Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Documentation (6)
- Human Factors (6)
- Architecture (2)
- Modality (2)
- ARCGIS (1)
-
- Agreement (1)
- Audit (1)
- Augmented reality (1)
- Autonomous vehicles (1)
- Brooklyn (1)
- Context (1)
- DBI (1)
- Data acquisition (1)
- Design (1)
- Direct manipulation (1)
- Documentation Management (1)
- Domain context (1)
- Dynamic binary instrumentation (1)
- ESRI (1)
- Effectiveness (1)
- Ethnographic methods (1)
- Evaluation (1)
- Evaluation methods classification (1)
- Evasive malware (1)
- Feature extraction (1)
- GIS (1)
- GPS (1)
- Game mechanics (1)
- Google Earth (1)
- Graph drawing (1)
Articles 1 - 15 of 15
Full-Text Articles in Engineering
Matthew Gaber: Peekaboo, Matthew Gaber, Mohiuddin Ahmed, Helge Janicke
Matthew Gaber: Peekaboo, Matthew Gaber, Mohiuddin Ahmed, Helge Janicke
Research Datasets
Cyber-attacks continue to evolve, increasing in frequency and sophistication where Artificial Intelligence (AI) is becoming essential in detecting modern malware. However, the accuracy of AI in malware detection is dependent on the quality of the features it is trained with. Static and dynamic analysis of malware is limited by the widespread use of obfuscation and anti-analysis techniques employed by malware authors, where if an analysis environment is detected the malware will hide its malicious behavior. However, Dynamic Binary Instrumentation (DBI) allows deep and precise control of the malware sample, thereby facilitating the extraction of authentic features from sophisticated and evasive …
Using Satellite Images Datasets For Road Intersection Detection In Route Planning, Fatmaelzahraa Eltaher, Susan Mckeever, Ayman Taha, Jane Courtney
Using Satellite Images Datasets For Road Intersection Detection In Route Planning, Fatmaelzahraa Eltaher, Susan Mckeever, Ayman Taha, Jane Courtney
Datasets
Understanding road networks plays an important role in navigation applications such as self-driving vehicles and route planning for individual journeys. Intersections of roads are essential components of road networks. Understanding the features of an intersection, from a simple T-junction to larger multi-road junctions is critical to decisions such as crossing roads or selecting safest routes. The identification and profiling of intersections from satellite images is a challenging task. While deep learning approaches offer state-of-the-art in image classification and detection, the availability of training datasets is a bottleneck in this approach. In this paper, a labelled satellite image dataset for the …
Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom
Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom
Library Philosophy and Practice (e-journal)
Management audit is very important for assessment of their information technology management to gain efficient and effective business running process. Information technology security as an effort of internal controlling for risk and threat security minimization, is mainly considered due to all learning and lecturing administration activities use information technology. Allso, the implementation of a number of computer labs to facilitate learning processes and access to information in order to support the lectures and personal development of students To find out how secure technology information is, it is then requiring an audit to make sure everything run based on procedure. Management …
Combining Virtual Reality And Machine Learning For Enhancing The Resiliency Of Transportation Infrastructure In Extreme Events, Supratik Mukhopadhyay, Yimin Zhu, Ravindra Gudishala
Combining Virtual Reality And Machine Learning For Enhancing The Resiliency Of Transportation Infrastructure In Extreme Events, Supratik Mukhopadhyay, Yimin Zhu, Ravindra Gudishala
Data
Corresponding data set for Tran-SET Project No. 18ITSLSU09. Abstract of the final report is stated below for reference:
"Traffic management models that include route choice form the basis of traffic management systems. High-fidelity models that are based on rapidly evolving contextual conditions can have significant impact on smart and energy efficient transportation. Existing traffic/route choice models are generic and are calibrated on static contextual conditions. These models do not consider dynamic contextual conditions such as the location, failure of certain portions of the road network, the social network structure of population inhabiting the region, route choices made by other drivers, …
Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey
Mapping In The Humanities: Gis Lessons For Poets, Historians, And Scientists, Emily W. Fairey
Open Educational Resources
User-friendly Geographic Information Systems (GIS) is the common thread of this collection of presentations, and activities with full lesson plans. The first section of the site contains an overview of cartography, the art of creating maps, and then looks at historical mapping platforms like Hypercities and Donald Rumsey Historical Mapping Project. In the next section Google Earth Desktop Pro is introduced, with lessons and activities on the basics of GE such as pins, paths, and kml files, as well as a more complex activity on "georeferencing" an historic map over Google Earth imagery. The final section deals with ARCGIS Online …
Ghosts Of The Horseshoe, Heidi Rae Cooley, Richard Walker, Duncan Buell
Ghosts Of The Horseshoe, Heidi Rae Cooley, Richard Walker, Duncan Buell
Digital Projects
Ghosts of the Horseshoe (Ghosts) is a mobile interactive application that endeavors to bring into view--literally, on mobile micro screens (iPads and iPhones at present)--the largely unknown history of slavery at South Carolina College. It deploys game mechanics (i.e., ludic methods), as well as Augmented Reality (AR) and GPS functionality to generate awareness of and questioning about what otherwise seems ordinary: a grassy space at the center of a university campus. It organizes content into distinct but overlapping themes: (1) architectural ghosts (e.g., razed outbuildings); (2) human ghosts (e.g., un/named enslaved persons); and (3) the historic Wall delimiting the Horseshoe …
Independent Study On Infinite Graph Theory, Martin Zimmermann
Independent Study On Infinite Graph Theory, Martin Zimmermann
Technical Reports
In this paper we will prove some results about infinite graphs. We show that for every linear order there is a graph with a distinguished vertex such that the edges adjacent to that vertex have the given order in any plane drawing. The other results are concerned with connectivity. We prove a generalization of a characterization of 2-connected graphs and prove that k-connectedness does not imply the existence of finite kconnected subgraphs for k > 2.
