Search results for "Computer science"

showing 10 items of 22367 documents

Online user survey on current mobile augmented reality applications

2011

Augmented reality (AR) as an emerging technology in the mobile computing domain is becoming mature enough to engender publicly available applications for end users. Various commercial applications have recently been emerging in the mobile consumer domain at an increasing pace — Layar, Junaio, Google Goggles, and Wikitude are perhaps the most prominent ones. However, the research community lacks an understanding of how well such timely applications have been accepted, what kind of user experiences they have evoked, and what the users perceive as the weaknesses of the various applications overall. During the spring of 2011 we conducted an online survey to study the overall acceptance and user…

ta113World Wide WebUser experience designEmerging technologiesbusiness.industryComputer scienceEnd userMobile computingContext (language use)Augmented realityMobile telephonybusinessUser Research2011 10th IEEE International Symposium on Mixed and Augmented Reality
researchProduct

Value Co-Creation and Co-Destruction in Online Video Games : An Exploratory Study and Implications for Future Research

2018

In this empirical study we studied how players of online video games co-create and co-destroy value. From players’ perceptions we identified that value co-creation and co-destruction occur amid themes of giving feedback and building relations. Feedback encourages players but it may also be harmful in the form of verbal abuse. Building relations relates to making friends in general but also on an international level. Building relations also relates to competition that creates a bad spirit. The most intensive interplay between value co-creation and codestruction was found in gaming groups. Gaming groups motivate players to engage in intense gameplay, but at the same time they are resourcedema…

ta113arvoketjutKnowledge managementbusiness.industryComputer sciencevideopelitarvonluonti05 social sciencesExploratory researchComputingMilieux_PERSONALCOMPUTING050109 social psychologyvideo gamesOnline videovalue co-creationvalue co-destructionpelitpelillistäminen0502 economics and businessCo-creation050211 marketing0501 psychology and cognitive sciencesgamificationbusinessValue (mathematics)games
researchProduct

Career Transitions of eSports Athletes : A Proposal for a Research Framework

2017

eSports has boomed, the number of eSport athletes has grown rapidly, and many teenagers aspire to a have career in eSports. However, eSports athletes' careers involve many problems, such as career-entry difficulties, straining life habits, burnout, premature retirement, and post-career dilemmas. Despite a growing research interest in eSports, a void of knowledge exists regarding eSports athletes' career aspects. To address the gap in research, this paper aims to take an initial step by proposing a framework for eSports athletes' career transitions. The framework combines two approaches from sport psychology and sport literature. The framework can help eSports athletes, coaches, and other st…

ta113biologyLife habitAthleteselektroninen urheilu05 social sciencesApplied psychology050301 education030229 sport sciencesBurnoutbiology.organism_classificationSport psychologyurakehitysComputer Science Applications03 medical and health sciences0302 clinical medicineathletesConceptual frameworkeSportscareerPedagogyPsychology0503 educationtransitionsInternational Journal of Gaming and Computer-Mediated Simulations
researchProduct

On optimal relay placement for improved performance in non-coverage limited scenarios

2014

Low power nodes have been a hot topic in research, standardization, and industry communities, which is typically considered under an umbrella term called heterogeneous networking. In this paper we look at the problem of deploying optimally low power nodes in the context of relay networking, when an operator connects low power nodes (or small cells) via the wireless backhaul that uses the same spectrum and the same wireless access technology. We present an analytical model that can calculate optimal coordinates for low power nodes based on the input parameters, such as preferred number of nodes, their transmission power, parameters of the environment etc. The analytical calculations are comp…

ta113business.industryComputer sciencePreferred numberUmbrella termContext (language use)law.inventionPower (physics)Operator (computer programming)Transmission (telecommunications)RelaylawWirelessbusinessComputer network
researchProduct

Listwise Collaborative Filtering

2015

Recently, ranking-oriented collaborative filtering (CF) algorithms have achieved great success in recommender systems. They obtained state-of-the-art performances by estimating a preference ranking of items for each user rather than estimating the absolute ratings on unrated items (as conventional rating-oriented CF algorithms do). In this paper, we propose a new ranking-oriented CF algorithm, called ListCF. Following the memory-based CF framework, ListCF directly predicts a total order of items for each user based on similar users' probability distributions over permutations of the items, and thus differs from previous ranking-oriented memory-based CF algorithms that focus on predicting th…

ta113business.industryComputer scienceRecommender systemMachine learningcomputer.software_genreRankingcollaborative filteringBenchmark (computing)Collaborative filteringProbability distributionPairwise comparisonData miningArtificial intelligencerecommender systemsbusinessFocus (optics)computerranking-oriented collaborative filtering
researchProduct

