Search results for "computer.software_genre"
showing 10 items of 3858 documents
Contrasting Automatic and Manual Group Formation: A Case Study in a Software Engineering Postgraduate Course
2021
This paper proposes the comparison of a group formation approach based on an evolutionary algorithm with a manual approach performed by an instructor with ten years of experience on this task. The groups were created based on the professional, psychological, and experience profile of each student. The results obtained demonstrated the algorithm’s potential, reaching an average similarity of \(83.46\%\) with the groups formed manually by the instructor.
Predicting Next Dialogue Action in Emotionally Loaded Conversation
2021
This paper reports on creating a neural network model for prediction of the next action in a dialogue considering conversation history, i.e. entities, context variables and emotion indicators marking emotionally loaded user utterances. Several experiments were performed to see how the information about emotions affects the accuracy of the model. For the purposes of these experiments, a dataset containing 206 dialogs in Latvian in the transport inquiry domain was created containing both neutral and emotionally loaded utterances. To see if the proposed next dialogue action prediction model architecture is suitable for other languages, the original Latvian utterances were translated into Engli…
An efficient prototype merging strategy for the condensed 1-NN rule through class-conditional hierarchical clustering
2002
Abstract A generalized prototype-based classification scheme founded on hierarchical clustering is proposed. The basic idea is to obtain a condensed 1-NN classification rule by merging the two same-class nearest clusters, provided that the set of cluster representatives correctly classifies all the original points. Apart from the quality of the obtained sets and its flexibility which comes from the fact that different intercluster measures and criteria can be used, the proposed scheme includes a very efficient four-stage procedure which conveniently exploits geometric cluster properties to decide about each possible merge. Empirical results demonstrate the merits of the proposed algorithm t…
Data Communication Security of Advanced Metering Infrastructure in Smart Grid
2013
Advanced Metering Infrastructure (AMI) is very critical part for wired/wireless communication in Smart Grid. It involves communication of vital smart metering data to central control center for smooth functioning of smart grid. Security and reliability of data is of paramount importance for operational reliability of smart grid. AMI network is susceptible to many cyber security threats and attacks. Therefore it is desirable to prevent the data from such vulnerabilities. The paper proposes two-phase method to provide security of data using dedicated authentication server which inhibits malicious and unauthorized nodes to gain access to AMI communication network. Secure environment is created…
Smart Assistance for Students and People Living in a Campus
2019
Being part of one of the fastest growing area in Artificial Intelligence (AI), virtual assistants are nowadays part of everyone's life being integrated in almost every smart device. Alexa, Siri, Google Assistant, and Cortana are just few examples of the most famous ones. Beyond these off-the-shelf solutions, different technologies which allow to create custom assistants are available. IBM Watson, for instance, is one of the most widely-adopted question-answering framework both because of its simplicity and accessibility through public APIs. In this work, we present a virtual assistant that exploits the Watson technology to support students and staff of a smart campus at the University of Pa…
Splitting the data cache: a survey
2000
Recent cache-memory research has focused on approaches that split the first-level data cache into two independent subcaches. The authors introduce a methodology for helping cache designers devise splitting schemes and survey a representative set of the published cache schemes.
The Conceptual Levels and Theory Languages of Interaction Design
2009
In a way, concepts are like friends. Tell me what your concepts are and I can tell what you are. Modifying freely the way Wittgenstein (1921) expressed this important Kantian (1781) point on the limiting power of concepts on one’s thinking, the concepts that human– technology interaction designers of different scientific backgrounds use differ from each other and, consequently, they are apt to solve the same tasks in different ways. Theoretical concepts constrain the kinds of questions specialists can ask and what kinds of things they are interested in. Thus programmers have a different view of users than do psychologists or sociologists. Just as a lay person can understand little about ven…
DETECTING FALLS AT HOME: USER-CENTERED DESIGN OF A PERVASIVE TECHNOLOGY
2016
Falling is the main cause of domestic accidents and fatal injuries to seniors at home. In this paper, we describe the design process for a new pervasive technology (CIRDO). The aim of this technology is to detect falls (via audio and video sensors) and to alert the elderly's family or caregivers. Two complementary studies were performed. Firstly, the actual risk situations of older adults were analyzed. Secondly, social acceptance was investigated for the different homecare field stakeholders. Our results highlight the tensions among social actors towards the tool and their impacts on technology acceptance by the elderly. Also, we show a significant change in the fall process due to the dev…
Analysis of contextual information sharing during table tennis matches: An empirical study on coordination in sports
2009
Abstract This study examined contextual information sharing between table tennis players during competitive interaction (two opponents during singles) and cooperative interaction (two partners during doubles) in a study based on the notion of shared context (Salembier & Zouinar, 2000) and conducted within the semiological framework of the course‐of‐action (Theureau, 2003). Matches were videotaped and players’ verbalizations as they viewed the tapes were collected a posteriori. The analysis and comparison of their courses of action served to characterize the nature and content of the contextual information that was shared between the players during singles and doubles matches. The results re…
Help! Is my Chatbot Falling into the Uncanny Valley? : An Empirical Study of User Experience in Human-Chatbot Interaction
2019
Original article available at http://dx.doi.org/10.17011/ht/urn.201902201607 Advances in artificial intelligence strengthen chatbots’ ability to resemble human conversational agents. For some application areas, it may be tempting not to be transparent regarding a conversational agent’s nature as chatbot or human. However, the uncanny valley theory suggests that such lack in transparency may cause uneasy feelings in the user. In this study, we combined quantitative and qualitative methods to investigate this issue. First, we used a 2 x 2 experimental research design (n = 28) to investigate effects of lack in transparency on the perceived pleasantness of the conversation in addition to percei…