Search results for "computer.software_genre"

showing 10 items of 3858 documents

Removing the barriers to adoption of social OER environments

2015

Despite the opportunities and benefits of OER, research and practice has shown how the OER repositories have a hard time in reaching an active user-base. The opportunities of experience exchange and simple feedback mechanisms of social software have been realized for improving the situation and many are basing or transforming their OER offerings towards socially powered environments. Research on social software has shown how knowledge-sharing barriers in online environments are highly culture and context-specific and require proper investigation. It is crucial to study what challenges might arise in such environments and how to overcome them, ensuring a successful uptake. A large-scale (N =…

InformatikKnowledge managementbusiness.industryComputer scienceCultural distanceSocial softwareContext (language use)businesscomputer.software_genrecomputerSimple (philosophy)Knowledge sharing
researchProduct

Criminal DNA databases: the European situation

2001

In the last 5 years, a number of European countries have successfully introduced national databases holding the DNA profiles from suspected and convicted criminal offenders as well as from biological stain materials from unsolved crime cases. At present, DNA databases are fully or partially in operation in the UK, The Netherlands, Austria, Germany, Finland, Norway, Denmark, Switzerland and Sweden. Furthermore, in the other European countries, specific legislation will be enacted soon, or the introduction of such databases is being discussed to initiate a legislative process. Numerous differences exist regarding the criteria for a criminal offender to be included in the database, the storage…

Information ServicesDatabases FactualDatabaseInternational CooperationMEDLINEInformation Storage and RetrievalLegislationHarmonizationcomputer.software_genreLegislative processDNA FingerprintingPolymerase Chain ReactionPathology and Forensic MedicineEuropeCriminal offenderExchange of informationLawHumansEuropean standardDatabase search engineCrimeSociologyLawcomputerConfidentialityForensic Science International
researchProduct

Ontology-based annotation and retrieval of services in the cloud

2014

Cloud computing is a technological paradigm that permits computing services to be offered over the Internet. This new service model is closely related to previous well-known distributed computing initiatives such as Web services and grid computing. In the current socio-economic climate, the affordability of cloud computing has made it one of the most popular recent innovations. This has led to the availability of more and more cloud services, as a consequence of which it is becoming increasingly difficult for service consumers to find and access those cloud services that fulfil their requirements. In this paper, we present a semantically-enhanced platform that will assist in the process of …

Information Systems and ManagementCloud computing securitybusiness.industryComputer scienceServices computingCloud computingcomputer.software_genreManagement Information SystemsWorld Wide WebSemantic gridUtility computingGrid computingArtificial IntelligenceInformation and Communications TechnologySemantic computingOntologyThe InternetSemantic Web StackWeb servicebusinesscomputerSemantic WebSoftwareKnowledge-Based Systems
researchProduct

Aligning Two Specifications for Controlling Information Security

2014

Assuring information security is a necessity in modern organizations. Many recommendations for information security management exist, which can be used to define a baseline of information security requirements. ISO/ IEC 27001 prescribes a process for an information security management system, and guidance to implement security controls is provided in ISO/IEC 27002. Finnish National Security Auditing Criteria (KATAKRI) has been developed by the national authorities in Finland as a tool to verify maturity of information security practices. KATAKRI defines both security control objectives and security controls to meet an objective. Here the authors compare and align these two specifications in…

Information Systems and ManagementComputer Networks and Communicationsinformation securitysecurity specification alignmentComputer securitycomputer.software_genreSecurity information and event managementInformation security auditKATAKRIsecurity managementSafety Risk Reliability and Qualitysecurity audit criteriaInformation security management systemta113Certified Information Security ManagerInformation securitySecurity controlsISO/IEC 27001ISO/IEC 27002ITIL security managementRisk analysis (engineering)Security servicesecurity cerificationHardware and ArchitectureBusinessSafety ResearchcomputerSoftwaresecurity controls
researchProduct

An overview of incremental feature extraction methods based on linear subspaces

2018

Abstract With the massive explosion of machine learning in our day-to-day life, incremental and adaptive learning has become a major topic, crucial to keep up-to-date and improve classification models and their corresponding feature extraction processes. This paper presents a categorized overview of incremental feature extraction based on linear subspace methods which aim at incorporating new information to the already acquired knowledge without accessing previous data. Specifically, this paper focuses on those linear dimensionality reduction methods with orthogonal matrix constraints based on global loss function, due to the extensive use of their batch approaches versus other linear alter…

