Latest in cs.cy

total 3545took 0.12s
Development of Internet of Things, Augmented Reality and 5G technologies (review)Feb 21 2019Just as the emergence of personal computers and smartphones has changed the life of modern society, the Internet of Things, augmented reality and ultra-fast and reliable telecommunications networks of the new generation, by combining the physical objects ... More
Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law EnforcementFeb 19 2019Cybercrime investigators face numerous challenges when policing online crimes. Firstly, the methods and processes they use when dealing with traditional crimes do not necessarily apply in the cyber-world. Additionally, cyber criminals are usually technologically-aware ... More
Using Crowdsourcing to Identify a Proxy of Socio-Economic statusFeb 19 2019Social Media provides researchers with an unprecedented opportunity to gain insight into various facets of human life. Health practitioners put a great emphasis on pinpointing socioeconomic status (SES) of individuals as they can use to it to predict ... More
Using Machine Learning to Guide Cognitive Modeling: A Case Study in Moral ReasoningFeb 18 2019Large-scale behavioral datasets enable researchers to use complex machine learning algorithms to better predict human behavior, yet this increased predictive power does not always lead to a better understanding of the behavior in question. In this paper, ... More
Quality of Life Assessment of Diabetic patients from health-related blogsFeb 18 2019Motivations: People are generating an enormous amount of social data to describe their health care experiences, and continuously search information about diseases, symptoms, diagnoses, doctors, treatment options and medicines. The increasing availability ... More
Digital Humanities Readiness Assessment Framework: DHuRAFFeb 18 2019This research suggests a framework, Digital Humanities Readiness Assessment Framework (DHuRAF), to assess the maturity level of the required infrastructure for Digital Humanities studies (DH) in different communities. We use a similar approach to the ... More
Local Media and Geo-situated Responses to Brexit: A Quantitative Analysis of Twitter, News and Survey DataFeb 18 2019Societal debates and political outcomes are subject to news and social media influences, which are in turn subject to commercial and other forces. Local press are in decline, creating a "news gap". Research shows a contrary relationship between UK regions' ... More
BYOD, Personal Area Networks (PANs) and IOT: Threats to Patients PrivacyFeb 18 2019The passage of FISMA and HIPPA Acts have mandated various security controls that ensure the privacy of patients data. Hospitals and health-care organizations are required by law to ensure that patients data is stored and disseminated in a secure fashion. ... More
What Makes a Good Team? A Large-scale Study on the Effect of Team Composition in Honor of KingsFeb 18 2019Team composition is a central factor in determining the effectiveness of a team. In this paper, we present a large-scale study on the effect of team composition on multiple measures of team effectiveness. We use a dataset from the largest multiplayer ... More
A semi-supervised deep residual network for mode detection in Wi-Fi signalsFeb 17 2019Due to their ubiquitous and pervasive nature, Wi-Fi networks have the potential to collect large-scale, low-cost, and disaggregate data on multimodal transportation. In this study, we develop a semi-supervised deep residual network (ResNet) framework ... More
Forecasting the 2017-2018 Yemen Cholera Outbreak with Machine LearningFeb 16 2019The ongoing Yemen cholera outbreak has been deemed one of the worst cholera outbreaks in history, with over a million people impacted and thousands dead. Triggered by a civil war, the outbreak has been shaped by various political, environmental, and epidemiological ... More
Outlining the Design Space of Explainable Intelligent Systems for Medical DiagnosisFeb 16 2019The adoption of intelligent systems creates opportunities as well as challenges for medical work. On the positive side, intelligent systems have the potential to compute complex data from patients and generate automated diagnosis recommendations for doctors. ... More
Who Watches the Watchmen: Exploring Complaints on the WebFeb 15 2019Under increasing scrutiny, many web companies now offer bespoke mechanisms allowing any third party to file complaints (e.g., requesting the de-listing of a URL from a search engine). While this self-regulation might be a valuable web governance tool, ... More
On the computational models for the analysis of illicit activitiesFeb 15 2019This paper presents a study on the advancement of computational models for the analysis of illicit activities. Computational models are being adapted to address a number of social problems since the development of computers. Computational model are divided ... More
