Filters








2,165 Hits in 3.6 sec

PerZoovasive

José Rouillard, Mona Laroussi
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
This paper discusses adaptivity and context awareness system as strategies to provide support for learners in mobile pervasive situations.  ...  This paper presents an adaptive pervasive learning environment, based on contextual QR Codes, where information is presented to learner at the appropriate time and place, and according to a particular  ...  This is known as ambient intelligence, ubiquitous and pervasive computing.  ... 
doi:10.1145/1456223.1456332 dblp:conf/wstst/RouillardL08 fatcat:jneeo673yjfxtazihow4zjbmli

GSpace

Giovanni Russello, Naranker Dulay, Michel Chaudron, Maarten van Steen
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
This separation, known as Separation of Concerns principle, helps in generating software artifacts that are more maintainable and reusable.  ...  However, it is possible to achieve another degree of separation by separating from the application logic the different extra-functional concerns (such as availability, performance, and security).  ...  Acknowledgments This research was supported by the UK's EPSRC research grant EP/C537181/1 and forms part of the CareGrid, a collaborative project with the University of Cambridge.  ... 
doi:10.1145/1456223.1456323 dblp:conf/wstst/RusselloDCS08 fatcat:kgemevgczrgfvlojctjoglypea

Fast extraction of gradual association rules

Lisa Di Jorio, Anne Laurent, Maguelonne Teisseire
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
A gradual rule can be read as "The more X and the less Y, then the more V and the less W ".  ...  Instead of using fuzzy sets, we apply our method directly on valued data and we propose an efficient heuristic, thus reducing combinatorial complexity and scalability.  ...  As we use equality, zero values can participate in the frequency computation. However, as we consider them as abscence values, they are thus ignored by the program.  ... 
doi:10.1145/1456223.1456268 dblp:conf/wstst/Di-JorioLT08 fatcat:rr54bkjqxbcyvki5sfe64taxru

Web opinion mining

Ali Harb, Michel Plantié, Gerard Dray, Mathieu Roche, François Trousset, Pascal Poncelet
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
With the growing popularity of the Web 2.0, we are more and more provided with documents expressing opinions on different topics.  ...  Usually they consider that opinions are expressed through adjectives and they extensively use either general dictionaries or experts in order to provide the relevant adjectives.  ...  We count the number of positive adjectives, then the number of negative adjectives, and we simply compute the difference.  ... 
doi:10.1145/1456223.1456269 dblp:conf/wstst/HarbPDRTP08 fatcat:om53w53lrrhlbkze6xqqljwfoy

Recursive data mining for role identification

Vineet Chaoji, Apirak Hoonlor, Boleslaw K. Szymanski
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
An example of such a problem is recognizing roles in a collection of emails from an organization in which middle level managers communicate both with superiors and subordinates.  ...  The challenge here is that the same author may participate in different roles in communications within the group, in each role having different authors as peers.  ...  Identifying the leaders and followers in such informal groups is of great value for social sciences, network science and security.  ... 
doi:10.1145/1456223.1456270 dblp:conf/wstst/ChaojiHS08 fatcat:cyzcykj2yjblln5yx7rkxcnsn4

Towards a first ontology for customer relationship management

Diego Magro, Anna Goy
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
The paper discusses in details the axiomatization for the sale and customer relationship concepts, as well as for the corresponding business knowledge items (i.e., sale and customer records).  ...  More precisely, the paper presents O-CREAM, a CRM ontology based on DOLCE and on two DOLCE-based modules, DnS (exploited for modeling roles and for handling reification) and OIO (exploited for modeling  ...  In the last twenty years ontologies have gained popularity in computer science as a means for improving the interaction between computational systems, between humans and computational systems, and also  ... 
doi:10.1145/1456223.1456352 dblp:conf/wstst/MagroG08 fatcat:dn62cbhd75d7nbmievtgws2rp4

Counter-ant algorithm for evolving multirobot collaboration

Abdelhak Chatty, Ilhem Kallel, Adel M. Alimi
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
In practical terms, the subdivision of the cleaning space is achieved in emergent and evolving way. A series of simulations show the usefulness of our algorithm for adaptive and cooperative cleanup.  ...  In order to test the performance of our CAA, we implement, simulate and test our algorithm in a generic multirobot environment.  ...  Most of these problems can be found in the engineering field, computer science and robotics, among others.  ... 
doi:10.1145/1456223.1456245 dblp:conf/wstst/ChattyKA08 fatcat:tswbsgfwtvcdtl22jq55apbvju

Automatic 3D skull reconstruction using invariant features

Lucia Ballerini, Marcello Calisti, Sergio Damas, Oscar Cordón, José Santamaría
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
Points belonging to such features are used as the input to improve an evolutionary approach to 3D range image registration in forensic anthropology.  ...  Our reconstruction method includes a pre-alignment stage, that uses a subset of feature points, and a refinement stage. Results are presented over a set of instances of real problems.  ...  The proposed method is fully automatic, easy to implement and fast from the computational point of view. Our method does not need any mesh information.  ... 
doi:10.1145/1456223.1456314 dblp:conf/wstst/BalleriniCDCS08 fatcat:7trcguwcwvhpdo5qahaueoq7k4

