150,232 results
Search Results
2. Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models
- Author
-
David Gerault
- Subjects
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Bounding overwatch ,Computer science ,Short paper ,Terrorism ,Rfid authentication ,Key (cryptography) ,ComputingMilieux_COMPUTERSANDSOCIETY ,Adversary ,Gas meter prover ,Computer security ,computer.software_genre ,computer - Abstract
Terrorist fraud is an attack against distance bounding protocols, whereby a malicious prover allows an adversary to authenticate on their behalf without revealing their secret key. In this paper, we propose new attack strategies that lead to successful terrorist frauds on proven-secure protocols.
- Published
- 2021
3. Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption
- Author
-
L. Jean Camp, Sanchari Das, and Andrew Kim
- Subjects
Authentication ,Knowledge management ,Work (electrical) ,business.industry ,Computer science ,Short paper ,Control (management) ,Organizational security ,Survey data collection ,Multi-factor authentication ,business ,Security awareness - Abstract
Multi-factor authentication (MFA) is a useful measure for strengthening authentication. Despite its security effectiveness, the adoption of MFA tools remains low. To create more human-centric authentication solutions, we designed and evaluated the efficacy of a risk-reduction-based incentivization model and implemented our proposed model in a large-scale organization with more than 92, 025 employees, and collected survey data from 287 participants and interviewed 41 participants. We observed negative perceptions and degraded understandings of MFA technology due to the absence of proper risk and benefit communication in the control group. Meanwhile, the experimental group employees showed positive perceptions of MFA use for their work and personal accounts. Our analysis and implementation strategy are critical for reducing users’ risks, creating positive security tool usage experiences, and motivating users to enhance their security practices.
- Published
- 2021
4. Gnome Desktop Management by Voice
- Author
-
Corpas, Alberto, Cámara, Mario, Pérez, Guillermo, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Cipolla Ficarra, Francisco V., editor, de Castro Lozano, Carlos, editor, Pérez Jiménez, Mauricio, editor, Nicol, Emma, editor, Kratky, Andreas, editor, and Cipolla-Ficarra, Miguel, editor
- Published
- 2011
- Full Text
- View/download PDF
5. Computer Science Teachers’ In-service Training Needs and Their Technological Pedagogical Content Knowledge
- Author
-
Doukakis, Spyros, Koilias, Christos, Adamopoulos, Nikos, Giannopoulou, Panagiota, Lytras, Miltiadis D., editor, Ruan, Da, editor, Tennyson, Robert D., editor, Ordonez De Pablos, Patricia, editor, García Peñalvo, Francisco José, editor, and Rusu, Lazar, editor
- Published
- 2013
- Full Text
- View/download PDF
6. Immersive Painting
- Author
-
Soutschek, Stefan, Hoenig, Florian, Maier, Andreas, Steidl, Stefan, Stuermer, Michael, Erzigkeit, Hellmut, Hornegger, Joachim, Kornhuber, Johannes, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Huang, Fay, editor, and Wang, Reen-Cheng, editor
- Published
- 2010
- Full Text
- View/download PDF
7. Status of HCI and Usability Research in Indian Educational Institutions
- Author
-
Yammiyavar, Pradeep, Katre, Dinesh, editor, Orngreen, Rikke, editor, Yammiyavar, Pradeep, editor, and Clemmensen, Torkil, editor
- Published
- 2010
- Full Text
- View/download PDF
8. Tool or Science? The History of Computing at the Norwegian University of Science and Technology
- Author
-
Nordal, Ola, Impagliazzo, John, editor, Järvi, Timo, editor, and Paju, Petri, editor
- Published
- 2009
- Full Text
- View/download PDF
9. New Technologies of the Information and Communication: Analysis of the Constructors and Destructors of the European Educational System
- Author
-
Ficarra, Francisco V. Cipolla, Ficarra, Valeria M., Ficarra, Miguel Cipolla, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Cipolla-Ficarra, Francisco, editor, Veltman, Kim, editor, Verber, Domen, editor, Cipolla-Ficarra, Miguel, editor, and Kammüller, Florian, editor
- Published
- 2012
- Full Text
- View/download PDF
10. Formalisms in Software Engineering: Myths Versus Empirical Facts
- Author
-
Rombach, Dieter, Seelisch, Frank, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Meyer, Bertrand, editor, Nawrocki, Jerzy R., editor, and Walter, Bartosz, editor
- Published
- 2008
- Full Text
- View/download PDF
11. Novosibirsk Young Programmers’ School: A Way to Success and Future Development
- Author
-
Marchuk, Alexander Gurievich, Tikhonova, Tatyana Ivanovna, Gorodnyaya, Lidiya Vasilyevna, Impagliazzo, John, editor, and Proydakov, Eduard, editor
- Published
- 2011
- Full Text
- View/download PDF
12. Database Theory for Users Unexpert: A Strategy for Learning Computer Science and Information Technology
- Author
-
Cipolla Ficarra, Francisco V., Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Cipolla Ficarra, Francisco V., editor, de Castro Lozano, Carlos, editor, Pérez Jiménez, Mauricio, editor, Nicol, Emma, editor, Kratky, Andreas, editor, and Cipolla-Ficarra, Miguel, editor