Crime Analysis using Open Source InformationFeb 15 2019In this paper, we present a method of crime analysis from open source information. We employed un-supervised methods of data mining to explore the facts regarding the crimes of an area of interest. The analysis is based on well known clustering and association ... More
Analysis of the Main Factors Affecting M-Commerce Adoption in IraqFeb 15 2019The telecommunications sector in Iraq is one of the most dynamic and active industries. This sector has prime importance only next to oil & gas, as revealed by recent reports. This industry has grown in leaps and bounds with the rising demand for mobile ... More
Using Key Player Analysis as a Method for Examining the Role of Community Animators in Technology AdoptionFeb 14 2019This paper examines the role of community animators in technology adoption. Community animators are individuals that actively build social networks and broker ties between nodes in those networks. The present study observes technology adoption patterns ... More
Base Station Allocation of Defibrillator Drones in Mountainous RegionsFeb 14 2019Responding to emergencies in alpine terrain is quite challenging as air ambulances and mountain rescue services are often confronted with logistics challenges and adverse weather conditions that extend the response times to provide life-saving support. ... More
A Framework towards Quantifying Human Restorativeness in Virtual Built EnvironmentsFeb 14 2019The impact of built environment on the human restorativeness has long been argued; however, the interrelations between neuroscience and the built environment, and the degree to which the built environment contributes to increased human restorativeness ... More
SoK: Transparent Dishonesty: front-running attacks on BlockchainFeb 13 2019We consider front-running to be a course of action where an entity benefits from prior access to privileged market information about upcoming transactions and trades. Front-running has been an issue in financial instrument markets since the 1970s. With ... More
Mathematical Notions vs. Human Perception of Fairness: A Descriptive Approach to Fairness for Machine LearningFeb 13 2019Fairness for Machine Learning has received considerable attention, recently. Various mathematical formulations of fairness have been proposed, and it has been shown that it is impossible to satisfy all of them simultaneously. The literature so far has ... More
Coloring in the Links: Capturing Social Ties as They are PerceivedFeb 12 2019The richness that characterizes relationships is often absent when they are modeled using computational methods in network science. Typically, relationships are represented simply as links, perhaps with weights. The lack of finer granularity is due in ... More
RTbust: Exploiting Temporal Patterns for Botnet Detection on TwitterFeb 12 2019Within OSNs, many of our supposedly online friends may instead be fake accounts called social bots, part of large groups that purposely re-share targeted content. Here, we study retweeting behaviors on Twitter, with the ultimate goal of detecting retweeting ... More
De-identification without losing facesFeb 12 2019Training of deep learning models for computer vision requires large image or video datasets from real world. Often, in collecting such datasets, we need to protect the privacy of the people captured in the images or videos, while still preserve the useful ... More
Policy Learning for Fairness in RankingFeb 11 2019Conventional Learning-to-Rank (LTR) methods optimize the utility of the rankings to the users, but they are oblivious to their impact on the ranked items. However, there has been a growing understanding that the latter is important to consider for a wide ... More
A Blockchain Framework for Managing and Monitoring Data in Multi-Site Clinical TrialsFeb 11 2019The cost of conducting multi-site clinical trials has significantly increased over time, with site monitoring, data management, and amendments being key drivers. Clinical trial data management approaches typically rely on a central database, and require ... More
A Reputation System for Marketplaces - Viability AssessmentFeb 11 2019In this work we explore the implementation of the reputation system for a generic marketplace, describe details of the algorithm and parameters driving its operation, justify an approach to simulation modeling, and explore how various kinds of reputation ... More
Prediction of Malignant & Benign Breast Cancer: A Data Mining Approach in Healthcare ApplicationsFeb 11 2019As much as data science is playing a pivotal role everywhere, healthcare also finds it prominent application. Breast Cancer is the top rated type of cancer amongst women; which took away 627,000 lives alone. This high mortality rate due to breast cancer ... More
Prediction of Malignant & Benign Breast Cancer: A Data Mining Approach in Healthcare ApplicationsFeb 11 2019Feb 13 2019As much as data science is playing a pivotal role everywhere, healthcare also finds it prominent application. Breast Cancer is the top rated type of cancer amongst women; which took away 627,000 lives alone. This high mortality rate due to breast cancer ... More
