54,351 research outputs found

    Combining relevance information in a synchronous collaborative information retrieval environment

    Get PDF
    Traditionally information retrieval (IR) research has focussed on a single user interaction modality, where a user searches to satisfy an information need. Recent advances in both web technologies, such as the sociable web of Web 2.0, and computer hardware, such as tabletop interface devices, have enabled multiple users to collaborate on many computer-related tasks. Due to these advances there is an increasing need to support two or more users searching together at the same time, in order to satisfy a shared information need, which we refer to as Synchronous Collaborative Information Retrieval. Synchronous Collaborative Information Retrieval (SCIR) represents a significant paradigmatic shift from traditional IR systems. In order to support an effective SCIR search, new techniques are required to coordinate users' activities. In this chapter we explore the effectiveness of a sharing of knowledge policy on a collaborating group. Sharing of knowledge refers to the process of passing relevance information across users, if one user finds items of relevance to the search task then the group should benefit in the form of improved ranked lists returned to each searcher. In order to evaluate the proposed techniques we simulate two users searching together through an incremental feedback system. The simulation assumes that users decide on an initial query with which to begin the collaborative search and proceed through the search by providing relevance judgments to the system and receiving a new ranked list. In order to populate these simulations we extract data from the interaction logs of various experimental IR systems from previous Text REtrieval Conference (TREC) workshops

    Virtual reality: Theoretical basis, practical applications

    Get PDF
    Virtual reality (VR) is a powerful multimedia visualization technique offering a range of mechanisms by which many new experiences can be made available. This paper deals with the basic nature of VR, the technologies needed to create it, and its potential, especially for helping disabled people. It also offers an overview of some examples of existing VR systems

    Planning and Resource Management in an Intelligent Automated Power Management System

    Get PDF
    Power system management is a process of guiding a power system towards the objective of continuous supply of electrical power to a set of loads. Spacecraft power system management requires planning and scheduling, since electrical power is a scarce resource in space. The automation of power system management for future spacecraft has been recognized as an important R&D goal. Several automation technologies have emerged including the use of expert systems for automating human problem solving capabilities such as rule based expert system for fault diagnosis and load scheduling. It is questionable whether current generation expert system technology is applicable for power system management in space. The objective of the ADEPTS (ADvanced Electrical Power management Techniques for Space systems) is to study new techniques for power management automation. These techniques involve integrating current expert system technology with that of parallel and distributed computing, as well as a distributed, object-oriented approach to software design. The focus of the current study is the integration of new procedures for automatically planning and scheduling loads with procedures for performing fault diagnosis and control. The objective is the concurrent execution of both sets of tasks on separate transputer processors, thus adding parallelism to the overall management process

    The volume and source of cyberabuse influences victim blame and perceptions of attractiveness

    Get PDF
    Cyberabuse is an escalating problem in society, as opportunities for abuse to occur in online public domains increase. Such acts are often defined by the frequency of abuse, and in many cases multiple individuals play a part in the abuse. Although consequences of such acts are often severe, there is typically little public sympathy/support for victims. To better understand perceptions of victims of abusive online acts, we manipulated the Volume (low, high) and Source (same-source, multi-source) of abusive posts in artificially-manipulated Facebook timelines of four fictitious ‘victims’. One hundred and sixty-four participants [United Kingdom-based; aged 18–59] rated ‘victims’ on measures of direct victim blame (DVB) and perceived social-, physical- and task-attractiveness. Results revealed significant Volume × Source interactions on DVB and social-attractiveness ratings. Few abusive posts authored by a single source yielded higher DVB and lower social-attractiveness ratings. Strong correlations between attractiveness and DVB were observed. We propose that our results could be due to an observer desensitization effect, or that participants interpreted the posts as indicative of friendly ‘teasing’ or ‘banter’ within an established social relationship, helping to explain why victims of online abuse often receive little sympathy or support

    Equivalence is in the Eye of the Beholder

    Get PDF
    In a recent provocative paper, Lamport points out "the insubstantiality of processes" by proving the equivalence of two different decompositions of the same intuitive algorithm by means of temporal formulas. We point out that the correct equivalence of algorithms is itself in the eye of the beholder. We discuss a number of related issues and, in particular, whether algorithms can be proved equivalent directly.Comment: See also the ASM web site at http://www.eecs.umich.edu/gasm

