Search results for "11"
showing 10 items of 17291 documents
Flexible entity search on surfaces
2016
Surface computing allows flexible search interaction where users can manipulate the representation of entities recommended for them to create new queries or augment existing queries by taking advantage of increased screen estate and almost physical tactile interaction. We demonstrate a search system based on 1) Direct Manipulation of Entity Representation on Surfaces and 2) Entity Recommendation and Document Retrieval. Entities are modeled as a knowledge-graph and the relevances of entities are computed using the graph structure. Users can manipulate the representation of entities via spatial grouping and assigning preferences on entities. Our contribution can help to design effective infor…
A two-step, user-centered approach to personalized tourist recommendations
2017
Geo-localized, mobile applications can simplify a tourist visit, making the relevant Point of Interests more easily and promptly discernible to users. At the same time, such solutions must avoid creating unfitting or rigid user profiles that impoverish the users' options instead of refining them. Currently, user profiles in recommender systems rely on dimensions whose relevance to the user is more often presumed than empirically defined. To avoid this drawback, we build our recommendation system in a two-step process, where profile parameters are evaluated preliminarily and separately from the recommendations themselves. We describe this two-step evaluation process including an initial surv…
Real-time recognition of personal routes using instance-based learning
2011
Predicting routes is a critical enabler for many new location-based applications and services, such as warning drivers about congestion- or accident-risky areas. Hybrid vehicles can also utilize the route prediction for optimizing their charging and discharging phases. In this paper, a new lightweight route recognition approach using instance-based learning is introduced. In this approach, the current route is compared in real-time against the route instances observed in past, and the most similar route is selected. In order to assess the similarity between the routes, a similarity measure based on the longest common subsequence (LCSS) is employed, and an algorithm for incrementally evaluat…
Online activity traces around a "Boston bomber"
2013
This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.
Vertical Software Industry Evolution: The Impact of Software Costs and Limited Customer Base
2013
ContextSoftware systems are commonly used in a variety of industries as a means of automating organizational business processes. Initially, such software is often developed in-house by the vertical organizations possibly with the support of professional IT service providers; however, in many cases, internally developed software is eventually replaced with the software products provided by independent software vendors. These vendors often use license fees to recover their software development investments, as well as to gain some margin. However, if the vendor's customer base for a specific type of software is limited, then either the license fees are too high and hence the customers may pref…
Software Renting in the Era of Cloud Computing
2012
In the new era of computing, software can be sold and delivered as a cloud service, and software renting has become as a strategic tool to compete in the market. Software renting has several advantages from the customer's point of view. However, for software providers it is challenging to ensure a profitable revenue stream when a license fee is replaced by a periodic rental fee. In this study, software renting was found to help the case firms to differentiate themselves from competitors; it also increased their competitive advantage by making the software available for a larger customer group. However, the negotiating power of larger customers impacted on software pricing, rental agreements…
Omission of Causal Indicators: Consequences and Implications for Measurement – A Rejoinder
2016
LOCAL CONTROL OF SOUND IN STOCHASTIC DOMAINS BASED ON FINITE ELEMENT MODELS
2011
A numerical method for optimizing the local control of sound in a stochastic domain is developed. A three-dimensional enclosed acoustic space, for example, a cabin with acoustic actuators in given locations is modeled using the finite element method in the frequency domain. The optimal local noise control signals minimizing the least square of the pressure field in the silent region are given by the solution of a quadratic optimization problem. The developed method computes a robust local noise control in the presence of randomly varying parameters such as variations in the acoustic space. Numerical examples consider the noise experienced by a vehicle driver with a varying posture. In a mod…
Semi-automatic literature mapping of participatory design studies 2006--2016
2018
The paper presents a process of semi-automatic literature mapping of a comprehensive set of participatory design studies between 2006--2016. The data of 2939 abstracts were collected from 14 academic search engines and databases. With the presented method, we were able to identify six education-related clusters of PD articles. Furthermore, we point out that the identified clusters cover the majority of education-related words in the whole data. This is the first attempt to systematically map the participatory design literature. We argue that by continuing our work, we can help to perceive a coherent structure in the body of PD research.
Scalable Hierarchical Clustering: Twister Tries with a Posteriori Trie Elimination
2015
Exact methods for Agglomerative Hierarchical Clustering (AHC) with average linkage do not scale well when the number of items to be clustered is large. The best known algorithms are characterized by quadratic complexity. This is a generally accepted fact and cannot be improved without using specifics of certain metric spaces. Twister tries is an algorithm that produces a dendrogram (i.e., Outcome of a hierarchical clustering) which resembles the one produced by AHC, while only needing linear space and time. However, twister tries are sensitive to rare, but still possible, hash evaluations. These might have a disastrous effect on the final outcome. We propose the use of a metaheuristic algor…