Search results for "computer.software_genre"

showing 10 items of 3858 documents

Contrasting Automatic and Manual Group Formation: A Case Study in a Software Engineering Postgraduate Course

2021

This paper proposes the comparison of a group formation approach based on an evolutionary algorithm with a manual approach performed by an instructor with ten years of experience on this task. The groups were created based on the professional, psychological, and experience profile of each student. The results obtained demonstrated the algorithm’s potential, reaching an average similarity of \(83.46\%\) with the groups formed manually by the instructor.

Similarity (network science)Group (mathematics)Computer sciencebusiness.industryEvolutionary algorithmCollaborative learningArtificial intelligencecomputer.software_genrebusinesscomputerNatural language processingTask (project management)Course (navigation)
researchProduct

Predicting Next Dialogue Action in Emotionally Loaded Conversation

2021

This paper reports on creating a neural network model for prediction of the next action in a dialogue considering conversation history, i.e. entities, context variables and emotion indicators marking emotionally loaded user utterances. Several experiments were performed to see how the information about emotions affects the accuracy of the model. For the purposes of these experiments, a dataset containing 206 dialogs in Latvian in the transport inquiry domain was created containing both neutral and emotionally loaded utterances. To see if the proposed next dialogue action prediction model architecture is suitable for other languages, the original Latvian utterances were translated into Engli…

Single modelArtificial neural networkComputer sciencebusiness.industrymedia_common.quotation_subjectLatviancomputer.software_genrelanguage.human_languageDomain (software engineering)Model architectureAction (philosophy)languageConversationArtificial intelligencebusinesscomputerNatural language processingmedia_commonTransformer (machine learning model)
researchProduct

An efficient prototype merging strategy for the condensed 1-NN rule through class-conditional hierarchical clustering

2002

Abstract A generalized prototype-based classification scheme founded on hierarchical clustering is proposed. The basic idea is to obtain a condensed 1-NN classification rule by merging the two same-class nearest clusters, provided that the set of cluster representatives correctly classifies all the original points. Apart from the quality of the obtained sets and its flexibility which comes from the fact that different intercluster measures and criteria can be used, the proposed scheme includes a very efficient four-stage procedure which conveniently exploits geometric cluster properties to decide about each possible merge. Empirical results demonstrate the merits of the proposed algorithm t…

Single-linkage clusteringcomputer.software_genreComplete-linkage clusteringHierarchical clusteringk-nearest neighbors algorithmArtificial IntelligenceNearest-neighbor chain algorithmClassification ruleSignal ProcessingCluster (physics)Computer Vision and Pattern RecognitionData miningMerge (version control)computerSoftwareMathematicsPattern Recognition
researchProduct

Data Communication Security of Advanced Metering Infrastructure in Smart Grid

2013

Advanced Metering Infrastructure (AMI) is very critical part for wired/wireless communication in Smart Grid. It involves communication of vital smart metering data to central control center for smooth functioning of smart grid. Security and reliability of data is of paramount importance for operational reliability of smart grid. AMI network is susceptible to many cyber security threats and attacks. Therefore it is desirable to prevent the data from such vulnerabilities. The paper proposes two-phase method to provide security of data using dedicated authentication server which inhibits malicious and unauthorized nodes to gain access to AMI communication network. Secure environment is created…

Smart meterComputer scienceNetwork packetWireless networkbusiness.industryAuthentication serverCommunications securityComputer securitycomputer.software_genreSmart gridSecurity servicebusinesscomputerAutomatic meter readingComputer network2013 5th International Conference on Computational Intelligence and Communication Networks
researchProduct

Smart Assistance for Students and People Living in a Campus

2019

Being part of one of the fastest growing area in Artificial Intelligence (AI), virtual assistants are nowadays part of everyone's life being integrated in almost every smart device. Alexa, Siri, Google Assistant, and Cortana are just few examples of the most famous ones. Beyond these off-the-shelf solutions, different technologies which allow to create custom assistants are available. IBM Watson, for instance, is one of the most widely-adopted question-answering framework both because of its simplicity and accessibility through public APIs. In this work, we present a virtual assistant that exploits the Watson technology to support students and staff of a smart campus at the University of Pa…

Smart service systemMultimediaExploitWatsonComputer sciencemedia_common.quotation_subjectSmart device02 engineering and technologycomputer.software_genreRemote assistanceVirtual Assistantlaw.inventionWork (electrical)lawSmart Campu020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSimplicitySmart campuscomputerIbm watsonmedia_common2019 IEEE International Conference on Smart Computing (SMARTCOMP)
researchProduct

Splitting the data cache: a survey

2000

Recent cache-memory research has focused on approaches that split the first-level data cache into two independent subcaches. The authors introduce a methodology for helping cache designers devise splitting schemes and survey a representative set of the published cache schemes.

