loading
How to Calibrate your Adversary's Capabilities? Inverse Filtering for Counter-Autonomous Systems
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

We consider an adversarial Bayesian signal processing problem involving "us" and an "adversary". The adversary observes our state in noise; updates its posterior distribution of the state and then chooses an action based on this posterior. Given knowledge of "our" state and sequence...

How is Open Source Software Development Different in Popular IoT Projects?
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

From the software point of view, the development of IoT applications differs from other kinds of applications due to the specific features that the former exhibit. In this paper, we investigate how developers contribute to IoT applications in the Open Source...

How Do Assurance Mechanisms Interact in Online Marketplaces? A Signaling Perspective
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Although multiple assurance mechanisms (e.g., third-party certification, web assurance seals, and reputation systems) are commonly used in online marketplaces to ameliorate transaction risks, there is little understanding about how different assurance mechanisms may be...

How the Business Model of Customisable Card Games Influences Player Engagement
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

In this article, we analyse the game play data of three popular customisable card games where players build decks prior to game play. We analyse the data from a player engagement perspective, how the business model affects players, how players influence the business...

How Advantageous Is It? An Analytical Study of Controller-Assisted Path Construction in Distributed SDN
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Distributed software-defined networks (SDN), consisting of multiple inter-connected network domains, each managed by one SDN controller, is an emerging networking architecture that offers balanced centralized control and distributed operations. Under such a networking paradigm, most existing works...

Modeling How Humans Judge Dot-Label Relations in Point Cloud Visualizations
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

When point clouds are labeled in information visualization applications, sophisticated guidelines as in cartography do not yet exist. Existing naive strategies may mislead as to which points belong to which label. To inform improved strategies, we studied factors...

How Far Are We From Quantifying Visual Attention in Mobile HCI?
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

With an ever-increasing number of mobile devices competing for attention, quantifying when, how often, or for how long users look at their devices has emerged as a key challenge in mobile human-computer interaction. Encouraged by recent advances in automatic eye contact...

Use of Patterns for Know-How Reuse in a Model-Based Systems Engineering Framework
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

The increasing complexity of systems being developed requires engineers to review their practices to improve engineering efficiency and meet the needs of a competitive market. To answer these challenges, engineers have always reused their know-how. However, facing...

How to Succeed in the Software Business While Giving Away the Source Code
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Open-source software, or, more accurately, Freely Licensed Open-Source Software ("FLOSS"), at first appears to present a dilemma when adopted as part of a business model. If users are allowed to access, modify and/or redistribute the source code, how does a company protect its...

Propagation From Deceptive News Sources Who Shares, How Much, How Evenly, and How Quickly?
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

As people rely on social media as their primary sources of news, the spread of misinformation has become a significant concern. In this large-scale study of news in social media, we analyze 11 million posts and investigate the propagation behavior of users that directly interact with...

Advertisement