Search results for "cc"
showing 10 items of 30638 documents
Voice traffic bicasting enhancements in mobile HSPA network
2014
This paper discusses methods for improving the effectiveness of delivering voice traffic over High-Speed Downlink Packet Access (HSDPA) network by employing transmission diversity with Single-Frequency Dual-Cell (SF-DC) Aggregation that is part of the Multiflow specification. SF-DC Aggregation allows the user to be served at the same time by two different cells. The enhancements discussed in the paper capitalize strongly on the availability of the composed Channel Quality Indication (CQI) feedback at both serving cells. According to the results obtained from the network simulations, the ability to select the better channel for each voice transmission significantly decreases the required tra…
Anomaly detection approach to keystroke dynamics based user authentication
2017
Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…
Rehearsing to control depressive symptoms through a behavior change support system
2013
Depressive symptoms are generally coupled with distress and high treatment costs. We present our on-going research on a Web-based behavior change support system, which utilizes Acceptance and Commitment Therapy as a rehearsal tool. We present a summarized account of the research setting, studied persuasive software features, and a brief account of initial data analysis. Our work presents implications on design interventions for mental well-being and human-computer interaction.
Anomaly Detection Algorithms for the Sleeping Cell Detection in LTE Networks
2015
The Sleeping Cell problem is a particular type of cell degradation in Long-Term Evolution (LTE) networks. In practice such cell outage leads to the lack of network service and sometimes it can be revealed only after multiple user complains by an operator. In this study a cell becomes sleeping because of a Random Access Channel (RACH) failure, which may happen due to software or hardware problems. For the detection of malfunctioning cells, we introduce a data mining based framework. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving Base Station (BS). The crucial element of the developed framework is an anomaly detection algorithm. We compare perfor…
Schemata, Acculturation, and Cognition : Expatriates in Japan's Software Industry
2016
This multiple case based empirical study expands the knowledge around North American software and IT workers in Japan as well as the expatriate literature and discussion of cognitive schemata in cross cultural settings. The study includes eleven individuals, nine of them in software. Evidence of selection, rejection, and adjustment of cognitive schemata found in Japan's business world is presented. Changes in schemata drive cultural adjustment and acculturation. North American software and IT workers in Japan must maneuver through unfamiliar and often complex schemata to motivate, lead, manipulate, and communicate with coworkers and partners and thereby gain success.
Introduction to Integrating Knowledge and Learning Processes Minitrack
2013
This minitrack discusses knowledge management (KM) from an integrated perspective, i.e., the integration of KM, learning, and business processes. It mainly focuses on two issues: a) how can knowledge, learning and business processes integrated, and b) how can the related systems be integrated to enable an efficient workflow. Currently, even less learning environments take context and environment into account. Using mobile and ubiquitous technologies can lead to a paradigm shift in the construction of such learning environments: from static to highly contextualized knowledge and learning experiences. Based on the integration of knowledge and learning systems into social networks and social m…
Sensory modalities and mental content in product experience
2015
Contemporary research in human-technology interaction emphasises the need to focus on what people experience when they interact with technological artefacts. Understanding how people experience products requires detailed investigation of how physical design properties are mentally represented, and the theorisation of how people represent information obtained through different modalities still needs work. The objective of this study is to investigate how people experience modality-related affective aspects of products, using the psychological concept of mental content. For this purpose, we adopt the framework of user psychology, which is the sub-area of psychology involved with investigating…
Combining PCA and multiset CCA for dimension reduction when group ICA is applied to decompose naturalistic fMRI data
2015
An extension of group independent component analysis (GICA) is introduced, where multi-set canonical correlation analysis (MCCA) is combined with principal component analysis (PCA) for three-stage dimension reduction. The method is applied on naturalistic functional MRI (fMRI) images acquired during task-free continuous music listening experiment, and the results are compared with the outcome of the conventional GICA. The extended GICA resulted slightly faster ICA convergence and, more interestingly, extracted more stimulus-related components than its conventional counterpart. Therefore, we think the extension is beneficial enhancement for GICA, especially when applied to challenging fMRI d…
An Information Systems Design Product Theory for Integrated Requirements, Test and Defect Management Systems
2012
Software companies need to develop high-quality products fast and with low cost. Development activities are typically distributed in different places and involve multiple stakeholders in different countries. Testing is an important way to ensure product quality but it is costly and takes ample time and resources. Sourcing testing services from specialized service providers is often the most viable option for software businesses. Flexible and effective test process management is especially vital to support the testing life-cycle when external testing service providers are involved. Yet, the extant literature provides little theoretical guidance for managing the testing life-cycle, including …
Consumers’ adoption of information services
2013
This paper reports on a design science research study that seeks to investigate how information service components affect consumers’ potential adoption of such services. More specifically, the paper develops a conceptual model that uses the theory of organizational information services (TOIS) and the unified theory of acceptance and use of technology (UTAUT) as a basis. The results indicate that individual constructs can be linked to service components. In turn, this result can potentially be instrumental in progress toward a deeper understanding of consumers’ adoption of information services and how this affects the development of such services and systems that support them.