Search results for "cc"

showing 10 items of 30638 documents

Voice traffic bicasting enhancements in mobile HSPA network

2014

This paper discusses methods for improving the effectiveness of delivering voice traffic over High-Speed Downlink Packet Access (HSDPA) network by employing transmission diversity with Single-Frequency Dual-Cell (SF-DC) Aggregation that is part of the Multiflow specification. SF-DC Aggregation allows the user to be served at the same time by two different cells. The enhancements discussed in the paper capitalize strongly on the availability of the composed Channel Quality Indication (CQI) feedback at both serving cells. According to the results obtained from the network simulations, the ability to select the better channel for each voice transmission significantly decreases the required tra…

ta113Access networkta213Computer sciencebusiness.industryNetwork packetCSoHSbicastingThroughputTransmission (telecommunications)HandovermultiflowTelecommunications linkHSPAVoHSSF-DC aggregationbusinessComputer networkPower controlCommunication channel
researchProduct

Anomaly detection approach to keystroke dynamics based user authentication

2017

Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…

ta113AuthenticationpääsynvalvontaComputer scienceaccess control02 engineering and technologycomputer.software_genreKeystroke dynamicstodentaminen020204 information systems0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Unsupervised learningauthentication020201 artificial intelligence & image processingAnomaly detectionData miningtietoturvadata securitycomputer
researchProduct

Rehearsing to control depressive symptoms through a behavior change support system

2013

Depressive symptoms are generally coupled with distress and high treatment costs. We present our on-going research on a Web-based behavior change support system, which utilizes Acceptance and Commitment Therapy as a rehearsal tool. We present a summarized account of the research setting, studied persuasive software features, and a brief account of initial data analysis. Our work presents implications on design interventions for mental well-being and human-computer interaction.

ta113DistressPsychotherapistWork (electrical)Control (management)Behavior changePsychological interventionRehearsingPsychologyAcceptance and commitment therapyta515Depressive symptomsCHI '13 Extended Abstracts on Human Factors in Computing Systems
researchProduct

Anomaly Detection Algorithms for the Sleeping Cell Detection in LTE Networks

2015

The Sleeping Cell problem is a particular type of cell degradation in Long-Term Evolution (LTE) networks. In practice such cell outage leads to the lack of network service and sometimes it can be revealed only after multiple user complains by an operator. In this study a cell becomes sleeping because of a Random Access Channel (RACH) failure, which may happen due to software or hardware problems. For the detection of malfunctioning cells, we introduce a data mining based framework. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving Base Station (BS). The crucial element of the developed framework is an anomaly detection algorithm. We compare perfor…

ta113Engineeringta213business.industryEvent (computing)Real-time computingProbabilistic logicdata miningSONanomaly detectionself-organizing networksLTEBase stationcell outageSoftwareRandom-access channelUser equipmentNetwork serviceAnomaly detectionmobile cellular networkstiedonlouhintabusiness
researchProduct

Schemata, Acculturation, and Cognition : Expatriates in Japan's Software Industry

2016

This multiple case based empirical study expands the knowledge around North American software and IT workers in Japan as well as the expatriate literature and discussion of cognitive schemata in cross cultural settings. The study includes eleven individuals, nine of them in software. Evidence of selection, rejection, and adjustment of cognitive schemata found in Japan's business world is presented. Changes in schemata drive cultural adjustment and acculturation. North American software and IT workers in Japan must maneuver through unfamiliar and often complex schemata to motivate, lead, manipulate, and communicate with coworkers and partners and thereby gain success.

ta113Knowledge managementExpatriatebusiness.industryComputer science05 social sciences050209 industrial relationsContext (language use)Cognitioncognitive schemataAcculturationexpatriatesEmpirical researchJapansoftware businessCultural diversity0502 economics and businessSelection (linguistics)Cross-culturalbusinessSocial psychologyta512acculturation050203 business & management
researchProduct