Discrimination in the Age of AlgorithmsFeb 11 2019The law forbids discrimination. But the ambiguity of human decision-making often makes it extraordinarily hard for the legal system to know whether anyone has actually discriminated. To understand how algorithms affect discrimination, we must therefore ... More
Safe Artificial General Intelligence via Distributed Ledger TechnologyFeb 11 2019Background. Expert observers and artificial intelligence (AI) progression metrics indicate AI will exceed human intelligence within a few decades. Whether general AI that exceeds human capabilities (AGI) will be the single greatest boon in history or ... More
Helping Blind People in Their Meeting Locations to Find Each Other Using RFID TechnologyFeb 10 2019This paper presents a new specific system based on RFID technology to help blind people find the other party in their meeting place. This system, uses a device called Smart Director or SD, equipped with Active Tag and RFID Reader. The blind person, the ... More
Human Computer Interaction Design for Mobile Devices Based on a Smart Healthcare ArchitectureFeb 10 2019Smart and IoT-enabled mobile devices have the potential to enhance healthcare services for both patients and healthcare providers. Human computer interaction design is key to realizing a useful and usable connection between the users and these smart healthcare ... More
Ask Not What AI Can Do, But What AI Should Do: Towards a Framework of Task DelegabilityFeb 08 2019Although artificial intelligence holds promise for addressing societal challenges, issues of exactly which tasks to automate and the extent to do so remain understudied. We approach the problem of task delegability from a human-centered perspective by ... More
Optimum Bi-level Hierarchical Clustering for Wireless Mobile Tracking SystemsFeb 08 2019A novel technique is proposed to optimize energy efficiency for wireless networks based on hierarchical mobile clustering. The new bi-level clustering technique minimizes mutual interference and energy consumption in large-scale tracking systems used ... More
Improving Consequential Decision Making under Imperfect PredictionsFeb 08 2019Consequential decisions are increasingly informed by sophisticated data-driven predictive models. For accurate predictive models, deterministic threshold rules have been shown to be optimal in terms of utility, even under a variety of fairness constraints. ... More
Human-Centered Tools for Coping with Imperfect Algorithms during Medical Decision-MakingFeb 08 2019Machine learning (ML) is increasingly being used in image retrieval systems for medical decision making. One application of ML is to retrieve visually similar medical images from past patients (e.g. tissue from biopsies) to reference when making a medical ... More
Community Animation: Exploring a design space that leverages geosocial networking to increase community engagementFeb 07 2019This paper explores a design study of a smartphone enabled meet-up app meant to inspire engagement in community innovation. Community hubs such as co-working spaces, incubators, and maker spaces attract community members with diverse interests. This paper ... More
The few-get-richer: a surprising consequence of popularity-based rankingsFeb 07 2019Ranking algorithms play a crucial role in online platforms ranging from search engines to recommender systems. In this paper, we identify a surprising consequence of popularity-based rankings: the fewer the items reporting a given signal, the higher the ... More
Bot Electioneering Volume: Visualizing Social Bot Activity During ElectionsFeb 06 2019It has been widely recognized that automated bots may have a significant impact on the outcomes of national events. It is important to raise public awareness about the threat of bots on social media during these important events, such as the 2018 US midterm ... More
Dynamic Pricing for Airline Ancillaries with Customer ContextFeb 06 2019Ancillaries have become a major source of revenue and profitability in the travel industry. Yet, conventional pricing strategies are based on business rules that are poorly optimized and do not respond to changing market conditions. This paper describes ... More
Are Children Fully Aware of Online Privacy Risks and How Can We Improve Their Coping Ability?Feb 06 2019The age of children adopting digital technologies, such as tablets or smartphones, is increasingly young. However, children under 11 are often regarded as too young to comprehend the concept of online privacy. Limited research studies have focused on ... More
A Surveillance Infrastructure for Malaria Analytics: Provisioning Data Access and Preservation of InteroperabilityFeb 05 2019We propose the Semantics, Interoperability, and Evolution for Malaria Analytics (SIEMA) platform for use in malaria surveillance based on semantic data federation. Using this approach, it is possible to access distributed data, extend and preserve interoperability ... More