- Published
- 2011
- Full Text
- View/download PDF
13. Advances in New Technologies, Interactive Interfaces and Communicability: Design, E-Commerce, E-Learning, E-Health, E-Tourism, Web 2.0 and Web 3.0
- Author
-
Cipolla Ficarra, Francisco V., Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Cipolla Ficarra, Francisco V., editor, de Castro Lozano, Carlos, editor, Pérez Jiménez, Mauricio, editor, Nicol, Emma, editor, Kratky, Andreas, editor, and Cipolla-Ficarra, Miguel, editor
- Published
- 2011
- Full Text
- View/download PDF
14. Strategies for a Creative Future with Computer Science, Quality Design and Communicability
- Author
-
Cipolla Ficarra, Francisco V., Villarreal, Maria, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Cipolla Ficarra, Francisco V., editor, de Castro Lozano, Carlos, editor, Nicol, Emma, editor, Kratky, Andreas, editor, and Cipolla-Ficarra, Miguel, editor
- Published
- 2011
- Full Text
- View/download PDF
15. Hostile Blockchain Takeovers (Short Paper)
- Author
-
Joseph Bonneau
- Subjects
Blockchain ,Computer science ,Process (engineering) ,05 social sciences ,Short paper ,Face (sociological concept) ,02 engineering and technology ,Adversary ,Computer security ,computer.software_genre ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,computer ,Protocol (object-oriented programming) ,050203 business & management - Abstract
Most research modelling Bitcoin-style decentralised consensus protocols has assumed profit-motivated participants. Complementary to this analysis, we revisit the notion of attackers with an extrinsic motivation to disrupt the consensus process (Goldfinger attacks). We outline several routes for obtaining a majority of decision-making power in the consensus protocol (a hostile takeover). Our analysis suggests several fundamental differences between proof-of-work and proof-of-stake systems in the face of such an adversary.
- Published
- 2019
16. Estimating Profitability of Alternative Cryptocurrencies (Short Paper)
- Author
-
Danny Yuxing Huang, Kirill Levchenko, and Alex C. Snoeren
- Subjects
Market capitalization ,Cryptocurrency ,Opportunity cost ,Computer science ,Financial economics ,Short paper ,020206 networking & telecommunications ,02 engineering and technology ,Work (electrical) ,Digital currency ,0202 electrical engineering, electronic engineering, information engineering ,Liberian dollar ,020201 artificial intelligence & image processing ,Profitability index - Abstract
Digital currencies have flourished in recent years, buoyed by the tremendous success of Bitcoin. These blockchain-based currencies, called altcoins, are associated with a few thousand to millions of dollars of market capitalization. Altcoins have attracted enthusiasts who enter the market by mining or buying them, but the risks and rewards could potentially be significant, especially when the market is volatile. In this work, we estimate the potential profitability of mining and speculating 18 altcoins using real-world blockchain and trade data. Using opportunity cost as a metric, we estimate the mining cost for an altcoin with respect to a more popular but stable coin. For every dollar invested in mining or buying a coin, we compute the potential returns under various conditions, such as time of market entry and hold positions. While some coins offer the potential for spectacular returns, many follow a simple bubble-and-crash scenario, which highlights the extreme risks—and potential gains—in altcoin markets.
- Published
- 2018
17. Attacks Against GSMA’s M2M Remote Provisioning (Short Paper)
- Author
-
Ben Smyth, Elizabeth A. Quaglia, and Maxime Meyer
- Subjects
Subscriber identity module ,021110 strategic, defence & security studies ,Service (systems architecture) ,business.industry ,Computer science ,Short paper ,0211 other engineering and technologies ,020207 software engineering ,Provisioning ,02 engineering and technology ,Adversary ,law.invention ,law ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,Architecture ,business ,Computer network - Abstract
GSMA is developing and standardizing specifications for embedded SIM cards with remote provisioning, called eUICCs, which are expected to revolutionize the cellular network subscription model. We study GSMA’s “Remote Provisioning Architecture for Embedded UICC” specification, which focuses on M2M devices, and we analyze the security of remote provisioning. Our analysis reveals weaknesses in the specification that would result in eUICCs being vulnerable to attacks: we demonstrate how a network adversary can exhaust an eUICC’s memory, and we identify three classes of attacks by malicious insiders that prevent service. We disclosed our findings to GSMA; GSMA confirmed the validity of these attacks and acknowledged their potential to disrupt the cellular industry. We propose fixes, which GSMA is incorporating into its specification. Thus, we improve security of next generation telecommunication networks.
