Results for 'Mobile Computing '

988 found
Order:
  1.  21
    The system of autono‑mobility: computer vision and urban complexity—reflections on artificial intelligence at urban scale.Fabio Iapaolo - 2023 - AI and Society 38 (3):1111-1122.
    Focused on city-scale automation, and using self-driving cars (SDCs) as a case study, this article reflects on the role of AI—and in particular, computer vision systems used for mapping and navigation—as a catalyst for urban transformation. Urban research commonly presents AI and cities as having a one-way cause-and-effect relationship, giving undue weight to AI’s impact on cities and overlooking the role of cities in shaping AI. Working at the intersection of data science and social research, this paper aims to counter (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  8
    Complexity Construction of Intelligent Marketing Strategy Based on Mobile Computing and Machine Learning Simulation Environment.Shuai Mao & Rong Huang - 2021 - Complexity 2021:1-11.
    Mankind’s research on marketing has a history of hundreds of years, and it has been fruitful in continuous summary and research. Now the theory of marketing has gradually penetrated into the minds of every company and even individual. A successful marketing strategy is the inevitable result of scientific planning and effective implementation. However, the current marketing strategy has gradually failed to meet the needs of corporates. In order to find the best solution for corporate marketing strategy, we built a simulation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  17
    Justification Logic as a foundation for certifying mobile computation.Eduardo Bonelli & Federico Feller - 2012 - Annals of Pure and Applied Logic 163 (7):935-950.
  4. A Study on Fog Computing Environment Mobility and Migration.R. J. Pedro - 2018 - 22nd International Conference Electronics 22.
    Cloud Computing paradigm has reached a high degree of popularity among all kinds of computer users, but it may not be suitable for mobile devices as they need computing power to be as close as possible to data sources in order to reduce delays. This paper focuses on achieving mathematical models for users moving around and proposes an overlay mobility model for Fog Data Centres based on traditional wireless mobility models aimed at better allocating edge computing (...)
     
    Export citation  
     
    Bookmark  
  5.  21
    Mobile/ubiquitous computing: dreams and nightmares.Charles Ess, Johnny Søraker & May Thorseth - 2010 - Etikk I Praksis - Nordic Journal of Applied Ethics 2 (2):3-9.
    Both the scholarly and certainly the popular literatures surrounding information and computing ethics make frequent reference to one or more revolutions. To be sure, in an age that has witnessed—and is increasingly driven by—rapid technological innovation and diffusion, it is tempting to believe that new technologies cannot help but to transform our lives and worlds in radical, dramatic, and thus revolutionary ways.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6.  11
    Multilayer Architecture Model for Mobile Cloud Computing Paradigm.Higinio Mora, Francisco J. Mora Gimeno, María Teresa Signes-Pont & Bruno Volckaert - 2019 - Complexity 2019:1-13.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7. People with Motor and Mobility Impairement: Human Computer Interaction, Rehabilitation-Development of a Power Assisted Handrail--Handrail Trajectory and Standing Up Motion.Yoshiyuki Takahashi, Osamu Nitta, Shigeru Okikawa & Takashi Komeda - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 935-942.
  8. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are only issued (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  28
    Book review: Computational principles of mobile robotics. [REVIEW]Christopher G. Prince - 2004 - Minds and Machines 14 (3):407-414.
  10.  11
    Stochastic Parameter Identification Method for Driving Trajectory Simulation Processes Based on Mobile Edge Computing and Self-Organizing Feature Mapping.Jingfeng Yang, Zhiyong Luo, Nanfeng Zhang, Jinchao Xiao, Honggang Wang, Shengpei Zhou, Xiaosong Liu & Ming Li - 2021 - Complexity 2021:1-8.
