Search results for "computer.software_genre"

showing 10 items of 3858 documents

To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications

2007

User's privacy concerns represent one of the most serious obstacles to the wide adoption of mobile social software applications. In this paper, we introduce a conceptual model which tackles the problem from the perspective of trade-off between privacy and trust, where the user takes the decision with minimal privacy loss. To support the user decision, we introduce the Mobile Access Control List (Macl), a privacy management mechanism which takes into account the user attitude towards mobile sharing, his communication history and social network relationships.

Information privacySocial networkPrivacy by Designbusiness.industryPrivacy softwareComputer scienceInternet privacySocial softwareMobile computingConceptual model (computer science)computer.software_genreWorld Wide WebbusinesscomputerAccess control list
researchProduct

Internet of things and privacy preserving technologies

2009

In this paper we consider different approaches to technological protection of users' privacy in the world of internet of things. Particularly, we consider what kind of problems and which level of protection can be achieved by applying approaches using secure multi-party computations.

Information privacyUbiquitous computingPrivacy by Designbusiness.industryComputer sciencePrivacy softwareInternet privacyData securityCryptographyComputer securitycomputer.software_genreWeb of ThingsThe Internetbusinesscomputer2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct

Access Security and Personal Privacy in Public Cellular Communication Systems: The Past, the Present and Beyond 2020

2010

In order to predict the future one needs to understand the past and then interpolate as best as possible. We expect this to work reasonably well for a “2020 Scenario”, but we do not expect this approach to be valid for a “Beyond 2020” scenario.

Information privacyWork (electrical)Security serviceOrder (exchange)business.industryPolitical scienceInternet privacyMessage authentication codeCellular communication systemsComputer securitycomputer.software_genrebusinesscomputer
researchProduct

Trust-enhanced intelligent security model

2012

In this paper we propose a trust-enhancement of access control to protect both integrity and confidentiality based on trustworthiness of users performing operations and documents' content analysis. We propose to utilize trustworthiness opinions from subjective logic and express levels of integrity as levels of trustworthiness. We assign confidentiality levels based on contents of documents and use opinions to express trustworthiness of such assignments.

Information privacybusiness.industryComputer scienceInternet privacyAccess controlComputer security modelComputer securitycomputer.software_genreContent analysisSoftware agentData_GENERALData integrityConfidentialitybusinessSubjective logiccomputer2012 6th IEEE INTERNATIONAL CONFERENCE INTELLIGENT SYSTEMS
researchProduct

Rings for privacy: An architecture for privacy-preserving user profiling

2014

Information privacysocial networking (online) data privacy human factors InternetSettore ING-INF/03 - TelecomunicazioniComputer sciencePrivacy softwarebusiness.industryInternet privacyComputer securitycomputer.software_genrePrivacy preservingprivacy-preserving users profiling FCM clustering distributed unstable scenarioProfiling (information science)The InternetArchitecturebusinesscomputer
researchProduct

Towards Efficient Teacher Assisted Assignment Marking Using Ranking Metrics

2017

This paper describes a tool with supporting methodology for efficient teacher assisted marking of open assignments based on student answer ranking metrics. It includes a methodology for how to design tasks for markability. This improves marking efficienty and reduces cognitive strain for the teacher during marking, and also allows for easily giving feedback to students on common pitfalls and misconceptions to improve both the learning outcome for the students as well as the teacher’s productivity by reducing the time needed for marking open assignments. An advantage with the method is that it is language agnostic as well as generally being agnostic to the discipline of the course being asse…

Information retrieval020205 medical informaticsComputer sciencebusiness.industry05 social sciences050301 educationCognition02 engineering and technologyMachine learningcomputer.software_genreComputingMilieux_COMPUTERSANDEDUCATION0202 electrical engineering electronic engineering information engineeringEntropy (information theory)Plagiarism detectionArtificial intelligencebusiness0503 educationcomputer
researchProduct