- Published
- 2018
18. Short Paper: Ballot Secrecy for Liquid Democracy
- Author
-
Nan Yang, Jeremy Clark, and Mahdi Nejadgholi
- Subjects
Ballot ,Secret ballot ,Delegate ,Computer science ,Presumption ,media_common.quotation_subject ,Secrecy ,Direct democracy ,Voter fatigue ,Democracy ,Law and economics ,media_common - Abstract
Certain advances in election technology, such as online voting, promise to reduce the administrative overhead of running an election. This has breathed new life into the idea of direct democracy, where voters play a more active role in setting legislation. However it is anticipated that a steady stream of referendums would generate voter fatigue. To combat this fatigue, voters could be allowed to delegate their votes to other (more knowledgeable) voters. This idea is old but has been recently reinvented under the name liquid democracy. In this paper, we consider how ballot secrecy should be defined for liquid democracy. We first show that a natural definition of full secrecy leads to several undesirable outcomes. We then show that these are very difficult to address without enabling voter coercion and vote buying. The purpose of the paper is not to affirm liquid democracy; rather, it is to raise awareness of unseen complexity hiding under our initial presumption that liquid democracy could effortlessly support a secret ballot.
- Published
- 2021
19. Geometric Figures on Grid Paper
- Author
-
Heinz Klaus Strick
- Subjects
Discrete mathematics ,Computer science ,Grid - Abstract
In this chapter, we will first deal with rectangles on grid paper, which we will then modify step-by-step. Then we are going to explore an easy way of calculating the area of figures whose vertices lie on grid points.
- Published
- 2021
20. Are Payment Card Contracts Unfair? (Short Paper)
- Author
-
Steven J. Murdoch, Ingolf Becker, Ross Anderson, M. Angela Sasse, N Bohm, Gianluca Stringhini, Alice Hutchings, and Ruba Abu-Salma
- Subjects
060201 languages & linguistics ,Card security code ,Computer science ,business.industry ,Short paper ,Internet privacy ,Usability ,06 humanities and the arts ,02 engineering and technology ,Directive ,Test (assessment) ,Payment card ,0602 languages and literature ,0202 electrical engineering, electronic engineering, information engineering ,Strong authentication ,020201 artificial intelligence & image processing ,Payment service provider ,business - Abstract
Fraud victims are often refused a refund by their bank on the grounds that they failed to comply with their bank’s terms and conditions about PIN safety. We, therefore, conducted a survey of how many PINs people have, and how they manage them. We found that while only a third of PINs are ever changed, almost half of bank customers write at least one PIN down. We also found bank conditions that are too vague to test, or even contradictory on whether PINs could be shared across cards. Yet, some hazardous practices are not forbidden by many banks: of the 22.9% who re-use PINs across devices, half also use their bank PINs on their mobile phones. We conclude that many bank contracts fail a simple test of reasonableness, and ‘strong authentication’, as required by the Payment Services Directive II, should include usability testing.
- Published
- 2017
21. Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper)
- Author
-
David J. Pym, Christos Ioannidis, and Tristan Caulfield
- Subjects
Discrete choice ,Computer science ,business.industry ,05 social sciences ,Short paper ,Usability ,Technological evolution ,02 engineering and technology ,Encryption ,Social relation ,Lead (geology) ,Work (electrical) ,Risk analysis (engineering) ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,050211 marketing ,020201 artificial intelligence & image processing ,business - Abstract
We introduce a model for examining the factors that lead to the adoption of new encryption technologies. Building on the work of Brock and Durlauf, the model describes how agents make choices, in the presence of social interaction, between competing technologies given their relative cost, functionality, and usability. We apply the model to examples about the adoption of encryption in communication (email and messaging) and storage technologies (self-encrypting drives) and also consider our model’s predictions for the evolution of technology adoption over time.
- Published
- 2017
22. Short Paper: Debt Representation in UTXO Blockchains
- Author
-
Michael Chiu and Uros Kalabic
- Subjects
Flexibility (engineering) ,Microeconomics ,Transparency (market) ,Loan ,Computer science ,Debt ,media_common.quotation_subject ,Aggregate (data warehouse) ,Scalability ,Reverse mortgage ,Representation (mathematics) ,media_common - Abstract
We provide a UTXO model of blockchain transactions that is able to represent both credit and debt on the same blockchain. Ordinarily, the UTXO model is solely used to represent credit and the representation of credit and debit together is achieved using the account model because of its support for balances. However, the UTXO model provides superior privacy, safety, and scalability when compared to the account model. In this work, we introduce a UTXO model that has the flexibility of balances with the usual benefits of the UTXO model. This model extends the conventional UTXO model, which represents credits as unmatched outputs, by representing debts as unmatched inputs. We apply our model to solving the problem of transparency in reverse mortgage markets, in which some transparency is necessary for a healthy market but complete transparency leads to adverse outcomes. Here the pseudonymous properties of the UTXO model protect the privacy of loan recipients while still allowing an aggregate view of the loan market. We present a prototype of our implementation in Tendermint and discuss the design and its benefits.
- Published
- 2021
23. How to Review a Clinical Research Paper?
- Author
-
Volker Musahl, Neel Patel, Marco Yeung, and Kanto Nagai
- Subjects
Clinical Practice ,Section (archaeology) ,Computer science ,media_common.quotation_subject ,Medical school ,Engineering ethics ,Review process ,Quality (business) ,media_common - Abstract
Critical evaluation of each section of a paper is needed in order to properly assess the purpose and quality of the paper and to understand the degree to which the results can influence clinical practice. Reviewing a paper is a skill that is best honed by practice, but there is no real formal training during medical school or residency on what to evaluate during a review and what the review process involves for a journal. Thus, this chapter will highlight the major points to review in each section of a paper and will provide a guide for young investigators to use while interpreting the findings of a paper. Additionally, the components of a review submission to a journal will be outlined.
