2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)最新文献

筛选
英文 中文
Social testing: A framework to support adoption of continuous delivery by small medium enterprises 社会测试:支持中小型企业采用持续交付的框架
J. Dunne, David Malone, J. Flood
{"title":"Social testing: A framework to support adoption of continuous delivery by small medium enterprises","authors":"J. Dunne, David Malone, J. Flood","doi":"10.1109/CSCESM.2015.7331827","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331827","url":null,"abstract":"Continuous delivery (CD) represents a challenge for software test teams, because of the continuous introduction of new features and feedback from customers. We consider testing in a framework where users are encouraged to report defects through social or other incentive schemes. Using an enterprise dataset, we address the question of which types of defects can best be found in the field, allowing in-house test resources to be refocused. Validation of these touch points ultimately interweaves both customer and business needs. The proposed framework is one which can help small to medium software businesses, which typically have limited resources to test and release software via CD.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123951651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The usage of social media in crisis communication 危机传播中社交媒体的使用
A. Miettinen, J. Nousiainen, J. Rajamäki, J. Knuuttila
{"title":"The usage of social media in crisis communication","authors":"A. Miettinen, J. Nousiainen, J. Rajamäki, J. Knuuttila","doi":"10.1109/CSCESM.2015.7331820","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331820","url":null,"abstract":"The usage of social media (SOME) has increased during the last few years due the increase in the amount of smartphones. SOME has emerged alongside the traditional channels of communication in crisis communication. SOME has become extremely popular in recent years and the authorities have adopted it as part of their communication strategy. This paper explains how SOME is used in crisis situations, what kind of strengths, weaknesses, opportunities and threats (SWOT) it has, and how its use could be improved.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"33 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114020775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Leveraging Complex Event Processing for supporting small and medium-sized e-commerce enterprises 利用复杂事件处理来支持中小型电子商务企业
Christopher Ruff, Florian Maier, Tobias Muller, H. Kett
{"title":"Leveraging Complex Event Processing for supporting small and medium-sized e-commerce enterprises","authors":"Christopher Ruff, Florian Maier, Tobias Muller, H. Kett","doi":"10.1109/CSCESM.2015.7331829","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331829","url":null,"abstract":"E-shop operators have a particular high interest in using web-analytics software to gain deeper insight in their visitor and customer base and to use this knowledge to optimize their sales through various activities. Compared to larger-scale companies, small and medium enterprises often lack the ability, time or resources to do the necessary data analysis to effectively use and understand the available data. In order to support these smaller enterprises, a tool was designed and implemented in a prototype, which uses Complex Event Processing (CEP) in order to automate the evaluation of relevant business data originating from web-analytics software, competitor website analysis tools, real-time user interaction data and potentially additional data sources. Rules can be defined and configured, that automatically and immediately notify the user when relevant changes in the visitor or competitor behavior occur. Additional rules were implemented, aimed at directly increasing sales by dynamically changing the shop-site, based on the analysis of the individual visitor's behavior. This allows the e-shop operators to concentrate on their main business while still benefiting from the available analytics data. The tool is developed as part of the SME E-Compass [1] project.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114695058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The cascading knowledge discovery in databases process in the information system development 信息系统开发过程中数据库中的级联知识发现
M. Mirończuk
{"title":"The cascading knowledge discovery in databases process in the information system development","authors":"M. Mirończuk","doi":"10.1109/CSCESM.2015.7331873","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331873","url":null,"abstract":"This article describes a proposal of information system project method. This method based on author's cascading knowledge discovery in databases process. In this article, the author also to presented use case of this process. All analysis presented in this article based on text reports from the rescue fire service.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127623517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The real time picture sharing in the cloud service 云服务中的实时图片共享
Mikko Taponen, Mari Liiri-Forsberg, Ilkka Tikanmaki
{"title":"The real time picture sharing in the cloud service","authors":"Mikko Taponen, Mari Liiri-Forsberg, Ilkka Tikanmaki","doi":"10.1109/CSCESM.2015.7331886","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331886","url":null,"abstract":"The goal of this study is to define the cloud service model when sharing real time pictures in governmental information sharing to different authorities. This article includes different kinds of viewpoints how to approach distinct cloud service models, what are the data security and legislation issues, concept level approach and benefits for real time picture sharing. The concept study of a real time picture was concluded using Needs, Approach, Benefits and Competition (NABC) framework. Swot analysis is used for Cloud service model survey. The application presented in this study may help future innovations to approach this complex mix of legal, secure and technical obstacles with accumulated information.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117278367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet addiction: A structured literature review and future research directions 网络成瘾:结构化文献综述及未来研究方向
Sulaiman Al Sheibani
