Search results for "Computer science"

showing 10 items of 22367 documents

Understanding beginners' mistakes with Haskell

2015

AbstractThis article presents an overview of student difficulties in an introductory functional programming (FP) course taught in Haskell. The motivation for this study stems from our belief that many student difficulties can be alleviated by understanding the underlying causes of errors and by modifying the educational approach and, possibly, the teaching language accordingly. We analyze students' exercise submissions and categorize student errors according to compiler error messages and then manually according to the observed underlying cause. Our study complements earlier studies on the topic by applying computer and manual analysis while focusing on providing descriptive statistics of d…

ta113Functional programmingDescriptive statisticsProgramming languageComputer scienceFunction applicationcomputer.software_genrebeginners' mistakesSyntaxCategorizationHaskellComputingMilieux_COMPUTERSANDEDUCATIONMathematics educationTeaching languagecomputer analysisHaskellCompilercomputerSoftwarecomputer.programming_languageJournal of Functional Programming
researchProduct

On the motivations to enroll in doctoral studies in Computer Science — A comparison of PhD program models

2013

While student motivation has been intensively researched, only a few studies cover motivation at doctoral level and even less focus on doctoral education in Computer Science. In this paper we investigate the motivation of graduate students to pursue doctoral studies specifically in Computer Science. We interviewed 63 doctoral students, from two different doctoral models (traditional and structured) in Finland and Austria, on their initial reasons and experiences that led them to enroll in doctoral studies. We identified five disjoint main motivational drivers that relate with different aspects of extrinsic and intrinsic motivation. Together with a measure of the strength of their initial mo…

ta113Graduate studentsComputer scienceDoctoral studiesPedagogyMathematics educationIntrinsic motivationta516Doctoral educationComputer aided instruction2013 12th International Conference on Information Technology Based Higher Education and Training (ITHET)
researchProduct

A modelling framework for social media monitoring

2013

This paper describes a hierarchical, three-level modelling framework for monitoring social media. Immediate social reality is modelled through the first level of the models. They represent various virtual communities at social media sites and adhere to the social world models of the sites, i.e., the "site ontologies". The second-level model is a temporal multirelational graph that captures the static and dynamic properties of the first-level models from the perspective of the monitoring site. The third-level model consists of a temporal relational database scheme that models the temporal multirelational graph within the database. The models are specified and instantiated at the monitoring s…

ta113Graph databaseComputer Networks and Communicationsbusiness.industryComputer scienceRelational databaseSocial realitySchematiccomputer.software_genreTemporal databaseHardware and ArchitectureGraph (abstract data type)The InternetSocial mediaData miningbusinesscomputerInformation SystemsInternational Journal of Web Engineering and Technology
researchProduct

A Generic Architecture for a Social Network Monitoring and Analysis System

2011

This paper describes the architecture and a partial implementation of a system designed for the monitoring and analysis of communities at social media sites. The main contribution of the paper is a novel system architecture that facilitates long-term monitoring of diverse social networks existing and emerging at various social media sites. It consists of three main modules, the crawler, the repository and the analyzer. The first module can be adapted to crawl different sites based on ontology describing the structure of the site. The repository stores the crawled and analyzed persistent data using efficient data structures. It can be implemented using special purpose graph databases and/or …

ta113Graph databaseDatabaseRelational databaseComputer scienceSystems architectureGraph (abstract data type)Persistent data structureOntology (information science)computer.software_genreSoftware architectureData structurecomputer2011 14th International Conference on Network-Based Information Systems
researchProduct

Twister Tries

2015

Many commonly used data-mining techniques utilized across research fields perform poorly when used for large data sets. Sequential agglomerative hierarchical non-overlapping clustering is one technique for which the algorithms’ scaling properties prohibit clustering of a large amount of items. Besides the unfavorable time complexity of O(n 2 ), these algorithms have a space complexity of O(n 2 ), which can be reduced to O(n) if the time complexity is allowed to rise to O(n 2 log2 n). In this paper, we propose the use of locality-sensitive hashing combined with a novel data structure called twister tries to provide an approximate clustering for average linkage. Our approach requires only lin…

ta113Hierarchical agglomerative clusteringta112Fuzzy clusteringBrown clusteringComputer scienceSingle-linkage clusteringcomputer.software_genreHierarchical clusteringLocality-sensitive hashingData setCURE data clustering algorithmlocality-sensitive hashingaverage linkageData miningHierarchical clustering of networkslinear complexityCluster analysishierarchical clusteringAlgorithmcomputerTime complexityProceedings of the 2015 ACM SIGMOD International Conference on Management of Data
researchProduct

Interface Detection Using a Quenched-Noise Version of the Edwards-Wilkinson Equation