- Published
- 2019
24. An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature
- Author
-
Pramote Kuacharoen, Puchong Subpratatsavee, Kasetsart University (KU), National Institute of Development Administration |Bangkok] (NIDA), Khalid Saeed, Václav Snášel, and TC 8
- Subjects
Government ,Authentication ,Computer science ,business.industry ,[SHS.INFO]Humanities and Social Sciences/Library and information sciences ,Paper based ,Computer security ,computer.software_genre ,Barcode ,law.invention ,Software ,Digital signature ,paper-based document ,digital signature ,law ,Loan ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,authentication ,[INFO]Computer Science [cs] ,HC2D barcode ,Communication source ,business ,computer - Abstract
Part 8: Pattern Recognition and Image Processing; International audience; Paper-based documents are important and still widely used in government agencies and private entities as some documents cannot be replaced by electronic documents. These include loan agreements, dispatch or contracts, household registrations and passports. They must be paper-based. Paper-based documents can be easily forged with a printer and a scanner, and imaging software can easily edit them. This paper presents a paper-based document authentication by applying a digital signature and HC2D barcode to verify the integrity of the text message and the sender of the document. This is useful both for a quick inspection of documents with large quantities and monitoring that may help prevent fraud and forgery which may have occurred.
- Published
- 2014
25. Item Differential in Computer Based and Paper Based Versions of a High Stakes Tertiary Entrance Test: Diagrams and the Problem of Annotation
- Author
-
Brad Jackel
- Subjects
Diagrammatic reasoning ,Annotation ,Multimedia ,business.industry ,Computer science ,Computer based ,Standardized test ,Paper based ,Artificial intelligence ,business ,computer.software_genre ,computer ,Natural language processing - Abstract
This paper presents the results from a tertiary entrance test that was delivered to two groups of candidates, one as a paper based test and the other as a computer based test. Item level differential reveals a pattern that appears related to item type: questions based on diagrammatic stimulus show a pattern of increased difficulty when delivered on computer. Differential in performance was not present in other sections of the test and it would appear unlikely to be explained by demographic differences between the groups. It is suggested this differential is due to the inability of the candidates to freely annotate on the stimulus when delivered on computer screen. More work needs to be done on considering the role of annotation as a problem solving strategy in high-stakes testing, in particular with certain kinds of stimulus, such as diagrams.
- Published
- 2014
26. A Short Paper on the Incentives to Share Private Information for Population Estimates
- Author
-
Jens Grossklags, Patrick Loiseau, and Michela Chessa
- Subjects
Population estimate ,Incentive ,Analytics ,business.industry ,Computer science ,Internet privacy ,Short paper ,Data analysis ,business ,Computer security ,computer.software_genre ,Private information retrieval ,computer - Abstract
Consumers are often willing to contribute their personal data for analytics projects that may create new insights into societal problems. However, consumers also have justified privacy concerns about the release of their data.
- Published
- 2015
27. Paper Wrapping, Based on Knowledge about Face Connectivity among Paper Fragments
- Author
-
Toyohide Watanabe and Kenta Matsushima
- Subjects
Paper sheet ,Tree (data structure) ,Creative work ,Human–computer interaction ,Interface (Java) ,business.industry ,Computer science ,Process (engineering) ,Face (geometry) ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Construct (python library) ,Artificial intelligence ,business - Abstract
The purpose of paper wrapping is to protect goods from external shocks, decorate goods beautifully, carry out materials/goods safely, etc. Also, the paper wrapping is intelligent and creative work. The knowledge about paper wrapping is dependent on the features of target-objects, paper sheets and wrapping purposes. This article addresses a method to design the wrapping process. We introduce the knowledge about paper wrapping and then construct a stage tree, which represents various kinds of wrapping means successfully. We propose a framework for designing the wrapping process appropriate to target-objects, and also describe an interactive support interface in the wrapping process.
- Published
- 2013
28. Integration of Optimization to the Design of Pulp and Paper Production Processes
- Author
-
Mika Strömman, Ilkka Seilonen, Kari Koskinen, and Jukka Peltola
- Subjects
Conceptual design ,Computer science ,Business process ,Design activities ,Pulp (paper) ,engineering ,Paper production ,Design process ,Interview study ,engineering.material ,Engineering design process ,Manufacturing engineering - Abstract
Adopting new methodology in a design process requires changes in organization, business process, roles, knowledge, data transfer and tools. The influence of the new methodology has to be evaluated and the costs of changes calculated before the change is possible. In pulp and paper industry the non-growing market situation has tightened the competition that much that cutting the design costs by integrating design activities is not going to be enough. The design itself has to be improved. In this paper, an optimization method is integrated to an existing design process of pulp and paper facilities. The model of a new design process is then assessed through a case study and an interview study to ensure that the design process can be realized in the conceptual design phase of a real delivery project.
