Search results for "Computer Science Application"

showing 10 items of 3998 documents

Customer segmentation based on commitment and ICT use

2009

PurposeThe purpose of this paper is to determine and characterize groups of retail customers, based on their perception of commitment to the retailer and the degree of use of its technological equipment.Design/methodology/approachA CHAID algorithm is performed and differences between the resulting segments are tested through the analysis of variance.FindingsFour segments are obtained that differ significantly in commitment to the retailer and level of use of the store's information and communication technology (ICT) facilities, as well as in other variables related to the retailer‐consumer relationship. In particular, customer segments differ in their use of retailers' payment facilities.Pr…

TypologyRelation (database)Strategy and Managementmedia_common.quotation_subjectPaymentInvestment (macroeconomics)CHAIDIndustrial and Manufacturing EngineeringComputer Science ApplicationsManagement Information SystemsMarket segmentationInformation and Communications TechnologyPerceptionIndustrial relationsBusinessMarketingmedia_commonIndustrial Management & Data Systems
researchProduct

The role of utility models in patent filing strategies: evidence from European countries

2018

We examine the role of utility models (UM) in patent filing strategies. With an extensive patent family data from European countries, we explore the structures and characteristics of patent families, which include UMs. A simple typology of patent families with UM members is introduced. We document that the geographical scope of most patent families with UM members is purely national, which is in line with the conventional view that the UM mechanism covers technologically and economically marginal inventions. However, the image of a UM as a signal of a minor invention is an oversimplification. Applicants exhibit a mixture of uses for the UM and there exists a subset of UM filings linked to i…

Typologypriority filingScope (project management)business.industrypatenttijärjestelmät05 social sciencesGeneral Social ScienceshyödyllisyysmallitAccountingLibrary and Information SciencesPriority filingUtility modelutility modelComputer Science Applications0502 economics and businesspatent familyPatentPatent familypatentit050207 economicsbusinessPatent system050203 business & managementUtility modelScientometrics
researchProduct

A DGS gesture dictionary for modelling on mobile devices

2017

ABSTRACTInteractive or Dynamic Geometry System (DGS) is a tool that help to teach and learn geometry using a computer-based interactive environment. Traditionally, the interaction with DGS is based on keyboard and mouse events where the functionalities are accessed using a menu of icons. Nevertheless, recent findings suggest that such a traditional model of interaction has a steep learning curve and is inadequate to develop DGS for devices with multi-touch screens. Thus, we propose a new interaction model for DGS based on a gesture dictionary which enables the construction and manipulation of geometric objects without the need of accessing a menu of icons. The dictionary is divided into thr…

USABILIDADE DE SOFTWAREInformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.HCI)Computer sciencebusiness.industry05 social sciences050301 educationComputer-Assisted InstructionInteraction modelUsabilityData_CODINGANDINFORMATIONTHEORYComputer Science ApplicationsEducationKernel (image processing)Learning curveHuman–computer interaction0501 psychology and cognitive sciencesHeuristicsbusiness0503 educationMobile device050107 human factorsGesture
researchProduct

Pervasive access to MRI bias artifact suppression service on a grid.

2009

Bias artifact corrupts magnetic resonance images in such a way that the image is afflicted by illumination variations. Some of the authors proposed the Exponential Entropy Driven - Homomorphic Unsharp Masking (E2D-HUM) algorithm that corrects this artifact without any a priori hypothesis about the tissues or the Magnetic Resonance image modality. Moreover, E2D-HUM does not care about the body part under examination and does not require any particular training task. People who want to use this algorithm, which is Matlab-based, have to set their own computers in order to execute it. Furthermore, they have to be Matlab-skilled to exploit all the features of the algorithm. In our work we propos…

Ubiquitous computingComputer scienceReal-time computingPelvisBiasMRI enhancementImage Processing Computer-AssistedHumansComputer visionKneeElectrical and Electronic EngineeringMATLABPervasive systemGrid servicescomputer.programming_languageSettore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionibusiness.industryBrainGeneral MedicineGridImage EnhancementMagnetic Resonance ImagingComputer Science ApplicationsSystems IntegrationComputers HandheldArtificial intelligenceUser interfacebusinessArtifactscomputerAlgorithmsBiotechnologyUnsharp maskingIEEE transactions on information technology in biomedicine : a publication of the IEEE Engineering in Medicine and Biology Society
researchProduct

Interacting with Augmented Environments

2010

Pervasive systems augment environments by integrating information processing into everyday objects and activities. They consist of two parts: a visible part populated by animate (visitors, operators) or inanimate (AI) entities interacting with the environment through digital devices, and an invisible part composed of software objects performing specific tasks in an underlying framework. This paper shows an ongoing work from the University of Palermo''s Department of Computer Science and Engineering that addresses two issues related to simplifying and broadening augmented environment access.