Post-Training Support For Learning Technology, Sam Snoddy Jr., David G. Novick
Post-Training Support For Learning Technology, Sam Snoddy Jr., David G. Novick
Departmental Papers (CS)
To examine the effects of post-training support, we studied the introduction of new gradebook software in a public high school. The school's 108 faculty members received training on the software, and approximately half of the faculty received posttraining support for eight weeks. The study measured the faculty's current computer usage, usage of earlier versions of the software, and their perceived skill levels in using the software. The data suggest that the faculty members who received post-training support maintained and raised their skill levels, while unsupported faculty had their skill levels decline.
Assessing Effectiveness Of Personality Style In Documentation, Kenneth Sayles, David G. Novick
Assessing Effectiveness Of Personality Style In Documentation, Kenneth Sayles, David G. Novick
Departmental Papers (CS)
This paper extends previous work by other researchers that indicated that users of computers preferred a computer with a personality that was similar to theirs. We conducted a similar experiment, but looking beyond preference to see if the personality of documentation would make a difference in the user’s performance. Our data suggest did not indicate that personality match affects performance; and if such a relationship exists it is likely to be weak. We discuss the related research, describe our methodology, present our results, and describe their implications and limitations.
Hands-Free Documentation, Karen Ward, David G. Novick
Hands-Free Documentation, Karen Ward, David G. Novick
Departmental Papers (CS)
In this paper, we introduce an analysis of the requirements and design choices for hands-free documentation. Hands-busy tasks such as cooking or car repair may require substantial interruption of the task: moving the pan off the burner and wiping hands, or crawling out from underneath the car. We review the need for hands-free documentation and explore the role of task in the use of documentation. Our central analysis examines the roles and characteristics of input and output modalities of hands-free documentation. In particular, we review the use of speech as an input modality, and then visual means and speech as …
An Interaction Initiative Model For Documentation, David G. Novick, Karen Ward
An Interaction Initiative Model For Documentation, David G. Novick, Karen Ward
Departmental Papers (CS)
In this paper we propose a model of creation and use of documentation based on the concept of mixed-initiative interaction. In our model, successful single-initiative interaction is characterized by grounding of contributions, and successful mixed-initiative interaction is characterized by both grounding and agreement. Just as in spoken conversation, achievement of actual agreement depends on the intentions of both parties; agreement is achieved when the reader follows the documentation’s instructions. In fact, readers are not obligated to—and often do not—act according to the author’s intentions. By making these dynamics explicit, the model can aid authors in developing effective documentation. The paper …
Extending Direct Manipulation In A Text Editor, David G. Novick, Francisco Romero, Edgar Rene Saenz, Armando Sandoval
Extending Direct Manipulation In A Text Editor, David G. Novick, Francisco Romero, Edgar Rene Saenz, Armando Sandoval
Departmental Papers (CS)
This paper describes the implementation of a prototype text editor that incorporates conversation-like features through the direct-manipulation modality. In this way, traditional direct-manipulation interaction techniques such as direct reference via pointing can be extended to include techniques more commonly associated with human conversation, such as negotiation of reference. The paper illustrates the use of the prototype with an extended example, and discusses research issues raised by the implementation.
"Conversational" Dialogues In Direct-Manipulation Interfaces, David G. Novick
"Conversational" Dialogues In Direct-Manipulation Interfaces, David G. Novick
Departmental Papers (CS)
This paper reports ongoing research in extending direct-manipulation interfaces by incorporating, via the direct-manipulation modality itself, interaction techniques that add kinds of language features associated with spoken conversation. The paper proposes means of implementing ways for a user of a direct-manipulation system to define new kinds of relations among objects in the interface.
Users And Uses Of Synchronous Business Communications Software, David G. Novick, Eleanor Wynn
Users And Uses Of Synchronous Business Communications Software, David G. Novick, Eleanor Wynn
Departmental Papers (CS)
To help designers and authors understand users' intentions and work practices for synchronous business communications in a systematic way, we used ethnographic and task-analytic techniques to collect, analyze and classify evidence of the activities of potential users as they conducted their work lives. The interactions we observed among our users took place through a variety of modalities. We found eight categories of tasks for the collaborative or interactive work in which our subjects engaged. Based on these data, we were able to classify roles of potential users of synchronous business communications software into a set of "archetypes" that characterize their …
Accounting For Domain Context In Evaluation, Meriem Chater, David G. Novick
Accounting For Domain Context In Evaluation, Meriem Chater, David G. Novick
Departmental Papers (CS)
Work is situated activity. Taking into account human factors in evaluation involves considering not only users but also their contexts of use. Consequently, the evaluation of systems — from video-games to safetycritical interfaces — requires analysis of context to understand not only the effect of context on usability but also the impact of artifacts' usability on users' environments. In the case of safety-critical systems (SCS), errors (by users or designers) may threaten human lives.
To assess the degree to which interface evaluation methods currently account for context, we have used the research strategy taxonomy of McGrath as a framework for …