Search results for "Computer technology"

showing 10 items of 40 documents

Collaborative Learning and Computer-Supported Collaborative Learning Environments

2008

A focus on purely individual cognition has set a stage to social construction of knowledge. New learning environments, in many cases supported by computer technology, are often based on collaborating and sharing expertise. As a result research on Computer Supported Collaborative learning (CSCL) environments is a significant and growing field, which actively seeks new methods to resolve the challenges of human learning across diverse levels of interaction in a modern information society. In this chapter we will discuss the concept of collaborative learning and the issues involved in using information and communication technology to support collaborative learning. We begin with the definition…

Team learningKnowledge managementComputer-supported collaborative learningbusiness.industryInformation and Communications TechnologyComputer scienceProfessional learning communityEducational technologyCollaborative learningInformation societybusinessComputer technology
researchProduct

What do citizens think of AI adoption in public services? Exploratory research on citizen attitudes through a social contract lens

2023

The adoption of Artificial Intelligence (AI) by the public sector has the potential to improve service delivery. However, the risks related to AI are significant and citizen concerns have halted several AI initiatives. In this paper we report findings from an empirical study on citizens´ attitudes towards AI use in public services in Norway. We found a generally positive attitude and identified three factors contributing to this: a) the high level of trust in government; b) the reassurance provided by having humans in the loop; c) the perceived transparency into processes, data used for AI models and models´ inner workings. We interpret these findings through the lens of social contract the…

VDP::Computer technology: 551VDP::Datateknologi: 551
researchProduct

Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks

2010

Published version of an article from the journal : Science in China, Series F: Information Sciences. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11432-010-0096-7 In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical or digest data (e.g., average temperature in a day), instead of real-time data, are of interest. The data are not instantly forwarded to a central sink upon sensing, thereby saving communication energy for transmission. Such a paradigm can also improve data survivability by m…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551General Computer Sciencebusiness.industryComputer scienceSecret sharingData integrityComputer data storageDistributed data storeDependabilityVerifiable secret sharingbusinessWireless sensor networkByzantine fault toleranceComputer networkScience China Information Sciences
researchProduct

Accelerated Bayesian learning for decentralized two-armed bandit based decision making with applications to the Goore Game

2012

Published version of an article in the journal: Applied Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/s10489-012-0346-z The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, Quality of Service (QoS) control, game playing, and resource allocation, can be solved …

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Bayesian learningVDP::Technology: 500::Information and communication technology: 550::Computer technology: 551Optimization problembusiness.industryComputer scienceGoore GameBayesian inferenceMulti-armed banditquality of service controldecentralized decision makingArtificial IntelligenceInfluence diagramResource allocationArtificial intelligencebandit problemswireless sensor networksbusinessWireless sensor networkOptimal decisionApplied Intelligence
researchProduct

A two-armed bandit based scheme for accelerated decentralized learning

2011

Published version of a chapter from the book: Modern Approaches in Applied Intelligence. Also available at SpringerLink: http://dx.doi.org/10.1007/978-3-642-21827-9_54 The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, QoS control, game playing, and resource allocation, can be solved in a …

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551
researchProduct

Maritime data integration using standard ISO 15926

2010

Paper presented at the Twentieth (2010) International Offshore and Polar Engineering Conference. Also available on the Conference site: http://www.isope.org/publications/proceedings/ISOPE/ISOPE%202010/data/toc.htm The Oil & Gas industry is moving forward with Integrated Operations (IO). This includes a strong focus on data integration issues. There are different ways to achieve data integration, and ontology-based approaches have drawn much attention. For maritime data integration, the international standard ISO 15926 has been developed to integrate and represent the information in and across process plants. In this article, we follow the ontology-based approach and use the ISO 15926 standa…

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551
researchProduct

Using SIP Presence for Remote Service Awareness

2008

Residential networks usually protect its devices and services behind firewalls and use private IP addresses. Therefore, appliances within a residential network cannot be discovered and utilized from external networks by standardized technologies as UPnP. In this paper, we present our concept of “Service Presence”, based on the 3GPP Presence Service that makes the service presence information remotely discoverable.

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551
researchProduct

IT-sikkerhetspolicy for Integrerte operasjoner

2007

Masteroppgave i informasjons- og kommunikasjonsteknologi 2007 – Høgskolen i Agder, Grimstad Ved å benytte IKT i alle ledd i oljeindustrien, vil man oppnå hurtigere og bedre beslutninger, og med hjelp av sanntidsdata kan man integrere arbeidsprosesser på tvers av fag og mellom organisasjoner. Denne utviklingen blir i oljenæringen kalt Integrerte operasjoner (IO). Ved hjelp av IO kan operasjoner styres uavhengig av avstand og geografisk lokasjon. Det er satt inn store ressurser på dette feltet, og allerede i dag ser man vellykkede implementeringer av Integrerte operasjoner. Med Internett som en del av bærenettverket for data produsert i oljenæringen, vil trafikken i utgangspunktet være svært …

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551IKT590VDP::Technology: 500::Marine technology: 580::Offshore technology: 581
researchProduct

Kunnskapsdeling gjennom historiefortelling : en casestudie av en smidig prosjektorganisasjon

2010

Masteroppgave i informasjonstudier- Universitetet i Agder 2010 Historier kan spille en viktig rolle for å oppnå effektiv kunnskapsdeling. Kunnskapsdeling både under og etter et IS-prosjekt er sentralt for å kunne utvikle en best mulig løsning for oppdragsgiver og for å unngå at feiltrinn gjentas i neste prosjekt. Hvilken form kunnskapen deles på, og hvorvidt den bidrar til læring og innsikt, kommer an på hvilken type kunnskap som ønskes delt og hvor godt formen den formidles på egner seg. Det er for eksempel stor forskjell på innsikt som kan formidles gjennom å lese en brukermanual utviklet for et ITsystem og den innsikt som kan formidles gjennom historiefortelling om bruken av systemet. De…

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551IS 501
researchProduct

Personlighetstrekk og ytelse i IT-supportteam

2014

Masteroppgave informasjonssystemer- Universitetet i Agder, 2014 Kontekst: Personlighetstypetesting har i varierende grad blitt benyttet innen rekruttering og bemanningsbyråer. Slike tester er også innen forskning betraktet som instrumenter for å forutse individuell ytelse og teamytelse innenfor en rekke fagområder. Forskning har vist at også andre faktorer som motivasjon, arbeidsmiljø og aktiv bruk av målsetting påvirker ytelse generelt. Hensikt: Denne avhandlingen rapporterer resultatene fra en studie hvor vi har benyttet Five Factor Model (FFM) for å se på sammenhengen mellom personlighetstrekk og IT-supportteams ytelse. Metoder: Vi har benyttet en induktiv/kontekstbasert forskningstilnær…

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551IS 501
researchProduct