Partisanship, Propaganda and Post-Truth Politics: Quantifying Impact in Online DebateFeb 05 2019Feb 18 2019The recent past has highlighted the influential role of social networks and online media in shaping public debate on current affairs and political issues. This paper is focused on studying the role of politically-motivated actors and their strategies ... More
Partisanship, Propaganda and Post-Truth Politics: Quantifying Impact in OnlineFeb 05 2019The recent past has highlighted the influential role of social networks and online media in shaping public debate on current affairs and political issues. This paper is focused on studying the role of politically-motivated actors and their strategies ... More
Agent-Based Simulation Modelling for Reflecting on Consequences of Digital Mental HealthFeb 05 2019The premise of this working paper is based around agent-based simulation models and how to go about creating them from given incomplete information. Agent-based simulations are stochastic simulations that revolve around groups of agents that each have ... More
Detecting Permanent and Intermittent Purchase Hotspots via Computational StigmergyFeb 05 2019The analysis of credit card transactions allows gaining new insights into the spending occurrences and mobility behavior of large numbers of individuals at an unprecedented scale. However, unfolding such spatiotemporal patterns at a community level implies ... More
A Blockchain-enabled Trustless Crowd-Intelligence Ecosystem on Mobile Edge ComputingFeb 05 2019Crowd-intelligence tries to gather, process, infer and ascertain massive useful information by utilizing the intelligence of crowds or distributed computers, which has great potential in Industrial Internet of Things (IIoT). A crowd-intelligence ecosystem ... More
Learning to Prescribe Interventions for Tuberculosis Patients using Digital Adherence DataFeb 05 2019Digital Adherence Technologies (DATs) are an increasingly popular method for verifying patient adherence to many medications. We analyze data from one city served by 99DOTS, a phone-call-based DAT deployed for Tuberculosis (TB) treatment in India where ... More
Bayesian method for evaluation an airline profitability on the base components of Airline Route PlanningFeb 04 2019Airline route planning takes into account the factors of commercial and customer preferences, safety, and should allow a flexibility given the tremendous uncertainty about market conditions. The mathematical model on the Bayes formula allows optimizing ... More
Smart Web Services (SmartWS) -- The Future of Services on the WebFeb 03 2019The past few years have been marked by an increased use of sensor technologies, abundant availability of mobile devices, and growing popularity of wearables, which enable the direct integration of their data as part of rich client applications. Despite ... More
A Corpus Linguistic Analysis of Public Reddit Blog Posts on Non-Suicidal Self-InjuryFeb 02 2019While non-suicidal self-injury (NSSI) is not a new phenomenon, there is still a limited yet little is still known about understanding of the behavior, the intent behind the behavior and what the individuals themselves say about their behavior. This study ... More
Filtering journal impact factor rank by specific parametersFeb 02 2019This paper reports the development of a bot to filter the journal impact factor rank by specific parameters such as papers published in a specific area during an specific period. The filter is done by an automatic search on Scopus and results are processed ... More
Big Data and Social/Medical Sciences: State of the Art and Future TrendsFeb 02 2019The explosion of data on the internet is a direct corollary of the social media platform. With petabytes of data being generated by end users, the researchers have access to unprecedented amount of data (Big Data). Such data provides an insight into user ... More
Public decision support for low population density areas: An imbalance-aware hyper-ensemble for spatio-temporal crime predictionFeb 01 2019Crime events are known to reveal spatio-temporal patterns, which can be used for predictive modeling and subsequent decision support. While the focus has hitherto been placed on areas with high population density, we address the challenging undertaking ... More
A Novel Universal Solar Energy PredictorFeb 01 2019Feb 20 2019Solar energy is one of the most economical and clean sustainable energy sources on the planet. However, the solar energy throughput is highly unpredictable due to its dependency on a plethora of conditions including weather, seasons, and other ecological/environmental ... More
Race, Ethnicity and National Origin-based Discrimination in Social Media and Hate Crimes Across 100 U.S. CitiesJan 31 2019We study malicious online content via a specific type of hate speech: race, ethnicity and national-origin based discrimination in social media, alongside hate crimes motivated by those characteristics, in 100 cities across the United States. We develop ... More