    With the rapid development of sensor technology for automated driving applications, the fusion, analysis, and application of multimodal data have become the main focus of different scenarios, especially in the development of mobile edge computing technology that provides more efficient algorithms for realizing the various application scenarios. In the present paper, the vehicle status and operation data were acquired by vehicle-borne and roadside units of electronic registration identification of motor vehicles. In addition, a motion model and an identification (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  10
    Social.networks@work: Case studies into the importance of computer-supported social networks in a mobile phone company.Gerit Götzenbrucker - 2004 - Communications 29 (4):467-494.
    Organizational innovation depends heavily on whether or not communication processes are regulated. Furthermore, social networks represent content-based connectivity of actors in opposition to formal organization. Communication technologies such as e-mail make it possible to continuously maintain the establishment and preserve social networks. Enhancing cooperation in team working processes are the benefits of social networks in dynamic organizations. This article reports on four case studies which focused on teamwork and the structural analysis of e-mail as a communication technology in a (...) phone company. The case studies reveal the impact of computer supported social networks which became mainly apparent through changes in personal communication styles and the establishment of alternative hierarchies in electronic environments. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  24
    A Spanish Adaptation of the Computer and Mobile Device Proficiency Questionnaires for Older Adults.Carmen Moret-Tatay, María José Beneyto-Arrojo, Eugenia Gutierrez, Walter R. Boot & Neil Charness - 2019 - Frontiers in Psychology 10.
  13.  21
    Handheld Mobile Device Based Text Region Extraction and Binarization of Image Embedded Text Documents.Dipak Kumar Basu, Mita Nasipuri, Subhadip Basu & Ayatullah Faruk Mollah - 2013 - Journal of Intelligent Systems 22 (1):25-47.
    . Effective text region extraction and binarization of image embedded text documents on mobile devices having limited computational resources is an open research problem. In this paper, we present one such technique for preprocessing images captured with built-in cameras of handheld devices with an aim of developing an efficient Business Card Reader. At first, the card image is processed for isolating foreground components. These foreground components are classified as either text or non-text using different feature descriptors of texts and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  10
    Traditional cyberloafing, mobile cyberloafing and personal mobile-internet loafing in business organizations.Sauvik Kumar Batabyal & Kanika Tandon Bhal - 2020 - Journal of Information, Communication and Ethics in Society 18 (4):631-647.
    PurposePossession and usage of data-enabled smartphones have added further complexity to the issue of cyberloafing behavior and it certainly evokes newer ethical concerns. This study aims to explore how working individuals perceive the ethicality of their cyberloafing behaviors at the workplace and the cognitive logics they apply to justify their cyberloafing behavior.Design/methodology/approachIncorporating constructivist grounded theory methodology, 19 working managers from various organizations were interviewed face-to-face and responses were audio-recorded with prior consent. The recordings were transcribed verbatim, simultaneously analyzed and coded (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  38
    Mobile social group sizes and scaling ratio.Santi Phithakkitnukoon & Ram Dantu - 2011 - AI and Society 26 (1):71-85.
    Social data mining has become an emerging area of research in information and communication technology fields. The scope of social data mining has expanded significantly in the recent years with the advance of telecommunication technologies and the rapidly increasing accessibility of computing resources and mobile devices. People increasingly engage in and rely on phone communications for both personal and business purposes. Hence, mobile phones become an indispensable part of life for many people. In this article, we perform (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16.  24
    Mobility, portability, and placelessness.Joseph Kupfer - 2007 - Journal of Aesthetic Education 41 (1):38-50.
    In lieu of an abstract, here is a brief excerpt of the content:Mobility, Portability, and PlacelessnessJoseph Kupfer (bio)Introduction: A Danger of Electronically Mediated ExperienceA few months ago I was sitting in a Chicago airport, waiting to make my connecting flight. Everywhere I looked, people were talking on cell phones, but the man across from me had gone one better. He had a cell phone and a laptop computer. He was talking on a conference call with two people who were at (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  28
    Lockbox: mobility, privacy and values in cloud storage. [REVIEW]Luke Stark & Matt Tierney - 2014 - Ethics and Information Technology 16 (1):1-13.