An approach based on the Adaptive Resonance Theory for analysing the viability of recommender systems in a citizen Web portal

2007

This paper proposes a methodology to optimise the future accuracy of a collaborative recommender application in a citizen Web portal. There are four stages namely, user modelling, benchmarking of clustering algorithms, prediction analysis and recommendation. The first stage is to develop analytical models of common characteristics of Web-user data. These artificial data sets are then used to evaluate the performance of clustering algorithms, in particular benchmarking the ART2 neural network with K-means clustering. Afterwards, it is evaluated the predictive accuracy of the clusters applied to a real-world data set derived from access logs to the citizen Web portal Infoville XXI (http://www…

Information retrievalArtificial neural networkComputer scienceGeneral EngineeringRecommender systemcomputer.software_genreComputer Science ApplicationsData setAdaptive resonance theoryArtificial IntelligenceCollaborative filteringData miningCluster analysiscomputerExpert Systems with Applications
researchProduct

A text based indexing system for mammographic image retrieval and classification

2014

Abstract In modern medical systems huge amount of text, words, images and videos are produced and stored in ad hoc databases. Medical community needs to extract precise information from that large amount of data. Currently ICT approaches do not provide a methodology for content-based medical images retrieval and classification. On the other hand, from the Internet of Things (IoT) perspective, the ICT medical data can be produced by several devices. Produced data complies with all Big Data features and constraints. The IoT guidelines put at the center of the system a new smart software to manage and transform Big Data in a new understanding form. This paper describes a text based indexing sy…

Information retrievalComputer Networks and CommunicationsComputer sciencebusiness.industrySearch engine indexingBig datacomputer.software_genreDICOMSearch engineMedical images indexing and classificationHardware and ArchitectureInformation retrievalMedical documents indexing and classificationData miningMedical diagnosisbusinessClassifier (UML)computerSoftwareFuture Generation Computer Systems
researchProduct

Aligning Relational Schema and OWL Ontologies with Hidden Markov Model

2016

The problem of bridging the gap between relational schema and ontologies is actively investigated in the Semantic Web and business communities. The main motivations are the OBDA scenario, where a domain ontology allows to hidden the technical details of the db to end-users; and the persistent storage of ontologies in db for facilitating search and retrieval keeping the benefits of DBMSs such as security and integrity. In these cases, the ABox is usually stored into a db, and the TBox is maintained in an ontology; for this reason, schema alignment is a more significant problem than the instance matching one. The use of manual mappings is hard and expensive, especially for large representatio…

Information retrievalComputer scienceOntology-based data integrationProcess ontologySemi-structured modelWeb Ontology Language02 engineering and technologyOntology (information science)computer.software_genreAbox020204 information systemsStar schema0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingData miningcomputerData integrationcomputer.programming_languageInternational Journal of Knowledge Society Research
researchProduct

Semantic web service discovery system for road traffic information services

2015

Create a multi-agent platform for a traveller information system (FIPA standards).Extend Paulucci algorithm with the use of seven similarity measures.Weight the similarity measure according to semantic relation and parameter nature.Improved running-time with a filtering pre-process for non-functional parameters.Improved the recall by measuring the sibling relationship concepts. We describe a multi-agent platform for a traveller information system, allowing travellers to find the road traffic information web service (WSs) that best fits their requirements. After studying existing proposals for discovery of semantic WS, we implemented a hybrid matching algorithm, which is described in detail …

Information retrievalComputer sciencebusiness.industryGeneral EngineeringSemantic web servicesSimilarity measurecomputer.software_genreRoad traffic information systemsSocial Semantic WebComputer Science ApplicationsKnowledge discoverySemantic similarityKnowledge extractionArtificial IntelligenceInformation systemInformation retrievalSemantic integrationRelevance (information retrieval)Semantic Web StackData miningWeb servicebusinessMatchmakingcomputerSemantic matching
researchProduct