Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (6)
- Software Engineering (6)
- Artificial Intelligence and Robotics (5)
- Cognition and Perception (4)
- Cognitive Neuroscience (4)
-
- Cognitive Psychology (4)
- Computational Neuroscience (4)
- Developmental Neuroscience (4)
- Discourse and Text Linguistics (4)
- First and Second Language Acquisition (4)
- Life Sciences (4)
- Linguistics (4)
- Neuroscience and Neurobiology (4)
- Psychology (4)
- Semantics and Pragmatics (4)
- Theory and Algorithms (4)
- Business (3)
- Discrete Mathematics and Combinatorics (2)
- Engineering (2)
- Graphics and Human Computer Interfaces (2)
- Mathematics (2)
- Computer Engineering (1)
- Computer and Systems Architecture (1)
- Curriculum and Instruction (1)
- Digital Circuits (1)
- Digital Communications and Networking (1)
- Education (1)
- Educational Assessment, Evaluation, and Research (1)
- Keyword
-
- Services Computing (5)
- Information Search and Retrieval (2)
- VISUO-SPATIAL (2)
- AUTISM (1)
- Adaboost (1)
-
- Analyses (1)
- Aviation (1)
- Awareness (1)
- Behavioral intention. (1)
- Business failure prediction (1)
- CC/PP (1)
- CS1 (1)
- CS2 (1)
- Cameras (1)
- Commercializing Innovations (1)
- Component technology (1)
- Computer science (1)
- Computer vision (1)
- Congealing (1)
- Course consistency (1)
- DECISION MAKING (1)
- Decision theory (1)
- Decision tree (1)
- Detectors (1)
- Dialog (1)
- Digital evidence (1)
- Directed exhaustive search (1)
- Distance learning (1)
- Document and Text Processing (1)
- Documentation (1)
- Publication
- File Type
Articles 1 - 30 of 40
Full-Text Articles in Computer Sciences
An Evaluation Of Decision Tree And Survival Analysis Techniques For Business Failure Prediction, Adrian Gepp
An Evaluation Of Decision Tree And Survival Analysis Techniques For Business Failure Prediction, Adrian Gepp
Adrian Gepp
Accurate business failure prediction models would be extremely valuable to many industry sectors, particularly in financial investment and lending. The potential value of such models has been recently emphasised by the extremely costly failure of high profile businesses in both Australia and overseas, such as HIH (Australia) and Enron (USA). Consequently, there has been a significant increase in interest in business failure prediction, from both industry and academia. Statistical models attempt to predict the failure or success of a business based on publicly available information about that business (or its industry and the overall economy), such as accounting ratios from …
The Centrality Of Awareness In The Formation Of User Behavioral Intention Toward Preventive Technologies In The Context Of Voluntary Use, Tamara Dinev, Qing Hu
The Centrality Of Awareness In The Formation Of User Behavioral Intention Toward Preventive Technologies In The Context Of Voluntary Use, Tamara Dinev, Qing Hu
Qing Hu
Little is known about user behavior toward what we call preventive computer technologies that have become increasingly important in the networked economy and society to secure data and systems from viruses, unauthorized access, disruptions, spyware, and similar harmful technologies. We present the results of a study of user behavior toward preventive technologies based on the frameworks of theory of planned behavior in the context of anti-spyware technologies. We find that the user awareness of the issues and threats from harmful technologies is a strong predictor of user behavioral intention toward the use of preventive technologies. In the presence of awareness, …
Online Teaching Practices (Both Best And Worst), Michael Nelson, Bhagyavati, Gail Miles, Amber Settle, Dale Shaffer, Jake Watts, Robert P. Webber
Online Teaching Practices (Both Best And Worst), Michael Nelson, Bhagyavati, Gail Miles, Amber Settle, Dale Shaffer, Jake Watts, Robert P. Webber
Amber Settle
Building A Classification Cascade For Visual Identification From One Example, Andras Ferencz, Erik G. Learned-Miller, Jitendra Malik
