A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
We present Koala, a system that enables users to capture, share, automate, and personalize business processes on the web. ...
Koala also takes advantage of corporate and personal data stores to automatically generalize and instantiate userspecific data, so that scripts created by one user are automatically personalized for others ...
CONCLUSION AND FUTURE WORK Koala allows users to capture, share, automate, and personalize business processes on the web. ...
doi:10.1145/1240624.1240767
dblp:conf/chi/LittleLCLHK07
fatcat:n424qg24vfcitplut4efnl5cje
CoScripter
2008
Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems - CHI '08
In response, we have developed the CoScripter system (formerly Koala [ 11]), a collaborative scripting environment for recording, automating, and sharing web-based processes. ...
We present interviews with knowledge workers that reveal a need for mechanisms to automate the execution of and to share knowledge about these processes. ...
Our solution to these problems is CoScripter (formerly Koala [ 11] ), a tool that enables end-users to create and share scripts to perform web-based processes. ...
doi:10.1145/1357054.1357323
dblp:conf/chi/LeshedHML08
fatcat:ywokankhbrhtxgy643im7achc4
Marmite: Towards End-User Programming for the Web
2007
IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2007)
Many information tasks on the web require users to make use of multiple websites, for both content as well as information processing or visualization features. ...
Programmers have created "mashups," which customize or combine the functionality of multiple websites by extracting information from web pages or accessing web services APIs. ...
"Koala: capture, share, automate, personalize business processes on the web." Proc. CHI '07. ACM Press, New York, NY, 2007, pp. 943-946. [3] Yahoo! ...
doi:10.1109/vlhcc.2007.40
dblp:conf/vl/Wong07
fatcat:2wxz62bimrh5vppbq67khpjgla
Help through demonstration and automation for interactive computing systems: A survey of recent works
2021
International Journal of Power Electronics and Drive Systems (IJPEDS)
This paper presents a general survey on recent works (building upon previous surveys) related to improving applications' help through demonstration and automation and, identifies which technologies are ...
The main contributions are, identifying (i) which are the recent existing solutions; (ii) which aspects must be investigated further; and (iii) which are the main difficulties that are preventing a faster ...
The authors would like to thank Rúben Pereira for the given support. ...
doi:10.11591/ijece.v11i2.pp1549-1560
fatcat:jo3xbtsyenamtkckm6mauvhnve
Towards an Acoustic Environmental Observatory
2008
2008 IEEE Fourth International Conference on eScience
Fourth IEEE International Conference on eScience 978-0-7695-3535-7/08 $25.00 ...
However, the volume of data generated by such an observatory would quickly overwhelm even the most fervent scientist using traditional methods. ...
Acknowledgements This work was undertaken by the Microsoft QUT eResearch Centre (www.mquter.qut.edu.au). ...
doi:10.1109/escience.2008.16
dblp:conf/eScience/MasonRTZGG08
fatcat:76sqfk5je5bcvcrr4yjgxoxpye
Stress Fractures of the Tibia after Jogging
2014
Journal of Trauma and Treatment
Based largely on markup meta-languages, such as the Standard General Markup Language (SGML) and the eXtensible Markup Language (XML), these efforts cover a wide range of industries, applications and functions ...
The intention of this paper, however, is to provide a simple survey and quick enumeration of the many, varied efforts from across industry. ...
It captures information about event and "to-do" items that are normally used by applications such as a personal information managers (PIMs) and group schedulers. vCard automates the exchange of personal ...
doi:10.4172/2167-1222.s2-006
fatcat:73kmefkhtreindbb5grlmjlj4i
Points-of-Interest Mining from People's Photo-Taking Behavior
2013
2013 46th Hawaii International Conference on System Sciences
Millions of geo-tagged photos are becoming available due to the widespread of photo-sharing websites. ...
These social medias capture attractive points-of-interest and contain interesting photo-taking patterns. ...
However, the amount of social media data generated daily easily exceeds the capability of human analysis, and it certainly needs an automated process of analyzing data. ...
doi:10.1109/hicss.2013.451
dblp:conf/hicss/LeeCL13a
fatcat:ofoezeq7nresploc3yyb7sotwm
Software Architecture Knowledge Management
2008
Australian Software Engineering Conference : Proceedings
To illustrate this, let us explore three situations that I have personally observed in the last few years. ...
So, what have I learned over the last years? The key lessons for me are twofold. First, software development is a people process first and technological one second. ...
