The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper provides a high-level review of the current state of techno-pedagogical design in Augmented Reality Learning Experiences (ARLEs). The review is based on a rubric constructed from the Meaningful Learning with ICT framework and the Orchestration Load reduction framework, providing, respectively, a view of primarily student- and primarily teacher-focused dimensions in ARLEs. Fifty-nine ARLEs...
Frequent sequence mining methods often make use of constraints to control which subsequences should be mined, e.g., length, gap, span, regular-expression, and hierarchy constraints. We show that many subsequence constraints—including and beyond those considered in the literature—can be unified in a single framework. In more detail, we propose a set of simple and intuitive "pattern expressions"...
Queries posed by a user over a database do not always return the desired responses. It may sometimes result an empty set of answers especially when data are pervaded with uncertainty and imprecision. Thus, to address this problem, we propose an approach for relaxing a failing query in the context of evidential databases. The uncertainty in such databases is expressed within the belief function theory...
Quality assurance is a subject that has grown dramatically in importance in recent times. In previous work, we have described how the ACM Curricula can be used to support the Quality Assurance process of educational programs, using the Computer Science program at Reykjavik University as an example. Faculty members and employers of graduates participated in the process, that resulted in providing both...
In many applications domains, time modeling has a fundamental role. Allen temporal relations are one of the most used and known formalisms for modeling and handling temporal data. However, classical Allen relations deal only with crisp time information, but time is often subjective and fuzzy. This paper discusses a disjunctive view of temporal relations between fuzzy time intervals. This approach...
A fundamental challenge in controlling the leakage of sensitive information by computer systems is the possibility of correlations between different secrets, with the result that leaking information about one secret may also leak information about a different secret. We explore such leakage, here called Dalenius leakage, within the context of the g-leakage family of leakage measures. We prove a fundamental...
Smart home is one of the most important applications of ubiquitous computing. In this work, we propose an infrastructure of Vietnamese Smart homes as well as a training framework for activity recognition and forecast. In this framework, active learning technique is applied and a new mining algorithm is proposed. In addition to activity recognition, a forecast mechanism is also added into the smart...
Non-rigid point set registration is a fundamental problem for many computer vision technologies. In this paper, we proposed a new non-rigid point set registration method based on coherent spatial mapping (CSM) and local geometrical constraint. Our central idea is to express each point as a weighted sum of several nearest neighbors and the same relation holds after the transformation. The registration...
Resolving ambiguous and unknown identities is crucial to intelligence analysis in which fraud and deceptive names are frequently used by criminals and terrorists to make their activities unnoticeable. Typical approaches rely on the similarity measure of textual and other content-based characteristics, which are usually not applicable in the case of falsely-defined and unknown instances. This barrier...
Recently α-cut irreducible and δ1δ2-multi-adjoint concept lattices have been introduced as two different methodologies focus on reducing the size of a given fuzzy concept lattice. The philosophy of both methodologies is completely different and so, the obtained lattices too. This paper analyzes the differences and proposes that the best is to combine both methodologies in order to obtain new procedures...
The design of class models for information systems, databases or programming is a delicate process in which experts of the domain and designers have to identify and agree on the domain concepts. Formal Concept Analysis (FCA) has been proposed for supporting this collaborative work and fostering the emergence of higher level entities and the factorization of descriptions and behaviors. More recently,...
The paper presents an idea of a context-aware application, which collects context data from many different sources, stores them in a dedicated database and makes use of it to support flexible scenarios for end users. Using open APIs it integrates different types of context information provided by: Unified Communication system, APIs exposed by communication service providers and information from Machine...
In this paper we explore the design of Leyline, a provenance-based desktop search and file management system, both on a conceptual and user interface level. We start with a comparative analysis and classification of previous provenance based search systems, examining their underlying assumptions and focus, search coverage and flexibility, as well as features and limitations. We then describe a novel...
With the proliferation of context-awareness, there is a great demand for providing the database users with suitable query results in the right place at the right time. Efficient and contextual ranking with the query results is one of the most promising way to achieve this goal. Because the users are often unwilling to show all their preferences, it is necessary to rank the query results according...
Previously studied fuzzy bipolar conditions of type ”and if possible” are made of a mandatory condition c and an optional condition w. They allow expressing complex preferences of a conjunctive nature. We define in this paper, a new kind of fuzzy bipolar conditions of the form ”or else” which express complex preferences of a disjunctive nature. We show that the ”or else” form can be used as a negation...
The advent of globalization has led to the adoption of distributed software development as a common practice. One of its drawbacks-the absence of impromptu meetings - is tackled with other communication means, such as emails, instant messaging, or forums. Mailing lists have proven to be effective for enabling developers' collaboration and coordination: Being asynchronous, emails can evade time zone...
Content usage statistics from superdistribution users have great commercial values since they can be used for any number of purposes including marketing, accounting, and/or fraud prevention. However tracking content usage under the superdistribution model poses a great challenge since most content users have no explicit pre-established relationship with the content provider. In this paper, we present...
Calcite is a new Eclipse plugin that helps address the difficulty of understanding and correctly using an API. Calcite finds the most popular ways to instantiate a given class or interface by using code examples. To allow the users to easily add these object instantiations to their code, Calcite adds items to the popup completion menu that will insert the appropriate code into the user's program....
In this paper, we describe an approach to database preference queries based on the notion of fuzzy outranking, suited to the case where partial preferences are incommensurable. This model constitutes an alternative to the use of Pareto order. Even though outranking does not define an order in the strict sense of the term, we describe a technique which yields a complete pre-order, based on a global...
Widget aggregators such as iGoogle and Netvibes are broadly adopted by the mass market. They enable end-users to personalize their environment with their preferred services (Widgets). However, the usage in an enterprise context is not yet investigated. In this paper, we firstly show that in addition to personalization capability, the integration of business processes should be considered. Secondly,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.