Search results for "11"

showing 10 items of 17291 documents

Teaching Knowledge Management by Combining Wikis and Screen Capture Videos

2011

PurposeThis paper aims to report on the design and creation of a knowledge management course aimed at facilitating student creation and use of social interactive learning tools for enhanced learning.Design/methodology/approachThe era of social media and web 2.0 has enabled a bottom‐up collaborative approach and new ways to publish work on the web, promoted by tools such as YouTube video service. In this spirit a knowledge management course was designed aiming to facilitate university students to compose videos on different difficult concepts in the theory part of the course by searching for explanations on the web and by creating a Windows Media Player video focusing on the self‐defined pro…

ta113Collaborative writingKnowledge managementMultimediaComputer Networks and Communicationsbusiness.industryComputer scienceWindows MediaLibrary and Information Sciencescomputer.software_genreInteractive LearningWorld Wide WebProblem-based learningConstructivism (philosophy of education)The InternetSocial mediabusinessSocial constructivismcomputer
researchProduct

Citizens' Communication Habits and Use of ICTs During Crises and Emergencies

2014

In this article, citizens’ communication habits and use of information and communication technologies during crises and emergencies are discussed from the perspective of community resilience. The topic is approached qualitatively by exploring citizens’ perceptions, and the data were gathered by means of focus groups in storm-prone and flood-prone areas in Finland. The results indicate that citizens consider emergency communication to be mostly unidirectional: from authorities to the public. However, because crises are often complex and fast developing, cooperation among response organizations and citizen groups is needed to coproduce safety and in adapting to changing situations. Organizati…

ta113Community resilienceKnowledge managementSocial PsychologyEmergency managementlcsh:T58.5-58.64business.industrylcsh:Information technologyCommunicationInformation sharingInformation technologyPublic relationsFocus groupHuman-Computer Interactionemergency communicationInformation and Communications TechnologyICTPolitical sciencePublic participationSocial mediacitizen participationta518businessinformation and communication technologyHuman Technology
researchProduct

Developing cloud business models: A case study on cloud gaming

2011

Cloud computing offers new ways for firms to operate in the global market so that even small firms can compete in markets traditionally dominated by multinational corporations. A case study considers how, over ten years, a small firm developed a successful business model to compete in computer gaming. peerReviewed

ta113Competitive intelligenceComputingMilieux_THECOMPUTINGPROFESSIONBusiness processbusiness.industrySoftware as a serviceCloud gamingcloud computingCloud computingBusiness modelpienyrityksetGlobalizationpilvipalvelutCommerceMultinational corporationcomputer gamesBusinessbusiness modelssmall firmsSoftwaretietokonepelitIEEE Software
researchProduct

Why Do Users Switch Mobile Applications? : Trialing Behavior as a Predecessor of Switching Behavior

2018

Mobile application providers face high user losses because users can easily and often switch to an alternative application. Researchers have recently started to study information technology (IT) switching. However, no studies have concentrated on the unique context of mobile applications. Mobile application switching differs from the switching behavior related to many other IT products and services because of the highlighted role of alternatives, beta versions, updates, reviews, and users’ spontaneous behavior. To address this gap, we develop a mobile-specific model by using a qualitative research approach. As a theoretical contribution, we introduce trialing behavior as a predecessor of sw…

ta113Computer science020204 information systems0502 economics and business05 social sciences0202 electrical engineering electronic engineering information engineeringswitching behavior02 engineering and technology050203 business & managementmobile applicationsInformation Systems
researchProduct

SearchBot: Supporting voice conversations with proactive search

2018

Searching during conversations and social interactions is becoming increasingly common. Although searching could be helpful for solving arguments, building common ground, and reinforcing mutual assumptions, it can also cause inter-actional problems. Proactive search approaches can enrich conversations with additional information without neglecting the shared and established social norms of being attentive to ongoing interaction. This demo showcases SearchBot, a tool that minimizes the issues associated with the practice of searching during conversations. It accomplishes this by tracking conversational background speech and then providing continuous recommendations of related documents and e…

ta113Computer science05 social sciencesCommon ground020207 software engineering02 engineering and technologyVoice user interfaceHuman–computer interaction0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesProactive searchTracking (education)Background speechSpoken conversation support050107 human factorsVoice user interface
researchProduct