2015

We report here a multipurpose dynamic-interface-based segmentation tool, suitable for segmenting planar, cylindrical, and spherical surfaces in 3D. The method is fast enough to be used conveniently even for large images. Its implementation is straightforward and can be easily realized in many environments. Its memory consumption is low, and the set of parameters is small and easy to understand. The method is based on the Edwards-Wilkinson equation, which is traditionally used to model the equilibrium fluctuations of a propagating interface under the influence of temporally and spatially varying noise. We report here an adaptation of this equation into multidimensional image segmentation, an…

ta113Image segmentationta114DiscretizationInterface (Java)Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONobject detectionimage edge detectionImage segmentationComputer Graphics and Computer-Aided DesignGrayscaleGray-scaleObject detectionSurface topographyNoiseMathematical modelThree-dimensional displaysSegmentationTomography3D image processingNoiseSurface morphologyAlgorithmSoftwareIEEE Transactions on Image Processing
researchProduct

Teaching programming by emphasizing self-direction: How did students react to the active role required of them?

2013

Lecturing is known to be a controversial form of teaching. With massed classrooms, in particular, it tends to constrain the active participation of students. One of the remedies applied to programming education is to use technology that can vitalize interaction in the classroom, while another is to base teaching increasingly on programming activities. In this article, we present the first results of an exploratory study, in which we teach programming without lectures, exams, or grades, by heavily emphasizing programming activity, and, in a pedagogical sense, student self-direction. This article investigates how students reacted to the active role required of them and what issues emerged in …

ta113Independent studyGeneral Computer ScienceComputer scienceTeaching methodScheduling (production processes)Exploratory researchSelf directionEducationPedagogyActive learningComputingMilieux_COMPUTERSANDEDUCATIONMathematics educationta516Action researchGroup workACM Transactions on Computing Education
researchProduct

Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications

2014

Abstract Constrained Application Protocol (CoAP) has been introduced as a simpler alternative to the Hypertext Transfer Protocol (HTTP) for connecting constrained smart objects to the Web. The adoption of the protocol depends on its relative advantage, and the cost–benefit associated with the use of the protocol is a significant factor affecting a protocol adoption decision. This paper aims at deepening the understanding of the cost–benefits of CoAP and identifies the application scenarios where its use is likely to be economically justifiable. The paper analyzes the costs of using CoAP and HTTP in the Web of Things (WoT) applications, by identifying the components of the total cost of owne…

ta113Information Systems and ManagementHypertext Transfer Protocolta213Cost efficiencyComputer scienceSmart objectsbusiness.industrycomputer.internet_protocolta111Computer securitycomputer.software_genreManagement Information SystemsConstrained Application ProtocolWeb of ThingsArts and Humanities (miscellaneous)Developmental and Educational PsychologyOverhead (computing)businessta512Protocol (object-oriented programming)computerInformation SystemsComputer networkDecision Support Systems
researchProduct

Investigating serendipity in recommender systems based on real user feedback

2018

Over the past several years, research in recommender systems has emphasized the importance of serendipity, but there is still no consensus on the definition of this concept and whether serendipitous items should be recommended is still not a well-addressed question. According to the most common definition, serendipity consists of three components: relevance, novelty and unexpectedness, where each component has multiple variations. In this paper, we looked at eight different definitions of serendipity and asked users how they perceived them in the context of movie recommendations. We surveyed 475 users of the movie recommender system, MovieLens regarding 2146 movies in total and compared tho…

ta113Information retrievalComputer scienceSerendipityuutuudetpalautesuosittelujärjestelmätNoveltyserendipityContext (language use)02 engineering and technologyVariation (game tree)Recommender systemunexpectednessPreferenceMovieLenssattumanovelty020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRelevance (information retrieval)relevancerecommender systemsProceedings of the 33rd Annual ACM Symposium on Applied Computing
researchProduct

A Hybrid Multigroup Coclustering Recommendation Framework Based on Information Fusion

2015

Collaborative Filtering (CF) is one of the most successful algorithms in recommender systems. However, it suffers from data sparsity and scalability problems. Although many clustering techniques have been incorporated to alleviate these two problems, most of them fail to achieve further significant improvement in recommendation accuracy. First of all, most of them assume each user or item belongs to a single cluster. Since usually users can hold multiple interests and items may belong to multiple categories, it is more reasonable to assume that users and items can join multiple clusters (groups), where each cluster is a subset of like-minded users and items they prefer. Furthermore, most of…

ta113Information retrievalComputer sciencebusiness.industrydata miningRecommender systemcomputer.software_genreTheoretical Computer ScienceInformation fusionKnowledge baseArtificial IntelligenceCollaborative FilteringScalabilityCluster (physics)Collaborative filteringLearning to rankData miningrecommender systemsCluster analysisbusinesscomputercluster analysisACM Transactions on Intelligent Systems and Technology
researchProduct