People across the world habitually turn to online social media to share their experiences, thoughts, ideas, and opinions as they go about their daily lives. These posts collectively contain a wealth of insights into h...
详细信息
People across the world habitually turn to online social media to share their experiences, thoughts, ideas, and opinions as they go about their daily lives. These posts collectively contain a wealth of insights into how masses perceive their surroundings. Therefore, extracting people's perceptions from social media posts can provide valuable information about pertinent issues such as public transportation, emergency conditions, and even reactions to political actions or other activities. This paper proposes a novel approach to extract such perceptions from a corpus of social media posts originating from a given broad geographical region. The approach divides the broad region into a number of sub-regions, and trains language models over social media conversations within these sub-regions. Using Bayesian and geo-smoothing methods, the ensemble of language models can be queried with phrases embodying a perception. Discrete and continuous visualization methods represent the extent to which social media posts within the sub-regions express the query. The capabilities of the perception mining approach are illustrated using transportation-themed scenarios.
Real-time embedded systems (RTES), as in the automotive domain, provide their functionality by executing software operations on hardware with restricted resources and by communicating via buses. The properties of the ...
详细信息
ISBN:
(纸本)9783885796268
Real-time embedded systems (RTES), as in the automotive domain, provide their functionality by executing software operations on hardware with restricted resources and by communicating via buses. The properties of the underlying architecture, i.e., execution times of software operations and bus latencies, cause delays during the provision of the functionality. At the same time, RTES have to fulfill strict real-time requirements. The fulfillment of such real-time requirements under consideration of delays induced by architectural properties should be taken into account already during requirements engineering (RE) to avoid costly iterations in subsequent development phases. In previous work, we developed a formal RE approach based on a recent Live Sequence Chart (LSC) variant, so-called Modal Sequence Diagrams (MSDs). This scenario-based RE approach allows to validate the requirements by means of simulation, i.e., the play-out algorithm originally conceived for LSCs. Our MSD play-out approach considers assumptions on the environment as well as real-time requirements and is applicable to hierarchical component architectures, which makes it well suited for automotive systems. However, delays induced by architectural properties are not considered. In order to consider this important aspect, we introduce in this paper an approach enabling the annotation of software operation execution times and connector latencies to hierarchical component architectures by means of the MARTE profile. These assumptions about the architectural properties can be verified against the realtime requirements specified in the MSDs by means of simulation. We illustrate the approach by means of an example of an automotive RTES.
Libraries are recently changing their classical role of providing stored information into new virtual communities, which involve large number of users sharing real time information. Despite of those good features, the...
详细信息
Libraries are recently changing their classical role of providing stored information into new virtual communities, which involve large number of users sharing real time information. Despite of those good features, there is still a necessity of developing tools to help users to reach decisions with a high level of consensus in those new virtual environments. In this contribution we present a new consensus reaching tool with linguistic preferences designed to minimize the main problems that this kind of organization presents (low and intermittent participation rates, difficulty of establishing trust relations and so on) while incorporating the benefits that a new digital library offers (rich and diverse knowledge due to a large number of users, real-time communication and so on). The tool incorporates some delegation and feedback mechanisms to improve the speed of the process and its convergence towards a consensual solution.
This paper introduces an enhanced Feature Driven Development (FDD) model for secure software development. In fact, the enhanced model is based on our previous study and its findings which concluded that existing FDD p...
详细信息
This paper introduces an enhanced Feature Driven Development (FDD) model for secure software development. In fact, the enhanced model is based on our previous study and its findings which concluded that existing FDD poses limitations to develop secure software. Thus, an enhanced FDD that supports secure software development is proposed. We have implemented this new FDD model and conducted a case study to compare the level of security in the undergraduate and postgraduate level students. The paper illustrates that agility of FDD is not affected significantly, even after adding new phases.
Welcome to the first edition of the Workshop on Quality Assurance for Self-adaptive, Self-organising systems (QA4SASO 2014). Developing self-adaptive, self-organising systems that fulfil the requirements of different ...