Building A Classification Cascade For Visual Identification From One Example, Andras Ferencz, Erik G. Learned-Miller, Jitendra Malik
Erik G Learned-Miller
Object identification (OID) is specialized recognition where the category is known (e.g. cars) and the algorithm recognizes an object's exact identity (e.g. Bob's BMW). Two special challenges characterize OID. (1) Interclass variation is often small (many cars look alike) and may be dwarfed by illumination or pose changes. (2) There may be many classes but few or just one positive "training" examples per class. Due to (1), a solution must locate possibly subtle object-specific salient features (a door handle) while avoiding distracting ones (a specular highlight). However, (2) rules out direct techniques of feature selection. We describe an online algorithm …
Graduate Student Satisfaction With An Online Discrete Mathematics Course, Amber Settle, Chad Settle
Graduate Student Satisfaction With An Online Discrete Mathematics Course, Amber Settle, Chad Settle
Amber Settle
Can A Divorced Mom/Dad Take Care Of The Child?, Vijay Dialani
Can A Divorced Mom/Dad Take Care Of The Child?, Vijay Dialani
Vijay Dialani
The Future Of Journal Publishing, Gordon C. Tibbitts
The Future Of Journal Publishing, Gordon C. Tibbitts
Gordon C. Tibbitts III
The seminar helped publishing neophytes understand where they can add value. It also focused on the challenges of the day and likely challenges in the future. Some predictions include a complete move to e-journals, article-at-a-time publishing, an increase in "meta" articles, and the demise of general search engine prominence.
A Framework To Ensure Trustworthy Web Services, Jia Zhang, Liang-Jie Zhang
A Framework To Ensure Trustworthy Web Services, Jia Zhang, Liang-Jie Zhang
Jia Zhang
No abstract provided.
Root Causes Of Lost Time And User Stress In A Simple Dialog System, Nigel Ward, Anais Rivera, Karen Ward, David G. Novick
Root Causes Of Lost Time And User Stress In A Simple Dialog System, Nigel Ward, Anais Rivera, Karen Ward, David G. Novick
David G. Novick
As a priority-setting exercise, we compared interactions between users and a simple spoken dialog system to interactions between users and a human operator. We observed usability events, places in which system behavior differed from human behavior, and for each we noted the impact, root causes, and prospects for improvement. We suggest some priority issues for research, involving not only such core areas as speech recognition and synthesis and language understanding and generation, but also less-studied topics such as adaptive or flexible timeouts, turn-taking and speaking rate.
Co-Generation Of Text And Graphics, David G. Novick, Brian Lowe
Co-Generation Of Text And Graphics, David G. Novick, Brian Lowe
David G. Novick
content in documentation, it is possible to produce both text and graphics from a single common source. One approach to co-generation of text and graphics uses a single logical specification; a second approach starts with CAD-based representation and produces a corresponding textual account. This paper explores these two different approaches, reports the results of using prototypes embodying the approaches to represent simple figures, and discusses issues that were identified through use of the prototypes. While it appears feasible to co-generate text and graphics automatically, the process raises deep issues of design of communications, including the intent of the producer of …
Using Containers To Enforce Smart Constraints For Performance In Industrial Systems, Scott A. Hissam, Gabriel A. Moreno, Kurt C. Wallnau
Using Containers To Enforce Smart Constraints For Performance In Industrial Systems, Scott A. Hissam, Gabriel A. Moreno, Kurt C. Wallnau
Gabriel A. Moreno
Criteria Analysis And Validation Of The Reliability Of Web Services-Oriented Systems,, Jia Zhang, Liang-Jie Zhang
Criteria Analysis And Validation Of The Reliability Of Web Services-Oriented Systems,, Jia Zhang, Liang-Jie Zhang
Jia Zhang
No abstract provided.