Exact extension of the DIRECT algorithm to multiple objectives

2019

The direct algorithm has been recognized as an efficient global optimization method which has few requirements of regularity and has proven to be globally convergent in general cases. direct has been an inspiration or has been used as a component for many multiobjective optimization algorithms. We propose an exact and as genuine as possible extension of the direct method for multiple objectives, providing a proof of global convergence (i.e., a guarantee that in an infinite time the algorithm becomes everywhere dense). We test the efficiency of the algorithm on a nonlinear and nonconvex vector function. peerReviewed

ta113Computer scienceDirect methodta111multi-objective optimisationExtension (predicate logic)algorithmsMulti-objective optimizationmonitavoiteoptimointiNonlinear systemComponent (UML)Convergence (routing)algoritmitGlobal optimizationVector-valued functionAlgorithm
researchProduct

Biomass estimator for NIR image with a few additional spectral band images taken from light UAS

2012

A novel way to produce biomass estimation will offer possibilities for precision farming. Fertilizer prediction maps can be made based on accurate biomass estimation generated by a novel biomass estimator. By using this knowledge, a variable rate amount of fertilizers can be applied during the growing season. The innovation consists of light UAS, a high spatial resolution camera, and VTT's novel spectral camera. A few properly selected spectral wavelengths with NIR images and point clouds extracted by automatic image matching have been used in the estimation. The spectral wavelengths were chosen from green, red, and NIR channels.

ta113Computer scienceFabry-Perotprecision farmingNear-infrared spectroscopyPoint cloudEstimatorBiomassSpectral bandsNIRBiomass estimationfertilizerestimatorWavelength/dk/atira/pure/sustainabledevelopmentgoals/zero_hungerPrecision agriculturespectral imagerSDG 2 - Zero HungerImage resolutionRemote sensingProceedings of SPIE
researchProduct

Introduction of Multiflow for HSDPA

2012

This paper introduces a multi-cell transmission scheme for High-Speed Downlink Packet Access (HSDPA) networks, called Multiflow. In this concept, downlink data is transmitted to a user terminal at the border of two cells from one or both of the cells. The cells may belong to same NodeB or to two different NodeBs. The data flows are separated by different scrambling codes used by each associated cell, thus the flows can be treated independently. This provides increased multi-user diversity by means of flexibility in downlink resource management, in addition to the spatial diversity of multiple transmission locations. Another important gain mechanism for this scheme is realized by short-term …

ta113Computer scienceNetwork packetbusiness.industryHSDPALoad balancing (computing)Antenna diversityMonipistelähetysScramblingHandoverTelecommunications linkNetwork performanceNodeBbusinessMultipoint transmissionComputer network2012 5th International Conference on New Technologies, Mobility and Security (NTMS)
researchProduct

Adaptive framework for network traffic classification using dimensionality reduction and clustering

2012

Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then …

ta113Computer scienceNetwork securitybusiness.industryDimensionality reductionintrusion detectionk-meansdiffusion mapServer logcomputer.software_genreanomaly detectionTraffic classificationkoneoppiminenWeb log analysis softwareAnomaly detectionData miningWeb servicetiedonlouhintaCluster analysisbusinesscomputern-grams
researchProduct

Software-as-a-Service Revenue Models

2013

This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations.

ta113Computer sciencebusiness.industrycomputer.internet_protocolSoftware as a serviceSoftware developmentInformation technologyCloud computingService-oriented architectureComputer securitycomputer.software_genreComputer Science ApplicationsEngineering managementRevenue modelHardware and ArchitectureRevenue assuranceYield managementbusinesscomputerSoftwareIT Professional
researchProduct