详细信息
Welcome to the first edition of the Workshop on Quality Assurance for Self-adaptive, Self-organising systems (QA4SASO 2014). Developing self-adaptive, self-organising systems that fulfil the requirements of different stakeholders is no simple matter. Quality assurance is required at each phase of the entire development process, starting from requirements elicitation, agent design, system architecture design, and finally in the implementation, testing, and deployment of the system. The quality of the artefacts from each development phase affects the rest of the system, since all parts are closely related to each other. Furthermore, the shift of adaptation decisions from design-time to run-time - necessitated by the need of the systems to adapt to changing circumstances - makes it difficult, but even more essential, to assure high quality standards in these kind of systems. Accordingly, the analysis and evaluation of these self-systems has to take into account the specific operational context to achieve high quality standards. As a consequence, we like to address the following challenges in the workshop on quality assurance for self-adaptive, self-organising systems: Evolutionary developing system, interleaving mechanisms, uncertainty according the system environment, open system architecture, and large number of system participants. The necessity to investigate this field has already been recognised and addressed in different communities, but there exists so far no platform to bring all these communities together. Therefore, the workshop provides an open stage for discussions about the different aspects of quality assurance for self-adaptive, self-organising systems.
Though many Information Assurance (IA) educators agree that hands-on exercises and case studies improve student learning, hands-on exercises and case studies are not widely adopted due to the time needed to develop th...
详细信息
ISBN:
(纸本)9781479925056
Though many Information Assurance (IA) educators agree that hands-on exercises and case studies improve student learning, hands-on exercises and case studies are not widely adopted due to the time needed to develop them and integrate them into curriculum. Under the support of National science Foundation (NSF) Scholarship for Service program, we implemented two faculty development workshops to disseminate effective hands-on exercises and case studies developed through multiple previous and ongoing grants, and to develop faculty expertise in IA. This paper reports our experience of holding the faculty summer workshops on teaching information assurance through case studies and hands-on experiences. The topics presented at the workshops are briefly described and the evaluation results of the workshops are discussed. The workshops provided a valuable opportunity for IA educators to connect with each other and form collaboration in teaching and research in IA.
The "Girls on the Go: The Mobile Computing College Experience" is a residential summer camp whose aim is to encourage female high school students to attend college, to consider computerscience as viable maj...
详细信息
ISBN:
(纸本)9781479939237
The "Girls on the Go: The Mobile Computing College Experience" is a residential summer camp whose aim is to encourage female high school students to attend college, to consider computerscience as viable major, and to pursue computing related degrees. The camp content is designed primarily around a user-centered design process, with the students gaining experience in the development of a zoo-themed mobile app. In addition to technical experience, students participate in sessions that educate them on campus life, the admissions process, and more importantly, what a computing-related career may hold for them. The camp was offered in two consecutive summers, with approximately 20 participants in each iteration. In this paper, we compare differences between the two iterations with the intent of identifying both lessons learned and avenues for improving the experience. We investigate whether the camp had an effect on attitudes towards computerscience as a major, and on the careers available to computerscience graduates. To this end, our analysis revealed a statistically significant effect upon raising awareness of the role of computer scientists and the relevancy of computing for solving real world problems.
Although most research in lattice wireless sensor networks are focus on determining the optimal deployment pattern to provide full sensing coverage while maximizing the deployment efficiency, we study the partial sens...
详细信息
Although most research in lattice wireless sensor networks are focus on determining the optimal deployment pattern to provide full sensing coverage while maximizing the deployment efficiency, we study the partial sensing coverage problem and the corresponding node saving rate in 3D lattice WSNs. Two popular 3D deployment patterns including cube and triangular prism are considered. The partial sensing coverage and the note saving rate with respect to full sensing coverage are derived through mathematically modeling and theoretical analysis. Research results show that partial sensing coverage is of paramount significance to 3D lattice WSN design and implementation as a large amount of expensive 3D sensors can be saved by sacrificing a small amount of sensing coverage. For example, 38.43% and 22.14% sensors can be saved when providing 0.9864 and 0.9898 sensing coverage with respect to full sensing coverage in a cubic pattern and a triangular prism pattern based lattice WSN respectively. computer-based simulations results validate the modeling and analysis.
Unlike most existing works that focus on a conventional omni-directional sensor network, we investigate the sensing coverage problem in a directional sensor network through mathematically modeling, analysis, and compu...
详细信息
Unlike most existing works that focus on a conventional omni-directional sensor network, we investigate the sensing coverage problem in a directional sensor network through mathematically modeling, analysis, and computer-based simulation evaluation. Research results show: 1) A factor of (2π/θ) more sensors will be required to provide the same sensing coverage in a θ(θ α = ln(1-α)-ln(1-f)/ln(1-f), is solely determined by the sensing coverage requirement in an application and is independent of sensor features. Simulation results validate the modeling, derivation, and analysis.
暂无评论