Ubiquitous computingComputer sciencebusiness.industryInformation processingMobile computingComputer Science ApplicationsSoftwareComputational Theory and MathematicsHuman–computer interactionpervasive computingPervasive systemsAugmented realityAugmented environmentUser interfacebusinessSoftwareComputer animationIEEE Pervasive Computing
researchProduct

Attosecond magnetization dynamics in non-magnetic materials driven by intense femtosecond lasers

2023

Irradiating solids with ultrashort laser pulses is known to initiate femtosecond timescale magnetization dynamics. However, sub-femtosecond spin dynamics have not yet been observed or predicted. Here, we explore ultrafast light-driven spin dynamics in a highly non-resonant strong-field regime. Through state-of-the-art ab-initio calculations, we predict that a non-magnetic material can be transiently transformed into a magnetic one via dynamical extremely nonlinear spin-flipping processes, which occur on attosecond timescales and are mediated by a combination of multi-photon and spin-orbit interactions. These are non-perturbative non-resonant analogues to the inverse Faraday effect that buil…

Ultrafest magnetismCondensed Matter - Mesoscale and Nanoscale PhysicsTDDFTMechanics of MaterialsModeling and SimulationMesoscale and Nanoscale Physics (cond-mat.mes-hall)Physics::OpticsFOS: Physical sciencesGeneral Materials ScienceSettore FIS/03 - Fisica Della MateriaPhysics - OpticsComputer Science ApplicationsOptics (physics.optics)
researchProduct

A Simulation Based Analysis of an Multi Objective Diffusive Load Balancing Algorithm

2018

In this paper, we presented a further development of our research on developing an optimal software-hardware mapping framework. We used the Petri Net model of the complete hardware and software High Performance Computing (HPC) system running a Computational Fluid Dynamics (CFD) application, to simulate the behaviour of the proposed diffusive two level multi-objective load-balancing algorithm. We developed an meta-heuristic algorithm for generating an approximation of the Pareto-optimal set to be used as reference. The simulations showed the advantages of this algorithm over other diffusive algorithms: reduced computational and communication overhead and robustness due to low dependence on u…

Uncertain dataComputer Networks and Communicationsbusiness.industryComputer scienceComputationLoad balancing (computing)Computational fluid dynamicsPetri netSupercomputerComputer Science ApplicationsSoftwareComputational Theory and MathematicsRobustness (computer science)businessAlgorithmInternational Journal of Computers Communications & Control
researchProduct

Perceived value of advanced mobile messaging services: A cross-cultural comparison of Greek and Spanish users

2017

PurposeThe purpose of this paper is to analyse the role of perceived value on post-acceptance behaviour for users of advanced mobile messaging services (AMMS). The paper also compares differences in the influence of perceived value on satisfaction and of satisfaction on loyalty to AMMS in Spain and Greece, to test the moderating effect of culture.Design/methodology/approachPartial least squares path modelling is used to test the model. Perceived value is modelled as a multidimensional reflective construct with four dimensions. Culture is studied at a national level. Differences between countries are tested using the multigroup analysis approach proposed by Henseleret al.(2009).FindingsPerce…

Uncertainty avoidancemedia_common.quotation_subject05 social sciencesLibrary and Information SciencesCross-cultural studiesComputer Science ApplicationsTest (assessment)Mobile phoneOrder (business)0502 economics and businessLoyalty050211 marketingPsychologyConstruct (philosophy)Social psychologyValue (mathematics)050203 business & managementInformation Systemsmedia_common
researchProduct

Social Interaction in YouTube Text-Based Polylogues: A Study of Coherence

2012

Since YouTube was launched, its emblematic video-sharing facility has attracted considerable attention as a social networking system of cultural production. In addition to vlogging, YouTube offers a text facility through which YouTubers share and negotiate opinions. However, research into the latter is scarce, especially within language-based disciplines (Androutsopoulos & Beiβwenger 2009; Zelenkauskaite & Herring 2008). This article contributes to addressing this imbalance by focusing on YouTube text-based ‘conversation’ (Herring 2010a). Specifically, it examines coherence in a corpus of YouTube postings in Spanish. Although coherence has been the object of much academic debate in other fo…

UnderlineComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subjectInformationSystems_INFORMATIONSTORAGEANDRETRIEVALMedia studiesObject (philosophy)Social relationComputer Science ApplicationsWorld Wide WebNegotiationConversationComputer-mediated communicationCoherence (linguistics)media_commonJournal of Computer-Mediated Communication
researchProduct

Developing Self-Awareness in Robots via Inner Speech

2019

The experience of inner speech is a common one. Such a dialogue accompanies the introspection of mental life and fulfills essential roles in human behavior, such as self-restructuring, self-regulation, and re-focusing on attentional resources. Although the underpinning of inner speech is mostly investigated in psychological and philosophical fields, the research in robotics generally does not address such a form of self-aware behavior. Existing models of inner speech inspire computational tools to provide a robot with this form of self-awareness. Here, the widespread psychological models of inner speech are reviewed, and a cognitive architecture for a robot implementing such a capability is…

Underpinningmedia_common.quotation_subjectlcsh:Mechanical engineering and machineryPsychological Modelslcsh:QA75.5-76.95human-robot interactioninner speechArtificial Intelligencelcsh:TJ1-1570media_commonOriginal ResearchCognitive scienceRobotics and AISettore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionibusiness.industryRoboticsrobotCognitive architectureComputer Science ApplicationsMental lifeSelf-awarenessIntrospectionRobotcognitive cycleArtificial intelligencelcsh:Electronic computers. Computer sciencebusinessPsychologyself-awareness
researchProduct