- Published
- 2013
29. How to Write a Clinical Paper
- Author
-
Brendan Coleman
- Subjects
Writing style ,Structure (mathematical logic) ,Publishing ,business.industry ,Computer science ,Process (engineering) ,Engineering ethics ,business ,GeneralLiterature_MISCELLANEOUS - Abstract
Publishing the results of your research is a fulfilling experience, both from a personal viewpoint, but also helping advance the orthopaedic knowledge. This chapter discusses the process from completing the study to formulating the final manuscript that is ready for submission, providing a structure to follow in preparation of the manuscript and tips on improving your writing style.
- Published
- 2019
30. A Practical Guide to Writing (and Understanding) a Scientific Paper: Meta-Analyses
- Author
-
Corrado Bait, Riccardo Compagnoni, Alberto Grassi, Stefano Zaffagnini, Pietro Randelli, and Kristian Samuelsson
- Subjects
Data extraction ,Point (typography) ,Process (engineering) ,Computer science ,Statistical analyses ,Meta-analysis ,media_common.quotation_subject ,Quality (business) ,Data science ,Critical condition ,Systematic search ,media_common - Abstract
Meta-analyses represent an unbiased way of summarising the evidence on a specific topic. A meta-analysis is a formal process for gathering and evaluating literature to answer a specific question, using statistics to combine the data from randomised controlled trials. However, their use is controversial, as there are several critical conditions and methodological considerations that could produce misleading conclusions. A wide and extensive systematic search, clear-cut inclusion criteria and appropriate data extraction are mandatory when it comes to obtaining all the evidence relating to the investigated topic. Statistical analyses should be performed carefully and all sources of heterogeneity should be explored to avoid dangerous bias. The design and the quality of the included studies should be clearly presented to show the reader the overall quality of the evidence that is presented in the meta-analysis. Finally, the results should be interpreted critically from both a clinical and a statistical point of view.
- Published
- 2019
31. Interaction Model of Pen-and-Paper User Interfaces
- Author
-
Jürgen Steimle
- Subjects
Paper document ,Computer science ,Human–computer interaction ,Interaction model ,Post-WIMP ,Interaction technique ,User interface ,Interface design ,User interface design - Abstract
The advent of novel types of user interfaces generates challenges that relate both to the conceptual understanding and to the question of practical interface design. In this chapter, we aim at providing answers to the following questions: What is the essence of interaction with Pen-and-Paper User Interfaces? How to guide analysis? What aspects are to be considered when designing a Pen-and-Paper User Interface? What principles and guidelines do apply?
- Published
- 2012
32. Users Can Do Better with PDAs Than Paper: A Usability Study of PDA-Based vs. Paper-Based Nursing Documentation Systems
- Author
-
Celia R. Colón-Rivera, Carlos Martinez, Néstor J. Rodríguez, José A. Borges, Aixa Ardín, Carlos Perez, and Gilberto Crespo
- Subjects
Nursing staff ,Multimedia ,business.industry ,Computer science ,Medical record ,Usability ,Paper based ,computer.software_genre ,Patient record ,Health informatics ,Nursing documentation ,business ,Mobile device ,computer - Abstract
Personal Digital Assistants (PDAs) are a viable technology for providing access to Electronic Medical Records at the point-of-care. However, acceptance of this technology by clinicians will depend on how easy they can make the transition from the system they normally use to a PDA-based system. Since many hospitals are still using paper-based patient record systems this study intends to provide some insight on the aspects that need to be considered in the transition from a paper-based system to a PDA-based system. The study compares the interaction of nurses with PDA-based and paper-based nursing documentation systems in terms of performance and subjective satisfaction. Twenty staff nurses from a metropolitan hospital performed twelve tasks on each system. The study supports the conclusion that a PDA-based nursing documentation system can be superior to a paper-based system in term of performance for tasks that don't required writing notes. Nurses were significantly more satisfied with the PDA-based system than with the paper-based system with every interaction and system aspect evaluated on the study. In general the results of the study provide hard evidence to predict an easy transition for nurses from a paper-based system to a PDA-based system nursing documentation system.
- Published
- 2009
33. Verification of the Minimum Illuminance for Comfortable Reading of an E-Paper
- Author
-
Shunta Sano, Nobuhiro Ishio, Tatsuya Koizuka, Masaru Miyao, and Takehito Kojima
- Subjects
Liquid-crystal display ,Computer science ,media_common.quotation_subject ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Illuminance ,Glare (vision) ,Backlight ,Readability ,law.invention ,law ,Power consumption ,Computer graphics (images) ,Reading (process) ,Electronic paper ,media_common - Abstract
Various e-paper devices also have been released (e.g. Amazon's Kindle DXTM), and their features include paper-like display and low power consumption. In our previous studies, in high light conditions, readability of the backlight LCD dropped significantly, because of the glare of the surrounding background. On the other hand, the readability of the electronic paper is increased, it was easy to read than backlit LCD. The e-paper that have low contrast ratio, evaluation of readability was low. In low light, the evaluation of the readability of the backlit LCD was high. The aim of this experiment was to verify the minimum illumination for comfortable reading with e-paper in low illumination (300 or less lx).