    This paper examines one particular problem of values in cloud computing: how individuals can take advantage of the cloud to store data without compromising their privacy and autonomy. Through the creation of Lockbox, an encrypted cloud storage application, we explore how designers can use reflection in designing for human values to maintain both privacy and usability in the cloud.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  18. The computer-mediated public sphere and the cosmopolitan ideal.Brothers Robyn - 2000 - Ethics and Information Technology 2 (2):91-97.
    In response to the attractive moral and politicalmodel of cosmopolitanism, this paper offers anoverview of some of the conceptual limitations to thatmodel arising from computer-mediated, interest-basedsocial interaction. I discuss James Bohman''sdefinition of the global and cosmopolitan spheres andhow computer-mediated communication might impact thedevelopment of those spheres. Additionally, I questionthe commitment to purely rational models of socialcooperation when theorizing a computer-mediated globalpublic sphere, exploring recent alternatives. Andfinally, I discuss a few of the political andepistemic constraints on participation in thecomputer-mediated public sphere (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark  
  19.  8
    Analysis and Classification of Mobile Apps Using Topic Modeling: A Case Study on Google Play Arabic Apps.Ahlam Fuad & Maha Al-Yahya - 2021 - Complexity 2021:1-12.
    Mobile app stores provide an extremely rich source of information on app descriptions, characteristics, and usage, and analyzing these data provides insights and a deeper understanding of the nature of apps. However, manual analysis of this vast amount of information on mobile apps is not a simple and straightforward task; it is costly in terms of human effort and time. Computational methods such as topic modeling can provide an efficient and satisfactory approach to mobile app information analysis. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  12
    Brain-Computer-Interfaces in their ethical, social and cultural contexts.Gerd Grübler & Elisabeth Hildt (eds.) - 2014 - Dordrecht: Imprint: Springer.
    This volume summarizes the ethical, social and cultural contexts of interfacing brains and computers. It is intended for the interdisciplinary community of BCI stakeholders. Insofar, engineers, neuroscientists, psychologists, physicians, care-givers and also users and their relatives are concerned. For about the last twenty years brain-computer-interfaces (BCIs) have been investigated with increasing intensity and have in principle shown their potential to be useful tools in diagnostics, rehabilitation and assistive technology. The central promise of BCI technology is enabling severely impaired people in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  6
    Computational text analysis: Thoughts on the contingencies of an evolving method.Daniel Marciniak - 2016 - Big Data and Society 3 (2).
    Mapping a public discourse with the tools of computational text analysis comes with many contingencies in the areas of corpus curation, data processing and analysis, and visualisation. However, the complexity of algorithmic assemblies and the beauty of resulting images give the impression of ‘objectivity’. Instead of concealing uncertainties and artefacts in order to tell a coherent and all-encompassing story, retaining the variety of alternative assemblies may actually strengthen the method. By utilising the mobility of digital devices, we could create mutable (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
    Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded. Traffic data subsume under the notion of data protection and are central in the discussion. The telecommunications environment is profoundly changing. The traditionally closed markets with closed networks change into an open market with open networks. Within these open networks more privacy sensitive data are generated and have to be exchanged (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  10
    Contestations in urban mobility: rights, risks, and responsibilities for Urban AI.Nitin Sawhney - 2023 - AI and Society 38 (3):1083-1098.
    Cities today are dynamic urban ecosystems with evolving physical, socio-cultural, and technological infrastructures. Many contestations arise from the effects of inequitable access and intersecting crises currently faced by cities, which may be amplified by the algorithmic and data-centric infrastructures being introduced in urban contexts. In this article, I argue for a critical lens into how inter-related urban technologies, big data and policies, constituted as Urban AI, offer both challenges and opportunities. I examine scenarios of contestations in _urban mobility_, defined broadly (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24.  52
    Mobility as involvement: on the role of involvement in the design of mobile support systems for industrial application. [REVIEW]Daniel Fallman - 2010 - AI and Society 25 (1):43-52.
