Videos with tag computing
Results 1-6 of 22
 
00:30.2
00:30.2
00:30.2

Clustering Students based on Their Annotation Behaviors

Students often annotate texts they are reading using highlighting, underlining, and written comments and marks in the margins of the text. These may serve various functions and will reflect each student’s goals and understanding of the text. This research proposes four biology-inspired approaches to represent the patterns of student annotations and to cluster students based on the similarity between their annotations; the annotations produced were simple highlighting. To verify the effectiveness of the proposed approaches, the research compared the processing speed of these approaches with generic hierarchical clustering algorithm implemented in Matlab and compared the accuracy of the clusters with the clusters created by human raters. The results show that all of the proposed approaches are more efficient and accurate than the generic hierarchical clustering algorithm. The proposed methodology can be implemented as an add-on to existing learning management systems and e-book readers, to automatically offer the students important notes and annotations conducted by others (either peers or students in the past) who have similar annotation behaviour pattern and style to the students.

Added: 1455 days ago by maiga

Views: 192 | Comments: 0 | Not yet rated

 
12:04
12:04
12:04

TMA 4 Presentation: Social Computing Privacy and Security

Computer and human interaction has evolved and reached new levels with the advent of social networks and social computing. This paper investigates challenges with social computing, particularly technical challenges around the collection and management of data, security and privacy and mobile social computing. The number of users of social computing systems has grown exponentially and managing all the data produced by all the users presents a monumental infrastructure challenge. Social computing organizations have deployed hundreds of thousands of servers to safely store and quickly retrieve data. Privacy and security manifest themselves in many different ways, a level of confidence in the organizations handling of private data is necessary to attract users. Organizations user privacy policy set the legal limits to what and organization intends and is allowed to do with a user’s private info. Additionally an organization needs to protect the data’s confidentiality, availability and integrity from malicious hackers. Finally and organization needs to protect users from other users, mainly minor or vulnerable users from predators and bullies. Finally there is the challenge of mobile computing which introduces an extra dimension of physical space in addition to the time and content of all users data. With mobile computing users content is superimposed with time and space factors that draws a complete picture of a user’s activities and the organization now needs to handle that extra dimension in all its system design, data management, and privacy challenges.

Added: 1508 days ago by wchannaa

Views: 38268 | Comments: 0 | Not yet rated

 
11:36
11:36
11:36

Context Aware Application Development Using the Android Development Kit for Inexperienced Programmers

In this paper we discuss the experience of developing a context aware application for an Android device using the Android development kit. Using the technologies available in mobile devices like smart phones, we can leverage GPS, Bluetooth, Wi-Fi, and other methods to provide ubiquitous computing/learning so a user can obtain content anywhere and anytime they want while the content being delivered to them is context aware of the learner’s location. This opens up possibilities for ubiquitous computing and also learning opportunities. In this paper, we will look at whether an inexperienced programmer is able to develop a basic context aware application with the short time period of three to four weeks.

Added: 1511 days ago by airken888

Views: 2989 | Comments: 0 | Not yet rated

 
17:23
17:23
17:23

HCI issues in applying social tagging techniques to social computing

M. Gupta, R. Li, Z. Yin, J. Han (June, 2010) “Survey on social tagging techniques” ACM SIGKDD Explorations Newsletter. [On-line]. 12 (1), pp. 58-72, Available: http://0-dl.acm.org.aupac.lib.athabascau.ca/citation.cfm?id=1882471.1882480&coll=DL&dl=ACM

Added: 1568 days ago by dsasa008

Views: 204 | Comments: 0 | Not yet rated

 
20:46
20:46
20:46

Comp648 TMA1 part 1

Y. Rogers. “The Changing Face of Human-Computer Interaction in the Age of Ubiquitous Computing”, Lecture Notes in Computer Science, vol. 5889, pp 1-19, 2009

http://link.springer.com/chapter/10.1007%2F978-3-642-10308-7_1

Added: 1570 days ago by leogvbr

Views: 730 | Comments: 0 | Not yet rated

 
19:08
19:08
19:08

DSL Based Approach to Software Development and Deployment

K. Sledziewski, B. Bordbar, R. Anane, A DSL-based Approach to Software Development and Deployment on Cloud. 2010 24th IEEE International Conference on Advanced Information Networking and Applications: 414-421, April 2010. DOI Bookmark: 10.1109/AINA.2010.81, URL: http://0-www.computer.org.aupac.lib.athabascau.ca/portal/web/csdl/doi/10.1109/AINA.2010.81

Added: 2543 days ago by mbesney

Views: 326 | Comments: 0 | Not yet rated