Bridging Units And Business Incubation In A Technology Research Lab, Arcot Desai Narasimhalu
Bridging Units And Business Incubation In A Technology Research Lab, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
This paper describes a new model of incubation practices at Singapore’s Kent Ridge Digital Labs from 1998 till 2002. The model deviates from previously known models where by research institutions including institutions of higher learning license their technologies to companies or entrepreneurs who wished to either productize the technology or start a new company using the technology. The model was successfully applied towards the creation of more than fifteen start ups. These start ups attracted significant investments from venture capitalists from Singapore and elsewhere. Several of these companies are still in business.
Testing First: Emphasizing Testing In Early Programming Courses, Will Marrero, Amber Settle
Testing First: Emphasizing Testing In Early Programming Courses, Will Marrero, Amber Settle
Amber Settle
A Case For Exhaustive Optimization, Sanza Kazadi, Michele Lee, Lauren Lee
A Case For Exhaustive Optimization, Sanza Kazadi, Michele Lee, Lauren Lee
Sanza Kazadi
Web Services Quality Testing, Jia Zhang, Liang-Jie Zhang
Web Services Quality Testing, Jia Zhang, Liang-Jie Zhang
Jia Zhang
No abstract provided.
Innovation Cube: Triggers, Drivers And Enablers For Successful Innovations, Arcot Desai Narasimhalu
Innovation Cube: Triggers, Drivers And Enablers For Successful Innovations, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
Research on innovation has explained the relationships between institutions of higher learning, companies and the markets from both market driven and resource driven perspectives. However, innovation still remains more of an art than a science. Key researchers have lamented that it is difficult for most companies to scan the market place to identify new innovation opportunities. This paper describes a framework called Innovation Cube that is the building block for helping companies identify new innovation opportunities. This cube is constructed using three attribute-pairs called drivers, triggers and enablers of innovation. The paper discusses examples of the types of innovations represented …
The Ames Mer Microscopic Imager Toolkit, Randy Sargent, Matt Deans, Clay Kunz, Ken Herkenhoff
The Ames Mer Microscopic Imager Toolkit, Randy Sargent, Matt Deans, Clay Kunz, Ken Herkenhoff
Randy Sargent
The Mars Exploration Rovers, spirit and opportunity, have spent several successful months on Mars, returning gigabytes of images and spectral data to scientists on Earth. One of the instruments on the MER rovers, the Athena microscopic imager (MI), is a fixed focus, megapixel camera providing a ±3mm depth of field and a 31×31 mm field of view at a working distance of 63 mm from the lens to the object being imaged. In order to maximize the science return from this instrument, we developed the Ames MI toolkit and supported its use during the primary mission. The MI toolkit is …
A Service-Oriented Multimedia Componentization Model, Jia Zhang, Liang-Jie Zhang, Francis Quek, Jen-Yao Chung
A Service-Oriented Multimedia Componentization Model, Jia Zhang, Liang-Jie Zhang, Francis Quek, Jen-Yao Chung
Jia Zhang
As Web services become more and more popular, how to manage multimedia Web services that can be composed as value-added service solutions remains challenging. This paper presents a service-oriented multimedia componentization model to support Quality of Service (QoS)-centered, device-independent multimedia Web services, which seamlessly incorporates cuttingedge technologies relating to Web services. A multimedia Web service is divided into control flow and data flow, each can be delivered via different infrastructures and channels. Enhancements are proposed to facilitate Simple Object Access Protocol (SOAP) and Composite Capability/Preference Profiles (CC/PP) protocols to improve their flexibility to serve multimedia Web services. We present a …
Trustworthy Web Services: Actions For Now, Jia Zhang
Trustworthy Web Services: Actions For Now, Jia Zhang
Jia Zhang
For Web services to grow as predicted, researchers must not wait to address the challenges of software trustworthiness
Recovering Digital Evidence From Linux Systems, Philip Craiger
Recovering Digital Evidence From Linux Systems, Philip Craiger
J. Philip Craiger, Ph.D.
Constraint Programming, John Hooker
Interaction Between The Dorsal And Ventral Pathways In Mental Rotation: An Fmri Study, Hideya Koshino, Patricia Carpenter, Timothy Keller, Marcel Just
Interaction Between The Dorsal And Ventral Pathways In Mental Rotation: An Fmri Study, Hideya Koshino, Patricia Carpenter, Timothy Keller, Marcel Just
Marcel Adam Just
No abstract provided.