- Published
- 2013
34. Evaluating Paper Prototype for Tabletop Collaborative Game Applications
- Author
-
Ricardo Nakamura, Mauricio Cirelli, Lucia Vilela Leite Filgueiras, and Marylia Gutierrez
- Subjects
Game design ,Multimedia ,InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.,HCI) ,Computer science ,Human–computer interaction ,Interface (Java) ,Collaborative game ,User interface ,computer.software_genre ,computer ,Gesture ,Paper prototyping - Abstract
Identifying the natural gestures for a tabletop application is one of the most challenging tasks developers must accomplish in order to achieve a good system user interface. This problem is even more difficult in a collaborative environment. Cooperative Gestures allow richer interaction and must be evaluated when designing a new multi-user tabletop interface. In this paper we present the use of paper prototyping to analyze user interaction on a tabletop collaborative game application. Our results show that it is possible to extract natural gestures for an application using this technique, regardless of some limitations.
- Published
- 2013
35. An Exploratory Study on Content-Based Filtering of Call for Papers
- Author
-
Germán Hurtado Martín, Helga Naessens, Chris Cornelis, Steven Schockaert, Lupu, Mihai, Kanoulas, Evangelos, and Loizides, Fernando
- Subjects
Information retrieval ,Computer science ,Language models ,Exploratory research ,Contrast (statistics) ,Vector space model ,Filter (signal processing) ,Recommendation ,Science General ,Call for papers ,World Wide Web ,Language model ,Generative grammar ,Scope (computer science) - Abstract
Due to the increasing number of conferences, researchers need to spend more and more time browsing through the respective calls for papers (CFPs) to identify those conferences which might be of interest to them. In this paper we study several content-based techniques to filter CFPs retrieved from the web. To this end, we explore how to exploit the information available in a typical CFP: a short introductory text, topics in the scope of the conference, and the names of the people in the program committee. While the introductory text and the topics can be directly used to model the document (e.g. to derive a tf-idf weighted vector), the names of the members of the program committee can be used in several indirect ways. One strategy we pursue in particular is to take into account the papers that these people have recently written. Along similar lines, to find out the research interests of the users, and thus to decide which CFPs to select, we look at the abstracts of the papers that they have recently written. We compare and contrast a number of approaches based on the vector space model and on generative language models.
- Published
- 2013
36. Statistically Analyzing RGB Histograms to Remove Highlighting in Aged Paper Monochromatic Documents
- Author
-
Ricardo da Silva Barboza, Rafael Dueire Lins, Edson da F. de Lira, and Diego de A. Barros
- Subjects
Information retrieval ,White paper ,Computer science ,Histogram ,Personal choice ,Natural aging ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,RGB color model ,Monochromatic color ,Filter (signal processing) - Abstract
Text highlighting is often used to emphasize parts of a document for some reason. As highlighting is a personal choice of the reader, it can be seen as physically "damaging" the original document. A recent paper shows how to remove felt-pen highlighting in monochromatic documents with a white paper background. This paper generalizes that result to filter out highlighting in monochromatic documents with non-white background due to paper natural aging.
- Published
- 2013
37. Composing with Style – Components Meet Architecture
- Author
-
Szyperski, Clemens, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Hofmeister, Christine, editor, Crnkovic, Ivica, editor, and Reussner, Ralf, editor
- Published
- 2006
- Full Text
- View/download PDF
38. Paper-based Tagging of Documents
- Author
-
Jürgen Steimle
- Subjects
Information retrieval ,Paper document ,Computer science ,Handwriting recognition ,Information space ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Interaction technique ,Paper based ,Structuring ,Digital paper - Abstract
Besides annotating documents and creating references, categorizing documents and structuring the information space are amongst the most relevant activities that knowledge workers perform when they seek to make sense of information. This chapter introduces several novel techniques for tagging of printed and digital documents.
- Published
- 2012
39. Vega Grid: A Computer Systems Approach to Grid Research
- Author
-
Xu, Zhiwei, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Li, Minglu, editor, Sun, Xian-He, editor, Deng, Qian-ni, editor, and Ni, Jun, editor
- Published
- 2004
- Full Text
- View/download PDF
40. Financial Industry Ontologies for Risk and Regulation Data (FIORD) – A Position Paper
- Author
-
Said Tabet, Thanassis Bouras, Jeroen van Grondelle, Cal Muckley, Theodoros Krintas, Laurentiu Vasiliu, Kyriakos Chourdakis, Donald Lawrence, Justin V. McCarthy, Allan D. Grody, Kiran Jude Fernandes, Adamantios Koumpis, Panos Xidonas, and Fokion Zervoudakis
- Subjects
Risk analysis (engineering) ,business.industry ,Computer science ,Big data ,Position paper ,Software system ,High-frequency trading ,Marketing ,business ,Semantic Web ,Risk management ,Financial services ,Domain (software engineering) - Abstract
This paper presents a proposed approach to address risk and regulation management within the highly active and volatile financial domain by employing semantic based technologies within a collaborative networks environment. Firstly the problems and motivation are introduced, with accent on big data and high frequency trading issues that are creating major problems to the current software systems. Secondly the state of the art on Big Data, Regulation and Risk Management are presented. Next the FIORD platform architecture is detailed and the envisioned approach explained. Finally conclusions are presented where benefits for real time monitoring are emphasized so high frequency trading irregularities are detected in real time for the benefit of involved financial institutions.