{"title":"Internet addiction: A structured literature review and future research directions","authors":"Sulaiman Al Sheibani","doi":"10.1109/CSCESM.2015.7331889","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331889","url":null,"abstract":"Internet Addiction (IA) has been a significant topical area for research since 1996. Considerable research has been done on IA across many nations around the world. Hence, there currently exists a rich body of literature addressing various aspects of IA. The study described in this report seeks to analyze the key findings expressed in the existing IA literature. In doing so, this study addresses four specific concerns relating to: a) reviewing various definitions of IA, b) growth of IA research over time in different parts of the world, c) the major themes identified in the literature, and d) future opportunities for research into IA. These concerns were addressed using a rigorous literature analysis involving 64 studies on IA selected from various scholarly sources. The outcomes of literature analysis are discussed in detail and some useful observations and insightful reflections are made. The findings reported in this study are useful because it offers a number of important recommendations for future research in this area.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116803731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automated color image arrangement method for multiple-peak image 多峰图像的自动彩色图像排列方法
Yusuke Kawakami, T. Hattori, Y. Horikawa, Janaka Rajapakse
{"title":"Automated color image arrangement method for multiple-peak image","authors":"Yusuke Kawakami, T. Hattori, Y. Horikawa, Janaka Rajapakse","doi":"10.1109/CSCESM.2015.7331823","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331823","url":null,"abstract":"This paper proposes the Histogram Matching based on the Gaussian Distribution (HMGD) method to improve feeling (or Kansei) impression for multiple-peak images. In the previous papers, we have described the HMGD processing. And we also proposed how calculate whether the processing results good or not, using curvature computation. As the results, we have understood that the HMGD processing works well for single-peak images. In this paper, we describe the principle and processing method of HMGD processing to correspond multiple-peak images. And we also illustrate experimental results.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123406243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TB±tree: Index structure for Information Retrieval Systems TB±tree:信息检索系统的索引结构
M. Fekihal, I. Jaluta, Dinesh Kumar Saini
{"title":"TB±tree: Index structure for Information Retrieval Systems","authors":"M. Fekihal, I. Jaluta, Dinesh Kumar Saini","doi":"10.1109/CSCESM.2015.7331890","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331890","url":null,"abstract":"Information Retrieval Systems (IR) is using different indexing techniques to retrieve information such as, Inverted files, and Signature files. However, Signature files are suitable for small IR systems due to its slow response, while inverted file have better response time but its space overhead is high. Moreover, inverted files use B±trees for single-word queries. In this paper, a new indexing structure called TB±tree to be used in the design of inverted files for large information retrieval systems. The TB±tree is a variant of the B±tree that supports single key-word queries and phrase queries efficiently. In TB±tree algorithms which represent each key-word stored in the index by a numeric value, and this numeric value can be used as encryption and inforce security. The numeric value for each keyword is stored in binary format, which may reduce the size of the index file by 19%. The records in TB±tree may be of variable length.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"50 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130972118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combination of histogram of oriented gradients and hierarchical centroid for sketch-based image retrieval 结合定向梯度直方图和分层质心的素描图像检索
Norah M. Asiri, Nourah AlHumaidi, Nourah AlOsaim
{"title":"Combination of histogram of oriented gradients and hierarchical centroid for sketch-based image retrieval","authors":"Norah M. Asiri, Nourah AlHumaidi, Nourah AlOsaim","doi":"10.1109/CSCESM.2015.7331884","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331884","url":null,"abstract":"The sketch based image retrieval (SBIR) systems is still little argued and debated. Histogram of oriented gradients (HOG) has shown good performance in sketch based retrieval systems over all other methods. In this paper, we propose an enhancement of HOG by using HOG combined with hierarchical centroid of irregular shape. We also compare the result with original HOG, edge histogram and the shape properties descriptors. The system uses free-hand sketched queries as input and matches it with images from different 12 classes.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Secure Urgent Situation Propagation System using the Mobile Security Solution 基于移动安全解决方案的安全紧急情况传播系统
Geonlyang Kim, Yong-Sung Jeon, Jeongnyeo Kim
{"title":"The Secure Urgent Situation Propagation System using the Mobile Security Solution","authors":"Geonlyang Kim, Yong-Sung Jeon, Jeongnyeo Kim","doi":"10.1109/CSCESM.2015.7331877","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331877","url":null,"abstract":"Many organizations want to support Bring Your Own Device initiatives to allow end-users to use personally owned devices at work. Organizations face significant challenges as users increasingly provide their own devices for work. So, interests of many people have grown how to prevent the leakage of security data of their enterprises. There are the technologies for using smart mobile devices safely by separating the personal area and the business area. This paper describes the Secure Domain of the Mobile Security Solution which is designed based on the Trusted Execution Environment system architecture of the Global Platform, and it describes the architecture and the operating procedure of the Secure Urgent Situation Propagation System. The Secure Urgent Situation Propagation System uses the Mobile Security Solution having the Secure Domain isolated from the normal domain, and it provides safe storages, data cryptographic functions through Secure Functions of the Secure Domain, and so on.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121704708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信