Search results for "communication technology"
showing 10 items of 360 documents
On utilizing dependence-based information to enhance micro-aggregation for secure statistical databases
2011
Published version of an article in the journal: Pattern Analysis and Applications. Also available from the publisher at: http://dx.doi.org/10.1007/s10044-011-0199-9 We consider the micro-aggregation problem which involves partitioning a set of individual records in a micro-data file into a number of mutually exclusive and exhaustive groups. This problem, which seeks for the best partition of the micro-data file, is known to be NP-hard, and has been tackled using many heuristic solutions. In this paper, we would like to demonstrate that in the process of developing micro-aggregation techniques (MATs), it is expedient to incorporate information about the dependence between the random variable…
A Research Review on Building Information Modeling in Construction―An Area Ripe for IS Research
2012
Published version of article of an article in the journal: Communications of the Association for Information Systems. Also available from the publisher : http://http://aisel.aisnet.org/cais/vol31/iss1/10/ This article presents a review of the research on Building Information Modeling (BIM) in construction, with the aim of identifying areas in this domain where IS research can contribute. The concept of BIM comprises an infrastructure of IT tools supporting collaborative and integrated design, assembly, and operation of buildings. This integrated construction approach, with all stakeholders editing or retrieving information from commonly shared models, requires major changes to well-establis…
A User-Centric Approach for Personalized Service Provisioning in Pervasive Environments
2011
Published version of an article published in Wireless Personal Communications (2011). Also available from the publisher at http://dx.doi.org/10.1007/s11277-011-0387-3 The vision of pervasive environments is being realized more than ever with the proliferation of services and computing resources located in our surrounding environments. Identifying those services that deserve the attention of the user is becoming an increasingly-challenging task. In this paper, we present an adaptive multi-criteria decision making mechanism for recommending relevant services to the mobile user. In this context, "Relevance" is determined based on a user-centric approach that combines both the reputation of the…
How and when do mobile media demands impact well-being? Explicating the integrative model of mobile media use and need experiences (IM3UNE)
2021
Using mobile media can be both detrimental and beneficial for well-being. Thus, explaining how and when they elicit such effects is of crucial importance. To explicate boundary conditions and processes for digital well-being, this article introduces the Integrative Model of Mobile Media Use and Need Experiences (IM³UNE). Instead of assuming mobile media to be pathogenic, the IM³UNE offers a salutogenic perspective—it focuses on how we can stay healthy when using mobile media ubiquitously in daily life. More specifically, the model assumes that both the satisfaction and the frustration of basic psychological needs are key underlying mechanisms linking demanding mobile media use to well-being…
Towards an integrated approach to emergency management: interdisciplinary challenges for research and practice
2015
This article presents an interdisciplinary vision for large-scale integrated emergency management that has been inspired by the transition from platform centric to integrated operations in the oil and gas fields, which uses remote emergency control centres collaborating virtually with local responders. The article discusses some of the most salient research challenges for integrated emergency management, including the role of mobile technology, human-centred sensing, citizen participation and social media, and the socio-cultural determinants of disaster management. The purpose of this article is to frame an integrated emergency management approach that adopts a multi-disciplinary approach, …
Trust-aware RBAC
2012
Published version of a chapter in the book: Computer Network Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-33704-8_9 In this paper we propose a trust-aware enhancement of RBAC (TA-RBAC) that takes trustworthiness of users into consideration explicitly before granting access. We assume that each role in the framework is associated with an expression that describe trustworthiness of subjects required to be able to activate the role, and each subject (user) has assigned trustworthiness level in the system. By adding trustworthiness constraints to roles we enhance system, for example, with more flexible ability to delegate roles, to control reading/updating…
How Quickly Can We Predict Users’ Ratings on Aesthetic Evaluations of Websites? Employing Machine Learning on Eye-Tracking Data
2020
This study examines how quickly we can predict users’ ratings on visual aesthetics in terms of simplicity, diversity, colorfulness, craftsmanship. To predict users’ ratings, first we capture gaze behavior while looking at high, neutral, and low visually appealing websites, followed by a survey regarding user perceptions on visual aesthetics towards the same websites. We conduct an experiment with 23 experienced users in online shopping, capture gaze behavior and through employing machine learning we examine how fast we can accurately predict their ratings. The findings show that after 25 s we can predict ratings with an error rate ranging from 9% to 11% depending on which facet of visual ae…
A formal proof of the ε-optimality of absorbing continuous pursuit algorithms using the theory of regular functions
2014
Published version of an article from the journal: Applied Intelligence. Also available on Springerlink: http://dx.doi.org/10.1007/s10489-014-0541-1 The most difficult part in the design and analysis of Learning Automata (LA) consists of the formal proofs of their convergence accuracies. The mathematical techniques used for the different families (Fixed Structure, Variable Structure, Discretized etc.) are quite distinct. Among the families of LA, Estimator Algorithms (EAs) are certainly the fastest, and within this family, the set of Pursuit algorithms have been considered to be the pioneering schemes. Informally, if the environment is stationary, their ε-optimality is defined as their abili…
A non-stationary MIMO vehicle-to-vehicle channel model based on the geometrical T-junction model
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WCSP.2009.5371438 In this paper, we derive a non-stationary multiple-input multiple-output (MIMO) vehicle-to-vehicle (V2V) channel model from the geometrical T-junction model. The propagation environment is assumed to be extremely non-isotropic. The proposed channel model takes into account double…
Fornøyd med litt men ønsker seg likevel mer : gir nye versjoner av EPJ-system i helse- og omsorgssektoren i kommunene kontinuerlig forbedring?
2016
Masteroppgave i helse- og sosialinformatikk- Universitetet i Agder, 2016 Continuous development in health- and care services leads to the electronic patient record (EPR) systems to become more complex. It is important for municipalities to have systems that work, and acts as a support for workflows of everyday life, so that information regarding the patients are easily accessible and accurate. It is therefore important that new versions of EPR systems are delivered with good quality. This study focuses on municipalities' challenges with developing, testing and implementing new versions of old EPR system in health- and caregiving services. A qualitative study is conductet, with interviews of…