1,744 research outputs found

    Topic and Sentiment Analysis on OSNs: a Case Study of Advertising Strategies on Twitter

    Get PDF
    Cognitive Science Research Group School of Electronic Engineering and Computer Science Queen Mary University of Londo

    Usability and Design of Personal Wearable and Portable Devices for Thermal Comfort

    Get PDF
    Conference paperPersonal comfort is important in the design of objects and environments. However, as comfort is a subjective experience, it is a very difficult aspect to design for. This paper presents an interrogation into the design for human thermal comfort, in particular the design of personal devices for use in shared work environments. The findings of two user studies are presented, in which wearable and portable, off-the-shelf personal heating and cooling devices were deployed in the field to explore the interaction with and use of these devices in everyday settings with the aim to uncover key aspects and requirements for the design of such devices. We found that functionality and affordances, i.e. the design for versatility, appropriation and mobility, as well as control, availability, effectiveness and efficiency of use were most important. Furthermore, individual preferences, foremost the preference for on-body versus off-body heating and cooling, and aspects related to wearable design of the devices, such as aesthetics, materiality, comfort of wear, mobility and unobtrusiveness, also need to be taken into account.This research was supported by the Media & Arts Technology Programme at the School of Electronic Engineering and Computer Science, Queen Mary University of London, an EPSRC Centre for Doctoral Training (EP/G03723X/1)

    Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions

    Get PDF
    When studying the information leakage in programs or protocols, a natural question arises: "what is the worst case scenario?". This problem of identifying the maximal leakage can be seen as a channel capacity problem in the information theoretical sense. In this paper, by combining two powerful theories: Information Theory and Karush-Kuhn-Tucker conditions, we demonstrate a very general solution to the channel capacity problem. Examples are given to show how our solution can be applied to practical contexts of programs and anonymity protocols, and how this solution generalizes previous approaches to this problem

    Spiking neural network connectivity and its potential for temporal sensory processing and variable binding

    Get PDF
    Copyright © 2013 Wall and Glackin. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these termsPeer reviewedFinal Published versio

    A network resource availability model for IEEE802.11a/b-based WLAN carrying different service types

    Get PDF
    The electronic version of this article is the complete one and can be found online at: http://jwcn.eurasipjournals.com/content/2011/1/103. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.Operators of integrated wireless systems need to have knowledge of the resource availability in their different access networks to perform efficient admission control and maintain good quality of experience to users. Network availability depends on the access technology and the service types. Resource availability in a WLAN is complex to gather when UDP and TCP services co-exist. Previous study on IEEE802.11a/b derived the achievable throughput under the assumption of inelastic and uniformly distributed traffic. Further study investigated TCP connections and derived a model to calculate the effective transmission rate of packets under the assumption of saturated traffic flows. The assumptions are too stringent; therefore, we developed a model for evaluating WLAN resource availability that tries to narrow the gap to more realistic scenarios. It provides an indication of WLAN resource availability for admitting UDP/TCP requests. This article presents the assumptions, the mathematical formulations, and the effectiveness of our model

    The scientific evaluation of music content analysis systems: Valid empirical foundations for future real-world impact

    Get PDF
    We discuss the problem of music content analysis within the formal framework of experimental design

    The power of VNA-driven quasi-optics to sense group molecular action in condensed phase systems

    Get PDF
    © © 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The authors would like to thank the Engineering and Physical Sciences Research Council (EPSRC, UK) for generous support (EP/1014845)

    A Review of Models for Evaluating Quality in Open Source Software

    Get PDF
    Open source products/projects targeting the same or similar applications are common nowadays. This makes choosing a tricky task. Quality is one factor that can be considered when choosing among similar open source solutions. In order to measure quality in software, quality models can be used. Open source quality models emerged due to the inability of traditional quality models to measure unique features (such as community) of open source software. The aim of the paper therefore is to examine the characteristic features, unique strengths, and limitations of existing open source quality models. In addition, we compare the models based on some selected attributes
    • …
    corecore