Search results for "Information Systems."

showing 10 items of 1545 documents

Interactive Multiple Criteria Decision Making based on preference driven Evolutionary Multiobjective Optimization with controllable accuracy

2012

Abstract We present an approach to interactive Multiple Criteria Decision Making based on preference driven Evolutionary Multiobjective Optimization with controllable accuracy. The approach relies on formulae for lower and upper bounds on coordinates of the outcome of an arbitrary efficient variant corresponding to preference information expressed by the Decision Maker. In contrast to earlier works on that subject, here lower and upper bounds can be calculated and their accuracy controlled entirely within evolutionary computation framework. This is made possible by exploration of not only the region of feasible variants – a standard within evolutionary optimization, but also the region of i…

ta113Mathematical optimizationInformation Systems and ManagementGeneral Computer ScienceComputationta111Contrast (statistics)Interactive evolutionary computationManagement Science and Operations ResearchMulti-objective optimizationOutcome (game theory)Industrial and Manufacturing EngineeringEvolutionary computationModeling and SimulationPreference (economics)Evolutionary programmingMathematicsEuropean Journal of Operational Research
researchProduct

Synchronous R-NSGA-II: An Extended Preference-Based Evolutionary Algorithm for Multi-Objective Optimization

2015

Classical evolutionary multi-objective optimization algorithms aim at finding an approx- imation of the entire set of Pareto optimal solutions. By considering the preferences of a decision maker within evolutionary multi-objective optimization algorithms, it is possible to focus the search only on those parts of the Pareto front that satisfy his/her preferences. In this paper, an extended preference-based evolutionary algorithm has been proposed for solving multi-objective optimiza- tion problems. Here, concepts from an interactive synchronous NIMBUS method are borrowed and combined with the R-NSGA-II algorithm. The proposed synchronous R-NSGA-II algorithm uses preference information provid…

ta113Mathematical optimizationinteractive multi-objective optimizationApplied MathematicsEvolutionary algorithmApproxDecision makerMulti-objective optimizationscalarizing functionSet (abstract data type)Pareto optimalevolutionary multi-objective optimizationpreference-based evolutionary algorithmsFocus (optics)Preference (economics)Information SystemsMathematicsInformatica
researchProduct

Consumer value of camera-based mobile interaction with the real world

2013

Camera-based mobile interaction with the real world allows consumers to connect digital information with the real-world environment, and furthermore, to interact with real-world objects and places. To explore and understand the types of consumer value in the context of such consumer-level applications, we applied the critical incident technique to reflect actual use experiences from 107 application users with a recognized consumer value framework by Holbrook. The findings of the study suggest that at the current state value is heavily based on utilitarian efficiency and excellence. Although the applications enable a diverse value, they have yet to fulfill their potential in providing hedoni…

ta113MultimediaComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subjectContext (language use)computer.software_genreComputer Science ApplicationsHardware and ArchitectureHuman–computer interactionExcellenceState (computer science)ta512computerCritical Incident TechniqueValue (mathematics)Mobile interactionSoftwareInformation SystemsValue frameworkActual usemedia_commonPervasive and Mobile Computing
researchProduct

Continuous Requirements Risk Profiling in Information Systems Development

2015

With the increasing adoption of agile, lean, and iterative development methods, information systems development (ISD) has become continuous, meaning that system development moves rapidly from release to release. This means that work practices and challenges that practitioners face have changed. Despite these changes, requirements development is still critical in ISD. However, IS literature is silent on how to manage requirements-related risks in the practice of continuous IS development. To fill this gap, we propose a continuous requirements risk profiling method. The study is informed by design science research methodology, and we apply focus group interviews and a Delphi study for data co…

ta113Requirements managementIterative and incremental developmentProcess managementKnowledge managementbusiness.industryComputer sciencerisk profilingRisk management information systemsvaatimusmäärittelytinformation systemsrisk managementinformation systems developmentohjelmistosuunnitteluSoftwareISDInformation systemriskianalyysiohjelmistokehitysbusinessDesign methodsRisk managementsoftware engineeringtietojärjestelmätAgile software development2015 48th Hawaii International Conference on System Sciences
researchProduct

Consumers’ adoption of information services

2013

This paper reports on a design science research study that seeks to investigate how information service components affect consumers’ potential adoption of such services. More specifically, the paper develops a conceptual model that uses the theory of organizational information services (TOIS) and the unified theory of acceptance and use of technology (UTAUT) as a basis. The results indicate that individual constructs can be linked to service components. In turn, this result can potentially be instrumental in progress toward a deeper understanding of consumers’ adoption of information services and how this affects the development of such services and systems that support them.

