Search results for "communication technology"

showing 10 items of 360 documents

On utilizing dependence-based information to enhance micro-aggregation for secure statistical databases

2011

Published version of an article in the journal: Pattern Analysis and Applications. Also available from the publisher at: http://dx.doi.org/10.1007/s10044-011-0199-9 We consider the micro-aggregation problem which involves partitioning a set of individual records in a micro-data file into a number of mutually exclusive and exhaustive groups. This problem, which seeks for the best partition of the micro-data file, is known to be NP-hard, and has been tackled using many heuristic solutions. In this paper, we would like to demonstrate that in the process of developing micro-aggregation techniques (MATs), it is expedient to incorporate information about the dependence between the random variable…

ConjectureTheoretical computer scienceVariablesComputer scienceCovariance matrixmedia_common.quotation_subjectmicro-aggregation techniqueVDP::Technology: 500::Information and communication technology: 550Mutually exclusive eventscomputer.software_genrePartition (database)CorrelationVDP::Mathematics and natural science: 400::Information and communication science: 420::Knowledge based systems: 425Artificial IntelligenceJoint probability distributionprojected variablesComputer Vision and Pattern RecognitionData miningmaximun spanning treeRandom variablecomputermedia_common
researchProduct

A Research Review on Building Information Modeling in Construction―An Area Ripe for IS Research

2012

Published version of article of an article in the journal: Communications of the Association for Information Systems. Also available from the publisher : http://http://aisel.aisnet.org/cais/vol31/iss1/10/ This article presents a review of the research on Building Information Modeling (BIM) in construction, with the aim of identifying areas in this domain where IS research can contribute. The concept of BIM comprises an infrastructure of IT tools supporting collaborative and integrated design, assembly, and operation of buildings. This integrated construction approach, with all stakeholders editing or retrieving information from commonly shared models, requires major changes to well-establis…

Construction managementEngineeringKnowledge managementbusiness.industryAssociation (object-oriented programming)It innovationVDP::Technology: 500::Information and communication technology: 550GeneralLiterature_MISCELLANEOUSPeer reviewBuilding information modelingInformation systemVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321businessInformation SystemsResearch review
researchProduct

A User-Centric Approach for Personalized Service Provisioning in Pervasive Environments

2011

Published version of an article published in Wireless Personal Communications (2011). Also available from the publisher at http://dx.doi.org/10.1007/s11277-011-0387-3 The vision of pervasive environments is being realized more than ever with the proliferation of services and computing resources located in our surrounding environments. Identifying those services that deserve the attention of the user is becoming an increasingly-challenging task. In this paper, we present an adaptive multi-criteria decision making mechanism for recommending relevant services to the mobile user. In this context, "Relevance" is determined based on a user-centric approach that combines both the reputation of the…

Context-aware pervasive systemsService (systems architecture)Pervasive computing service recommendation unobtrusive applicationsUbiquitous computingComputer sciencemedia_common.quotation_subjectVDP::Technology: 500::Information and communication technology: 550020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer Science ApplicationsTask (project management)World Wide Web0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRelevance (information retrieval)Electrical and Electronic EngineeringUser-centered designReputationmedia_commonWireless Personal Communications
researchProduct

How and when do mobile media demands impact well-being? Explicating the integrative model of mobile media use and need experiences (IM3UNE)

2021

Using mobile media can be both detrimental and beneficial for well-being. Thus, explaining how and when they elicit such effects is of crucial importance. To explicate boundary conditions and processes for digital well-being, this article introduces the Integrative Model of Mobile Media Use and Need Experiences (IM³UNE). Instead of assuming mobile media to be pathogenic, the IM³UNE offers a salutogenic perspective—it focuses on how we can stay healthy when using mobile media ubiquitously in daily life. More specifically, the model assumes that both the satisfaction and the frustration of basic psychological needs are key underlying mechanisms linking demanding mobile media use to well-being…

Coping (psychology)bepress|Social and Behavioral Sciences|Psychology|Other PsychologyComputer Networks and Communicationsbepress|Social and Behavioral Sciences|CommunicationSocArXiv|Social and Behavioral Sciences|Communication|Social Mediaddc:150bepress|Social and Behavioral Sciences|Communication|Communication Technology and New MediaMedia TechnologySocial mediaSocArXiv|Social and Behavioral Sciences|CommunicationSelf-determination theorySocArXiv|Social and Behavioral Sciences|Communication|Communication Technology and New Mediabepress|Social and Behavioral Sciences|PsychologySocArXiv|Social and Behavioral Sciences|Psychology|Health PsychologyCommunicationSocArXiv|Arts and HumanitiesSalutogenesisbepress|Social and Behavioral Sciences|Communication|Social MediaMobile mediabepress|Social and Behavioral Sciences|Psychology|Health PsychologyWell-beingbepress|Social and Behavioral SciencesSocArXiv|Social and Behavioral SciencesSocArXiv|Social and Behavioral Sciences|PsychologyPsychologySocial psychologySocArXiv|Social and Behavioral Sciences|Psychology|Other Psychologybepress|Arts and Humanities
researchProduct

Towards an integrated approach to emergency management: interdisciplinary challenges for research and practice

