Search results for "computer.software_genre"

showing 10 items of 3858 documents

OLAP Personalization with User-Describing Profiles

2010

In this paper we have highlighted five existing approaches for introducing personalization in OLAP: preference constructors, dynamic personalization, visual OLAP, recommendations with user session analysis and recommendations with user profile analysis and have analyzed research papers within these directions. We have pointed out applicability of personalization to OLAP schema elements in these approaches. The comparative analysis has been made in order to highlight a certain personalization approach. A new method has been proposed, which provides exhaustive description of interaction between user and data warehouse, using the concept of Zachman Framework [1, 2], according to which a set of…

User profileData collectionInformation retrievalComputer scienceOnline analytical processingSchema (psychology)Zachman FrameworkData miningcomputer.software_genrecomputerData warehousePersonalization
researchProduct

Extracting Features from Social Media Networks Using Semantics

2016

This paper focuses on the analysis of social media content generated by social networks (e.g. Twitter) in order to extract semantic features. By using text categorization to sort text feeds into categories of similar feeds, it has been proved to reduce the overhead that is required to retrieve these feeds and at the same time, it provides smaller pools in which further investigations can be made easier. The aim of this survey is to draw a user profile, by analysing his or her tweets. In this early stage of research, being a pre-processing phase, a dictionary based approach is considered. Moreover, the paper describes an algorithm used in analysing the text and its preliminary results. This …

User profileInformation retrievalComputer sciencebusiness.industrySemantic analysis (machine learning)Feature extractioncomputer.software_genreSemanticsSupport vector machinesortOverhead (computing)Social mediaArtificial intelligencebusinesscomputerNatural language processing
researchProduct

A data-logging mechanism to support e-learning systems

2015

User profiling and e-learning have received great attention in the last years. In a learning environment, user profiling provides historical data of the students' performance on different learning subjects. e-Learning tools such as serious games can collect user's data and build a user profile by appropriate storing these information. Thus, by combining above techniques and analysing each user's data a teacher can provide personalized treatment to her/his students. In this paper we present our solution on storing and analysing user data on a centralized server. Our system stores data collected from users with dyslexia. We maintain one user profile per student from data taken from a) user re…

User profileMultimediaComputer scienceUser modelingLearning environmentDyslexiaComputer user satisfactionmedicine.diseasecomputer.software_genreUser interface designData loggermedicineProfiling (information science)computer2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA)
researchProduct

An approach for recommending personalized contents for homecare users in the context of health 2.0

2014

This paper proposes a content recommendation mechanism as part of a model for implementing ubiquitous learning for supporting people with chronic diseases who are treated at home, so that they can learn more about treatments for their disease. In the proposed approach, the learning takes place based on day-to-day activities and real situations. In this case, the model supports the development of tools that can learn about the user's context, based on data obtained via sensors installed on users or in their home, as well as data supplied directly by the user interface of their mobile devices, and data provided by the healthcare team, and, after that, recommend contents about their diseases.

User profileMultimediaComputer sciencebusiness.industryContext (language use)Ontology (information science)computer.software_genreWorld Wide WebHealth careUser interfacebusinessMobile devicecomputerUbiquitous learningProceedings of the 7th Euro American Conference on Telematics and Information Systems
researchProduct

Through the Eyes of an Entangled Teacher: When Classical Musical Instrument Performance Tuition in Higher Education is Subject to Quality Assurance

2020

What happens when a classical music instrument performance course at a Norwegian state university study programme is assessed for quality following a standardized procedure? The article explores frictions and negotiations between managerial quality assurance and classical music performance education in a contextual sense, focusing particularly on the teacher-student relation. I employ my own experience as an instrument performance teacher in a Western Classical Music performance study programme while drawing on state acts, regulations, managerial processes, educational politics, funding, and classical music performance education’s habitus and heritage. I begin by addressing the institution …

VDP::Humaniora: 000::Musikkvitenskap: 110Education HigherHigher educationMusic--Performancebusiness.industrySubject (philosophy)Musical instrumentGeneral MedicineEducational tests and measurementscomputer.software_genreMusic educationAcademic standardsLearning strategiesClassical musicEducational assessmentAccountabilityMathematics educationComputingMilieux_COMPUTERSANDEDUCATIONCollege teachingPsychologybusinesscomputerMusic
researchProduct

Dynamic Range Processing’s Influence on Perceived Timing in Electronic Dance Music

2020

In this article, we explore the extent to which dynamic range processing (such as compression and sidechain compression) influences our perception of a sound signal’s temporal placement in music. Because compression reshapes the sound signal’s envelope, scholars have previously noted that certain uses of sidechain compression can produce peculiar rhythmic effects. In this article, we have tried to interrogate and complicate this notion by linking a description of the workings and effects of dynamic range processing to empirical findings on the interaction between sound and perceived timing, and by analyzing multitracks and DAW project files, as well as released audio files, of selected EDM …

VDP::Humaniora: 000::Musikkvitenskap: 110MultimediaDynamic range05 social sciences06 humanities and the artscomputer.software_genre050105 experimental psychologyElectronic dance music060404 musicVDP::Humanities: 000::Musicology: 1100501 psychology and cognitive sciencesPsychologycomputer0604 artsMusic
researchProduct

A survey on peer-to-peer SIP based communication systems

2010

Published version of an article from the journal: Peer-to-Peer Networking and Applications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s12083-009-0064-4 Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information on each participating peer without help of the central servers. The concept of self-configuration, self-establishment greatly improves the robustness of the network system compared with the traditional Client/Server based systems. In this paper, we survey P2PSIP solutions proposed recently both in …

VDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423Computer Networks and Communicationsbusiness.industryComputer scienceMessage routingPeer-to-peerCommunications systemcomputer.software_genrePeer reviewWorld Wide WebNAT traversalRobustness (computer science)ServerVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552businessChord (peer-to-peer)computerSoftwareComputer networkPeer-to-Peer Networking and Applications
researchProduct

Privacy Violation Classification of Snort Ruleset

2010

Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacyNaive Bayes classifierComputer scienceRelational databasePrivacy softwareData securityConfidentialityNetwork monitoringIntrusion detection systemData miningcomputer.software_genrecomputer
researchProduct

A roadmap towards improving managed security services from a privacy perspective

2014

Published version of an article in the journal: Ethics and Information Technology. Also available from the publisher at: http://dx.doi.org/10.1007/s10676-014-9348-3 This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow fo…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacymanaged security servicesPrivacy by Designbusiness.industryComputer scienceDigital forensicsBig dataethical awarenesssecurityIntrusion detection systemLibrary and Information SciencesprivacyComputer securitycomputer.software_genreComputer Science ApplicationsOutsourcingInformation sensitivityintrusion detection and prevention systemsoutsourcingbusinesscomputerRegister of data controllersEthics and Information Technology
researchProduct

Managing Emerging Information Security Risks during Transitions to Integrated Operations

2010

Paper presented at the 2010 43rd Hawaii International Conference on System Sciences (HICSS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/HICSS.2010.260 The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. Th…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424business.industryControl (management)Information securityIntegrated operationsComputer securitycomputer.software_genreInvestment (macroeconomics)System dynamicsRisk analysis (engineering)Information and Communications TechnologybusinesscomputerRisk managementVulnerability (computing)2010 43rd Hawaii International Conference on System Sciences
researchProduct