    In this article, the concept of mobility is examined theoretically, from a phenomenological perspective, as well as empirically, through two design case studies. First, a background to how the notion of mobility is generally conceptualized and used in academia as well as within industry is provided. From a phenomenological analysis, it becomes necessary to question the currently dominating understanding of mobility as first and foremost a provider of freedom from a number of constraints. Rather, it is argued, mobility needs to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  2
    The Computer Prescription: Medical Computing, Public Policy, and Views of History.Bonnie Kaplan - 1995 - Science, Technology and Human Values 20 (1):5-38.
    This article traces past trends and current developments in medical computing in the United States. It suggests a link between shifts in emphases in medical computing and in federal government policy toward health care delivery. The development of medical computing was not driven solely by the internal imperatives of science and technology, but by dreams and visions of how computers could revolutionize medicine. Such dreams and visions constitute a mythical charter similar to ideologies and rhetoric used to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  26.  24
    Transafe: a crowdsourced mobile platform for crime and safety perception management.M. Hamilton, F. Salim, E. Cheng & S. L. Choy - 2011 - Acm Sigcas Computers and Society 41 (2):32-37.
    An earlier version of this paper was presented at the 2011 IEEE International Symposium on Technology and Society at Saint Xavier University in Chicago, Illinois. This paper describes a proposed mobile platform, Transafe, that captures and analyses public perceptions of safety to deliver 'crowdsourced' collective intelligence about places in the City of Melbourne, Australia, and their affective states at various times of the day. Public perceptions of crime on public transport in Melbourne are often mismatched with actual crime statistics (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  27. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile Atm Network.Stephen F. Bush - 1999 - Dissertation,
    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dynamic and continuous (...)
     
    Export citation  
     
    Bookmark  
  28.  4
    On Computers and Men.Tomasz Goban-Klas - 2019 - Studia Humana 8 (2):79-83.
    The title of the article was inspired by the novel by John Steinbeck “Of Mice and Men” (1937) and the poem by Robet Burns about the deception of human plans. Even the best of them often lead astray, or their far-reaching negative effects are revealed. As it seems, nowadays nature (“mice”) and men (people) are in a breakthrough period – in the geological sense between the old and the new era, the Holocene and the Anthropocene, in the cultural sense – (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  29.  72
    Assessing the quality of steady-state visual-evoked potentials for moving humans using a mobile electroencephalogram headset.Yuan-Pin Lin, Yijun Wang, Chun-Shu Wei & Tzyy-Ping Jung - 2014 - Frontiers in Human Neuroscience 8:74478.
    Recent advances in mobile electroencephalogram (EEG) systems, featuring non-prep dry electrodes and wireless telemetry, have urged the needs of mobile brain-computer interfaces (BCIs) for applications in our daily life. Since the brain may behave differently while people are actively situated in ecologically-valid environments versus highly-controlled laboratory environments, it remains unclear how well the current laboratory-oriented BCI demonstrations can be translated into operational BCIs for users with naturalistic movements. Understanding inherent links between natural human behaviors and brain activities is (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  30.  10
    The object of mobile spatial data, the subject in mobile spatial research.Jim Thatcher - 2016 - Big Data and Society 3 (2).
    With an estimated one billion smartphones producing over 5 petabytes of data a day, the spatially aware mobile device has become a near ubiquitous presence in daily life. Cogent, excellent research in a variety of fields has explored what the spatial data these devices produce can reveal of society, such as analysis of Foursquare check-ins to reveal patterns of mobility for groups through a city. In such studies, the individual intentions, motivations, and desires behind the production of said data (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  37
    Interaction spaces in computer-mediated communication.Duska Rosenberg, S. Foley, M. Lievonen, S. Kammas & M. J. Crisp - 2005 - AI and Society 19 (1):22-33.