Contactless Cardiac Arrest Detection Using Smart DevicesJan 31 2019Out-of-hospital cardiac arrest (OHCA) is a leading cause of death worldwide. Rapid diagnosis and initiation of cardiopulmonary resuscitation (CPR) is the cornerstone of therapy for victims of cardiac arrest. Yet a significant fraction of cardiac arrest ... More
A Commodity SBC-Edge Cluster for Smart CitiesJan 31 2019The commodity Single Board Computers (SBCs) are increasingly becoming powerful and can execute standard operating systems and mainstream workloads. In the context of cloud-based smart city applications, SBCs can be utilized as Edge computing devices reducing ... More
Software solutions for form-based collection of data and the semantic enrichment of form dataJan 30 2019Data collection is an important part of many citizen science projects as well as other fields of research, particularly in life sciences. Mobile applications with form-based surveys are increasingly used to support this, due to the large number of mobile ... More
Noise-tolerant fair classificationJan 30 2019Fair machine learning concerns the analysis and design of learning algorithms that do not exhibit systematic bias with respect to some sensitive feature (e.g., race, gender). This subject has received sustained interest in the past few years, with considerable ... More
Building Knowledge Graphs About Political Agents in the Age of MisinformationJan 29 2019This paper presents the construction of a Knowledge Graph about relations between agents in a political system. It discusses the main modeling challenges, with emphasis on the issue of trust and provenance. Implementation decisions are also presented
Repairing without Retraining: Avoiding Disparate Impact with Counterfactual DistributionsJan 29 2019When the average performance of a prediction model varies significantly with respect to a sensitive attribute (e.g., race or gender), the performance disparity can be expressed in terms of the probability distributions of input and output variables for ... More
Improved Adversarial Learning for Fair ClassificationJan 29 2019Motivated by concerns that machine learning algorithms may introduce significant bias in classification models, developing fair classifiers has become an important problem in machine learning research. One important paradigm towards this has been providing ... More
Malicious cryptocurrency miners: Status and OutlookJan 29 2019In this study, we examine the behavior and profitability of modern malware that mines cryptocurrency. Unlike previous studies, we look at the cryptocurrency market as a whole, rather than just Bitcoin. We not only consider PCs, but also mobile phones, ... More
Quantifying the Impact of User Attention on Fair Group Representation in Ranked ListsJan 29 2019In this work we introduce a novel metric for verifying group fairness in ranked lists. Our approach relies on measuring the amount of attention given to members of a protected group and comparing it to that group's representation in the investigated population. ... More
MultiLock: Mobile Active Authentication based on Multiple Biometric and Behavioral PatternsJan 29 2019In this paper we evaluate mobile active authentication based on an ensemble of biometrics and behavior-based profiling signals. We consider seven different data channels and their combination. Touch dynamics (touch gestures and keystroking), accelerometer, ... More
Performance comparison of an AI-based Adaptive Learning System in ChinaJan 29 2019Adaptive learning systems stand apart from traditional learning systems by offering a personalized learning experience to students according to their different knowledge states. Adaptive systems collect and analyse students' behavior data, update learner ... More
Fair Regression for Health Care SpendingJan 28 2019The distribution of health care payments to insurance plans has substantial consequences for social policy. Risk adjustment formulas predict spending in health insurance markets in order to provide fair benefits and health care coverage for all enrollees, ... More
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept InventoriesJan 26 2019For two days in February 2018, 17 cybersecurity educators and professionals from government and industry met in a "hackathon" to refine existing draft multiple-choice test items, and to create new ones, for a Cybersecurity Concept Inventory (CCI) and ... More
Quantum Terrorism: Collective Vulnerability of Global Quantum SystemsJan 25 2019The major imminent investments in quantum technologies will bring concepts like a global quantum Internet and quantum Internet-of-Things, closer to reality. Our findings reveal a new form of vulnerability that will enable hostile groups of quantum-enabled ... More
Forecasting Transformative AI: An Expert SurveyJan 24 2019Transformative AI technologies have the potential to reshape critical aspects of society in the near future. However, in order to properly prepare policy initiatives for the arrival of such technologies accurate forecasts and timelines are necessary. ... More
