188,882 research outputs found

    Reply With: Proactive Recommendation of Email Attachments

    Full text link
    Email responses often contain items-such as a file or a hyperlink to an external document-that are attached to or included inline in the body of the message. Analysis of an enterprise email corpus reveals that 35% of the time when users include these items as part of their response, the attachable item is already present in their inbox or sent folder. A modern email client can proactively retrieve relevant attachable items from the user's past emails based on the context of the current conversation, and recommend them for inclusion, to reduce the time and effort involved in composing the response. In this paper, we propose a weakly supervised learning framework for recommending attachable items to the user. As email search systems are commonly available, we constrain the recommendation task to formulating effective search queries from the context of the conversations. The query is submitted to an existing IR system to retrieve relevant items for attachment. We also present a novel strategy for generating labels from an email corpus---without the need for manual annotations---that can be used to train and evaluate the query formulation model. In addition, we describe a deep convolutional neural network that demonstrates satisfactory performance on this query formulation task when evaluated on the publicly available Avocado dataset and a proprietary dataset of internal emails obtained through an employee participation program.Comment: CIKM2017. Proceedings of the 26th ACM International Conference on Information and Knowledge Management. 201

    Preliminary assessment of the computer-based Taenia solium educational program ‘The Vicious Worm’ on knowledge uptake in primary school students in rural areas in eastern Zambia

    Get PDF
    Objective: The zoonotic helminth Taenia solium is endemic in Zambia, causing human (taeniasis and (neuro)cysticercosis) and pig (porcine cysticercosis) diseases with high health, social and economic burdens. We aimed to evaluate the impact of a health educational program intended to lead to powerful and cumulative improvements in knowledge, attitudes and practices that decrease parasite transmission and disease occurrence. Methods: Half-day health education workshops were conducted in three primary schools in the highly endemic Eastern Province of Zambia, using the computer-based T. solium educational program The Vicious Worm'. Questionnaires were administered before and after the educational component to determine the program's impact on knowledge uptake in primary school students. Results: In total, 99 students participated: 38 males and 61 females, with a median age of 14 years (range 10-18 years). Baseline general knowledge of T. solium, including awareness of the different human and pig disease states, and disease diagnosis, treatment and prevention, was quite high (average score 62%) and consistent across all three study areas. Participants' knowledge had significantly increased after the educational component, particularly regarding parasite transmission and disease prevention. Conclusion: Preliminary assessment of The Vicious Worm' indicates it is an effective tool for the short-term T. solium education of primary school students in Zambia. Follow-up studies are planned to assess the longer term impact of the program on knowledge uptake in the study neighbourhoods. Inclusion of tailored The Vicious Worm' educational workshops should be considered in integrated cysticercosis control programs in endemic areas of sub-Saharan Africa

    Are We There Yet? A Communications Evaluation Guide

    Get PDF
    Most foundation and nonprofit communicators can speak at length about the work they do and what it's intended to achieve. But when it comes to describing exactly what their efforts are achieving, few can offer specifics.This guide helps foundation and nonprofit communicators learn whether their communications are effective and what is being achieved -- and determine if any course corrections are necessary.Among the reasons stressed for evaluating communication efforts are these:Evaluation improves the effectiveness of communications.Evaluation can help organizations more effectively engage with intended audiences.Situations change - strategies and tactics may need to change as well.Evaluation ensures wise allocation of resources.The guide points out that evaluation need not be limited to large-scale campaigns or major outreach activities, but should also conducted for efforts to raise awareness of an organization or an issue. And once an evaluation is underway, the guide suggests findings be shared with those who may benefit from what is learned, such as team members, the board, colleagues and peers.The guide includes:Background on why evaluation can contribute to good communications.Four case studies of evaluation in action from the Lumina Foundation for Education, the Robert Wood Johnson Foundation, the Neimand Collaborative, and the California HealthCare Foundation.A worksheet for creating an evaluation plan

    The Early Bird Catches The Term: Combining Twitter and News Data For Event Detection and Situational Awareness

    Full text link
    Twitter updates now represent an enormous stream of information originating from a wide variety of formal and informal sources, much of which is relevant to real-world events. In this paper we adapt existing bio-surveillance algorithms to detect localised spikes in Twitter activity corresponding to real events with a high level of confidence. We then develop a methodology to automatically summarise these events, both by providing the tweets which fully describe the event and by linking to highly relevant news articles. We apply our methods to outbreaks of illness and events strongly affecting sentiment. In both case studies we are able to detect events verifiable by third party sources and produce high quality summaries

    Investigation into Mobile Learning Framework in Cloud Computing Platform

    Get PDF
    Abstract—Cloud computing infrastructure is increasingly used for distributed applications. Mobile learning applications deployed in the cloud are a new research direction. The applications require specific development approaches for effective and reliable communication. This paper proposes an interdisciplinary approach for design and development of mobile applications in the cloud. The approach includes front service toolkit and backend service toolkit. The front service toolkit packages data and sends it to a backend deployed in a cloud computing platform. The backend service toolkit manages rules and workflow, and then transmits required results to the front service toolkit. To further show feasibility of the approach, the paper introduces a case study and shows its performance

    Design & Evaluation of Path-based Reputation System for MANET Routing

    Get PDF
    Most of the existing reputation systems in mobile ad hoc networks (MANET) consider only node reputations when selecting routes. Reputation and trust are therefore generally ensured within a one-hop distance when routing decisions are made, which often fail to provide the most reliable, trusted route. In this report, we first summarize the background studies on the security of MANET. Then, we propose a system that is based on path reputation, which is computed from reputation and trust values of each and every node in the route. The use of path reputation greatly enhances the reliability of resulting routes. The detailed system architecture and components design of the proposed mechanism are carefully described on top of the AODV (Ad-hoc On-demand Distance Vector) routing protocol. We also evaluate the performance of the proposed system by simulating it on top of AODV. Simulation experiments show that the proposed scheme greatly improves network throughput in the midst of misbehavior nodes while requires very limited message overhead. To our knowledge, this is the first path-based reputation system proposal that may be implemented on top of a non-source based routing scheme such as AODV

    Resolving Parent-Child Differences

    Get PDF
    PDF pages:
    corecore