ta113Service (business)Information Systems and ManagementKnowledge managementbusiness.industrymedia_common.quotation_subjectServices computingUnified theory of acceptance and use of technologyAffect (psychology)Management Information SystemsConceptual modelInformation systemDesign science researchBusinessMarketingInformation Systemsmedia_commonInformation & Management
researchProduct

Flexible entity search on surfaces

2016

Surface computing allows flexible search interaction where users can manipulate the representation of entities recommended for them to create new queries or augment existing queries by taking advantage of increased screen estate and almost physical tactile interaction. We demonstrate a search system based on 1) Direct Manipulation of Entity Representation on Surfaces and 2) Entity Recommendation and Document Retrieval. Entities are modeled as a knowledge-graph and the relevances of entities are computed using the graph structure. Users can manipulate the representation of entities via spatial grouping and assigning preferences on entities. Our contribution can help to design effective infor…

ta113Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniInformation retrievalSettore INF/01 - InformaticaComputer science020207 software engineering02 engineering and technologyEntity searchSurface computing020204 information systems0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)Information explorationDocument retrievalInformation explorationSurface computing
researchProduct

A two-step, user-centered approach to personalized tourist recommendations

2017

Geo-localized, mobile applications can simplify a tourist visit, making the relevant Point of Interests more easily and promptly discernible to users. At the same time, such solutions must avoid creating unfitting or rigid user profiles that impoverish the users' options instead of refining them. Currently, user profiles in recommender systems rely on dimensions whose relevance to the user is more often presumed than empirically defined. To avoid this drawback, we build our recommendation system in a two-step process, where profile parameters are evaluated preliminarily and separately from the recommendations themselves. We describe this two-step evaluation process including an initial surv…

ta113Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniTourist applicationEngineeringUser profileSettore INF/01 - InformaticaPoint (typography)Process (engineering)Computer Applicationsbusiness.industry02 engineering and technologyRecommender systemWorld Wide WebTourist applicationsUser validationHuman–computer interaction020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingGeneralizability theoryRelevance (information retrieval)businessDrawbackProceedings of the 12th Biannual Conference on Italian SIGCHI Chapter
researchProduct

Social Collaborative Viewpoint Regression with Explainable Recommendations

2017

A recommendation is called explainable if it not only predicts a numerical rating for an item, but also generates explanations for users' preferences. Most existing methods for explainable recommendation apply topic models to analyze user reviews to provide descriptions along with the recommendations they produce. So far, such methods have neglected user opinions and influences from social relations as a source of information for recommendations, even though these are known to improve the rating prediction. In this paper, we propose a latent variable model, called social collaborative viewpoint regression (sCVR), for predicting item ratings based on user opinions and social relations. To th…

ta113Topic modelInformation retrievalComputer sciencetopic modeling02 engineering and technologyRecommender systemtrusted social relationsViewpointsSocial relationRegression020204 information systemsBenchmark (surveying)0202 electrical engineering electronic engineering information engineeringuser comment analysis020201 artificial intelligence & image processingrecommender systemsTupleLatent variable modelProceedings of the Tenth ACM International Conference on Web Search and Data Mining
researchProduct

A Novel Model for Cybersecurity Economics and Analysis

2017

In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…

ta113Value (ethics)Computer sciencemedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTING020207 software engineering02 engineering and technologyBusiness activitiesComputer securitycomputer.software_genrecybersecurity economicscyber fraudadvanced cyber threatstaloudelliset vaikutuksetcost-benefit model020204 information systemsCyber-security regulation0202 electrical engineering electronic engineering information engineeringResearch developmentkyberturvallisuuscomputercybersecurity impactReputationmedia_common2017 IEEE International Conference on Computer and Information Technology (CIT)
researchProduct

An Approach for Network Outage Detection from Drive-Testing Databases

2012

A data-mining framework for analyzing a cellular network drive testing database is described in this paper. The presented method is designed to detect sleeping base stations, network outage, and change of the dominance areas in a cognitive and self-organizing manner. The essence of the method is to find similarities between periodical network measurements and previously known outage data. For this purpose, diffusion maps dimensionality reduction and nearest neighbor data classification methods are utilized. The method is cognitive because it requires training data for the outage detection. In addition, the method is autonomous because it uses minimization of drive testing (MDT) functionalit…

ta113cellular network drive testing databaseDowntimeArticle SubjectDatabaseComputer Networks and CommunicationsComputer scienceDimensionality reductionData classificationDiffusion mapcomputer.software_genrelcsh:QA75.5-76.95Base stationHandoverCellular networklcsh:Electronic computers. Computer scienceData miningtiedonlouhintacomputerInformation SystemsTest dataJournal of Computer Networks and Communications
researchProduct