SaaS architecture and pricing models

2014

In the new era of computing, SaaS software with different architectural characteristics might be priced in different ways. Even though both pricing and architectural characteristics are responsible for the success of the offering; the relationship between architectural and pricing characteristics has not been studied before. The present study fills this gap by employing a multi-case research. The findings accentuate that flexible and well-designed architecture enables different pricing models; however, poorly designed architecture limits also the pricing. Scalability and high level of modularity are the major enablers of a great variety of pricing models. Using public cloud services may lea…

ta113business.industryComputer scienceSoftware as a servicemedia_common.quotation_subjectArchitectural designCloud computingSaaS architecturehinnoitteluModularityVariety (cybernetics)SaaSNegotiationRisk analysis (engineering)ScalabilitycloudArchitecturebusinessSimulationmedia_common
researchProduct

Use of a Semantic Language to Reduce the Indeterminacy in Agents Communication

2014

In the field of agent communications uncertainty and vagueness in the message content and in the achievable results play a primordial role when two agents (human or artificial) communicate. Even though the importance of vagueness and uncertainty has been recognized long ago, only recently mechanisms related to the communications’ semantics that allow a practical approach have been designed; more specifically, the development of tools such as agent programming languages and frameworks, which is a field of intensive research. On the other hand, recent theoretical ideas, drawn from situation semantics theory and the works of Sutton on semantic information, support this work. This paper applies…

ta113business.industryComputer scienceVaguenessSemanticsOperational semanticscommunications semanticsSoftware agentWell-founded semanticsHuman–computer interactionmulti-agent systems programming languageFourth-generation programming languageArtificial intelligenceFifth-generation programming languageta518businessProgramming language theory
researchProduct

Automatic dynamic texture segmentation using local descriptors and optical flow

2012

A dynamic texture (DT) is an extension of the texture to the temporal domain. How to segment a DT is a challenging problem. In this paper, we address the problem of segmenting a DT into disjoint regions. A DT might be different from its spatial mode (i.e., appearance) and/or temporal mode (i.e., motion field). To this end, we develop a framework based on the appearance and motion modes. For the appearance mode, we use a new local spatial texture descriptor to describe the spatial mode of the DT; for the motion mode, we use the optical flow and the local temporal texture descriptor to represent the temporal variations of the DT. In addition, for the optical flow, we use the histogram of orie…

ta113business.industrySegmentation-based object categorizationComputer scienceTexture DescriptorComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONOptical flowScale-space segmentationPattern recognitionImage segmentationComputer Graphics and Computer-Aided DesignImage textureMotion fieldRegion growingComputer Science::Computer Vision and Pattern RecognitionHistogramComputer visionSegmentationArtificial intelligencebusinessSoftwareIEEE Transactions on Image Processing
researchProduct

An Approach for Network Outage Detection from Drive-Testing Databases

2012

A data-mining framework for analyzing a cellular network drive testing database is described in this paper. The presented method is designed to detect sleeping base stations, network outage, and change of the dominance areas in a cognitive and self-organizing manner. The essence of the method is to find similarities between periodical network measurements and previously known outage data. For this purpose, diffusion maps dimensionality reduction and nearest neighbor data classification methods are utilized. The method is cognitive because it requires training data for the outage detection. In addition, the method is autonomous because it uses minimization of drive testing (MDT) functionalit…

ta113cellular network drive testing databaseDowntimeArticle SubjectDatabaseComputer Networks and CommunicationsComputer scienceDimensionality reductionData classificationDiffusion mapcomputer.software_genrelcsh:QA75.5-76.95Base stationHandoverCellular networklcsh:Electronic computers. Computer scienceData miningtiedonlouhintacomputerInformation SystemsTest dataJournal of Computer Networks and Communications
researchProduct

Cognitive self-healing system for future mobile networks

2015

This paper introduces a framework and implementation of a cognitive self-healing system for fault detection and compensation in future mobile networks. Performance monitoring for failure identification is based on anomaly analysis, which is a combination of the nearest neighbor anomaly scoring and statistical profiling. Case-based reasoning algorithm is used for cognitive self-healing of the detected faulty cells. Validation environment is Long Term Evolution (LTE) mobile system simulated with Network Simulator 3 (ns-3) [1, 2]. Results demonstrate that cognitive approach is efficient for compensation of cell outages and is capable to improve network coverage. Anomaly analysis can be used fo…

ta113cognitionta213Performance managementComputer sciencebusiness.industryDistributed computingCognitiondata miningcomputer.software_genreAutomationanomaly detectionFault detection and isolation5G networksNetwork simulationcompensationcell outageRobustness (computer science)self-healingAnomaly detectionData miningbusinesscomputer5G2015 International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct