Search results for "software"

showing 10 items of 7396 documents

Recommending Serendipitous Items using Transfer Learning

2018

Most recommender algorithms are designed to suggest relevant items, but suggesting these items does not always result in user satisfaction. Therefore, the efforts in recommender systems recently shifted towards serendipity, but generating serendipitous recommendations is difficult due to the lack of training data. To the best of our knowledge, there are many large datasets containing relevance scores (relevance oriented) and only one publicly available dataset containing a relatively small number of serendipity scores (serendipity oriented). This limits the learning capabilities of serendipity oriented algorithms. Therefore, in the absence of any known deep learning algorithms for recommend…

ta113recommender systemInformation retrievalTraining setArtificial neural networkComputer sciencebusiness.industrySerendipityDeep learningsuosittelujärjestelmätdeep learning020207 software engineeringserendipity02 engineering and technologyRecommender systemtransfer learningalgorithmskoneoppiminenalgoritmit0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRelevance (information retrieval)Artificial intelligenceTransfer of learningbusiness
researchProduct

Data mining framework for random access failure detection in LTE networks

2014

Sleeping cell problem is a particular type of cell degradation. There are various software and hardware reasons that might cause such kind of cell outage. In this study a cell becomes sleeping because of Random Access Channel (RACH) failure. This kind of network problem can appear due to misconfiguration, excessive load or software/firmware problem at the Base Station (BS). In practice such failure might cause network performance degradation, which is hardly traceable by an operator. In this paper we present a data mining based framework for the detection of problematic cells. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving BS. The choice of N i…

ta113sleeping cell problembusiness.industryComputer scienceFirmwareHeuristic (computer science)Event (computing)Reliability (computer networking)data miningLTE networkscomputer.software_genreBase stationRandom-access channelUser equipmentData miningbusinessrandom access channelcomputerRandom accessComputer network2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC)
researchProduct

Towards enabling privacy preserving smart city apps

2016

Smart city applications are increasingly relying on personally identifiable data. A disclosure of such a data to a platform provider and possible 3rd parties represents a risk to the privacy of the application users. To mitigate the privacy risk, two-layer privacy-preserving platform architecture is introduced, wherein the personally identifiable information is dealt with at the inner layer (executed in a trusted environment), whereas only generic and personally unidentifiable information is made available to the apps at the outer layer of the architecture — e.g., in a form of app-specific events. The essential requirements for the platform are described, and the architectural implications …

ta113smart city application platformInformation privacyPrivacy by DesignComputer sciencebusiness.industryPrivacy softwareMultitier architectureInternet privacy020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreprivacylayered architecture020204 information systemsSmart city0202 electrical engineering electronic engineering information engineeringLayer (object-oriented design)ArchitecturebusinessPersonally identifiable informationcomputerpersonally identifiable information
researchProduct

Essence : Reference Architecture for Software Engineering - Representing Essence in Archimate Notation

2018

Essence is a standard for working with methods in software engineering. As such, it can be seen as the reference architecture for software engineering. The Essence consists of the Kernel, and a notation called the Language. This representation is not widely known and likely hinders the adoption of the Essence. This paper represents the work-in-progress of representing the Essence using ArchiMate, the de facto notation for enterprise architecture. Our purpose is to help organisations to adopt Essence by representing it in the language already understood by different stakeholders. peerReviewed

ta113software development methodbusiness.industryComputer scienceSEMAT020206 networking & telecommunications020207 software engineering02 engineering and technologyNotationessenceArchiMatekernel0202 electrical engineering electronic engineering information engineeringReference architectureSoftware engineeringbusinessohjelmistokehitys
researchProduct

Scalable implementation of dependence clustering in Apache Spark

2017

This article proposes a scalable version of the Dependence Clustering algorithm which belongs to the class of spectral clustering methods. The method is implemented in Apache Spark using GraphX API primitives. Moreover, a fast approximate diffusion procedure that enables algorithms of spectral clustering type in Spark environment is introduced. In addition, the proposed algorithm is benchmarked against Spectral clustering. Results of applying the method to real-life data allow concluding that the implementation scales well, yet demonstrating good performance for densely connected graphs. peerReviewed

ta113ta213Apache SparkComputer sciencedatasetsCorrelation clusteringdata miningcomputer.software_genrealgorithmsSpectral clusteringComputational sciencedependence clusteringData stream clusteringCURE data clustering algorithmScalabilitySpark (mathematics)algoritmitCanopy clustering algorithmData miningtiedonlouhintaCluster analysisclustering algorithmscomputerdata processingtietojenkäsittely
researchProduct

Are they different? affect, feeling, emotion, sentiment, and opinion detection in text

