Search results for "ta113"

showing 10 items of 530 documents

How and Why to Start and Run a SIGCHI Local Chapter

2015

There is a vast and increasing interest towards local HCI communities around the globe and in particular on geographical areas in which HCI has only recently started to gain increasing interest by local industries as well as academic institutions. A SIGCHI Local Chapter is one of the ways a local HCI community can organize and get visibility and support for their activities. However, many active volunteers in this field might not be aware of this possibility. The main goal of the Chapters' SIG in CHI'15 is to inform interested parties of SIGCHI Local Chapters and to find ways in which SIGCHI could better support local HCI communities with their various needs all over the world.

ta113Human-Computer Interaction (HCI)ComputingMilieux_THECOMPUTINGPROFESSIONMultimediabusiness.industryField (Bourdieu)local communitiesVisibility (geometry)GlobePublic relationsSpecial Interest Groupcomputer.software_genreLocal communityspecial interest groupsInformationSystems_MODELSANDPRINCIPLESmedicine.anatomical_structurePolitical sciencemedicineInformationSystems_MISCELLANEOUSbusinesscomputerProceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems
researchProduct

Interface Detection Using a Quenched-Noise Version of the Edwards-Wilkinson Equation

2015

We report here a multipurpose dynamic-interface-based segmentation tool, suitable for segmenting planar, cylindrical, and spherical surfaces in 3D. The method is fast enough to be used conveniently even for large images. Its implementation is straightforward and can be easily realized in many environments. Its memory consumption is low, and the set of parameters is small and easy to understand. The method is based on the Edwards-Wilkinson equation, which is traditionally used to model the equilibrium fluctuations of a propagating interface under the influence of temporally and spatially varying noise. We report here an adaptation of this equation into multidimensional image segmentation, an…

ta113Image segmentationta114DiscretizationInterface (Java)Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONobject detectionimage edge detectionImage segmentationComputer Graphics and Computer-Aided DesignGrayscaleGray-scaleObject detectionSurface topographyNoiseMathematical modelThree-dimensional displaysSegmentationTomography3D image processingNoiseSurface morphologyAlgorithmSoftwareIEEE Transactions on Image Processing
researchProduct

Teaching programming by emphasizing self-direction: How did students react to the active role required of them?

2013

Lecturing is known to be a controversial form of teaching. With massed classrooms, in particular, it tends to constrain the active participation of students. One of the remedies applied to programming education is to use technology that can vitalize interaction in the classroom, while another is to base teaching increasingly on programming activities. In this article, we present the first results of an exploratory study, in which we teach programming without lectures, exams, or grades, by heavily emphasizing programming activity, and, in a pedagogical sense, student self-direction. This article investigates how students reacted to the active role required of them and what issues emerged in …

ta113Independent studyGeneral Computer ScienceComputer scienceTeaching methodScheduling (production processes)Exploratory researchSelf directionEducationPedagogyActive learningComputingMilieux_COMPUTERSANDEDUCATIONMathematics educationta516Action researchGroup workACM Transactions on Computing Education
researchProduct

Co-evolution between Trust in Teachers and Higher Education Enabled by ICT Advancement – A Suggestion to ICT Growing Economies

2016

In light of the increasing significance of trust-based higher education towards digitally-rich learning environments, co-evolution dynamism between trust in teachers and higher education enabled by ICT advancement was analyzed. Using the rate of trust in teachers for good education in the Global Teacher Status Index, together with statistics on higher education level and ICT advancement, an empirical numerical analysis of 20 countries was attempted. It was identified that while ICT advanced countries have constructed a co-evolution between ICT, higher education and trust, ICT growing countries have not succeeded due to a vicious cycle between ICT and trust. Finland’s educational success can…

ta113Index (economics)Knowledge managementHigher educationbusiness.industrysulautuva opetusblended learningPublic relationseducational productivity paradoxlogistic growthBlended learningtrust in teachersInformation and Communications TechnologyPolitical scienceProductivity paradoxComputingMilieux_COMPUTERSANDEDUCATIONta516pedagogical loveDynamismDisengagement theorybusinessJournal of Technology Management for Growing Economies
researchProduct

A posteriori error estimates for time-dependent reaction-diffusion problems based on the Payne-Weinberger inequality

2015

We consider evolutionary reaction-diffusion problem with mixed Dirichlet--Robin boundary conditions. For this class of problems, we derive two-sided estimates of the distance between any function in the admissible energy space and exact solution of the problem. The estimates (majorants and minorants) are explicitly computable and do not contain unknown functions or constants. Moreover, it is proved that the estimates are equivalent to the energy norm of the deviation from the exact solution.

ta113InequalityApplied Mathematicsmedia_common.quotation_subjectta111Numerical Analysis (math.NA)Parabolic partial differential equationExact solutions in general relativityevolutionary reaction-diffusion problemsNorm (mathematics)FOS: MathematicsDiscrete Mathematics and CombinatoricsA priori and a posterioriApplied mathematicsBoundary value problemMathematics - Numerical AnalysisDirichlet–Robin boundary conditionsAnalysisMathematicsmedia_common
researchProduct

Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications

2014

Abstract Constrained Application Protocol (CoAP) has been introduced as a simpler alternative to the Hypertext Transfer Protocol (HTTP) for connecting constrained smart objects to the Web. The adoption of the protocol depends on its relative advantage, and the cost–benefit associated with the use of the protocol is a significant factor affecting a protocol adoption decision. This paper aims at deepening the understanding of the cost–benefits of CoAP and identifies the application scenarios where its use is likely to be economically justifiable. The paper analyzes the costs of using CoAP and HTTP in the Web of Things (WoT) applications, by identifying the components of the total cost of owne…

ta113Information Systems and ManagementHypertext Transfer Protocolta213Cost efficiencyComputer scienceSmart objectsbusiness.industrycomputer.internet_protocolta111Computer securitycomputer.software_genreManagement Information SystemsConstrained Application ProtocolWeb of ThingsArts and Humanities (miscellaneous)Developmental and Educational PsychologyOverhead (computing)businessta512Protocol (object-oriented programming)computerInformation SystemsComputer networkDecision Support Systems
researchProduct

Role of Acquisition Intervals in Private and Public Cloud Storage Costs

2014

The volume of worldwide digital content has increased nine-fold within the last five years, and this immense growth is predicted to continue in the foreseeable future to reach 8 ZB by 2015. Traditionally, organizations proactively have built and managed their private storage facilities to cope with the growing demand for storage capacity. Recently, many organizations have instead welcomed the alternative of outsourcing their storage needs to the providers of public cloud storage services due to the proliferation of public cloud infrastructure offerings. The comparative cost-efficiency of these two alternatives depends on a number of factors, such as the prices of the public and private stor…

ta113Information Systems and Managementbusiness.industryDigital contentmedia_common.quotation_subjectControl (management)Volume (computing)ProvisioningCloud computingEnvironmental economicsManagement Information SystemsOutsourcingArts and Humanities (miscellaneous)Service (economics)Developmental and Educational PsychologyOperations managementBusinessCloud storageInformation Systemsmedia_commonDecision Support Systems
researchProduct

Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work

2013

Non-work-related personal use of the Internet within organizations has received increased attention from scholars. We increase previous understanding of this phenomenon by proposing a novel model based on the theory of interpersonal behavior (TIB). The TIB includes previous researched constructs (i.e., attitudes, social influence, and intentions) as well as emotional factors, habits, and different sources of social influence. Our results (N=238) suggest that the model well predicts the use of the Internet at work for non-work purposes. Our results shed new light on the influence of habit, affect, role, and self-concept in the use of the Internet.

ta113Information Systems and Managementbusiness.industrymedia_common.quotation_subjectAffect (psychology)Work relatedInterpersonal behaviorManagement Information SystemsWork (electrical)PhenomenonThe InternetHabitbusinessPsychologySocial psychologyInformation SystemsSocial influencemedia_commonInformation & Management
researchProduct

Investigating serendipity in recommender systems based on real user feedback

2018

Over the past several years, research in recommender systems has emphasized the importance of serendipity, but there is still no consensus on the definition of this concept and whether serendipitous items should be recommended is still not a well-addressed question. According to the most common definition, serendipity consists of three components: relevance, novelty and unexpectedness, where each component has multiple variations. In this paper, we looked at eight different definitions of serendipity and asked users how they perceived them in the context of movie recommendations. We surveyed 475 users of the movie recommender system, MovieLens regarding 2146 movies in total and compared tho…

ta113Information retrievalComputer scienceSerendipityuutuudetpalautesuosittelujärjestelmätNoveltyserendipityContext (language use)02 engineering and technologyVariation (game tree)Recommender systemunexpectednessPreferenceMovieLenssattumanovelty020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRelevance (information retrieval)relevancerecommender systemsProceedings of the 33rd Annual ACM Symposium on Applied Computing
researchProduct

A Hybrid Multigroup Coclustering Recommendation Framework Based on Information Fusion

2015

Collaborative Filtering (CF) is one of the most successful algorithms in recommender systems. However, it suffers from data sparsity and scalability problems. Although many clustering techniques have been incorporated to alleviate these two problems, most of them fail to achieve further significant improvement in recommendation accuracy. First of all, most of them assume each user or item belongs to a single cluster. Since usually users can hold multiple interests and items may belong to multiple categories, it is more reasonable to assume that users and items can join multiple clusters (groups), where each cluster is a subset of like-minded users and items they prefer. Furthermore, most of…

ta113Information retrievalComputer sciencebusiness.industrydata miningRecommender systemcomputer.software_genreTheoretical Computer ScienceInformation fusionKnowledge baseArtificial IntelligenceCollaborative FilteringScalabilityCluster (physics)Collaborative filteringLearning to rankData miningrecommender systemsCluster analysisbusinesscomputercluster analysisACM Transactions on Intelligent Systems and Technology
researchProduct