Search results for "EB"

showing 10 items of 15658 documents

Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications

2014

Abstract Constrained Application Protocol (CoAP) has been introduced as a simpler alternative to the Hypertext Transfer Protocol (HTTP) for connecting constrained smart objects to the Web. The adoption of the protocol depends on its relative advantage, and the cost–benefit associated with the use of the protocol is a significant factor affecting a protocol adoption decision. This paper aims at deepening the understanding of the cost–benefits of CoAP and identifies the application scenarios where its use is likely to be economically justifiable. The paper analyzes the costs of using CoAP and HTTP in the Web of Things (WoT) applications, by identifying the components of the total cost of owne…

ta113Information Systems and ManagementHypertext Transfer Protocolta213Cost efficiencyComputer scienceSmart objectsbusiness.industrycomputer.internet_protocolta111Computer securitycomputer.software_genreManagement Information SystemsConstrained Application ProtocolWeb of ThingsArts and Humanities (miscellaneous)Developmental and Educational PsychologyOverhead (computing)businessta512Protocol (object-oriented programming)computerInformation SystemsComputer networkDecision Support Systems
researchProduct

User session level diverse reranking of search results

2018

Most Web search diversity approaches can be categorized as Document Level Diversification (DocLD), Topic Level Diversification (TopicLD) or Term Level Diversification (TermLD). DocLD selects the relevant documents with minimal content overlap to each other. It does not take the coverage of query subtopics into account. TopicLD solves this by modeling query subtopics explicitly. However, the automatic mining of query subtopics is difficult. TermLD tries to cover as many query topic terms as possible, which reduces the task of finding a query's subtopics into finding a set of representative topic terms. In this paper, we propose a novel User Session Level Diversification (UserLD) approach bas…

ta113InternetInformation retrievalWeb search queryuser sessionComputer scienceCognitive NeuroscienceInformationSystems_INFORMATIONSTORAGEANDRETRIEVAL02 engineering and technologyGraphComputer Science Applicationssearch result rerankingQuery expansionsession graphArtificial IntelligenceWeb query classification020204 information systems0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)020201 artificial intelligence & image processingtiedonhakuhakutuloksetsearch result diversification
researchProduct

Formal specification of open standards and the case of RSS v2.0

2014

Open standardization seems to be very popular among software developers as it makes the standard's adoption by the software engineering community easier and smoother. Formal specification methods, on the other hand, while very promising, are being adopted by protocol engineers very slowly; the industry seems to have little motivation to move into this, almost unknown, territory.In this paper the authors present the i) idea of applying formal methods (formal specification techniques) to open standards' specifications, and ii) an example of a formal specification of open standards, RSS v2.0 in particular. The authors support and provide evidence for the advantages of the open standards formal…

ta113Language Of Temporal Ordering SpecificationProgramming languageComputer scienceFormal specificationObject languageAlgebraic specificationSpecification languageRefinementcomputer.software_genreFormal methodscomputerFormal verification
researchProduct

Issues with a course that emphasizes self-direction

2013

In this paper, we examine a master's level course that emphasizes self-direction on the part of students. The course is run by weekly group assignments and requires independent work such that only one mandatory classroom session is arranged each week. Our specific research interests are how students responded to the setting of this kind and whether they demonstrated self-direction during the course. We surveyed the students' view of the course, their group work experience, and their study habits, and analyzed the resultant survey data for themes. The results suggest that while the pass rate was considerably high and the course was regarded as well-organized by the students, there were sever…

ta113Medical educationComputer scienceeducationPass rateSelf directionSession (web analytics)Course (navigation)Work (electrical)PedagogyActive learningComputingMilieux_COMPUTERSANDEDUCATIONSurvey data collectionta516Group work
researchProduct

A two-step, user-centered approach to personalized tourist recommendations

2017

Geo-localized, mobile applications can simplify a tourist visit, making the relevant Point of Interests more easily and promptly discernible to users. At the same time, such solutions must avoid creating unfitting or rigid user profiles that impoverish the users' options instead of refining them. Currently, user profiles in recommender systems rely on dimensions whose relevance to the user is more often presumed than empirically defined. To avoid this drawback, we build our recommendation system in a two-step process, where profile parameters are evaluated preliminarily and separately from the recommendations themselves. We describe this two-step evaluation process including an initial surv…

ta113Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniTourist applicationEngineeringUser profileSettore INF/01 - InformaticaPoint (typography)Process (engineering)Computer Applicationsbusiness.industry02 engineering and technologyRecommender systemWorld Wide WebTourist applicationsUser validationHuman–computer interaction020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingGeneralizability theoryRelevance (information retrieval)businessDrawbackProceedings of the 12th Biannual Conference on Italian SIGCHI Chapter
researchProduct