    In this paper we describe the development of the Interaction Space Theory developed as part of the SANE project. EU framework 5 IST project sustainable accommodation for the new economy, IST 2000-25-257 The EU funded project provided an inter-disciplinary context for the study of interactions in the hybrid workplace where physical work environment is enhanced with information and communication technologies (ICT) which enable collaboration with remote partners. We explain how the theoretical approach, empirical work and methodological strategy employed by SANE (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  61
    Philosophy, privacy, and pervasive computing.Diane P. Michelfelder - 2010 - AI and Society 25 (1):61-70.
    Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33. Consciousness is computational: The Lida model of global workspace theory.Bernard J. Baars & Stan Franklin - 2009 - International Journal of Machine Consciousness 1 (1):23-32.
    The currently leading cognitive theory of consciousness, Global Workspace Theory,1,2 postulates that the primary functions of consciousness include a global broadcast serving to recruit internal resources with which to deal with the current situation and to modulate several types of learning. In addition, conscious experiences present current conditions and problems to a "self" system, an executive interpreter that is identifiable with brain structures like the frontal lobes and precuneus.1Be it human, animal or artificial, an autonomous agent3 is said to be (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   23 citations  
  34.  15
    Role-Playing Computer Ethics: Designing and Evaluating the Privacy by Design (PbD) Simulation.Katie Shilton, Donal Heidenblad, Adam Porter, Susan Winter & Mary Kendig - 2020 - Science and Engineering Ethics 26 (6):2911-2926.
    There is growing consensus that teaching computer ethics is important, but there is little consensus on how to do so. One unmet challenge is increasing the capacity of computing students to make decisions about the ethical challenges embedded in their technical work. This paper reports on the design, testing, and evaluation of an educational simulation to meet this challenge. The privacy by design simulation enables more relevant and effective computer ethics education by letting students experience and make decisions about (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  35.  23
    Linear logic in computer science.Thomas Ehrhard (ed.) - 2004 - New York: Cambridge University Press.
    Linear Logic is a branch of proof theory which provides refined tools for the study of the computational aspects of proofs. These tools include a duality-based categorical semantics, an intrinsic graphical representation of proofs, the introduction of well-behaved non-commutative logical connectives, and the concepts of polarity and focalisation. These various aspects are illustrated here through introductory tutorials as well as more specialised contributions, with a particular emphasis on applications to computer science: denotational semantics, lambda-calculus, logic programming and concurrency theory. The (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  3
    Measuring Consumer Engagement in Omnichannel Retailing: The Mobile In-Store Experience (MIX) Index.Charles Aaron Lawry & Anita D. Bhappu - 2021 - Frontiers in Psychology 12.
    We draw insights from Activity Theory within the field of human-computer interaction to quantitatively measure a mobile in-store experience (MIX), which includes the suite of shopping activities and retail services that a consumer can engage in when using their mobile device in brick-and-mortar stores. We developed and validated a nine-item, formative MIX index using survey data collected from fashion consumers in the United States (n= 1,267), United Kingdom (n= 370), Germany (n= 362), and France (n= 219). As survey (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Influencing the Others’ Minds: an Experimental Evaluation of the Use and Efficacy of Fallacious-reducible Arguments in Web and Mobile Technologies.Antonio Lieto & Fabiana Vernero - 2014 - PsychNology Journa 12 (3):87-105.
    The research in Human Computer Interaction (HCI) has nowadays extended its attention to the study of persuasive technologies. Following this line of research, in this paper we focus on websites and mobile applications in the e-commerce domain. In particular, we take them as an evident example of persuasive technologies. Starting from the hypothesis that there is a strong connection between logical fallacies, i.e., forms of reasoning which are logically invalid but psychologically persuasive, and some common persuasion strategies adopted within (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  12
    Re-Discovering and Re-Creating African American Historical Accounts through Mobile Apps: The Role of Mobile Technology in History Education.LaGarrett J. King, Christina Gardner-McCune, Penelope Vargas & Yerika Jimenez - 2014 - Journal of Social Studies Research 38 (3):173-188.
