest items to a user that are popular among all users and similar to items the user usually consumes. As a result, a user receives recommendations that she/he is already familiar with or would find anyway, leading to low satisfaction. To overcome this problem, a recommender system should suggest novel, relevant and unexpected, i.e. serendipitous items. In this paper, we propose a serendipity-oriented algorithm, which improves serendipity through feature diversification and helps overcome the overspecialization problem. To evaluate our algorithm and compare it with others, we employ a serendipity metric that captures each component of serendipity, unlike the most …

ta113SerendipityComputer sciencebusiness.industrysuosittelujärjestelmät020207 software engineeringserendipity02 engineering and technologyalgorithmsunexpectednessnoveltyalgoritmit0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencerecommender systemsGreedy algorithmbusinessGreedy randomized adaptive search procedure
researchProduct

Domain Specific Case Tool for ICT-Enabled Service Design

2014

One major problem in service design is the limited availability of information gathered during the development process. In particular, information on end-user requirements is difficult for designers, developers, and maintainers to access. Here, we provide a mechanism that supports the gathering and modeling of various types of information throughout the service and software development life cycle. As various existing tools focus on a particular part of the life cycle, essential information is not available, or it is more difficult to obtain in later stages. The linkage between information collected in the different stages is often lost. The implemented tool support enables the modeling of r…

ta113Service (systems architecture)Computer sciencebusiness.industryService designDomain (software engineering)SoftwareUnified Modeling LanguageInformation and Communications TechnologySystems development life cycleComponent (UML)Component-based software engineeringSoftware engineeringbusinessComputer-aided software engineeringcomputercomputer.programming_language2014 47th Hawaii International Conference on System Sciences
researchProduct

Flexible entity search on surfaces

2016

Surface computing allows flexible search interaction where users can manipulate the representation of entities recommended for them to create new queries or augment existing queries by taking advantage of increased screen estate and almost physical tactile interaction. We demonstrate a search system based on 1) Direct Manipulation of Entity Representation on Surfaces and 2) Entity Recommendation and Document Retrieval. Entities are modeled as a knowledge-graph and the relevances of entities are computed using the graph structure. Users can manipulate the representation of entities via spatial grouping and assigning preferences on entities. Our contribution can help to design effective infor…

ta113Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniInformation retrievalSettore INF/01 - InformaticaComputer science020207 software engineering02 engineering and technologyEntity searchSurface computing020204 information systems0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)Information explorationDocument retrievalInformation explorationSurface computing
researchProduct