23,785 research outputs found
Finding the right answer: an information retrieval approach supporting knowledge sharing
Knowledge Management can be defined as the effective strategies to get the right piece of knowledge to the right person in the right time. Having the main purpose of providing users with information items of their interest, recommender systems seem to be quite valuable for organizational knowledge management environments. Here we
present KARe (Knowledgeable Agent for Recommendations), a multiagent recommender system that supports users sharing knowledge in a peer-to-peer environment. Central to this work is the assumption that social interaction is essential for the creation and dissemination of new knowledge. Supporting social interaction, KARe allows users to share knowledge through questions and answers. This paper describes KARe�s agent-oriented architecture and presents its recommendation algorithm
The insider on the outside: a novel system for the detection of information leakers in social networks
Confidential information is all too easily leaked by naive users posting comments. In this paper we introduce DUIL, a system for Detecting Unintentional Information Leakers. The value of DUIL is in its ability to detect those responsible for information leakage that occurs through comments posted on news articles in a public environment, when those articles have withheld material non-public information. DUIL is comprised of several artefacts, each designed to analyse a different aspect of this challenge: the information, the user(s) who posted the information, and the user(s) who may be involved in the dissemination of information. We present a design science analysis of DUIL as an information system artefact comprised of social, information, and technology artefacts. We demonstrate the performance of DUIL on real data crawled from several Facebook news pages spanning two years of news articles
Seamless mobility with personal servers
We describe the concept and the taxonomy of personal servers, and their implications in seamless mobility. Personal servers could offer electronic services independently of network availability or quality, provide a greater flexibility in the choice of user access device, and support the key concept of continuous user experience. We describe the organization of mobile and remote personal servers, define three relevant communication modes, and discuss means for users to exploit seamless services on the personal server
Misaligned Values in Software Engineering Organizations
The values of software organizations are crucial for achieving high
performance; in particular, agile development approaches emphasize their
importance. Researchers have thus far often assumed that a specific set of
values, compatible with the development methodologies, must be adopted
homogeneously throughout the company. It is not clear, however, to what extent
such assumptions are accurate.
Preliminary findings have highlighted the misalignment of values between
groups as a source of problems when engineers discuss their challenges.
Therefore, in this study, we examine how discrepancies in values between groups
affect software companies' performance.
To meet our objectives, we chose a mixed method research design. First, we
collected qualitative data by interviewing fourteen (\textit{N} = 14) employees
working in four different organizations and processed it using thematic
analysis. We then surveyed seven organizations (\textit{N} = 184). Our analysis
indicated that value misalignment between groups is related to organizational
performance. The aligned companies were more effective, more satisfied, had
higher trust, and fewer conflicts.
Our efforts provide encouraging findings in a critical software engineering
research area. They can help to explain why some companies are more efficient
than others and, thus, point the way to interventions to address organizational
challenges.Comment: accepted for publication in Journal of Software: Evolution and
Proces
Systems And Methods For Detecting Call Provenance From Call Audio
Various embodiments of the invention are detection systems and methods for detecting call provenance based on call audio. An exemplary embodiment of the detection system can comprise a characterization unit, a labeling unit, and an identification unit. The characterization unit can extract various characteristics of networks through which a call traversed, based on call audio. The labeling unit can be trained on prior call data and can identify one or more codecs used to encode the call, based on the call audio. The identification unit can utilize the characteristics of traversed networks and the identified codecs, and based on this information, the identification unit can provide a provenance fingerprint for the call. Based on the call provenance fingerprint, the detection system can identify, verify, or provide forensic information about a call audio source.Georgia Tech Research Corporatio
- …