    This paper describes a case study of a program called WATCH: Workshop for Actively Thinking Computationally and Historically. The focus of the program and this paper was on using mobile application development to promote historical thinking using a plantation site visit as the focus of inquiry. WATCH was delivered during an academic enrichment youth program at a major research university in the Southeast and served a total of 30 African American and Latino high school students from low socio-economic backgrounds. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  39.  8
    User-centered AI-based voice-assistants for safe mobility of older people in urban context.Bokolo Anthony Jnr - forthcoming - AI and Society:1-24.
    Voice-assistants are becoming increasingly popular and can be deployed to offers a low-cost tool that can support and potentially reduce falls, injuries, and accidents faced by older people within the age of 65 and older. But, irrespective of the mobility and walkability challenges faced by the aging population, studies that employed Artificial Intelligence (AI)-based voice-assistants to reduce risks faced by older people when they use public transportation and walk in built environment are scarce. This is because the development of AI-based (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  7
    Artificial Intelligence-Based Human–Computer Interaction Technology Applied in Consumer Behavior Analysis and Experiential Education.Yanmin Li, Ziqi Zhong, Fengrui Zhang & Xinjie Zhao - 2022 - Frontiers in Psychology 13.
    In the course of consumer behavior, it is necessary to study the relationship between the characteristics of psychological activities and the laws of behavior when consumers acquire and use products or services. With the development of the Internet and mobile terminals, electronic commerce has become an important form of consumption for people. In order to conduct experiential education in E-commerce combined with consumer behavior, courses to understand consumer satisfaction. From the perspective of E-commerce companies, this study proposes to use (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  34
    Do only computers scale? On the cognitive and social aspects of scalability.Giuseppe Lugano - 2010 - ENCYCLOPAIDEIA 14 (28):89-110.
    La scalabilità è una proprietà desiderabile di sistemi informatici associata a metriche di performance. Più precisamente, un sistema è definito scalabile quando riesce a gestire, senza calo di prestazioni, un numero crescente di elementi, processi, quantità di lavoro e/o quando può essere espanso a piacimento. Progettare un sistema scalabile garantisce un’ottimizzazione dei costi e delle prestazioni, e della produttività di un’azienda. Questi scopi sono stati perseguiti, dagli anni Ottanta, attraverso numerosi studi sulla scalabilità, che sono stati sviluppati in un ambito (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  17
    Simplified Graphical Domain-Specific Languages as Communication Tools in the Process of Developing Mobile Systems for Reporting Life-Threatening Situations – the Perspective of Technical Persons.Kamil Żyła - 2017 - Studies in Logic, Grammar and Rhetoric 51 (1):39-51.
    Reporting systems based on mobile technologies and feedback from regular citizens are becoming increasingly popular, especially as far as protection of environmental and cultural heritage is concerned. Reporting life-threatening situations, such as sudden natural disasters or traffic accidents, belongs to the same class of problems and could be aided by IT systems of a similar architecture. Designing and developing systems for reporting life-threatening situations is not a trivial task, requiring close cooperation between software developers and experts in different domains, (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  43. Workshop on Mobile and Networking Technologies for Social Applications (MONET)-Architecture and Middleware-MobiSoft: An Agent-Based Middleware for Social-Mobile Applications.Steffen Braun Kern & Wilhelm Rossak - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 984-993.
  44.  7
    Experiment on teaching visually impaired and blind children using a mobile electronic alphabetic braille trainer.Aliya Kintonova, Galimzhan Gabdreshov, Timur Yensebaev, Rizvangul Sadykova, Nurbek Yensebayev, Sultan Kulbasov & Daulet Magzymov - forthcoming - AI and Society:1-16.
    The article considers a pressing problem in the field of inclusive education: creating a comfortable learning environment for the effective education of children with special needs. In this article, a mobile electronic alphabet Braille simulator is an element of the learning environment for children with special needs. The article describes an experiment on teaching visually impaired and blind children using a mobile electronic Braille alphabet simulator. The mobile electronic Braille alphabet trainer, based on new advanced technology, was (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  20
    Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview.Pooja Rana, Isha Batra, Arun Malik, Agbotiname Lucky Imoize, Yongsung Kim, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar & Seungmin Rho - 2022 - Complexity 2022:1-14.