- Published
- 2013
41. Technical White Paper on 'Time and Frequency Synchronization in OFDM'
- Author
-
Mridula Korde and A. P. Rathkanthiwar
- Subjects
White paper ,Wireless broadband ,Computer science ,Orthogonal frequency-division multiplexing ,Orthogonal frequency-division multiple access ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Synchronization (computer science) ,Physical layer ,Phase error ,Electronic engineering ,Data_CODINGANDINFORMATIONTHEORY ,Time synchronization - Abstract
Orthogonal frequency division multiple access (OFDMA) is a emerging standard for broadband wireless access. Synchronization in OFDMA represents one of the most challenging issues and plays a major role in the physical layer design. Aim of this paper is to provide a overview of various frequency and time synchronization errors in OFDM systems. This paper also discusses the effect of timing and frequency errors on system performance. It focuses on time and frequency error estimation algorithms for OFDM based systems in downlink transmission as well.
- Published
- 2011
42. Neural Prediction of Product Quality Based on Pilot Paper Machine Process Measurements
- Author
-
Paavo Nieminen, Jukka Muhonen, Tommi Kärkkäinen, and Kari Luostarinen
- Subjects
business.product_category ,Computer science ,Papermaking ,media_common.quotation_subject ,Process (computing) ,Reliability engineering ,Product (business) ,Paper machine ,Multilayer perceptron ,Production (economics) ,Quality (business) ,State (computer science) ,business ,Simulation ,media_common - Abstract
We describe a multilayer perceptron model to predict the laboratory measurements of paper quality using the instantaneous state of the papermaking production process. Actual industrial data from a pilot paper machine was used. The final model met its goal accuracy 95.7% of the time at best (tensile index quality) and 66.7% at worst (beta formation). We anticipate usage possibilities in lowering machine prototyping expenses, and possibly in quality control at production sites.
- Published
- 2011
43. ECOTRUCK: An Agent System for Paper Recycling
- Author
-
Ilias Sakellariou, Nikolaos Bezirgiannis, Utrecht University [Utrecht], University of Macedonia [Thessaloniki] (UoM), Lazaros Iliadis, Ilias Maglogiannis, Harris Papadopoulos, TC 12, and WG 12.5
- Subjects
Functional Logic Programming ,Functional logic programming ,Computer science ,Erlang (programming language) ,Erlang ,02 engineering and technology ,12. Responsible consumption ,020202 computer hardware & architecture ,Transport engineering ,Paper recycling ,Risk analysis (engineering) ,Management system ,Vehicle routing problem ,0202 electrical engineering, electronic engineering, information engineering ,Agent Systems ,[INFO]Computer Science [cs] ,020201 artificial intelligence & image processing ,computer ,Contract-Net ,Declarative programming ,computer.programming_language - Abstract
Part 13: Environmental and Earth Applications of AI; International audience; Recycling has been gaining ground, thanks to the recent progress made in the related technology. However, a limiting factor to its wide adoption, is the lack of modern tools for managing the collection of recyclable resources. In this paper, we present EcoTruck, a management system for the collection of recyclable paper products. EcoTruck is modelled as a multi-agent system and its implementation employs Erlang, a distribution-oriented declarative language. The system aims to automate communication and cooperation of parties involved in the collection process, as well as optimise vehicle routing. The latter have the effect of minimising vehicle travel distances and subsequently lowering transportation costs. By speeding up the overall recycling process, the system could increase the service throughput, eventually introducing recycling methods to a larger audience.
- Published
- 2011
44. Selective Inductive Powering in Hardware-Based Paper Computing
- Author
-
Kening Zhu, Adrian David Cheok, Owen Noel Newton Fernando, and Hideaki Nii
- Subjects
Ambient intelligence ,business.industry ,Computer science ,Transmitter ,Wireless ,Context (language use) ,Folding (DSP implementation) ,Paper computing ,business ,Electrical impedance ,Computer hardware ,Power (physics) - Abstract
We present a method of selective wireless power transferring for paper computing. The novelty of this method lies in the power transmitter can be controlled to selectively activate different receivers in the context of wireless power transferring with multiple receivers. This was achieved by changing the output frequency of the power transmitter and the impedance of the receivers. With this method, users could easily design new types of paper-computing system without worrying about the arrangement of the massive wire connection to power supply. This technology combining with paper computing can become a physical rendering system using paper-crafts, such as paper folding and cutting.
- Published
- 2011
45. Identification of Scholarly Papers and Authors
- Author
-
Eisuke Ito, Kensuke Baba, and Masao Mori
- Subjects
Information retrieval ,identification of authors ,Computer science ,business.industry ,Institutional repository ,String searching algorithm ,Web database ,identification of scholarly papers ,World Wide Web ,Metadata ,Identification (information) ,Clerical error ,The Internet ,business - Abstract
Repositories are being popular as places for publication of research outputs. To make more efficient use of scholarly information on the internet, repositories are required to cooperate with other databases. One of the essential processes of the cooperation is identification of scholarly papers and their authors. The straightforward approach is string matching of the title and authors' name, however this approach cannot always solve the difficulties by basic clerical errors and same names. This paper proposes a method to compensate for the inaccuracy of the identification by connecting different databases. The main idea of the method is that different metadata of a scholarly paper is linked by the authors themselves, therefore the correspondence is guaranteed by the authors. The authors of this paper are developing a system based on the idea on the repository and the researcher database in their university.
