Search results for "web"

showing 10 items of 2018 documents

The Supranational Dimension in Max Weber’s Vision of Politics

2019

Max Weber analyzed politics from the perspective of Chancen for actors, and he never separated world politics from domestic politics. The “Westphalian balance” between great European powers shaped Weber’s views on international polity. However, he also regarded Western individualism, human rights, and parliamentary democracy as necessary qualities to possess in order to be recognized as a great power. This vision provided the basis for his wartime critique of the expansionist tendencies in German foreign policy and for his demand for the parliamentarization of German politics. After the end of World War I, Weber used Woodrow Wilson’s idea of the League of Nations as the basis for a proposal…

supranationalismYhdistyneet kansakunnat (YK)Euroopan unioni (EU)United NationsWeber MaxMax Weberworld politicskansainvälinen politiikkaKansainliittosota-aikaPoliticsinternational polityLeague of NationsWestphalian balanceylikansallisuusPolitical sciencejournalismimedia_common.cataloged_instancewartime journalismEuropean UnionDimension (data warehouse)European unionLaw and economicsmedia_common
researchProduct

Clinical Behavior of Short Dental Implants: Systematic Review and Meta-Analysis

2020

Short implants are an increasingly common alternative to other surgical techniques in areas where bone availability is reduced. Despite the advantages they offer, a variety of biological repercussions have been described in the literature that can even lead to the loss of these. The aim of this systematic review and meta-analysis was to analyze the impact of the use of short implants on their survival and on peri-implant bone loss, evaluating the influence that length, diameter, and crown-to-implant ratio (C/I) have on these parameters. This systematic review was based on guidelines proposed by the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA). An electronic se…

survival rateWeb of scienceDentistrylcsh:MedicineReview03 medical and health sciences0302 clinical medicineQualitative analysis0502 economics and businessMedicineLead (electronics)Survival ratebusiness.industry05 social scienceslcsh:R030206 dentistryGeneral Medicineedentulous mouthShort implantsSystematic reviewMeta-analysiscrown-to-implant ratio050211 marketingImplantpartially edentulous mouthshort implantsbusinessJournal of Clinical Medicine
researchProduct

Supporting Cyber Resilience with Semantic Wiki

2016

Cyber resilient organizations, their functions and computing infrastructures, should be tolerant towards rapid and unexpected changes in the environment. Information security is an organization-wide common mission; whose success strongly depends on efficient knowledge sharing. For this purpose, semantic wikis have proved their strength as a flexible collaboration and knowledge sharing platforms. However, there has not been notable academic research on how semantic wikis could be used as information security management platform in organizations for improved cyber resilience. In this paper, we propose to use semantic wiki as an agile information security management platform. More precisely, t…

ta113021110 strategic defence & security studiesEngineeringKnowledge managementCloud computing securitybusiness.industryStandard of Good Practiceinformation security management0211 other engineering and technologies02 engineering and technologyInformation securitycyber resiliencesemantic wikiSecurity information and event managementrisk managementSecurity controlsResilience (organizational)World Wide WebITIL security managementInformation security management020204 information systems0202 electrical engineering electronic engineering information engineeringbusiness
researchProduct

Teaching Knowledge Management by Combining Wikis and Screen Capture Videos

2011

PurposeThis paper aims to report on the design and creation of a knowledge management course aimed at facilitating student creation and use of social interactive learning tools for enhanced learning.Design/methodology/approachThe era of social media and web 2.0 has enabled a bottom‐up collaborative approach and new ways to publish work on the web, promoted by tools such as YouTube video service. In this spirit a knowledge management course was designed aiming to facilitate university students to compose videos on different difficult concepts in the theory part of the course by searching for explanations on the web and by creating a Windows Media Player video focusing on the self‐defined pro…

ta113Collaborative writingKnowledge managementMultimediaComputer Networks and Communicationsbusiness.industryComputer scienceWindows MediaLibrary and Information Sciencescomputer.software_genreInteractive LearningWorld Wide WebProblem-based learningConstructivism (philosophy of education)The InternetSocial mediabusinessSocial constructivismcomputer
researchProduct

Adaptive framework for network traffic classification using dimensionality reduction and clustering

2012

Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then …

ta113Computer scienceNetwork securitybusiness.industryDimensionality reductionintrusion detectionk-meansdiffusion mapServer logcomputer.software_genreanomaly detectionTraffic classificationkoneoppiminenWeb log analysis softwareAnomaly detectionData miningWeb servicetiedonlouhintaCluster analysisbusinesscomputern-grams
researchProduct

Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications

2014

Abstract Constrained Application Protocol (CoAP) has been introduced as a simpler alternative to the Hypertext Transfer Protocol (HTTP) for connecting constrained smart objects to the Web. The adoption of the protocol depends on its relative advantage, and the cost–benefit associated with the use of the protocol is a significant factor affecting a protocol adoption decision. This paper aims at deepening the understanding of the cost–benefits of CoAP and identifies the application scenarios where its use is likely to be economically justifiable. The paper analyzes the costs of using CoAP and HTTP in the Web of Things (WoT) applications, by identifying the components of the total cost of owne…

ta113Information Systems and ManagementHypertext Transfer Protocolta213Cost efficiencyComputer scienceSmart objectsbusiness.industrycomputer.internet_protocolta111Computer securitycomputer.software_genreManagement Information SystemsConstrained Application ProtocolWeb of ThingsArts and Humanities (miscellaneous)Developmental and Educational PsychologyOverhead (computing)businessta512Protocol (object-oriented programming)computerInformation SystemsComputer networkDecision Support Systems
researchProduct

User session level diverse reranking of search results

2018

Most Web search diversity approaches can be categorized as Document Level Diversification (DocLD), Topic Level Diversification (TopicLD) or Term Level Diversification (TermLD). DocLD selects the relevant documents with minimal content overlap to each other. It does not take the coverage of query subtopics into account. TopicLD solves this by modeling query subtopics explicitly. However, the automatic mining of query subtopics is difficult. TermLD tries to cover as many query topic terms as possible, which reduces the task of finding a query's subtopics into finding a set of representative topic terms. In this paper, we propose a novel User Session Level Diversification (UserLD) approach bas…

ta113InternetInformation retrievalWeb search queryuser sessionComputer scienceCognitive NeuroscienceInformationSystems_INFORMATIONSTORAGEANDRETRIEVAL02 engineering and technologyGraphComputer Science Applicationssearch result rerankingQuery expansionsession graphArtificial IntelligenceWeb query classification020204 information systems0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)020201 artificial intelligence & image processingtiedonhakuhakutuloksetsearch result diversification
researchProduct

Issues with a course that emphasizes self-direction

2013

In this paper, we examine a master's level course that emphasizes self-direction on the part of students. The course is run by weekly group assignments and requires independent work such that only one mandatory classroom session is arranged each week. Our specific research interests are how students responded to the setting of this kind and whether they demonstrated self-direction during the course. We surveyed the students' view of the course, their group work experience, and their study habits, and analyzed the resultant survey data for themes. The results suggest that while the pass rate was considerably high and the course was regarded as well-organized by the students, there were sever…

ta113Medical educationComputer scienceeducationPass rateSelf directionSession (web analytics)Course (navigation)Work (electrical)PedagogyActive learningComputingMilieux_COMPUTERSANDEDUCATIONSurvey data collectionta516Group work
researchProduct

A two-step, user-centered approach to personalized tourist recommendations

2017

Geo-localized, mobile applications can simplify a tourist visit, making the relevant Point of Interests more easily and promptly discernible to users. At the same time, such solutions must avoid creating unfitting or rigid user profiles that impoverish the users' options instead of refining them. Currently, user profiles in recommender systems rely on dimensions whose relevance to the user is more often presumed than empirically defined. To avoid this drawback, we build our recommendation system in a two-step process, where profile parameters are evaluated preliminarily and separately from the recommendations themselves. We describe this two-step evaluation process including an initial surv…

ta113Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniTourist applicationEngineeringUser profileSettore INF/01 - InformaticaPoint (typography)Process (engineering)Computer Applicationsbusiness.industry02 engineering and technologyRecommender systemWorld Wide WebTourist applicationsUser validationHuman–computer interaction020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingGeneralizability theoryRelevance (information retrieval)businessDrawbackProceedings of the 12th Biannual Conference on Italian SIGCHI Chapter
researchProduct

Online activity traces around a "Boston bomber"

2013

This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.

ta113Social networkbusiness.industryInternet privacyTragedy (event)ComputingMilieux_LEGALASPECTSOFCOMPUTINGThe InternetSocial mediaSociologySuspectbusinessWeb crawlerDigital mediaProceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
researchProduct