Darknet observation networks have experienced a significant surge in sophisticated and diverse Internet-wide scanning activities and investigative scanner operations. In addition to malware scanning attacks, reconnais...
详细信息
Stochastic approximation (SA) and stochastic gradient descent (SGD) algorithms are work-horses for modern machine learning algorithms. Their constant stepsize variants are preferred in practice due to fast convergence...
详细信息
Microtransactions have become a major monetisation model in digital games, shaping their design, impacting player experience, and raising ethical concerns. Research in this area has chiefly focused on loot boxes. This...
详细信息
ISBN:
(纸本)9781450391573
Microtransactions have become a major monetisation model in digital games, shaping their design, impacting player experience, and raising ethical concerns. Research in this area has chiefly focused on loot boxes. This begs the question whether other microtransactions might actually be more relevant and problematic for players. We therefore conducted a content analysis of negative player reviews (n=801) of top-grossing mobile and desktop games to determine which problematic microtransactions are most prevalent and salient for players. We found that problematic microtransactions with mobile games featuring more frequent and different techniques compared to desktop games. Across both, players minded issues related to fairness, transparency, and degraded user experience, supporting prior theoretical work, and importantly take issue with monetisation-driven design as such. We identify future research needs on why microtransactions in particular spark this critique, and which player communities it may be more or less representative of.
With the increasing demand for real-time computing applications on energy-harvesting embedded devices which are deployed wherever it is not possible or practical to recharge, the worst-case performance analysis become...
详细信息
ISBN:
(纸本)9783981926361
With the increasing demand for real-time computing applications on energy-harvesting embedded devices which are deployed wherever it is not possible or practical to recharge, the worst-case performance analysis becomes crucial. However, it is difficult to bound the worst-case response time of tasks under both timing and energy constraints due to the uncertainty of harvested energy. Based on this motivation, this paper studies response time analysis for Energy-Harvesting Mixed-Criticality (EHMC) systems. We present schedulability analysis algorithm to extend the Adaptive Mixed Criticality (AMC) approach to EHMC systems. Furthermore, we develop two response time bounds for it. To our best knowledge, this is the first work of response time analysis for EHMC systems. Finally, we examine both the effectiveness and the tightness of the bounds by experiments.
The intersection of Cloud and Edge computing has ushered in a new era of distributed computing, known as Continuum computing. This computational paradigm shift leverages the computational strength of Cloud infrastruct...
详细信息
ISBN:
(纸本)9798400702341
The intersection of Cloud and Edge computing has ushered in a new era of distributed computing, known as Continuum computing. This computational paradigm shift leverages the computational strength of Cloud infrastructure and the pervasiveness of Edge devices to handle massive workloads, reshaping the landscape of distributed computing. One of the most challenging applications of Continuum computing is the orchestration of scientific workflows, known as Continuum workflows. This problem is tackled by Workflow Management systems (WMSs). However, the variety of WMSs in the literature is based on different techniques due to the rapid evolution of these systems. This study aims to compare two WMSs, that are Pegasus WMS and OpenWolf, by analyzing their key orchestration strategies and evaluating the performance of the two systems on workflows designed for Artificial Intelligence (AI) tasks. This comparative analysis is the first step toward identifying the most suitable frameworks for deploying AI-driven pipelines across the Continuum.
Audits are critical mechanisms for identifying the risks and limitations of deployed artificial intelligence (AI) systems. However, the effective execution of AI audits remains incredibly difficult, and practitioners ...
详细信息
This case study explores the experiences of Microsoft employees, who are early adopters of multi-agent generative AI systems, as they experiment with these technologies to design, test, and deploy new tools attempting...
详细信息
The proceedings contain 20 papers. The topics discussed include: transforming ideas and developing entrepreneurship skills in computing sciences and informatics engineering courses;low-cost clusters on big data – a s...
ISBN:
(纸本)9781450397391
The proceedings contain 20 papers. The topics discussed include: transforming ideas and developing entrepreneurship skills in computing sciences and informatics engineering courses;low-cost clusters on big data – a systematic study;image filtering model based on convolutional neural networks for automatic counting of post-larvae in aquaculture;designing future scenarios in e-tourism;an analysis on the use of blockchain by developers and application users;a blockchain solution for crowdfunding and cost analysis;further aspects of stochastic cooperative beamforming;a systematic review on teaching parallel programming;internet of things under a semantic perspective with user profiles;and comparison of statistical methods for time synchronization between network nodes equipped with UWB transceivers.
Scientists and journalists strive to report numbers with high precision to keep readers well-informed. Our work investigates whether this practice can backfire due to the cognitive costs of processing multi-digit prec...
详细信息
ISBN:
(纸本)9781450391573
Scientists and journalists strive to report numbers with high precision to keep readers well-informed. Our work investigates whether this practice can backfire due to the cognitive costs of processing multi-digit precise numbers. In a pre-registered randomized experiment, we presented readers with several news stories containing numbers in either precise or round versions. We then measured their ability to approximately recall these numbers and make estimates based on what they read. Our results revealed a counterintuitive efect where reading round numbers helped people better approximate the precise values, while seeing precise numbers made them worse. We also conducted two surveys to elicit individual preferences for the ideal degree of rounding for numbers spanning seven orders of magnitude in various contexts. From the surveys, we found that people tended to prefer more precision when the rounding options contained only digits (e.g., "2,500,000") than when they contained modifer terms (e.g., "2.5 million"). We conclude with a discussion of how these fndings can be leveraged to enhance numeracy in digital content consumption.
The Data Distribution Service (DDS) is a popular communication middleware for the Internet of Things (IoT), providing its own security mechanisms specified in the DDS Security standard. In this work, we formally analy...
详细信息
暂无评论