the paper presents a computational model of context sensitive judgment, called JUDGEMAP, which has been developed for modeling judgment on a subjective scale. this paper presents an attempt to apply the same model to ...
详细信息
ISBN:
(纸本)9783540742548
the paper presents a computational model of context sensitive judgment, called JUDGEMAP, which has been developed for modeling judgment on a subjective scale. this paper presents an attempt to apply the same model to the case of judgment on an objective scale. this is a big challenge since the behavioral data are showing the opposite type of effects. thus we have repeatedly obtained contrast effects of irrelevant information, when judging on a subjective scale. In the experiment described here we obtained an assimilation effect in exactly the same conditions except that the scale was objective. Without any changes of the model we run the corresponding simulations and there are a good and bad news. the bad news is that we did not obtain the assimilation effect, but the good news is that the contrast effect disappeared. the paper discusses possible reasons for these results and possible ways to improve the model.
this paper presents the context based authentication and authorization management system for security management in the pervasive computing environment. we explored security considerations of the pervasive computing e...
详细信息
ISBN:
(纸本)9783540742548
this paper presents the context based authentication and authorization management system for security management in the pervasive computing environment. we explored security considerations of the pervasive computing environment. the proposed system adopts the context-role based access control model as access control model for enforcement of access control service based on various context information. We also studied the methodology to apply partial credential to user authentication. We introduce the authentication confidence index for applying the partial credential to authentication mechanisms. the authentication confidence index is also used for user-role activation in the access control service. this paper shows comparison between our system and related works, such as Cerberus and CASA.
Mechanisms that underlie the inductive reasoning process in risk contexts are investigated. Experimental results indicate that people rate the same inductive reasoning argument differently according to the direction o...
详细信息
ISBN:
(纸本)9783540742548
Mechanisms that underlie the inductive reasoning process in risk contexts are investigated. Experimental results indicate that people rate the same inductive reasoning argument differently according to the direction of risk aversion. In seeking to provide the most valid explanation of this, two kinds of models based on a Support Vector Machine (SVM) that process different knowledge spaces are proposed and compared. these knowledge spaces-a feature-based space and a category-based space-are both constructed from the soft clustering of the same corpus data. the simulation for the category-based model resulted in a slightly more successful replication of experimental findings for two kinds of risk conditions using two different estimated model parameters than the other simulation. Finally, the cognitive explanation by the category-based model based on a SVM for contextual inductive reasoning is discussed.
the objective of novel e-learning strategies is to educate the learner during his actual work process. We focus on this new approach of in-place and in-time e-learning, which offers learning resources right in time th...
详细信息
ISBN:
(纸本)9783540742548
the objective of novel e-learning strategies is to educate the learner during his actual work process. We focus on this new approach of in-place and in-time e-learning, which offers learning resources right in time the user is in need for it. A crucial factor for those modern task-oriented e-learning software is the user's context. To deliver learning resources to the user, which are both suitable and helpful with regards to the user's current work situation and his competencies, the application always has to consider the learner's actual work task, his environment, and history. In this paper, we present an architecture for the work task prediction, evaluate different machine learning algorithms in depth by their accuracy for that purpose and discuss the integration in our e-learning environment. this validates the possible usage in real-world business scenarios.
One of the key factors for effective personalization of information access is the user context. We propose a framework which integrates several critical elements that make up the user context, namely, the user's s...
详细信息
ISBN:
(纸本)9783540742548
One of the key factors for effective personalization of information access is the user context. We propose a framework which integrates several critical elements that make up the user context, namely, the user's short-term behavior, semantic knowledge from ontologies that provide explicit representations of the domain of interest, and long-term user profiles revealing interests and trends. Our proposed approach involves implicitly building ontological user profiles by assigning interest scores to existing concepts in a domain ontology. these profiles are, therefore, maintained and updated as annotated instances of a reference domain ontology. We propose a spreading activation algorithm for maintaining the interest scores in the user profile based on the user's ongoing behavior. Our experimental results show that the user context can be effectively utilized for Web search personalization. Specifically, re-ranking the search results based on interest scores derived from the semantic evidence in an ontological user profile provides better search results by proficiently bringing results closer to the top when they are most relevant to the user.
this paper presents a novel language-independent context-based sentence alignment technique given parallel corpora. We can view the problem of aligning sentences as finding translations of sentences chosen from differ...
