1,744 research outputs found
Topic and Sentiment Analysis on OSNs: a Case Study of Advertising Strategies on Twitter
Cognitive Science Research Group School of Electronic Engineering and Computer Science Queen Mary University of Londo
Usability and Design of Personal Wearable and Portable Devices for Thermal Comfort
Conference paperPersonal comfort is important in the design of objects and environments. However, as comfort is a subjective experience, it is a very difficult aspect to design for. This paper presents an interrogation into the design for human thermal comfort, in particular the design of personal devices for use in shared work environments. The findings of two user studies are presented, in which wearable and portable, off-the-shelf personal heating and cooling devices were deployed in the field to explore the interaction with and use of these devices in everyday settings with the aim to uncover key aspects and requirements for the design of such devices. We found that functionality and affordances, i.e. the design for versatility, appropriation and mobility, as well as control, availability, effectiveness and efficiency of use were most important. Furthermore, individual preferences, foremost the preference for on-body versus off-body heating and cooling, and aspects related to wearable design of the devices, such as aesthetics, materiality, comfort of wear, mobility and unobtrusiveness, also need to be taken into account.This research was supported by the Media & Arts
Technology Programme at the School of Electronic
Engineering and Computer Science, Queen Mary
University of London, an EPSRC Centre for
Doctoral Training (EP/G03723X/1)
Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions
When studying the information leakage in programs or protocols, a natural
question arises: "what is the worst case scenario?". This problem of
identifying the maximal leakage can be seen as a channel capacity problem in
the information theoretical sense. In this paper, by combining two powerful
theories: Information Theory and Karush-Kuhn-Tucker conditions, we demonstrate
a very general solution to the channel capacity problem. Examples are given to
show how our solution can be applied to practical contexts of programs and
anonymity protocols, and how this solution generalizes previous approaches to
this problem
Spiking neural network connectivity and its potential for temporal sensory processing and variable binding
Copyright © 2013 Wall and Glackin. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these termsPeer reviewedFinal Published versio
A network resource availability model for IEEE802.11a/b-based WLAN carrying different service types
The electronic version of this article is the complete one and can be found online at: http://jwcn.eurasipjournals.com/content/2011/1/103.
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.Operators of integrated wireless systems need to have knowledge of the resource availability in their different access networks to perform efficient admission control and maintain good quality of experience to users. Network availability depends on the access technology and the service types. Resource availability in a WLAN is complex to gather when UDP and TCP services co-exist. Previous study on IEEE802.11a/b derived the achievable throughput under the assumption of inelastic and uniformly distributed traffic. Further study investigated TCP connections and derived a model to calculate the effective transmission rate of packets under the assumption of saturated traffic flows. The assumptions are too stringent; therefore, we developed a model for evaluating WLAN resource availability that tries to narrow the gap to more realistic scenarios. It provides an indication of WLAN resource availability for admitting UDP/TCP requests. This article presents the assumptions, the mathematical formulations, and the effectiveness of our model
The scientific evaluation of music content analysis systems: Valid empirical foundations for future real-world impact
We discuss the problem of music content analysis within the formal framework of experimental design
The power of VNA-driven quasi-optics to sense group molecular action in condensed phase systems
© © 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The authors would like to thank the Engineering and Physical Sciences Research Council (EPSRC, UK) for generous support (EP/1014845)
A Review of Models for Evaluating Quality in Open Source Software
Open source products/projects targeting the same or similar applications are common nowadays. This makes choosing a
tricky task. Quality is one factor that can be considered when choosing among similar open source solutions. In order to measure quality in software, quality models can be used. Open source quality models emerged due to the inability of
traditional quality models to measure unique features (such as community) of open source software. The aim of the paper
therefore is to examine the characteristic features, unique strengths, and limitations of existing open source quality
models. In addition, we compare the models based on some selected attributes
- …