When Machine Learning Meets Big Data: A Wireless Communication PerspectiveJan 24 2019We have witnessed an exponential growth in commercial data services, which has lead to the big data's era. Machine learning, as one of the most promising artificial intelligence tools of analyzing the deluge of data, has been invoked in many research ... More
Whole slide image registration for the study of tumor heterogeneityJan 24 2019Consecutive thin sections of tissue samples make it possible to study local variation in e.g. protein expression and tumor heterogeneity by staining for a new protein in each section. In order to compare and correlate patterns of different proteins, the ... More
Wikipedia Cultural Diversity Dataset: A Complete Cartography for 300 Language EditionsJan 23 2019In this paper we present the Wikipedia Cultural Diversity dataset. For each existing Wikipedia language edition, the dataset contains a classification of the articles that represent its associated cultural context, i.e. all concepts and entities related ... More
Evaluation of Biases in Self-reported Demographic and Psychometric Information: Traditional versus Facebook-based SurveysJan 23 2019Social media in scientific research offer a unique digital observatory of human behaviours and hence great opportunities to conduct research at large scale answering complex sociodemographic questions. We focus on the identification and assessment of ... More
Smart contracts for the Internet of Things: opportunities and challengesJan 23 2019With the Internet of Things (IoT), Things are expected to live in different "domains" and "contexts" during their lifetime. Information generated by and associated with Things should be manageable by multiple, diverse stakeholders accordingly. Moreover, ... More
A Review on Energy, Environmental, and Sustainability Implications of Connected and Automated VehiclesJan 23 2019Connected and automated vehicles (CAVs) are poised to reshape transportation and mobility by replacing humans as the driver and service provider. While the primary stated motivation for vehicle automation is to improve safety and convenience of road mobility, ... More
A Review on Energy, Environmental, and Sustainability Implications of Connected and Automated VehiclesJan 23 2019Feb 17 2019Connected and automated vehicles (CAVs) are poised to reshape transportation and mobility by replacing humans as the driver and service provider. While the primary stated motivation for vehicle automation is to improve safety and convenience of road mobility, ... More
Explaining Models: An Empirical Study of How Explanations Impact Fairness JudgmentJan 23 2019Ensuring fairness of machine learning systems is a human-in-the-loop process. It relies on developers, users, and the general public to identify fairness problems and make improvements. To facilitate the process we need effective, unbiased, and user-friendly ... More
Analytics-Driven Digital Platform for Regional Growth and Development: A Case Study from NorwayJan 22 2019Jan 25 2019In this paper, we present the growth barometer (Vekstbarometer in Norwegian), which is a digital platform that provides the development trends in the regional context in a visual and user-friendly way. The platform is developed to use open data from different ... More
Quantifying Legibility of Indoor Spaces Using Deep Convolutional Neural Networks: Case Studies in Train StationsJan 22 2019Legibility is the extent to which a space can be easily recognized. Evaluating legibility is particularly desirable in indoor spaces, since it has a large impact on human behavior and the efficiency of space utilization. However, indoor space legibility ... More
Positioning services of a travel agency in social networksJan 21 2019In this paper the methods of forming a travel company customer base by means of social networks are observed. These methods are made to involve web-users of the social networks (VK.com and Facebook) for positioning of the service of the travel agency ... More
Disturbed YouTube for Kids: Characterizing and Detecting Disturbing Content on YouTubeJan 21 2019A considerable number of the most-subscribed YouTube channels feature content popular among children of very young age. Hundreds of toddler-oriented channels on YouTube offer inoffensive, well produced, and educational videos. Unfortunately, inappropriate ... More
Discovering Eastern European PCs by hacking them. TodayJan 21 2019Computer science would not be the same without personal computers. In the West the so called PC revolution started in the late '70s and has its roots in hobbyists and do-it-yourself clubs. In the following years the diffusion of home and personal computers ... More
Earthquake Early Warning and Beyond: Systems Challenges in Smartphone-based Seismic NetworkJan 20 2019Earthquake Early Warning (EEW) systems can effectively reduce fatalities, injuries, and damages caused by earthquakes. Current EEW systems are mostly based on traditional seismic and geodetic networks, and exist only in a few countries due to the high ... More