Snoopy cacheHardware_MEMORYSTRUCTURESDatabaseCache coloringComputer scienceGeneral EngineeringParallel computingCache pollutioncomputer.software_genreSmart CacheCache invalidationPage cacheCachecomputerCache algorithmsIEEE Concurrency
researchProduct

The Conceptual Levels and Theory Languages of Interaction Design

2009

In a way, concepts are like friends. Tell me what your concepts are and I can tell what you are. Modifying freely the way Wittgenstein (1921) expressed this important Kantian (1781) point on the limiting power of concepts on one’s thinking, the concepts that human– technology interaction designers of different scientific backgrounds use differ from each other and, consequently, they are apt to solve the same tasks in different ways. Theoretical concepts constrain the kinds of questions specialists can ask and what kinds of things they are interested in. Thus programmers have a different view of users than do psychologists or sociologists. Just as a lay person can understand little about ven…

Social PsychologyComputer sciencebusiness.industryCommunicationField (Bourdieu)media_common.quotation_subjectConceptual model (computer science)Interaction designcomputer.software_genreEpistemologyHuman-Computer InteractionCritical thinkingPhenomenonInformation systemArtificial intelligencebusinessFunction (engineering)DisciplinecomputerNatural language processingmedia_commonHuman Technology: An Interdisciplinary Journal on Humans in ICT Environments
researchProduct

DETECTING FALLS AT HOME: USER-CENTERED DESIGN OF A PERVASIVE TECHNOLOGY

2016

Falling is the main cause of domestic accidents and fatal injuries to seniors at home. In this paper, we describe the design process for a new pervasive technology (CIRDO). The aim of this technology is to detect falls (via audio and video sensors) and to alert the elderly's family or caregivers. Two complementary studies were performed. Firstly, the actual risk situations of older adults were analyzed. Secondly, social acceptance was investigated for the different homecare field stakeholders. Our results highlight the tensions among social actors towards the tool and their impacts on technology acceptance by the elderly. Also, we show a significant change in the fall process due to the dev…

Social PsychologyIterative designComputer scienceProcess (engineering)Video sensorsApplied psychology[SHS.PSY]Humanities and Social Sciences/PsychologyComputer securitycomputer.software_genreField (computer science)050906 social workmedicine0501 psychology and cognitive sciences050107 human factorsUser-centered designelderly peoplelcsh:T58.5-58.64lcsh:Information technologypervasive technologyCommunication05 social sciencesHuman-Computer Interactionrisk situationFalling (accident)Pervasive technologydomestic activity0509 other social sciencesmedicine.symptomEngineering design processcomputeracceptance
researchProduct

Analysis of contextual information sharing during table tennis matches: An empirical study on coordination in sports

2009

Abstract This study examined contextual information sharing between table tennis players during competitive interaction (two opponents during singles) and cooperative interaction (two partners during doubles) in a study based on the notion of shared context (Salembier & Zouinar, 2000) and conducted within the semiological framework of the course‐of‐action (Theureau, 2003). Matches were videotaped and players’ verbalizations as they viewed the tapes were collected a posteriori. The analysis and comparison of their courses of action served to characterize the nature and content of the contextual information that was shared between the players during singles and doubles matches. The results re…

Social Psychology[SHS.PSY]Humanities and Social Sciences/PsychologyContext (language use)computer.software_genre[SHS.PSY] Humanities and Social Sciences/Psychology03 medical and health sciences[ SHS.PSY ] Humanities and Social Sciences/Psychology0302 clinical medicineEmpirical researchHuman–computer interactionContextual information0501 psychology and cognitive sciencesCompetitive interactionCooperative interaction050107 human factorsApplied Psychologycontextual informationMultimedia05 social sciences030229 sport sciencesContextual inquiryAction (philosophy)Table (database)Psychologysportcomputer
researchProduct

Help! Is my Chatbot Falling into the Uncanny Valley? : An Empirical Study of User Experience in Human-Chatbot Interaction

2019

Original article available at http://dx.doi.org/10.17011/ht/urn.201902201607 Advances in artificial intelligence strengthen chatbots’ ability to resemble human conversational agents. For some application areas, it may be tempting not to be transparent regarding a conversational agent’s nature as chatbot or human. However, the uncanny valley theory suggests that such lack in transparency may cause uneasy feelings in the user. In this study, we combined quantitative and qualitative methods to investigate this issue. First, we used a 2 x 2 experimental research design (n = 28) to investigate effects of lack in transparency on the perceived pleasantness of the conversation in addition to percei…

Social Psychologylcsh:T58.5-58.64business.industrylcsh:Information technologyCommunicationchatbotUncanny valleycomputer.software_genreChatbotuncanny valleyHuman-Computer InteractionFalling (accident)Empirical researchUser experience designChatbotsAestheticsuser experiencemedicineHuman–chatbot interactionmedicine.symptomPsychologybusinesshuman–chatbot interactioncomputerChatbot
researchProduct