Community satisfaction has become a crucial aspect to measure success of emerging community information systems. thus, we propose a community success model (CSM) based on the seminal DeLone & McLean IS Success Mod...
ISBN:
(纸本)9781424418657
Community satisfaction has become a crucial aspect to measure success of emerging community information systems. thus, we propose a community success model (CSM) based on the seminal DeLone & McLean IS Success Model, Gaming communities are part of our new media culture, entertaining people of all ages with online and video games. As a proof of concept, we apply our CSM to gaming communities. CSM was evaluated in our university lab course "Gaming Communities". We analyze requirements from gaming communities and offer support to those communities by assessing the potential community satisfaction of prototypical solutions realized in the course through automatic monitoring of the service use and a questionnaire tool.
Optimization of a similarity metric is an essential component in most medical image registration approaches based on image intensities. the increasing availability of parallel computers makes parallelizing some regist...
详细信息
Modern software engineering is getting increasingly complicated. Especially in the HPC field, we are dealing with cutting edge infrastructure and a novel problem with unprecedented scale. the ability to monitor and an...
详细信息
Lane-line detection is one of the key technologies in the field of intelligent driving. this paper changes the anchor box regression loss function of the YOLOv5s to the EIoU function to construct a kind of lane-line d...
详细信息
Currently, a lot of work has been done in the area of detection, scoring, and inventory of software and hardware vulnerabilities. Known vulnerabilities are listed in the open databases. It is essential to continuously...
详细信息
ISBN:
(纸本)9781665426053
Currently, a lot of work has been done in the area of detection, scoring, and inventory of software and hardware vulnerabilities. Known vulnerabilities are listed in the open databases. It is essential to continuously monitor that information system doesn't contain severe vulnerabilities to ensure its information security. Applicability of open vulnerability databases is limited by the challenges occurring due to automated mapping the software product names in the analyzed system logs to their product names in the open sources (to extract relevant vulnerabilities from them). the paper proposes the technique incorporating an algorithm for mapping the software products names in the analyzed system logs to the relevant Common Platform Enumeration entries in open vulnerability databases based on the Ratcliff/Obershelp algorithm, identification of known vulnerabilities for the detected entries, and security risk assessment of the analysed system. the technique is implemented and tested using Windows computers software and has shown an accuracy of 79% on average.
this book constitutes the proceedings of the satellite workshops held around the 21st internationalconference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023.;· ...
详细信息
ISBN:
(数字)9783031411816
ISBN:
(纸本)9783031411809
this book constitutes the proceedings of the satellite workshops held around the 21st internationalconference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023.;· 1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023);· 5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023);· 4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023);· 5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023);· 3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023);· 5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023);· 4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023);· 4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023);· 5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)
the proceedings contain 84 papers. the topics discussed include: active nanophotonics with nonvolatile response: the case for phase-change materials;low-noise chip-based photonic oscillators;modelling the training pro...
ISBN:
(纸本)9781665402231
the proceedings contain 84 papers. the topics discussed include: active nanophotonics with nonvolatile response: the case for phase-change materials;low-noise chip-based photonic oscillators;modelling the training process;phase-change metamaterial infrared scene projector;actively tunable angle-independent mid-infrared optical filters using GST Fabry-Perot resonators;frequency tuning of perfect absorbing metamaterial using a thin conformal dielectric;thin film surface reconstruction from interferometry curvature measurements;photon doppler velocimetry in interdisciplinary shock compression studies;measurements of reduced scale models for testing 3D synthetic aperture radar algorithms;modeling the self-capacitance of individual plates in a multi-conductor system using PEEC;generalized constructal framework for two-dimensional colloidal particle systems;and novel photonic crystals for beam control in the near-infrared spectrum.
Modern embedded systems designers are required to imple-ment efficient multi-functional applications, over portable platforms under strong energy and resources constraints. Automatic tools may help them in challenging...
详细信息
5G networks deployment is already a commercial reality, while the specification groups move towards 5G standalone standardization. Withthe need for network slicing and edge computing capabilities - and therefore, inh...
详细信息
the proceedings contain 19 papers. the special focus in this conference is on Human Work Interaction Design. the topics include: Engaging automation at work – A literature review;artificial intelligence awareness in ...
ISBN:
(纸本)9783030052966
the proceedings contain 19 papers. the special focus in this conference is on Human Work Interaction Design. the topics include: Engaging automation at work – A literature review;artificial intelligence awareness in work environments;an initial generic assessment framework for the consideration of risk in the implementation of autonomous systems;a methodology to involve domain experts and machine learning techniques in the design of human-centered algorithms;a framework for understanding human factors issues in border control automation;research methods – What is best for developing and evaluating human computer interaction and interactive artistic installations?;theorizing about socio-technical approaches to HCI;a worker-centric design and evaluation framework for operator 4.0 solutions that support work well-being;techno-trust and rational trust in technology – A conceptual investigation;enhancing your mental well-being and creativity while writing: A crowdsource-based approach;using task descriptions with explicit representation of allocation of functions, authority and responsibility to design and assess automation;improving the tourists’ experience;Unraveling the influence of the interplay between mobile phones’ and users’ awareness on the user experience (UX) of using mobile phones;automating engineering educational practical electronics laboratories for designing engaging learning experiences;testing augmented reality systems for spotting sub-surface impurities;ESISTE: Supporting inclusion of students with special needs in mainstream classrooms;exploring potential of traditionally crafted textiles to transform into e-wearables for use in socio-cultural space.
暂无评论