Search results for "software"
showing 10 items of 7396 documents
Recommending Serendipitous Items using Transfer Learning
2018
Most recommender algorithms are designed to suggest relevant items, but suggesting these items does not always result in user satisfaction. Therefore, the efforts in recommender systems recently shifted towards serendipity, but generating serendipitous recommendations is difficult due to the lack of training data. To the best of our knowledge, there are many large datasets containing relevance scores (relevance oriented) and only one publicly available dataset containing a relatively small number of serendipity scores (serendipity oriented). This limits the learning capabilities of serendipity oriented algorithms. Therefore, in the absence of any known deep learning algorithms for recommend…
Data mining framework for random access failure detection in LTE networks
2014
Sleeping cell problem is a particular type of cell degradation. There are various software and hardware reasons that might cause such kind of cell outage. In this study a cell becomes sleeping because of Random Access Channel (RACH) failure. This kind of network problem can appear due to misconfiguration, excessive load or software/firmware problem at the Base Station (BS). In practice such failure might cause network performance degradation, which is hardly traceable by an operator. In this paper we present a data mining based framework for the detection of problematic cells. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving BS. The choice of N i…
Towards enabling privacy preserving smart city apps
2016
Smart city applications are increasingly relying on personally identifiable data. A disclosure of such a data to a platform provider and possible 3rd parties represents a risk to the privacy of the application users. To mitigate the privacy risk, two-layer privacy-preserving platform architecture is introduced, wherein the personally identifiable information is dealt with at the inner layer (executed in a trusted environment), whereas only generic and personally unidentifiable information is made available to the apps at the outer layer of the architecture — e.g., in a form of app-specific events. The essential requirements for the platform are described, and the architectural implications …
Essence : Reference Architecture for Software Engineering - Representing Essence in Archimate Notation
2018
Essence is a standard for working with methods in software engineering. As such, it can be seen as the reference architecture for software engineering. The Essence consists of the Kernel, and a notation called the Language. This representation is not widely known and likely hinders the adoption of the Essence. This paper represents the work-in-progress of representing the Essence using ArchiMate, the de facto notation for enterprise architecture. Our purpose is to help organisations to adopt Essence by representing it in the language already understood by different stakeholders. peerReviewed
Scalable implementation of dependence clustering in Apache Spark
2017
This article proposes a scalable version of the Dependence Clustering algorithm which belongs to the class of spectral clustering methods. The method is implemented in Apache Spark using GraphX API primitives. Moreover, a fast approximate diffusion procedure that enables algorithms of spectral clustering type in Spark environment is introduced. In addition, the proposed algorithm is benchmarked against Spectral clustering. Results of applying the method to real-life data allow concluding that the implementation scales well, yet demonstrating good performance for densely connected graphs. peerReviewed
Are they different? affect, feeling, emotion, sentiment, and opinion detection in text
2014
A major limitation in the automatic detection of affect, feelings, emotions, sentiments, and opinions in text is the lack of proper differentiation between these subjective terms and understanding of how they relate to one another. This lack of differentiation not only leads to inconsistency in terminology usage but also makes the subtleties and nuances expressed by the five terms difficult to understand, resulting in subpar detection of the terms in text. In light of such limitation, this paper clarifies the differences between these five subjective terms and reveals significant concepts to the computational linguistics community for their effective detection and processing in text.
Video Streaming and Internalized Surveillance
2018
This paper aims to develop knowledge about the complicated ways in which the modern individual uses surveillance (techniques) and the ways surveillance uses the individual. My observational analysis of a videostreaming community reveals the central role that surveillance plays in participating and becoming visible in an online environment. The results show that through disciplinary and lateral surveillance, participants produced context-defined I-narrations and formed themselves following the normative judgment of the environment. The same mechanism may be observed in other videostreaming social media environments and the modern social media-saturated society in general. This is an inconspi…
Towards proactive context-aware self-healing for 5G networks
2017
In this paper, we suggest a new research direction and a future vision for Self-Healing (SH) in Self-Organizing Networks (SONs). The problem we wish to solve is that traditional SH solutions may not be sufficient for the future needs of cellular network management because of their reactive nature, i.e., they start recovering after detecting already occurred faults instead of preparing for possible future faults in a pre-emptive manner. The detection delays are especially problematic with regard to the zero latency requirements of 5G networks. To address this problem, existing SONs need to be upgraded from reactive to proactive response. One of the dimensions in SH research is to employ more…
Choosing a study mode in blended learning
2012
Education providers aim to meet today's education requirements by employing, among other things, education technology solutions that increase flexibility. This has also happened with the master's level mathematical information technology degree directed to adults. In the degree program, lecture videos brought in together with face-to-face teaching provide good opportunities for flexible educational arrangements. Education with the help of videos can be arranged in such a way that students themselves will be able to choose their study mode in accordance with their needs. When students themselves can choose their study modes, many different ways to take advantage of the flexibility provided a…
Looking for Peace of Mind? Manage your (Technical) Debt : An Exploratory Field Study
2017
Background: In the last two decades Technical Debt (TD) has received a considerable amount of attention from software engineering research and practice. Recently, a small group of studies suggests that, in addition to its technical and economic consequences, TD can affect developers’ psychological states and morale. However, until now there has been a lack of empirical research clarifying such influences. Aims: In this study, we aim at taking the first step in filling this gap by investigating the potential impacts of TD and its management on developers’ morale. Method: Drawing from previous literature on morale, we decided to explore the influence of TD and its management on three dimensio…