    Cloud computing paradigm is growing rapidly, and it allows users to get services via the Internet as pay-per-use and it is convenient for developing, deploying, and accessing mobile applications. Currently, security is a requisite concern owning to the open and distributed nature of the cloud. Copious amounts of data are responsible for alluring hackers. Thus, developing efficacious IDS is an imperative task. This article analyzed four intrusion detection systems for the detection of attacks. Two standard benchmark datasets, namely, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  3
    Communication consistency, completeness, and complexity of digital ideography in trustworthy mobile extended reality.Kevin B. Clark - 2023 - Behavioral and Brain Sciences 46:e239.
    Communication barriers long-associated with ideographs, including combinatorial grapholinguistic complexity, computational encoding–decoding complexity, and technological rendering and deployment, become trivialized through advancements in interoperable smart mobile digital devices. Such technologies impart unprecedented extended-reality user hazards only mitigated by unprecedented colloquial and bureaucratic societal norms. Digital age norms thus influence natural ideographic language origins and evolution in ways novel to human history.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  8
    Attention Deficit Hyperactivity Disorder Detection – from Psychological Checklists to Mobile Solutions.Kamil Żyła - 2019 - Studies in Logic, Grammar and Rhetoric 60 (1):85-100.
    The notion of Attention Deficit Hyperactivity Disorder (ADHD) may have its origins in 1763, when Scottish physician Sir Arthur Crichton observed people who could be easily distracted to a degree approaching the nature of delirium. Since then, the notion of ADHD matured and aroused controversy concerning whether it is a real illness and the motives behind particular methods of its treatments. Despite the controversy, ADHD is well established as a research subject and a frequently diagnosed disorder. Thus, the aim of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48. Games 2.0 jako próba konstrukcji społeczno-kulturowego perpetuum mobile.Andrzej Klimczuk - 2008 - Homo Communicativus 5:177--187.
    Increase in popularity of games like "Second Life" has contributed not only to significant changes in the development of the electronic entertainment industry. Promoting Games 2.0, the new trend of video game production that are assumed to be the virtual worlds that contain user-generated content makes both measured with a specific technological innovation, as well as a serious change in the organization of socio-cultural heritage. The article presents problems of the existing difficulties of terminology, the implications of the availability of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  7
    On the feasibility of simple brain-computer interface systems for enabling children with severe physical disabilities to explore independent movement.Erica D. Floreani, Danette Rowley, Dion Kelly, Eli Kinney-Lang & Adam Kirton - 2022 - Frontiers in Human Neuroscience 16:1007199.
    IntroductionChildren with severe physical disabilities are denied their fundamental right to move, restricting their development, independence, and participation in life. Brain-computer interfaces (BCIs) could enable children with complex physical needs to access power mobility (PM) devices, which could help them move safely and independently. BCIs have been studied for PM control for adults but remain unexamined in children. In this study, we explored the feasibility of BCI-enabled PM control for children with severe physical disabilities, assessing BCI performance, standard PM skills (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  4
    Adaptive Visually Servoed Tracking Control for Wheeled Mobile Robot with Uncertain Model Parameters in Complex Environment.Fujie Wang, Yi Qin, Fang Guo, Bin Ren & John T. W. Yeow - 2020 - Complexity 2020:1-13.
    This paper investigates the stabilization and trajectory tracking problem of wheeled mobile robot with a ceiling-mounted camera in complex environment. First, an adaptive visual servoing controller is proposed based on the uncalibrated kinematic model due to the complex operation environment. Then, an adaptive controller is derived to provide a solution of uncertain dynamic control for a wheeled mobile robot subject to parametric uncertainties. Furthermore, the proposed controllers can be applied to a more general situation where the parallelism requirement (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 988