A face-house paradigm for architectural scene analysis

Stephan K. Chalup, Kenny Hong, Michael J. Ostwald
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
In the computer experiments the system was trained using a specifically composed image data base consisting of human faces and smileys.  ...  The experiments show how facial expression pattern associated with emotional states such as surprise, fear, happiness, sadness, anger, disgust, contempt or neutral could be recognised in both image data  ...  The presented pilot results are part of an ongoing interdisciplinary study between architecture and computer science.  ... 
doi:10.1145/1456223.1456304 dblp:conf/wstst/ChalupHO08 fatcat:mz363rsoyzau3psokxs5vbf7vm

Distributed real time neural networks in interactive complex systems

Lagarde Matthieu, Andry Pierre, Gaussier Philippe
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
We present as an illustration two control architectures: the first one allowing a mobile robot to navigate using on-line learning of visual places, and the second one allowing a robotic head to learn to  ...  In this paper, we present two graphical softwares which help the modeling and the simulation of real time, distributed neural networks (NNs).  ...  Since their creation, the Leto and Promethe projects have enormously evolved, following the different technologies of computer science and, in particular, the field of real-time distributed computation  ... 
doi:10.1145/1456223.1456247 dblp:conf/wstst/MatthieuPP08 fatcat:3on7fa4wmrd2bjsimr2n3o3mlu

Service diffusion in the market considering consumers' subjective value

Kousuke Fujita, Takeshi Takenaka, Kanji Ueda
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
Results of the survey elucidate the relation between the usage of information technologies and other consumer attributes.  ...  With increasing networking and market globalization, it is becoming increasingly difficult to understand how social valuations of products or services emerge based on the interaction of consumers' value  ...  As described in this paper, we particularly examine the relation between the usage of information technologies (the internet on PC and cell phone services) and other attributes (daily behaviors and personalities  ... 
doi:10.1145/1456223.1456262 dblp:conf/wstst/FujitaTU08 fatcat:ta6fmcryezeldd5cgrwv5l23vy

Dynamic optimization of Bluetooth networks for indoor localization

Markus Jevring, Robert de Groote, Cristian Hesselman
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
As these networks grow in size and complexity, their management becomes increasingly costly, for instance in terms of equipment, software, and people.  ...  Ubiquitous computing environments typically contain a large number and a large variety of networked sensors that are often embedded in the environment.  ...  Traditionally such management has been carried out by humans, but as the sizes of ubiquitous computing networks grow, coupled with the fact that the sensors get smaller and smaller, and can be deployed  ... 
doi:10.1145/1456223.1456357 dblp:conf/wstst/JevringGH08 fatcat:ilq6kql4ingd3auzyo5xpiqd5e

A novel particle swarm optimization for multiple campaigns assignment problem

Satchidananda Dehuri, Sung-Bae Cho
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
It is treated as a very challenging problem in marketing. In personalized marketing it is very important to optimize the customer satisfaction and targeting efficiency.  ...  We measure the effectiveness of the propose method with two other methods know as Random and Independent using randomly created customer-campaign preference matrix.  ...  ACKNOWLEDGEMENT The authors would like to thank Department of Science and Technology, Govt. of India for financial support under the BOYSCAST fellowship 2007-2008 and the financial support of Brain Korea  ... 
doi:10.1145/1456223.1456290 dblp:conf/wstst/DehuriC08 fatcat:eod5yws6jnhnfai7b2rxdafhju

High scale video mining with forests of fuzzy decision trees

Christophe Marsala, Marcin Detyniecki
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
We focus on the use of such a FFDT in a high scale video mining application and highlight the main advantages of using fuzzy set theory in such a process.  ...  , Zadeh, and Lukasiewicz), is around 7350 seconds on a multiprocessor computer (10 core 2.93 Ghz, 64 Go RAM, with GNU/Linux 2.6).  ...  For features such as "animal" (26), "computer TV screen" (27) or "maps" (38), FFDT obtain good results (in the first half of all the approaches that participated to the challenge).  ... 
doi:10.1145/1456223.1456308 dblp:conf/wstst/MarsalaD08 fatcat:x2wn3ujurvcg7cbg34zhpdcosy

Extending web applications with a lightweight zero knowledge proof authentication

Sławomir Grzonkowski, Wojciech Zaremba, Maciej Zaremba, Bill McDaniel
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
We suggest that most of the computations should be carried out by the user's web browser without revealing password or login at any point in time; instead generated random isomorphic graphs and permutation  ...  The proposed mechanism allows for authentication with varying confidence and security levels.  ...  The computations tend to be slow and inaccurate because of round-off error.  ... 
doi:10.1145/1456223.1456241 dblp:conf/wstst/GrzonkowskiZZM08 fatcat:l44z6a3idzhr7nigy4pmzbnxnm
« Previous Showing results 1 — 15 out of 2,165 results