A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks -- Prevention and Prediction for Combating TerrorismJan 19 2019Terrorism has become one of the most tedious problems to deal with and a prominent threat to mankind. To enhance counter-terrorism, several research works are developing efficient and precise systems, data mining is not an exception. Immense data is floating ... More
TEduChain: A Platform for Crowdsourcing Tertiary Education Fund using Blockchain TechnologyJan 18 2019Jan 24 2019Blockchain is an emerging technology framework for creating and storing transaction in distributed ledgers with a high degree of security and reliability. In this paper we present a blockchain-based platform to create and store contracts in between students ... More
Characterizing the Use of Images by State-Sponsored Troll Accounts on TwitterJan 17 2019Anecdotal evidence has emerged suggesting that state-sponsored organizations, like the Russian Internet Research Agency, have exploited mainstream social. Their primary goal is apparently to conduct information warfare operations to manipulate public ... More
Trends in Demand, Growth, and Breadth in Scientific Computing Training Delivered by a High-Performance Computing CenterJan 16 2019We analyze the changes in the training and educational efforts of the SciNet HPC Consortium, a Canadian academic High Performance Computing center, in the areas of Scientific Computing and High-Performance Computing, over the last six years. Initially, ... More
Survey of Bayesian Networks Applications on Unmanned Intelligent Autonomous VehiclesJan 16 2019This article review the applications of Bayesian networks on Unmanned Intelligent Autonomous Vehicles (UIAV) from the decision making point of view, which represents the final step for fully autonomous unmanned vehicles (currently under discussion). Until ... More
Bridging the Educational Gap between Emerging and Established Scientific Computing DisciplinesJan 16 2019In this paper we describe our experience in developing curriculum courses aimed at graduate students in emerging computational fields, including biology and medical science. We focus primarily on computational data analysis and statistical analysis, while ... More
Artificial Intelligence for Social GoodJan 16 2019The Computing Community Consortium (CCC), along with the White House Office of Science and Technology Policy (OSTP), and the Association for the Advancement of Artificial Intelligence (AAAI), co-sponsored a public workshop on Artificial Intelligence for ... More
Teaching Electronics and Programming in Norwegian Schools Using the air:bit Sensor KitJan 16 2019We describe lessons learned from using the air:bit project to introduce more than 150 students in the Norwegian upper secondary school to computer programming, engineering and environmental sciences. In the air:bit project, students build and code a portable ... More
Topological Analysis of Bitcoin's Lightning NetworkJan 15 2019Jan 16 2019Bitcoin's Lightning Network (LN) is a scalability solution for Bitcoin allowing transactions to be issued with negligible fees and settled instantly at scale. In order to use LN, funds need to be locked in payment channels on the Bitcoin blockchain (Layer-1) ... More
Data-driven Modelling of Smart Building Ventilation SubsystemJan 15 2019Considering the advances in building monitoring and control through networks of interconnected devices, effective handling of the associated rich data streams is becoming an important challenge. In many situations the application of conventional system ... More
Analysis of a site's integrity by 3D models and Integrated database, case study : the pic-du-midi high-mountain observatory (France)Jan 15 2019The concept of "integrity", as currently used in the analysis of World Heritage sites or cultural landscapes mainly consists of 1) the composition of a given site, regarding its origins and its current state of conservation; 2) the visual and functional ... More
Putting Fairness Principles into Practice: Challenges, Metrics, and ImprovementsJan 14 2019As more researchers have become aware of and passionate about algorithmic fairness, there has been an explosion in papers laying out new metrics, suggesting algorithms to address issues, and calling attention to issues in existing applications of machine ... More
BoostNet: Bootstrapping detection of socialbots, and a case study from GuatemalaJan 14 2019We present a method to reconstruct networks of socialbots given minimal input. Then we use Kernel Density Estimates of Botometer scores from 47,000 social networking accounts to find clusters of automated accounts, discovering over 5,000 socialbots. This ... More
Critical Incidents for Technology Enhanced Learning in Vocational Education and Training - Observations from the field of mechanical engineeringJan 13 2019In this study, observations of the Vocational Education and Training (VET) in mechanical engineering companies are carried out. A Learning Management System (LMS) had been developed for the assistance in solving typical task structures, that are used ... More