详细信息
ISBN:
(纸本)9783540742548
this paper presents a novel language-independent context-based sentence alignment technique given parallel corpora. We can view the problem of aligning sentences as finding translations of sentences chosen from different sources. Unlike current approaches which rely on pre-defined features and models, our algorithm employs features derived from the distributional proper-ties of sentences and does not use any language dependent knowledge. We make use of the context of sentences and introduce the notion of Zipfian word vectors which effectively models the distributional properties of a given sentence. We accept the context to be the frame in which the reasoning about sentence alignment is done. We examine alternatives for local context models and demonstrate that our context based sentence alignment algorithm per-forms better than prominent sentence alignment techniques. Our system dynamically selects the local context for a pair of set of sentences which maximizes the correlation. We evaluate the performance of our system based on two different measures: sentence alignment accuracy and sentence alignment coverage. We compare the performance of our system with commonly used sentence alignment systems and show that our system performs 1.1951 to 1.5404 times better in reducing the error rate in alignment accuracy and coverage.
the paper is primarily concerned with laying out the space of positions that purport to account for semantic context sensitivity of natural language expressions and with making a prima facie case for relativism. I sta...
详细信息
ISBN:
(纸本)9783540742548
the paper is primarily concerned with laying out the space of positions that purport to account for semantic context sensitivity of natural language expressions and with making a prima facie case for relativism. I start with distinguishing between pre-semantic, semantic and post-semantic context sensitivity. In the following section I briefly present the classic picture of indexicals due to David Kaplan and assess some arguments for the introduction of certain parameters in the circumstances of evaluation (specifically, time). In section III I envisage two views that purport to expand semantic context sensitivity beyond expressions from "the basic set": indexicalism and contextualism. In section IV, by means of an example taken from John Perry, I draw attention to a specific form of semantic context sensitivity, namely that in which what is affected by context are the circumstances of evaluation of utterances rather than their content. the example leads to the necessity of distinguishing between two roles of context: a content-determinative one and a circumstance-determinative one. In section V I introduce relativism as the view incorporating the claim that context has a circumstance-determinative role and contrast it withthe two views presented before. In the final section I analyze a certain type of argument usually adduced in favor of contextualism (the so-called "context-shifting arguments") and show that in order to work it has to rule out relativism. I conclude by claiming that the battle must be fought by giving arguments to the effect that a certain parameter should or should not be part of the circumstances of evaluation rather than the content of utterances.
the always increasing complexity of digital system is overcome in design flows based on Transaction Level modeling (TLM) by designing and verifying the system at different abstraction levels. the design implementation...
详细信息
ISBN:
(纸本)9781424410507
the always increasing complexity of digital system is overcome in design flows based on Transaction Level modeling (TLM) by designing and verifying the system at different abstraction levels. the design implementation starts from a TLM high-level description and, following a top-down approach, it is refined towards a corresponding RTL model. However, the bottom-up approach is also adopted in the design flow when already existing RTL IPs are abstracted to be reused into the TLM system. In this context, proving the equivalence between a model and its refined or abstracted version is still an open problem. Infact, traditional equivalence definitions and formal equivalence checking methodologies presented in the literature cannot be applied due to the very different internal characteristics of the models, including structure organization and timing. Targeting this topic, the paper presents a formal definition of equivalence based on events, and then, it shows how such a definition can be used for proving the equivalence in the RTL vs. TLM context, without requiring timing or structural similarities between the modules to be compared. Finally, the paper presents a practical use of the proposed theory, by proving the correctness of a methodology that automaticall), abstracts RTL IPs towards TLM implementations.
this paper proposes a method of context-aware querying in mobile/ubiquitous Web searches, which provides mobile users with four capabilities: (1) context-aware keyphrase inference to help them input a keyphrase as a p...
详细信息
the proceedings contain 10 papers. the topics discussed include: context engineering and modeling challenges;a hybrid-approach to integrate contextmodeling and decision support;colored cognitive maps for modeling dec...
the proceedings contain 10 papers. the topics discussed include: context engineering and modeling challenges;a hybrid-approach to integrate contextmodeling and decision support;colored cognitive maps for modeling decision contexts;expressing systemic contexts in visual models of system specifications;a context-based approach to the development of decision support systems;modeling and adapting to context changes: the case of stock market decisions making;context-aware mobile agents for decision-making support in healthcare emergency applications;knowledge sharing on how to recognize and use context to make decisions;environmental context significance in strategic decision support systems;and history-based conflict management for multi-users and multi-services*.
暂无评论