Acknowledgements We are most thankful to the many authors we invited to contribute a chapter within the scope and contents prescribed by us. ...
doi:10.1109/aswec.2008.4483186
fatcat:xwdaitrejvb2fkyx3ymeg6tq6i
Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System
2012
Journal of Digital Forensics, Security and Law
Finally, an evidence tree, which is expected to provide the necessary contextual information to automate the attack tracking and reconstruction process in the future, is built for each attack based on ...
Furthermore, mechanisms should be established to automate the security incident tracking and reconstruction processes. ...
We would also like to thank NSF REU DSU Site student fellows Mikal Ustad and Tom SwiftBird for their contributions to this paper, and Kacie Fodness for her hard work on the grammatical editing. ...
doi:10.15394/jdfsl.2012.1134
fatcat:7rr6vbtlrnbprlovrphlqwd4vy
An Analysis of the Current State of the Consumer Credit Reporting System in China
2020
Proceedings on Privacy Enhancing Technologies
Based on the findings, we discuss the relationship between the CCRS and the SCS including the changes in the power relationships between the government, consumer credit reporting companies and Chinese ...
Then, we study 13 consumer credit reporting companies to examine how they collect and use personal information. ...
Mo Chen thanks for the support through a postdoc research stipend of the Fritz Thyssen Foundation. ...
doi:10.2478/popets-2020-0064
fatcat:kuyb7ct35bfsrigkunggawarj4
GUI testing using computer vision
2010
Proceedings of the 28th international conference on Human factors in computing systems - CHI '10
This paper presents a new approach to GUI testing using computer vision for testers to automate their tasks. ...
By recording both input events and screen images, it is possible to extract the images of components interacted with and the visual feedback seen by the demonstrator, and generate a visual test script ...
Any opinions, findings, conclusions or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the sponsors. ...
doi:10.1145/1753326.1753555
dblp:conf/chi/ChangYM10
fatcat:a6sp5gbgy5fojle53aicyhikty
Exploring patterns of social commonality among file directories at work
2007
Proceedings of the SIGCHI conference on Human factors in computing systems - CHI '07
We removed commonly shared files and focused on specific filetypes that represent user activity to find more meaningful files in common. ...
Mechanisms for addressing the privacy concerns raised by this approach are discussed. ...
ACKNOWLEDGEMENTS We gratefully thank the 15 anonymous users who allowed us to crawl their file directory data and the 13 anonymous LiveWire users who opted in to the Consolidarity analysis. ...
doi:10.1145/1240624.1240769
dblp:conf/chi/TangDSWSL07
fatcat:2po5a44srjbgnetyquhkv7dzvy
Practical Analysis of Big Acoustic Sensor Data for Environmental Monitoring
2014
2014 IEEE Fourth International Conference on Big Data and Cloud Computing
The collection of acoustic sensor data is a solved problem; the current challenge is the management and analysis of raw audio data to produce useful datasets for ecologists. ...
This paper presents the applied research we use to analyze big acoustic datasets. Its core contribution is the presentation of practical large-scale acoustic data analysis methodologies. ...
The authors also acknowledge the resources provided by the Big Data Lab at the School of Electrical Engineering and Computer Science, QUT. ...
doi:10.1109/bdcloud.2014.29
dblp:conf/bdcloud/TruskingerCETR14
fatcat:7xuodxpvbze65duimuakm66lnm
Help, It Looks Confusing: GUI Task Automation Through Demonstration and Follow-up Questions
[article]
2017
arXiv
pre-print
We propose a user-in-the-loop framework that learns to generate scripts of actions performed on visible elements of graphical applications. ...
After the demonstration, the user answers follow-up questions. ...
ACKNOWLEDGMENTS We thank all the volunteers, and all reviewers, who provided helpful comments on previous versions of this paper. ...
arXiv:1611.03906v2
fatcat:66cn5gt64neyhobqzx5hklxiky
Self-awareness of Cloud Applications
[chapter]
2017
Self-Aware Computing Systems
A much shorter, revised version of this material will be available in print, as part of a Springer book on "Self-Aware Computing". The book is due to appear in 2017. ...
In this chapter, we propose a conceptual framework for analyzing state-of-the-art self-awareness approaches used in the context of cloud applications. ...
Acknowledgements This work is partially supported by the Dutch STW/NWO Veni personal grant @large(#11881) and Vidi personal grant MagnaData, by the Dutch national program COM-MIT and COMMissioner sub-project ...
doi:10.1007/978-3-319-47474-8_20
fatcat:ckcxfmjmvvas5bhg7wp5qfmehy
« Previous
Showing results 1 — 15 out of 120 results