106,247 Hits in 4.3 sec

Requirements-Driven Log Analysis (Extended Abstract) [chapter]

Klaus Havelund
2012 Lecture Notes in Computer Science  
A single person might be assigned to perform such log analysis, compared to the entire testing team changing behavior.  ...  A log is a sequence of events, generated by special log recording statements, most often manually inserted in the code by the programmers.  ...  Requirements Engineering and Logging We shall furthermore discuss the possibility of relating requirements engineering to logging, and thereby log analysis.  ... 
doi:10.1007/978-3-642-34691-0_1 fatcat:6wwfnshedrf3hgb3vyw5go67l4

Nondeterministic Communication Complexity of Random Boolean Functions (Extended Abstract) [chapter]

Mozhgan Pourmoradnasseri, Dirk Oliver Theis
2017 Lecture Notes in Computer Science  
The size of the largest monochromatic rectangle is of interest in the analysis of gene expression data [27] , and formal concept analysis [5] .  ...  For the proof of (a), we say that a 1-rectangle is bulky, if it extends over at least 2 rows and also over at least 2 columns.  ... 
doi:10.1007/978-3-319-55911-7_38 fatcat:4jjhufuyn5fpfntu5mddte5nva

Extended Abstract of Performance Analysis and Prediction of Model Transformation

Vijayshree Vijayshree, Markus Frank, Steffen Becker
2020 Zenodo  
Becker [1] made analysis performance and prediction, by generating prototypes from models, which in turn generate code skeleton or require detailed models for the prototype.  ...  System Memory management Monitoring Records Monitoring DB QVTo Engine QVTo Rules Predictive Analysis Prediction Profiler Execution time (in sec) Memory Requirements (in KBs)  ... 
doi:10.5281/zenodo.3757286 fatcat:t4emhhwyijhxvdxp7j7o4bierm

Human Values and Digital Patterns in Physical Exercise (Extended Abstract)

Yelena Mejova, Kyriaki Kalimeri
2020 Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence  
In this study, we present a unique demographically representative dataset of 15k US residents that combines technology use logs with surveys on moral views, human values, and emotional contagion.  ...  The authors thank Wyscout for supplying the event stream data used in this extended abstract.  ...  This extended abstract of our KDD'19 paper [Decroos et al., 2019] describes our data-driven framework for valuing actions in a soccer game.  ... 
doi:10.24963/ijcai.2020/648 dblp:conf/ijcai/DecroosBHD20 fatcat:xheno7i7irfpde4msvjah22ydm

Extending the Abstraction of Personality Types based on MBTI with Machine Learning and Natural Language Processing [article]

Carlos Basto
2021 arXiv   pre-print
about how people perceive the world and make decisions) through systematic enrichment of text representation, based on the domain of the area, under the generation of features based on three types of analysis  ...  In addition, the study demonstrated a broad spectrum for the evolution and deepening of the task and possible approaches for a greater extension of the abstraction of personality types.  ...  ENDLOOP EXP. 1 REQUIRES: sentiment analysis and corresponding feature engineering.  ... 
arXiv:2105.11798v1 fatcat:c4gubf4crbe5xb4sxl7vjrexsu

Hierarchical Reinforcement Learning for Pedagogical Policy Induction (Extended Abstract)

Guojing Zhou, Hamoon Azizsoltani, Markel Sanz Ausin, Tiffany Barnes, Min Chi
2020 Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence  
In recent years, there is growing interest in applying data-driven techniques for adaptive decision making that can dynamically tailor students' learning experiences.  ...  Most existing data-driven approaches, however, treat these pedagogical decisions equally, or independently, disregarding the long-term impact that tutor decisions may have across these two levels of granularity  ...  Ablation Analysis.  ... 
doi:10.24963/ijcai.2020/639 dblp:conf/ijcai/WangLCJYWLM20 fatcat:pg62wevc2vbnji33s4kmhhy7cu

Sensor based extended floating bicycle data (xFBD) analysis

Jukka M. Krisp, Maja Kalinic, Christian Röger, Andreas Keler
2021 Abstracts of the International Cartographic Association  
In the analysis, we follow a data driven approach classifying the detected values into fuzzy membership functions.  ...  For logging sensor data, we use a micro SD reader/writer. All the utilized sensors are stored in a shock-and waterproof box.  ... 
doi:10.5194/ica-abs-3-164-2021 fatcat:jzm56jkjeffelb5pvxsmj2rmh4

Leveraging intersections in management theory and practice (Extended Abstracts)

2021 Sinergie Italian Journal of Management  
applied to the Italian context MARCO BETTIOL, MAURO CAPESTRO, ELEONORA DI MARIA, STEFANO MICELLI " Recognizing opportunities during the crisis: a longitudinal analysis of Italian SMEs during Covid-19  ...  SANTINI " Ethnic diversity, recombinant capabilities and the generation of green technologies ALBA MARINO, FRANCESCO QUATRARO " Exploring the innovation paths of SMEs to face the COVID-19 crisis: A cluster analysis  ...  ., SRIVASTAVA R.K. ( 2020 2006 ), "A meta-analysis of the Technology Acceptance Model", Information & Management, vol. 43, n. 6, pp. 740-755.  ... 
doi:10.7433/srecp.ea.2021.01 fatcat:l2upsdqpqvc3zgahty45hquici