Information Systems and ManagementComputer scienceDimensionality reductionFeature extraction010103 numerical & computational mathematics02 engineering and technologycomputer.software_genre01 natural sciencesLinear subspaceManagement Information SystemsMatrix decompositionCategorizationDiscriminative modelArtificial IntelligencePrincipal component analysis0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAdaptive learningOrthogonal matrixData mining0101 mathematicscomputerSoftwareKnowledge-Based Systems
researchProduct

Towards safe reinforcement-learning in industrial grid-warehousing

2020

Abstract Reinforcement learning has shown to be profoundly successful at learning optimal policies for simulated environments using distributed training with extensive compute capacity. Model-free reinforcement learning uses the notion of trial and error, where the error is a vital part of learning the agent to behave optimally. In mission-critical, real-world environments, there is little tolerance for failure and can cause damaging effects on humans and equipment. In these environments, current state-of-the-art reinforcement learning approaches are not sufficient to learn optimal control policies safely. On the other hand, model-based reinforcement learning tries to encode environment tra…

Information Systems and ManagementComputer sciencemedia_common.quotation_subjectSample (statistics)02 engineering and technologyMachine learningcomputer.software_genreTheoretical Computer ScienceArtificial Intelligence0202 electrical engineering electronic engineering information engineeringReinforcement learningVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550media_commonbusiness.industry05 social sciences050301 educationGridOptimal controlAutoencoderComputer Science ApplicationsAction (philosophy)Control and Systems EngineeringCuriosity020201 artificial intelligence & image processingArtificial intelligencebusiness0503 educationcomputerSoftwareInformation Sciences
researchProduct

Using PageRank for non-personalized default rankings in dynamic markets

2017

Abstract Default ranking algorithms are used to generate non-personalized product rankings for standard consumers, for example, on landing pages of online stores. Default rankings are created without any information about the consumers’ preferences. This paper proposes using the product centrality ranking algorithm (PCRA), which solves some problems of existing default ranking algorithms: Existing approaches either have low accuracy, because they rely on only one product attribute, or they are unable to estimate ranks for new or updated products, because they use past consumer behavior, such as previous sales or ratings. The PCRA uses the PageRank centrality of products in a product dominat…

Information Systems and ManagementGeneral Computer ScienceComputer science02 engineering and technologyManagement Science and Operations Researchcomputer.software_genreIndustrial and Manufacturing Engineeringlaw.inventionPageRanklaw0502 economics and business0202 electrical engineering electronic engineering information engineeringEconometricsProduct (category theory)Consumer behaviour05 social sciencesGraphRankingModeling and SimulationGraph (abstract data type)050211 marketing020201 artificial intelligence & image processingLearning to rankData miningCentralitycomputerEuropean Journal of Operational Research
researchProduct

Analysis and design of sequencing rules for car sequencing

2009

Abstract This paper presents novel approaches for generating sequencing rules for the car sequencing (CS) problem in cases of two and multiple processing times per station. The CS problem decides on the succession of different car models launched down a mixed-model assembly line. It aims to avoid work overloads at the stations of the line by applying so-called sequencing rules, which restrict the maximum occurrence of labor-intensive options in a subsequence of a certain length. Thus to successfully avoid work overloads, suitable sequencing rules are essential. The paper shows that the only existing rule generation approach leads to sequencing rules which misclassify feasible sequences. We …

Information Systems and ManagementGeneral Computer ScienceOperations researchComputer scienceModeling and SimulationSubsequenceData miningManagement Science and Operations ResearchLine (text file)Mixed-model assembly lines Car sequencing Sequencing rulescomputer.software_genrecomputerIndustrial and Manufacturing EngineeringEuropean Journal of Operational Research
researchProduct

Strategic leadership in cyber security, case Finland

2020

Cyber security has become one of the biggest priorities for businesses and governments. Streamlining and strengthening strategic leadership are key aspects in making sure the cyber security vision is achieved. The strategic leadership of cyber security implies identifying and setting goals based on the protection of the digital operating environment. Furthermore, it implies coordinating actions and preparedness as well as managing extensive disruptions. The aim of this article is to define what is strategic leadership of cyber security and how it is implemented as part of the comprehensive security model in Finland. In terms of effective strategic leadership of cyber security, it is vital t…

Information Systems and ManagementNational securitybusiness.industrystrateginen johtaminenComputer securitycomputer.software_genreCyber securityComputer Science ApplicationsStrategic leadershipKey (cryptography)strategic leadershiptietoturvakansallinen turvallisuusnational securitykyberturvallisuusbusinesscomputerComputingMilieux_MISCELLANEOUSSoftware
researchProduct

2016

Information Systems and ManagementProcess managementWork (electrical)Supply chainBusinessManagement Science and Operations ResearchVirtualizationcomputer.software_genrecomputerManagement Information SystemsLogforum
researchProduct