Skip to main content

Page of 4
and
  1. No Access

    Chapter and Conference Paper

    Two 1%s Don’t Make a Whole: Comparing Simultaneous Samples from Twitter’s Streaming API

    We compare samples of tweets from the Twitter Streaming API constructed from different connections that tracked the same popular keywords at the same time. We find that on average, over 96% of the tweets seen ...

    Kenneth Joseph, Peter M. Landwehr in Social Computing, Behavioral-Cultural Mode… (2014)

  2. No Access

    Chapter and Conference Paper

    Towards Anonymous Ciphertext Indistinguishability with Identity Leakage

    Key escrow is a major drawback of identity-based encryption (IBE). The key generation centre (KGC) can generate the user secret key of any user by using the master secret key and the user’s identity. This pape...

    Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Joseph K. Liu in Provable Security (2013)

  3. Chapter and Conference Paper

    Inclusive Design: Bridging Theory and Practice

    Large groups in society lack the necessary skills to be sufficiently self-reliant and are in need of personal assistance. These groups could be supported by information and information technology (ICT), but on...

    Anita H. M. Cremers, Mark A. Neerincx in Engineering Psychology and Cognitive Ergon… (2013)

  4. Chapter and Conference Paper

    CogWatch – Automated Assistance and Rehabilitation of Stroke-Induced Action Disorders in the Home Environment

    Stroke frequently causes apraxia, particularly if it affects the left-hemisphere. A major symptom of apraxia is the presence of deficits during the execution and organization of activities of daily living (ADL...

    Joachim Hermsdörfer, Marta Bienkiewicz in Engineering Psychology and Cognitive Ergon… (2013)

  5. Chapter and Conference Paper

    Analyzing Deceptive Speech

    This current work explored the speech-based attributes of participants who were being deceptive in an experimental interrogation setting. In particular, the study attempted to investigate the appropriateness o...

    Christin Kirchhübel, Alex W. Stedmon in Engineering Psychology and Cognitive Ergon… (2013)

  6. No Access

    Chapter and Conference Paper

    A Low-Cost Classroom-Oriented Educational Robotics System

    Over the past few years, there has been a growing interest in using robots in education. The use of these tangible devices in combination with problem-based learning activities results in more motivated studen...

    Mário Saleiro, Bruna Carmo, Joao M. F. Rodrigues, J. M. H. du Buf in Social Robotics (2013)

  7. No Access

    Chapter and Conference Paper

    HySoN: A Distributed Agent-Based Protocol for Group Formation in Online Social Networks

    On-line social networks allow people to easily interact with each other by means of social computer services. This scenario makes possible to search in a social network for affinities or new opportunities that...

    Fabrizio Messina, Giuseppe Pappalardo, Domenico Rosaci in Multiagent System Technologies (2013)

  8. No Access

    Chapter and Conference Paper

    Hacking the Natural Habitat: An In-the-Wild Study of Smart Homes, Their Development, and the People Who Live in Them

    Commercial home automation systems are becoming increasingly common, affording the opportunity to study technology-augmented homes in real world contexts. In order to understand how these technologies are bein...

    Sarah Mennicken, Elaine M. Huang in Pervasive Computing (2012)

  9. No Access

    Chapter and Conference Paper

    Payload Drop Application of Unmanned Quadrotor Helicopter Using Gain-Scheduled PID and Model Predictive Control Techniques

    In this paper two useful control techniques are applied to a Quadrotor helicopter to control the height and while carrying a payload weighing one-fourth of its total weight as well as drop** the payload at a...

    Iman Sadeghzadeh, Mahyar Abdolhosseini in Intelligent Robotics and Applications (2012)

  10. No Access

    Chapter and Conference Paper

    Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?

    We are now in the post-PC era, yet our mobile devices are insecure. We consider the different stake-holders in today’s mobile device ecosystem, and analyze why widely-deployed hardware security primitives on m...

    Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou in Trust and Trustworthy Computing (2012)

  11. No Access

    Chapter and Conference Paper

    Power Reduction in WDM Mesh Networks Using Grooming Strategies

    This work reports on the benefits of using energy-efficient grooming strategies in WDM mesh networks in terms of the overall network power consumption. We examine a key enabling node architecture called tap-or...

    Farid Farahmand, M. Masud Hasan in Green Communications and Networking (2012)

  12. No Access

    Chapter and Conference Paper

    A Hybrid System for Online Detection of Emotional Distress

    Nowadays, people are familiar with online communication and tend to express their deeper feelings on the Web. In the light of this situation, we present a hybrid system based on affect analysis for mining emot...

    Tim M. H. Li, Michael Chau, Paul W. C. Wong in Intelligence and Security Informatics (2012)

  13. No Access

    Chapter and Conference Paper

    Multi-sorted Argumentation

    In the theory of abstract argumentation, the acceptance status of arguments is normally determined for the complete set of arguments at once, under a single semantics. However, this is not always desired. In t...

    Tjitze Rienstra, Alan Perotti in Theorie and Applications of Formal Argumen… (2012)

  14. No Access

    Chapter and Conference Paper

    Using Properties to Compare Both Words and Clauses

    There are many applications that use the semantic similarity of words to compare input to stored data, such as conversational agents. When a human thinks of a word they consider a meaning which has associated ...

    David M. Pearce, Zuhair Bandar, David Mclean in Agent and Multi-Agent Systems: Technologie… (2011)

  15. No Access

    Chapter and Conference Paper

    The Fundamental Principle of Coactive Design: Interdependence Must Shape Autonomy

    This article presents the fundamental principle of Coactive Design, a new approach being developed to address the increasingly sophisticated roles for both people and agents in mixed human-agent systems. The fund...

    Matthew Johnson, Jeffrey M. Bradshaw in Coordination, Organizations, Institutions,… (2011)

  16. No Access

    Chapter and Conference Paper

    Capacity-Building in Nonprofit Organizations: Is There a Blended Learning Paradigm for the Sector?

    Blended learning models are widely-used, successful training vehicles for e-learning and workplace training, in corporate as well as higher education environments. Increasingly, Web 2.0 applications, imbedded ...

    M. T. Cole, B. J. Garner in New Horizons in Web-Based Learning - ICWL 2010 Workshops (2011)

  17. No Access

    Chapter and Conference Paper

    Evaluating Interaction of MAS Providing Context-Aware Services

    Much effort has been spent on suggesting and implementing new architectures of MAS to specific domains. Often each new architecture is not even compared to any existing architectures in order to evaluate their...

    Nayat Sanchez-Pi, David Griol, Javier Carbo in Agent and Multi-Agent Systems: Technologie… (2011)

  18. No Access

    Chapter and Conference Paper

    VigilAgent for the Development of Agent-Based Multi-robot Surveillance Systems

    Usually, surveillance applications are developed following an ad-hoc approach instead of using a methodology to guide stakeholders in achieving quality standards expected from commercial software. To solve thi...

    José M. Gascueña, Elena Navarro in Agent and Multi-Agent Systems: Technologie… (2011)

  19. No Access

    Chapter and Conference Paper

    Extending Learning Objects by Means of Social Networking

    Learning objects have been the promise of providing people with high quality learning resources. Initiatives such as MIT OpenCourseWare, MERLOT and others have shown the real possibilities of creating and shar...

    Julià Minguillón, M. Elena Rodríguez in Advances in Web-Based Learning – ICWL 2010 (2010)

  20. No Access

    Chapter and Conference Paper

    Emo-dramatic Robotic Stewards

    In this paper will be presented an heterogeneous colony of robots capable to cooperate with people as effective partners to provide different kind of support among various working environments, such as museums...

    Salvatore M. Anzalone, Antonio Nuzzo, Nicola Patti, Rosario Sorbello in Social Robotics (2010)

Page of 4