Introduction to Integrating Knowledge and Learning Processes Minitrack

2013

This minitrack discusses knowledge management (KM) from an integrated perspective, i.e., the integration of KM, learning, and business processes. It mainly focuses on two issues: a) how can knowledge, learning and business processes integrated, and b) how can the related systems be integrated to enable an efficient workflow. Currently, even less learning environments take context and environment into account. Using mobile and ubiquitous technologies can lead to a paradigm shift in the construction of such learning environments: from static to highly contextualized knowledge and learning experiences. Based on the integration of knowledge and learning systems into social networks and social m…

ta113Knowledge managementSocial networkbusiness.industryBusiness processComputer scienceEducational technologyAcculturationBusiness process managementWorkflowRelational capitalKnowledge integrationOrganizational learningPersonal knowledge managementApprenticeshipbusinessCompetence (human resources)2012 45th Hawaii International Conference on System Sciences
researchProduct

Sensory modalities and mental content in product experience

2015

Contemporary research in human-technology interaction emphasises the need to focus on what people experience when they interact with technological artefacts. Understanding how people experience products requires detailed investigation of how physical design properties are mentally represented, and the theorisation of how people represent information obtained through different modalities still needs work. The objective of this study is to investigate how people experience modality-related affective aspects of products, using the psychological concept of mental content. For this purpose, we adopt the framework of user psychology, which is the sub-area of psychology involved with investigating…

ta113Modalitiesmedia_common.quotation_subjectCognitionkäyttäjäpsykologiaVariance (accounting)Industrial and Manufacturing Engineeringproduct experienceuser psychologysensory modalityStimulus modalityFeelingmental contentArtificial IntelligenceContent analysisaffective interactionProduct (category theory)PsychologyThink aloud protocolSocial psychologymedia_commonCognitive psychologyInternational Conference on Applied Human Factors and Ergonomics
researchProduct

Combining PCA and multiset CCA for dimension reduction when group ICA is applied to decompose naturalistic fMRI data

2015

An extension of group independent component analysis (GICA) is introduced, where multi-set canonical correlation analysis (MCCA) is combined with principal component analysis (PCA) for three-stage dimension reduction. The method is applied on naturalistic functional MRI (fMRI) images acquired during task-free continuous music listening experiment, and the results are compared with the outcome of the conventional GICA. The extended GICA resulted slightly faster ICA convergence and, more interestingly, extracted more stimulus-related components than its conventional counterpart. Therefore, we think the extension is beneficial enhancement for GICA, especially when applied to challenging fMRI d…

ta113MultisetPCAGroup (mathematics)business.industrydimension reductionSpeech recognitionDimensionality reductionPattern recognitionMusic listeningta3112naturalistic fMRIGroup independent component analysisPrincipal component analysistemporal cocatenationArtificial intelligenceCanonical correlationbusinessmultiset CCAMathematics
researchProduct

An Information Systems Design Product Theory for Integrated Requirements, Test and Defect Management Systems

2012

Software companies need to develop high-quality products fast and with low cost. Development activities are typically distributed in different places and involve multiple stakeholders in different countries. Testing is an important way to ensure product quality but it is costly and takes ample time and resources. Sourcing testing services from specialized service providers is often the most viable option for software businesses. Flexible and effective test process management is especially vital to support the testing life-cycle when external testing service providers are involved. Yet, the extant literature provides little theoretical guidance for managing the testing life-cycle, including …

ta113Requirements managementTest strategyKnowledge managementProcess managementService product managementOffshoringTest managementComputer sciencebusiness.industrySystem testingSoftware performance testingService providerSoftware qualityOutsourcingSoftwareAcceptance testingPerformance engineeringManagement systemInformation systemNon-functional testingOperational acceptance testingbusinessSystem integration testing2012 45th Hawaii International Conference on System Sciences
researchProduct

Consumers’ adoption of information services

2013

This paper reports on a design science research study that seeks to investigate how information service components affect consumers’ potential adoption of such services. More specifically, the paper develops a conceptual model that uses the theory of organizational information services (TOIS) and the unified theory of acceptance and use of technology (UTAUT) as a basis. The results indicate that individual constructs can be linked to service components. In turn, this result can potentially be instrumental in progress toward a deeper understanding of consumers’ adoption of information services and how this affects the development of such services and systems that support them.

ta113Service (business)Information Systems and ManagementKnowledge managementbusiness.industrymedia_common.quotation_subjectServices computingUnified theory of acceptance and use of technologyAffect (psychology)Management Information SystemsConceptual modelInformation systemDesign science researchBusinessMarketingInformation Systemsmedia_commonInformation & Management
researchProduct