- Published
- 2011
46. Additives in the Paper Industry
- Author
-
Daniel Guillén, R. M. Darbra, Antoni Ginebreda, and Damià Barceló
- Subjects
Computer science ,Wet strength ,Biochemical engineering ,Sizing ,Paper manufacturing - Abstract
An overview of the paper sector from the point of view of additives use is presented. In the first section, the general trends of the sector concerned in terms of world production and trade flows are reviewed together with an overall description of the main characteristics of the production process, including pulp production and paper manufacturing and finishing. The second part is focused on the description of the different additive classes used to provide paper with the required functional characteristics and to facilitate and improve the production process as well, namely, retention aids, sizing agents, binders, wet strength agents, coating agents, optical brightener agents, biocides and dyes. Main compounds or compound families within each additive class are listed, and some related information regarding their function, world consumption and environmental potential impacts is also included.
- Published
- 2011
47. A Dynamic AR Marker for a Paper Based Temperature Sensor
- Author
-
Roshan Lalintha Peiris, Owen Noel Newton Fernando, and Adrian David Cheok
- Subjects
Work (thermodynamics) ,Proof of concept ,Computer science ,Augmented reality ,Paper based ,Simulation - Abstract
This paper presents a proof of concept technology for a novel concept of dynamic markers for Augmented Reality. Here, by dynamic we mean markers that can change on external stimuli. Thus, the paper describes the use of ambient dynamic Augmented Reality Markers as temperature sensors. To achieve this technology we print patterns on an AR marker using thermochromic inks of various actuation temperatures. Thus, as the temperature gradually changes, the marker morphs into new marker for each temperature range. Thus here we present our preliminary results for three temperature ranges and discuss this work can be extended and applied in the future.
- Published
- 2011
48. Study on the Application of RFID Technology in the Management System of Paper Machine’s Disassembly and Assembly
- Author
-
Xiuqing Wang, Chunxia Zhang, and Xian Zhang
- Subjects
Information management ,SQL ,business.product_category ,Computer science ,business.industry ,Serial communication ,Interface (computing) ,Construct (python library) ,Management information systems ,Paper machine ,Embedded system ,Management system ,business ,Software engineering ,computer ,computer.programming_language - Abstract
This paper takes the management system of paper machine’s disassembly and assembly as research objects, and introduces RFID technology as well as the application of RFID. Then it establishes basic information management of paper machine, marking information management, installation information management, serial communication and other functional modules. The monitoring system adopts VC6.0 and SQL as the original developing tools. At first, it needs to analyse and construct system functional modules of paper machine, then it designs engineering framework-a kind of visual user management interface- in VC platform. Finally, it does the mapping coefficient and data transmitting from the engineering framework to database by ADO database access.
- Published
- 2011
49. A Virtual Computational Paper Folding Environment Based on Computer Algebraic System
- Author
-
Sheng-Kai Yin, Po-Yu Chen, and Wing-Kwong Wong
- Subjects
Theoretical computer science ,Computer science ,Computation ,Compass ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Mathematics of paper folding ,Process (computing) ,Folding (DSP implementation) ,Symbolic computation ,Algorithm ,GeneralLiterature_MISCELLANEOUS ,Computer animation ,Axiom - Abstract
Many people enjoy origami, an art of paper folding, since childhood. Origami is a more powerful geometry construction tool than straight and compass. But there are some inconvenience when you practice traditional origami on geometry. In this study, a computational origami environment has been developed. Huzita axioms are implemented with a computer algebra system (CAS). CAS not only deals with fundamental computation of axioms but also can prove some geometric consequences of folding steps. Furthermore, the process of paper folding is visualized. Users can observe the 3D animation of folding steps from different viewpoints.
- Published
- 2011
50. An Analysis of Longitudinal TCP Passive Measurements (Short Paper)
- Author
-
Kensuke Fukuda
- Subjects
Upgrade ,business.industry ,Computer science ,Tcp sack ,Short paper ,Traffic trace ,Timestamp ,business ,Computer network - Abstract
This paper reports on the longitudinal dynamics of TCP flows at an international backbone link over the period from 2001 to 2010. The dataset was a collection of traffic traces called MAWI data consisting of daily 15min pcap traffic trace measured at a trans-pacific link between Japan and the US. The environment of the measurement link has changed in several aspects (i.e., congestion, link upgrade, application). The main findings of the paper are as follows. (1) A comparison of the AS-level delays between 2001 and 2010 shows that the mean delay decreased in 55% of ASes, but the median value increased. Moreover, largely inefficient paths disappeared. (2) The deployment of TCP SACK increased from 10% to 90% over the course of 10 years. On the other hand, the window scale and timestamp options remained under-deployed (less than 50%).
- Published
- 2011
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.