2,309 research outputs found
TRULLO - local trust bootstrapping for ubiquitous devices
Handheld devices have become sufficiently powerful
that it is easy to create, disseminate, and access digital content
(e.g., photos, videos) using them. The volume of such content is
growing rapidly and, from the perspective of each user, selecting
relevant content is key. To this end, each user may run a trust
model - a software agent that keeps track of who disseminates
content that its user finds relevant. This agent does so by
assigning an initial trust value to each producer for a specific
category (context); then, whenever it receives new content, the
agent rates the content and accordingly updates its trust value for
the producer in the content category. However, a problem with
such an approach is that, as the number of content categories
increases, so does the number of trust values to be initially set.
This paper focuses on how to effectively set initial trust values.
The most sophisticated of the current solutions employ predefined
context ontologies, using which initial trust in a given
context is set based on that already held in similar contexts.
However, universally accepted (and time invariant) ontologies
are rarely found in practice. For this reason, we propose a
mechanism called TRULLO (TRUst bootstrapping by Latently
Lifting cOntext) that assigns initial trust values based only on
local information (on the ratings of its user’s past experiences)
and that, as such, does not rely on third-party recommendations.
We evaluate the effectiveness of TRULLO by simulating its use
in an informal antique market setting. We also evaluate the
computational cost of a J2ME implementation of TRULLO on
a mobile phone
Enhancing Practice and Achievement in Introductory Programming With a Robot Olympics
© 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information
Finding and Resolving Security Misusability with Misusability Cases
Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice- versa. One way of using scenarios to bridge security and usability involves explicitly describing how design deci- sions can lead to users inadvertently exploiting vulnera- bilities to carry out their production tasks. This paper describes how misusability cases, scenarios that describe how design decisions may lead to usability problems sub- sequently leading to system misuse, address this problem. We describe the related work upon which misusability cases are based before presenting the approach, and illus- trating its application using a case study example. Finally, we describe some findings from this approach that further inform the design of usable and secure systems
Chapter Bibliography
authored support system; contextual machine translation; controlled document authoring; controlled language; document structure; terminology management; translation technology; usability evaluatio
Nature-Inspired Coordination Models: Current Status and Future Trends
Coordination models and languages are meant to provide abstractions and mechanisms to harness the space of interaction as one of the foremost sources of complexity in computational systems. Nature-inspired computing aims at understanding the mechanisms and patterns of complex natural systems in order to bring their most desirable features to computational systems. Thus, the promise of nature-inspired coordination models is to prove themselves fundamental in the design of complex computational systems|such as intelligent, knowledge-intensive, pervasive, adaptive, and self-organising ones. In this paper, we survey the most relevant nature-inspired coordination models in the literature, focussing in particular on tuple-based models, and foresee the most interesting research trends in the field
How to make privacy policies both GDPR-compliant and usable
It is important for organisations to ensure that their privacy policies are General Data Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline. However, it is also important for these policies to be designed with the needs of the human recipient in mind. We carried out an investigation to find out how best to achieve this.We commenced by synthesising the GDPR requirements into a checklist-type format. We then derived a list of usability design guidelines for privacy notifications from the research literature. We augmented the recommendations with other findings reported in the research literature, in order to confirm the guidelines. We conclude by providing a usable and GDPR-compliant privacy policy template for the benefit of policy writers
Introductory programming: a systematic literature review
As computing becomes a mainstream discipline embedded in the school curriculum and acts as an enabler for an increasing range of academic disciplines in higher education, the literature on introductory programming is growing. Although there have been several reviews that focus on specific aspects of introductory programming, there has been no broad overview of the literature exploring recent trends across the breadth of introductory programming.
This paper is the report of an ITiCSE working group that conducted a systematic review in order to gain an overview of the introductory programming literature. Partitioning the literature into papers addressing the student, teaching, the curriculum, and assessment, we explore trends, highlight advances in knowledge over the past 15 years, and indicate possible directions for future research
GHItaly19: Research Perspectives on Game Human Interaction
This is a short introduction to the papers presented at the 3rd Workshop on Games-Human Interaction - GHItaly19, that was held in connection with CHItaly 2019. This series of workshops focuses on the multifaceted issues related to the design and development of human-game interfaces. This entails multidisciplinary competences and skills, and the final quality of the User eXperience depends on how consistently and smartly they are exploited. As a matter of fact, users\u2019 engagement and satisfaction rely on the wise design and skilled evaluation of the produced (multidimensional) artifacts. This gains even more critical importance since the application of video games has long overcome the borders of amusement, to spur new possibilities for, e.g., continuous healthcare and education
GHItaly19: Research Perspectives on Game Human Interaction
This is a short introduction to the papers presented at the 3rd Workshop on Games-Human Interaction - GHItaly19, that was held in connection with CHItaly 2019. This series of workshops focuses on the multifaceted issues related to the design and development of human-game interfaces. This entails multidisciplinary competences and skills, and the final quality of the User eXperience depends on how consistently and smartly they are exploited. As a matter of fact, users’ engagement and satisfaction rely on the wise design and skilled evaluation of the produced (multidimensional) artifacts. This gains even more critical importance since the application of video games has long overcome the borders of amusement, to spur new possibilities for, e.g., continuous healthcare and education
- …