2014

A major limitation in the automatic detection of affect, feelings, emotions, sentiments, and opinions in text is the lack of proper differentiation between these subjective terms and understanding of how they relate to one another. This lack of differentiation not only leads to inconsistency in terminology usage but also makes the subtleties and nuances expressed by the five terms difficult to understand, resulting in subpar detection of the terms in text. In light of such limitation, this paper clarifies the differences between these five subjective terms and reveals significant concepts to the computational linguistics community for their effective detection and processing in text.

ta113ta520business.industrymedia_common.quotation_subjectAffect (psychology)Electronic mailTerminologyHuman-Computer InteractionText miningText processingFeelingCultural diversityComputational linguisticsPsychologybusinessSocial psychologySoftwaremedia_commonCognitive psychologyIEEE transactions on affective computing
researchProduct

Video Streaming and Internalized Surveillance

2018

This paper aims to develop knowledge about the complicated ways in which the modern individual uses surveillance (techniques) and the ways surveillance uses the individual. My observational analysis of a videostreaming community reveals the central role that surveillance plays in participating and becoming visible in an online environment. The results show that through disciplinary and lateral surveillance, participants produced context-defined I-narrations and formed themselves following the normative judgment of the environment. The same mechanism may be observed in other videostreaming social media environments and the modern social media-saturated society in general. This is an inconspi…

ta113videostreamingMultimediaminäkuvaComputer sciencevisuaalinen viestintäsosiaalinen mediaitseilmaisuvalvontajärjestelmätvideotmodern individualcomputer.software_genreUrban Studiesyksilökontrollisosiaaliset verkostotsosiaalinen ympäristöidentiteettiVideo streamingtarkkailuvalvontayksilöllisyysSafety Researchcomputer
researchProduct

Towards proactive context-aware self-healing for 5G networks

2017

In this paper, we suggest a new research direction and a future vision for Self-Healing (SH) in Self-Organizing Networks (SONs). The problem we wish to solve is that traditional SH solutions may not be sufficient for the future needs of cellular network management because of their reactive nature, i.e., they start recovering after detecting already occurred faults instead of preparing for possible future faults in a pre-emptive manner. The detection delays are especially problematic with regard to the zero latency requirements of 5G networks. To address this problem, existing SONs need to be upgraded from reactive to proactive response. One of the dimensions in SH research is to employ more…

ta213Computer Networks and CommunicationsComputer science020206 networking & telecommunicationsSelf-organizing network02 engineering and technologyuser contextcontext aware systemComputer securitycomputer.software_genre5G networksSelf-healing0202 electrical engineering electronic engineering information engineeringCellular networkself-organizing networkself-healing020201 artificial intelligence & image processingcomputer5G
researchProduct

Choosing a study mode in blended learning

2012

Education providers aim to meet today's education requirements by employing, among other things, education technology solutions that increase flexibility. This has also happened with the master's level mathematical information technology degree directed to adults. In the degree program, lecture videos brought in together with face-to-face teaching provide good opportunities for flexible educational arrangements. Education with the help of videos can be arranged in such a way that students themselves will be able to choose their study mode in accordance with their needs. When students themselves can choose their study modes, many different ways to take advantage of the flexibility provided a…

ta213MultimediaComputer sciencebusiness.industryFlexibility (personality)Information technologycomputer.software_genreBlended learningMode (computer interface)Degree programComputingMilieux_COMPUTERSANDEDUCATIONMathematics educationProfiling (information science)businesscomputerProceedings of the 17th ACM annual conference on Innovation and technology in computer science education
researchProduct

Looking for Peace of Mind? Manage your (Technical) Debt : An Exploratory Field Study

2017

Background: In the last two decades Technical Debt (TD) has received a considerable amount of attention from software engineering research and practice. Recently, a small group of studies suggests that, in addition to its technical and economic consequences, TD can affect developers’ psychological states and morale. However, until now there has been a lack of empirical research clarifying such influences. Aims: In this study, we aim at taking the first step in filling this gap by investigating the potential impacts of TD and its management on developers’ morale. Method: Drawing from previous literature on morale, we decided to explore the influence of TD and its management on three dimensio…

ta222media_common.quotation_subjectApplied psychology02 engineering and technologyInterpersonal communicationthematic analysisAffect (psychology)Field (computer science)Empirical researchPolitical science0502 economics and business0202 electrical engineering electronic engineering information engineeringProductivityta512media_commonmixed-methodta113Management scienceQualitative interviews05 social sciences020207 software engineeringexploratory field studyinformation systems developmentFeelingtechnical debtTechnical debtsoftware developmentmoralebehavioral software engineeringohjelmistokehitys050203 business & management
researchProduct