Search results for "computer.software_genre"

showing 10 items of 3858 documents

Agent-Based Model to Study and Quantify the Evolution Dynamics of Android Malware Infection

2014

[EN] In the last years the number of malware Apps that the users download to their devices has risen. In this paper, we propose an agentbased model to quantify the Android malware infection evolution, modeling the behavior of the users and the different markets where the users may download Apps. The model predicts the number of infected smartphones depending on the type of malware. Additionally, we will estimate the cost that the users should afford when the malware is in their devices. We will be able to analyze which part is more critical: the users, giving indiscriminate permissions to the Apps or not protecting their devices with antivirus software, or the Android platform, due to the v…

Agent-based modelSoftware_OPERATINGSYSTEMSArticle SubjectApplied Mathematicslcsh:MathematicsComputer securitycomputer.software_genrelcsh:QA1-939ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSAndroid malwareMalwareAndroid (operating system)MATEMATICA APLICADAcomputerAnalysisMathematics
researchProduct

ABM of Civil Violence: ODD Description

2017

This chapter contains a description of the proposed agent-based model, using the well-known “Overview, Design Concepts and Details” protocol. The model was implemented in NetLogo and is based on the same two types of agents—citizens and law-enforcement—as in Epstein’s model, but “citizen” agents have one subtype (“activist”) used for implementing network influence effects. The salient aspects of the model description are centered on the submodels for the risk perception, the expression of hardship in terms of value-sensitive relative deprivation, endogenous legitimacy feedback and network influence effects, which provide extensions to Epstein’s model. The model includes two networks called …

Agent-based modelTheoretical computer scienceNetLogoExpression (computer science)computer.software_genremedicine.disease_causeModel descriptionScripting languageSalientPolitical sciencemedicineRelative deprivationcomputerSocial psychologycomputer.programming_languageSocial influence
researchProduct

E-Hitz: A word frequency list and a program for deriving psycholinguistic statistics in an agglutinative language (Basque)

2007

We describe a Windows program that enables users to obtain a broad range of statistics concerning the properties of word and nonword stimuli in an agglutinative language (Basque), including measures of word frequency (at the whole-word and lemma levels), bigram and biphone frequency, orthographic similarity, orthographic and phonological structure, and syllable-based measures. It is designed for use by researchers in psycholinguistics, particularly those concerned with recognition of isolated words and morphology. In addition to providing standard orthographic and phonological neighborhood measures, the program can be used to obtain information about other forms of orthographic similarity, …

Agglutinative languagePeriodicityVocabularyComputer scienceSpeech recognitionmedia_common.quotation_subjectBigramExperimental and Cognitive Psychologycomputer.software_genreVocabularyPsycholinguisticsLemma (psycholinguistics)Arts and Humanities (miscellaneous)PhoneticsSimilarity (psychology)StatisticsDevelopmental and Educational PsychologyHumansGeneral PsychologyLanguagemedia_commonPsycholinguisticsbusiness.industryPhoneticsWord lists by frequencyPsychology (miscellaneous)Artificial intelligencebusinesscomputerSoftwareNatural language processingBehavior Research Methods
researchProduct

Methods matter: Testing competing models for designing short-scale Big-Five assessments

2015

Abstract Many psychological instruments are psychometrically inadequate because derived person-parameters are unfounded and models will be rejected using established psychometric criteria. One strategy towards improving the psychometric properties is to shorten instruments. We present and compare the following procedures for the abbreviation of self-report assessments on the Trait Self-Description Inventory in a sample of 14,347 participants: (a) Maximizing reliability/main loadings, (b) Minimizing modification indices/cross loadings, (c) the PURIFY Algorithm in Tetrad, (d) Ant Colony Optimization, and (e) a genetic algorithm. Ant Colony Optimization was superior to all other methods in imp…

AgreeablenessSocial PsychologyPsychometricsbusiness.industryAnt colony optimization algorithmsConscientiousnessSample (statistics)Machine learningcomputer.software_genreConfirmatory factor analysisGenetic algorithmTraitArtificial intelligencebusinessPsychologycomputerSocial psychologyGeneral PsychologyJournal of Research in Personality
researchProduct

Session details: Distributed systems: WT - web technologies track

2018

The Web is relentlessly evolving. Once a single interconnection of static, physically distributed content passively accessed by human users through personal computers, during the explosion of Web-based social networks the Web evolved into an environment allowing users worldwide to interact and collaborate to create user-generated content within many virtual communities. In this line, Web 2.0 is the umbrella term used to encompass several developments which followed, namely social networking sites and social media sites (e.g., Facebook), blogs, wikis, folksonomies (e.g. Flickr), video sharing sites (e.g., YouTube), Web applications ("apps"), collaborative platforms, and mashup applications. …