2015

This article presents an interdisciplinary vision for large-scale integrated emergency management that has been inspired by the transition from platform centric to integrated operations in the oil and gas fields, which uses remote emergency control centres collaborating virtually with local responders. The article discusses some of the most salient research challenges for integrated emergency management, including the role of mobile technology, human-centred sensing, citizen participation and social media, and the socio-cultural determinants of disaster management. The purpose of this article is to frame an integrated emergency management approach that adopts a multi-disciplinary approach, …

Cultural StudiesKnowledge managementsocial media0211 other engineering and technologieslcsh:A02 engineering and technologyemergency managementIntegrated operationsArts and Humanities (miscellaneous)020204 information systems0202 electrical engineering electronic engineering information engineeringInformation systemSocial mediaMobile technologyinformation and communication technologyComputingMilieux_MISCELLANEOUSvirtual collaboration021110 strategic defence & security studiesEmergency managementdisaster vulnerabilitybusiness.industryEnvironmental resource managementsmart phonesdisaster perceptionIntegrated OperationDevelopment studiesDisasterVirtual collaborationInformation and Communications Technology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Anthropologyad hoc networksintegrated operationslcsh:General Worksbusinesshuman-centred sensingCulture Unbound: Journal of Current Cultural Research
researchProduct

Trust-aware RBAC

2012

Published version of a chapter in the book: Computer Network Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-33704-8_9 In this paper we propose a trust-aware enhancement of RBAC (TA-RBAC) that takes trustworthiness of users into consideration explicitly before granting access. We assume that each role in the framework is associated with an expression that describe trustworthiness of subjects required to be able to activate the role, and each subject (user) has assigned trustworthiness level in the system. By adding trustworthiness constraints to roles we enhance system, for example, with more flexible ability to delegate roles, to control reading/updating…

DelegateTrustworthinessComputer scienceReading (process)media_common.quotation_subjectControl (management)Role-based access controlVDP::Technology: 500::Information and communication technology: 550Computer securitycomputer.software_genrecomputerExpression (mathematics)media_common
researchProduct

How Quickly Can We Predict Users’ Ratings on Aesthetic Evaluations of Websites? Employing Machine Learning on Eye-Tracking Data

2020

This study examines how quickly we can predict users’ ratings on visual aesthetics in terms of simplicity, diversity, colorfulness, craftsmanship. To predict users’ ratings, first we capture gaze behavior while looking at high, neutral, and low visually appealing websites, followed by a survey regarding user perceptions on visual aesthetics towards the same websites. We conduct an experiment with 23 experienced users in online shopping, capture gaze behavior and through employing machine learning we examine how fast we can accurately predict their ratings. The findings show that after 25 s we can predict ratings with an error rate ranging from 9% to 11% depending on which facet of visual ae…

DesignArtificial IntelligenceMachine learningAestheticsVDP::Technology: 500::Information and communication technology: 550E-commerceEye-trackingArticle
researchProduct

A formal proof of the ε-optimality of absorbing continuous pursuit algorithms using the theory of regular functions

2014

Published version of an article from the journal: Applied Intelligence. Also available on Springerlink: http://dx.doi.org/10.1007/s10489-014-0541-1 The most difficult part in the design and analysis of Learning Automata (LA) consists of the formal proofs of their convergence accuracies. The mathematical techniques used for the different families (Fixed Structure, Variable Structure, Discretized etc.) are quite distinct. Among the families of LA, Estimator Algorithms (EAs) are certainly the fastest, and within this family, the set of Pursuit algorithms have been considered to be the pioneering schemes. Informally, if the environment is stationary, their ε-optimality is defined as their abili…

Discrete mathematicsDiscretizationLearning automataAbsorbing CPAComputer scienceEstimatorMonotonic functionVDP::Technology: 500::Information and communication technology: 550Mathematical proofFormal proofCPAArbitrarily largeArtificial Intelligenceε-optimalityMartingale (probability theory)Pursuit algorithmsAlgorithm
researchProduct

A non-stationary MIMO vehicle-to-vehicle channel model based on the geometrical T-junction model

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WCSP.2009.5371438 In this paper, we derive a non-stationary multiple-input multiple-output (MIMO) vehicle-to-vehicle (V2V) channel model from the geometrical T-junction model. The propagation environment is assumed to be extremely non-isotropic. The proposed channel model takes into account double…

Distribution (mathematics)Computer scienceScatteringMIMOAutocorrelationTransmitterVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Function (mathematics)Communications systemTopologySimulationComputer Science::Information Theory
researchProduct

Fornøyd med litt men ønsker seg likevel mer : gir nye versjoner av EPJ-system i helse- og omsorgssektoren i kommunene kontinuerlig forbedring?

2016

Masteroppgave i helse- og sosialinformatikk- Universitetet i Agder, 2016 Continuous development in health- and care services leads to the electronic patient record (EPR) systems to become more complex. It is important for municipalities to have systems that work, and acts as a support for workflows of everyday life, so that information regarding the patients are easily accessible and accurate. It is therefore important that new versions of EPR systems are delivered with good quality. This study focuses on municipalities' challenges with developing, testing and implementing new versions of old EPR system in health- and caregiving services. A qualitative study is conductet, with interviews of…

EPJelektronisk pasientjournalHSI500VDP::Technology: 500::Information and communication technology: 550EPRElectronic Pasient Records
researchProduct