    IT Capital, Job Content and Educational Attainment

    Get PDF
    Based on a large data set containing information on occupations between 1979 and 1999, this study explores the ?black box? surrounding the skill?biased technological change hypothesis by analyzing the mechanisms that induce information technologies to be complementary to employees with higher skill levels. Using direct, multidimensional measures of occupational skill requirements, the analysis shows that IT capital substitutes repetitive manual and repetitive cognitive skills, whereas it complements analytical and interactive skills. These changes in the within occupational task mix result in an increased deployment of employees with high levels of education who have comparative advantages in performing non?repetitive cognitive tasks. --skill-biased technological change,job task content,vocational education

    Recognizing Emotions in a Foreign Language

    Get PDF
    Expressions of basic emotions (joy, sadness, anger, fear, disgust) can be recognized pan-culturally from the face and it is assumed that these emotions can be recognized from a speaker's voice, regardless of an individual's culture or linguistic ability. Here, we compared how monolingual speakers of Argentine Spanish recognize basic emotions from pseudo-utterances ("nonsense speech") produced in their native language and in three foreign languages (English, German, Arabic). Results indicated that vocal expressions of basic emotions could be decoded in each language condition at accuracy levels exceeding chance, although Spanish listeners performed significantly better overall in their native language ("in-group advantage"). Our findings argue that the ability to understand vocally-expressed emotions in speech is partly independent of linguistic ability and involves universal principles, although this ability is also shaped by linguistic and cultural variables

    PRESENCE: A human-inspired architecture for speech-based human-machine interaction

    No full text
    Recent years have seen steady improvements in the quality and performance of speech-based human-machine interaction driven by a significant convergence in the methods and techniques employed. However, the quantity of training data required to improve state-of-the-art systems seems to be growing exponentially and performance appears to be asymptotic to a level that may be inadequate for many real-world applications. This suggests that there may be a fundamental flaw in the underlying architecture of contemporary systems, as well as a failure to capitalize on the combinatorial properties of human spoken language. This paper addresses these issues and presents a novel architecture for speech-based human-machine interaction inspired by recent findings in the neurobiology of living systems. Called PRESENCE-"PREdictive SENsorimotor Control and Emulation" - this new architecture blurs the distinction between the core components of a traditional spoken language dialogue system and instead focuses on a recursive hierarchical feedback control structure. Cooperative and communicative behavior emerges as a by-product of an architecture that is founded on a model of interaction in which the system has in mind the needs and intentions of a user and a user has in mind the needs and intentions of the system

    The role of information systems in the prevention and detection of transnational and international crime

    Get PDF
    © Cambridge University Press 2014. All around the world criminal activity remains at the forefront of governmental concerns, not only as a problem that distorts the very fabric of society within the confines of national jurisdictions, but also as a problem that cuts across national borders to exhibit a global dimension. The international dimension of criminal activity remains critical and is generally characterized by a complexity that is unique and requires action on many different levels. Criminals set out to mask their illegal activities and deliberately generate complexity as a means of concealment. In doing so, they exploit new developments in technology that assist them in achieving their ends. This criminality exhibits forms of innovation that stretch far beyond traditional criminal activity (e.g., drug and human trafficking) and manages to attach itself within the broader fabric of society by exploiting the very latest developments. This evolution is necessary as criminals seek not only to escape arrest, prosecution and conviction, but also to enjoy the fruits of their criminality (mostly financial gains). Thus, they seek to develop ways of exploiting the various diffuse norms of social interaction (e.g., trust), financial modes of conduct (e.g., cash-based economies), technological and communication developments (e.g., Internet), and thereby minimize the possibility for detection. By limiting the resources that can be made available for prevention (or making them obsolete when developing new criminal behaviour), they participate in this co-evolution actively; and this they achieve by generating complexity

    Where did Words Come from? A Linking Theory of Sound Symbolism and Natural Language Evolution

    Get PDF
    Where did words come from? The traditional view is that the relation between the sound of a word and its meaning is arbitrary. An alternative hypothesis, known as sound symbolism, holds that form-meaning correspondence is systematic. Numerous examples of sound symbolism exist across natural language phyla. Moreover, cross-linguistic similarities suggest that sound symbolism represents a language universal. For example, many unrelated languages affix an "ee" sound to words in order to emphasize size distinctions or express affection (e.g., look at the teeny weeny baby); other such phonetic universals are evident for object mass, color, brightness, and aggression. We hypothesize that sound symbolism reflects sensitivity to an ecological law (i.e., Hooke's Law) governing an inverse relation between object mass and acoustic resonance. In two experiments healthy adults showed high agreement in matching pure tones to color swatches and nonwords to novel objects as linear functions of frequency and luminance. These results support a degree of non-arbitrariness in integrating visual and auditory information. We discuss implications for sound symbolism as a factor underlying language evolution
    corecore