AjaxComputer sciencebusiness.industrycomputer.software_genreSession (web analytics)World Wide WebScripting languageWeb applicationSocial mediaMashupbusinessTheme (computing)computercomputer.programming_languageProceedings of the 33rd Annual ACM Symposium on Applied Computing
researchProduct

Sequential formula translation

1983

The syntax of an algorithmic language such as ALGOL is conveniently described as a sequence of states indicated by an element called cellar. Transitions are controlled by admissible state- s ymbol pairs which may be represented by a transition matrix. This description of syntax furnishes at the same time an extremely simple rule for translating into machine programs statements in the algorithmic language. Sequential treatment, however, is not feasible in the case of certain optimizing processes such as recursive address calculation.

Algorithmic languageSequenceRecursionGeneral Computer ScienceSyntax (programming languages)Computer scienceSimple (abstract algebra)Programming languageElement (category theory)Translation (geometry)computer.software_genreSyntaxcomputerCommunications of the ACM
researchProduct

Structural Reforms in Banking: The Role of Trading

2017

In the wake of the recent financial crisis, significant regulatory actions have been taken aimed at limiting risks emanating from trading in bank business models. Prominent reform proposals are the Volcker Rule in the U.S., the Vickers Report in the UK, and, based on the Liikanen proposal, the Barnier proposal in the EU. A major element of these reforms is to separate "classical" commercial banking activities from securities trading activities, notably from proprietary trading. While the reforms are at different stages of implementation, there is a strong ongoing discussion on what possible economic consequences are to be expected. The goal of this paper is to look at the alternative approa…

Alternative trading system050208 financebusiness.industry05 social sciencesFinancial systemBusiness modelcomputer.software_genreVolcker RuleCommerceProprietary trading0502 economics and businessFinancial crisisRetail bankingBusiness050207 economicsAlgorithmic tradingHigh-frequency tradingcomputerFinanceJournal of Financial Regulation
researchProduct

Insider Trading and Market Behaviour Around Takeover Announcements in the Spanish Market

2002

As microstructure models assume informational asymmetries among investors, the possibility of insider trading is a sound reason for liquidity suppliers to increase the bid-ask spread. In this way, the tested effect that takeover announcements have on target firm returns becomes a strong motive for trading with insider information. In this paper we firstly investigate whether liquidity suppliers value the possibility of trading with informed agents in this sort of event. We analyse the adverse selection cost from bid-ask spread behaviour around takeover announcements. We find that liquidity suppliers enlarge adverse selection cost suggesting that they value the possibility of facing to insid…

Alternative trading systemBid–ask spreadFinancial economicsDark liquidityLiquidity crisisInsider tradingBusinessAlgorithmic tradingcomputer.software_genrecomputerMarket liquidityInsiderSSRN Electronic Journal
researchProduct

An AmI-Based Software Architecture Enabling Evolutionary Computation in Blended Commerce: The Shopping Plan Application

2015

This work describes an approach to synergistically exploit ambient intelligence technologies, mobile devices, and evolutionary computation in order to support blended commerce or ubiquitous commerce scenarios. The work proposes a software architecture consisting of three main components: linked data for e-commerce, cloud-based services, and mobile apps. The three components implement a scenario where a shopping mall is presented as an intelligent environment in which customers use NFC capabilities of their smartphones in order to handle e-coupons produced, suggested, and consumed by the abovesaid environment. The main function of the intelligent environment is to help customers define shopp…

Ambient intelligenceArticle SubjectExploitDatabaseComputer Networks and CommunicationsComputer sciencebusiness.industryShopping mallCloud computingTK5101-6720computer.software_genreComputer Science ApplicationsTelecommunicationIntelligent environmentUbiquitous commerceSoftware architecturebusinessMobile devicecomputerMobile Information Systems
researchProduct

Multi-sensor Fusion through Adaptive Bayesian Networks

2011

Common sensory devices for measuring environmental data are typically heterogeneous, and present strict energy constraints; moreover, they are likely affected by noise, and their behavior may vary across time. Bayesian Networks constitute a suitable tool for pre-processing such data before performing more refined artificial reasoning; the approach proposed here aims at obtaining the best trade-off between performance and cost, by adapting the operating mode of the underlying sensory devices. Moreover, self-configuration of the nodes providing the evidence to the Bayesian network is carried out by means of an on-line multi-objective optimization.

Ambient intelligenceComputer sciencebusiness.industryMode (statistics)Ambient Intelligence Bayesian Networks Multi-objective optimization.Bayesian networkMachine learningcomputer.software_genreMulti-objective optimizationVariable-order Bayesian networkNoise (video)Artificial intelligenceData miningbusinesscomputerEnergy (signal processing)
researchProduct