Imagining Material Versus Geometric Properties Of Objects: An Fmri Study, Sharlene Newman, Roberta Klatzky, Susan Lederman, Marcel Just
Imagining Material Versus Geometric Properties Of Objects: An Fmri Study, Sharlene Newman, Roberta Klatzky, Susan Lederman, Marcel Just
Marcel Adam Just
No abstract provided.
Modeling Interaction Between Metacognition And Emotion In A Cognitive Architecture, Eva Hudlicka
Modeling Interaction Between Metacognition And Emotion In A Cognitive Architecture, Eva Hudlicka
Eva Hudlicka
While research in metacognition has grown significantly in the past 10 years, there has been a relative lack of research devoted to the focused study of the interactions between metacognition and affective processes. Computational models represent a useful tool which can help remedy this situation by constructing causal models of demonstrated correlational relationships, and by generating empirical hypotheses which can be verified experimentally. In this paper we describe enhancements to an existing cognitive–affective architecture that will enable it to perform a subset of metacognitive functions. We focus on modeling the role of a specific metacognitive factor, the feeling of confidence …
Platform Thinking In Embedded Systems, Robert Iannucci
Platform Thinking In Embedded Systems, Robert Iannucci
Robert A Iannucci
No abstract provided.
Functional Connectivity In An Fmri Working Memory Task In High-Functioning Autism, Hideya Koshino, Patricia Carpenter, Nancy Minshew, Vladimir Cherkassky, Timothy Keller, Marcel Just
Functional Connectivity In An Fmri Working Memory Task In High-Functioning Autism, Hideya Koshino, Patricia Carpenter, Nancy Minshew, Vladimir Cherkassky, Timothy Keller, Marcel Just
Marcel Adam Just
No abstract provided.
Joint Mri Bias Removal Using Entropy Minimization Across Images, Erik G. Learned-Miller, Parvez Ahammad
Joint Mri Bias Removal Using Entropy Minimization Across Images, Erik G. Learned-Miller, Parvez Ahammad
Erik G Learned-Miller
The correction of bias in magnetic resonance images is an important problem in medical image processing. Most previous approaches have used a maximum likelihood method to increase the likelihood of the pixels in a single image by adaptively estimating a correction to the unknown image bias field. The pixel likelihoods are defined either in terms of a pre-existing tissue model, or non-parametrically in terms of the image's own pixel values. In both cases, the specific location of a pixel in the image is not used to calculate the likelihoods. We suggest a new approach in which we simultaneously eliminate the …
Combining Text And Audio-Visual Features In Video Indexing, Shih-Fu Chang, R. Manmatha, Tat-Seng Chua
Combining Text And Audio-Visual Features In Video Indexing, Shih-Fu Chang, R. Manmatha, Tat-Seng Chua
R. Manmatha
We discuss the opportunities, state of the art, and open research issues in using multi-modal features in video indexing. Specifically, we focus on how imperfect text data obtained by automatic speech recognition (ASR) may be used to help solve challenging problems, such as story segmentation, concept detection, retrieval, and topic clustering. We review the frameworks and machine learning techniques that are used to fuse the text features with audio-visual features. Case studies showing promising performance will be described, primarily in the broadcast news video domain.
A Probabilistic Upper Bound On Differential Entropy, Joseph Destefano, Erik G. Learned-Miller
A Probabilistic Upper Bound On Differential Entropy, Joseph Destefano, Erik G. Learned-Miller
Erik G Learned-Miller
A novel probabilistic upper bound on the entropy of an unknown one-dimensional distribution, given the support of the distribution and a sample from that distribution, is presented. No knowledge beyond the support of the unknown distribution is required. Previous distribution-free bounds on the cumulative distribution function of a random variable given a sample of that variable are used to construct the bound. A simple, fast, and intuitive algorithm for computing the entropy bound from a sample is provided.