Search results for "computer"
showing 10 items of 30657 documents
On optimal relay placement for improved performance in non-coverage limited scenarios
2014
Low power nodes have been a hot topic in research, standardization, and industry communities, which is typically considered under an umbrella term called heterogeneous networking. In this paper we look at the problem of deploying optimally low power nodes in the context of relay networking, when an operator connects low power nodes (or small cells) via the wireless backhaul that uses the same spectrum and the same wireless access technology. We present an analytical model that can calculate optimal coordinates for low power nodes based on the input parameters, such as preferred number of nodes, their transmission power, parameters of the environment etc. The analytical calculations are comp…
Listwise Collaborative Filtering
2015
Recently, ranking-oriented collaborative filtering (CF) algorithms have achieved great success in recommender systems. They obtained state-of-the-art performances by estimating a preference ranking of items for each user rather than estimating the absolute ratings on unrated items (as conventional rating-oriented CF algorithms do). In this paper, we propose a new ranking-oriented CF algorithm, called ListCF. Following the memory-based CF framework, ListCF directly predicts a total order of items for each user based on similar users' probability distributions over permutations of the items, and thus differs from previous ranking-oriented memory-based CF algorithms that focus on predicting th…
SaaS architecture and pricing models
2014
In the new era of computing, SaaS software with different architectural characteristics might be priced in different ways. Even though both pricing and architectural characteristics are responsible for the success of the offering; the relationship between architectural and pricing characteristics has not been studied before. The present study fills this gap by employing a multi-case research. The findings accentuate that flexible and well-designed architecture enables different pricing models; however, poorly designed architecture limits also the pricing. Scalability and high level of modularity are the major enablers of a great variety of pricing models. Using public cloud services may lea…
Use of a Semantic Language to Reduce the Indeterminacy in Agents Communication
2014
In the field of agent communications uncertainty and vagueness in the message content and in the achievable results play a primordial role when two agents (human or artificial) communicate. Even though the importance of vagueness and uncertainty has been recognized long ago, only recently mechanisms related to the communications’ semantics that allow a practical approach have been designed; more specifically, the development of tools such as agent programming languages and frameworks, which is a field of intensive research. On the other hand, recent theoretical ideas, drawn from situation semantics theory and the works of Sutton on semantic information, support this work. This paper applies…
Automatic dynamic texture segmentation using local descriptors and optical flow
2012
A dynamic texture (DT) is an extension of the texture to the temporal domain. How to segment a DT is a challenging problem. In this paper, we address the problem of segmenting a DT into disjoint regions. A DT might be different from its spatial mode (i.e., appearance) and/or temporal mode (i.e., motion field). To this end, we develop a framework based on the appearance and motion modes. For the appearance mode, we use a new local spatial texture descriptor to describe the spatial mode of the DT; for the motion mode, we use the optical flow and the local temporal texture descriptor to represent the temporal variations of the DT. In addition, for the optical flow, we use the histogram of orie…
An Approach for Network Outage Detection from Drive-Testing Databases
2012
A data-mining framework for analyzing a cellular network drive testing database is described in this paper. The presented method is designed to detect sleeping base stations, network outage, and change of the dominance areas in a cognitive and self-organizing manner. The essence of the method is to find similarities between periodical network measurements and previously known outage data. For this purpose, diffusion maps dimensionality reduction and nearest neighbor data classification methods are utilized. The method is cognitive because it requires training data for the outage detection. In addition, the method is autonomous because it uses minimization of drive testing (MDT) functionalit…
Appraisal and Mental Contents in Human-Technology Interaction
2015
User experience has become a key concept in investigating human-technology interaction. Therefore it has become essential to consider how user experience can be explicated using psychological concepts. Emotion has been widely considered to be an important dimension of user experience, and one obvious link between modern psychology and the analysis of user experience assumes the analysis of emotion in interaction processes. In this paper, the focus is on the relationship between action types and elicited emotional patterns. In three experiments including N = 40 participants each, it is demonstrated that the types of emotions experienced when people evaluate and use technical artefacts differ…
Cognitive self-healing system for future mobile networks
2015
This paper introduces a framework and implementation of a cognitive self-healing system for fault detection and compensation in future mobile networks. Performance monitoring for failure identification is based on anomaly analysis, which is a combination of the nearest neighbor anomaly scoring and statistical profiling. Case-based reasoning algorithm is used for cognitive self-healing of the detected faulty cells. Validation environment is Long Term Evolution (LTE) mobile system simulated with Network Simulator 3 (ns-3) [1, 2]. Results demonstrate that cognitive approach is efficient for compensation of cell outages and is capable to improve network coverage. Anomaly analysis can be used fo…
Turing's error-revised
2016
Many important lines of argumentation have been presented during the last decades claiming that machines cannot think like people. Yet, it has been possible to construct devices and information systems, which replace people in tasks which have previously been occupied by people as the tasks require intelligence. The long and versatile discourse over, what machine intelligence is, suggests that there is something unclear in the foundations of the discourse itself. Therefore, we critically studied the foundations of used theory languages. By looking critically some of the main arguments of machine thinking, one can find unifying factors. Most of them are based on the fact that computers canno…
Context-aware data caching for 5G heterogeneous small cells networks
2016
In this work, we investigate the problem of context-aware data caching in the heterogeneous small cell networks (HSCNs) to provide satisfactory to the end-users in reducing the service latency. In particular, we explore the storage capability of base stations (BSs) in HSCNs and propose a data caching model consists of edge caching elements (CAEs), small cell base stations (SBSs), and macro cell BS (MBS). Then, we concentrate on how to efficiently match the data contents to the different cache entities in order to minimize the overall system service latency. We model it as a distributed college admission (CA) stable matching problem and tackle this issue by utilizing contextual information t…