Understanding Crowdsourcing Requesters' Wage Setting Behaviors

Kotaro Hara, Yudai Tanaka
2022 CHI Conference on Human Factors in Computing Systems Extended Abstracts  
Our analysis with Bayesian growth curve modeling suggests that the estimated wage derived from the participant-set reward  ...  An exploratory data analysis of hourly wage data with a Mauchly's test suggested that the data violated the sphericity assumption (W=0.85, p=.0097) and using ANOVA for analysis is inappropriatea method  ...  mean = exp (µ + σ 2 )/2 and median = exp (µ) for log-normal data  ... 
doi:10.1145/3491101.3519660 fatcat:ji6b2s376far3h6f7jb4su7kya

Monte Carlo Inversion of SkyTEM AEM data from Lake Thetis, Western Australia

Ross Brodie, James Reid
2013 ASEG Extended Abstracts  
It tends to favour models with the fewest number of layers that allow the data to be fitted, in essence providing a data-driven Occam's Razor.  ...  Layer Conductivity ( Table 1 Layered conductivity model derived from a borehole conductivity log at Lake Thetis.  ... 
doi:10.1071/aseg2013ab224 fatcat:cjvwlskthrb73ejzlk2scmi52a

Context Vectors Are Reflections of Word Vectors in Half the Dimensions (Extended Abstract)

Zhenisbek Assylbekov, Rustem Takhanov
2020 Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence  
This paper takes a step towards the theoretical analysis of the relationship between word embeddings and context embeddings in models such as word2vec.  ...  Acknowledgements This work was supported by the Innovation Fund Denmark through the Danish Center for Big Data Analytics Driven Innovation (DABAI).  ...  In this extended abstract summarizing the work by [Krause et al., 2020], we will put an emphasis on experimental results, showcasing the advantages of the different algorithms.  ... 
doi:10.24963/ijcai.2020/704 dblp:conf/ijcai/KrauseFI20 fatcat:ddwu63qgyrek5cxbvzp33iwccq

Supporting Shy & Neurodivergent Children in Social Play

Flannery Hope Currin
2022 CHI Conference on Human Factors in Computing Systems Extended Abstracts  
because inhibitory control (the ability to stop impulsive, inappropriate responses) is often a focus of EF training interventions, shy children who need support to initiate appropriate responses may require  ...  Through this large-scale deployment, usage logs, and optional user surveys and bug reports, I plan to iteratively improve the design of StoryCarnival and eventually assess the impact of regular use of  ... 
doi:10.1145/3491101.3503800 fatcat:belpdwniabajne6bhgw5nchgei

The Emotional Impact of Multi-Factor Authentication for University Students

Davis Arnold, Benjamin Blackmon, Brendan Gibson, Anthony G Moncivais, Garrett B Powell, Megan Skeen, Michael Kelland Thorson, Nathan B Wade
2022 CHI Conference on Human Factors in Computing Systems Extended Abstracts  
We hypothesize these responses are tied to the emotional impact of using required MFA for critical tasks.  ...  Our findings indicate that, due to the time sensitive nature of many tasks that required MFA, university students are likely to experience strong negative emotions towards MFA that drastically lower their  ...  Many password meters provide bad advice because they are not data-driven [13] .  ... 
doi:10.1145/3491101.3516809 fatcat:z3xc2msbevah7oabwy7ik6lune

Beyond Meditation: Everyday Mindfulness and Technology Use

Jingjin Li, Gilly Leshed
2022 CHI Conference on Human Factors in Computing Systems Extended Abstracts  
Transcripts were then imported into Atlas.ti 1 , a qualitative data analysis 1 software.  ...  One participant used Google Sheets to record events, emotions, and mindfulness practice in her daily life, then used calculations to find relationships between her practice and emotions: "I try to log  ... 
doi:10.1145/3491101.3519820 fatcat:y7aemmq7enfgfdkaumsvybhkzq

Categorizing Open Government Data Users by Exploring their Challenges and Proficiency

Fanghui Xiao, Khushboo Thaker, Daqing He
2022 CHI Conference on Human Factors in Computing Systems Extended Abstracts  
Open coding-based content analysis and k-means clustering were performed on posts of an online community managed by a U.S. local-level OGD portal, where users' characteristics such as purposes, challenges  ...  Additionally, there are studies using a transaction log analysis to study OGD user behaviors patterns, characteristics of issued queries, and data needs [17, 31] .  ...  Manual analysis of the post content in this group disclosed that the answers provided by the users regarded the sources (locations) of data, which require CDDK proficiency.  ... 
doi:10.1145/3491101.3519689 fatcat:yy333e45lrhphj74onil4raq6e
« Previous Showing results 1 — 15 out of 106,247 results