Online activity traces around a "Boston bomber"

2013

This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.

ta113Social networkbusiness.industryInternet privacyTragedy (event)ComputingMilieux_LEGALASPECTSOFCOMPUTINGThe InternetSocial mediaSociologySuspectbusinessWeb crawlerDigital mediaProceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
researchProduct

Online anomaly detection using dimensionality reduction techniques for HTTP log analysis

2015

Modern web services face an increasing number of new threats. Logs are collected from almost all web servers, and for this reason analyzing them is beneficial when trying to prevent intrusions. Intrusive behavior often differs from the normal web traffic. This paper proposes a framework to find abnormal behavior from these logs. We compare random projection, principal component analysis and diffusion map for anomaly detection. In addition, the framework has online capabilities. The first two methods have intuitive extensions while diffusion map uses the Nyström extension. This fast out-of-sample extension enables real-time analysis of web server traffic. The framework is demonstrated using …

ta113Web serverComputer Networks and Communicationsbusiness.industryComputer scienceRandom projectionDimensionality reductionRandom projectionPrincipal component analysisIntrusion detection systemAnomaly detectionMachine learningcomputer.software_genreCyber securityWeb trafficPrincipal component analysisDiffusion mapAnomaly detectionIntrusion detectionArtificial intelligenceData miningWeb servicebusinesskyberturvallisuuscomputer
researchProduct

Visualization in the integrated SimPhoNy multiscale simulation framework

2018

Abstract We describe three distinct approaches to visualization for multiscale materials modelling research. These have been developed with the framework of the SimPhoNy FP7 EU-project, and complement each other in their requirements and possibilities. All have been integrated via wrappers to one or more of the simulation approaches within the SimPhoNy project. In this manuscript we describe and contrast their features. Together they cover visualization needs from electronic to macroscopic scales and are suited to simulations made on personal computers, workstations or advanced High Performance parallel computers. Examples as well as recommendations for future calculations are presented.

ta113Workstation010308 nuclear & particles physicsComputer scienceGeneral Physics and AstronomyElectronic charge density01 natural scienceselectronic charge densityComputational scienceVisualizationComplement (complexity)law.inventionatomisticHardware and Architecturelaw0103 physical sciencesCover (algebra)010306 general physicsvisualizationfluidComputer Physics Communications
researchProduct

Online user survey on current mobile augmented reality applications

2011

Augmented reality (AR) as an emerging technology in the mobile computing domain is becoming mature enough to engender publicly available applications for end users. Various commercial applications have recently been emerging in the mobile consumer domain at an increasing pace — Layar, Junaio, Google Goggles, and Wikitude are perhaps the most prominent ones. However, the research community lacks an understanding of how well such timely applications have been accepted, what kind of user experiences they have evoked, and what the users perceive as the weaknesses of the various applications overall. During the spring of 2011 we conducted an online survey to study the overall acceptance and user…

ta113World Wide WebUser experience designEmerging technologiesbusiness.industryComputer scienceEnd userMobile computingContext (language use)Augmented realityMobile telephonybusinessUser Research2011 10th IEEE International Symposium on Mixed and Augmented Reality
researchProduct

Research literature clustering using diffusion maps

2013

We apply the knowledge discovery process to the mapping of current topics in a particular field of science. We are interested in how articles form clusters and what are the contents of the found clusters. A framework involving web scraping, keyword extraction, dimensionality reduction and clustering using the diffusion map algorithm is presented. We use publicly available information about articles in high-impact journals. The method should be of use to practitioners or scientists who want to overview recent research in a field of science. As a case study, we map the topics in data mining literature in the year 2011. peerReviewed

ta113kirjallisuuskatsausklusterointiComputer scienceProcess (engineering)Dimensionality reductiondiffuusiokuvausta111Diffusion mapKeyword extractionliterature mappingdiffusion mapKnowledge discovery processLibrary and Information Sciencescomputer.software_genreData scienceField (geography)Computer Science ApplicationsKnowledge extractionTiedonhavaitsemisprosessitiedonlouhintaCluster analysiscomputerWeb scrapingclustering
researchProduct