当前期刊: arXiv - CS - Computers and Society Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • Data Science: Challenges and Directions
    arXiv.cs.CY Pub Date : 2020-06-28
    Longbing Cao

    While data science has emerged as a contentious new scientific field, enormous debates and discussions have been made on it why we need data science and what makes it as a science. In reviewing hundreds of pieces of literature which include data science in their titles, we find that the majority of the discussions essentially concern statistics, data mining, machine learning, big data, or broadly data

    更新日期:2020-07-01
  • Human Mobility during COVID-19 in the Context of Mild Social Distancing: Implications for Technological Interventions
    arXiv.cs.CY Pub Date : 2020-06-28
    Myeong Lee; Seongkyu Lee; Seonghoon Kim; Noseong Park

    The COVID-19 pandemic has brought both tangible and intangible damage to our society. Many researchers studied about its societal impacts in the countries that had implemented strong social distancing measures such as stay-at-home orders. Among them, human mobility has been studied extensively due to its importance in flattening the curve. However, mobility has not been actively studied in the context

    更新日期:2020-07-01
  • Data Science: Nature and Pitfalls
    arXiv.cs.CY Pub Date : 2020-06-28
    Longbing Cao

    Data science is creating very exciting trends as well as significant controversy. A critical matter for the healthy development of data science in its early stages is to deeply understand the nature of data and data science, and to discuss the various pitfalls. These important issues motivate the discussions in this article.

    更新日期:2020-07-01
  • Digital Contact Tracing Service: An improved decentralized design for privacy and effectiveness
    arXiv.cs.CY Pub Date : 2020-06-29
    Kilian Holzapfel; Martina Karl; Linus Lotz; Georg Carle; Christian Djeffal; Christian Fruck; Christian Haack; Dirk Heckmann; Philipp H. Kindt; Michael Köppl; Patrick Krause; Lolian Shtembari; Lorenz Marx; Stephan Meighen-Berger; Birgit Neumair; Matthias Neumair; Julia Pollmann; Tina Pollmann; Elisa Resconi; Stefan Schönert; Andrea Turcati; Christoph Wiesinger; Giovanni Zattera; Christopher Allan; Esteban

    We propose a decentralized digital contact tracing service that preserves the users' privacy by design while complying to the highest security standards. Our approach is based on Bluetooth and measures actual encounters of people, the contact time period, and estimates the proximity of the contact. We trace the users' contacts and the possible spread of infectious diseases while preventing location

    更新日期:2020-07-01
  • A Deep Learning Pipeline for Patient Diagnosis Prediction Using Electronic Health Records
    arXiv.cs.CY Pub Date : 2020-06-23
    Leopold Franz; Yash Raj Shrestha; Bibek Paudel

    Augmentation of disease diagnosis and decision-making in healthcare with machine learning algorithms is gaining much impetus in recent years. In particular, in the current epidemiological situation caused by COVID-19 pandemic, swift and accurate prediction of disease diagnosis with machine learning algorithms could facilitate identification and care of vulnerable clusters of population, such as those

    更新日期:2020-07-01
  • Ethical Analysis on the Application of Neurotechnology for Human Augmentation in Physicians and Surgeons
    arXiv.cs.CY Pub Date : 2020-06-23
    Soaad Hossain; Syed Ishtiaque Ahmed

    With the shortage of physicians and surgeons and increase in demand worldwide due to situations such as the COVID-19 pandemic, there is a growing interest in finding solutions to help address the problem. A solution to this problem would be to use neurotechnology to provide them augmented cognition, senses and action for optimal diagnosis and treatment. Consequently, doing so can negatively impact

    更新日期:2020-07-01
  • Large image datasets: A pyrrhic win for computer vision?
    arXiv.cs.CY Pub Date : 2020-06-24
    Vinay Uday Prabhu; Abeba Birhane

    In this paper we investigate problematic practices and consequences of large scale vision datasets. We examine broad issues such as the question of consent and justice as well as specific concerns such as the inclusion of verifiably pornographic images in datasets. Taking the ImageNet-ILSVRC-2012 dataset as an example, we perform a cross-sectional model-based quantitative census covering factors such

    更新日期:2020-07-01
  • Zur Modellierung und Klassifizierung von Kompetenzen in der grundlegenden Programmierausbildung anhand der Anderson Krathwohl Taxonomie
    arXiv.cs.CY Pub Date : 2020-06-24
    Natalie Kiesler

    This research paper focusses on the competences expected from computer science novices in the domain of basic programming and how they can be classified. By means of a qualitative content analysis of current learning objectives at German universities and the perspective of university teachers, basic programming competencies are identified. Since the competency model proposed by the German Society of

    更新日期:2020-07-01
  • Interdependence in active mobility adoption: Joint modelling and motivational spill-over in walking, cycling and bike-sharing
    arXiv.cs.CY Pub Date : 2020-06-24
    M Said; A Biehl; A Stathopoulos

    Active mobility, traditionally referring to modes requiring physical activity to operate, offers an array of physical, emotional, and social well-being benefits. However, with the proliferation of the sharing economy, new nonmotorized means of transport are entering the fold, complementing some existing mobility options while competing with others. The purpose of this research is to investigate the

    更新日期:2020-07-01
  • Synthesizing Tasks for Block-based Programming
    arXiv.cs.CY Pub Date : 2020-06-17
    Umair Ahmed; Maria Christakis; Aleksandr Efremov; Nigel Fernandez; Ahana Ghosh; Abhik Roychoudhury; Adish Singla

    Block-based visual programming environments play a critical role in introducing computing concepts to K-12 students. One of the key pedagogical challenges in these environments is in designing new practice tasks for a student that match a desired level of difficulty and exercise specific programming concepts. In this paper, we formalize the problem of synthesizing visual programming tasks. In particular

    更新日期:2020-07-01
  • HGKT : Introducing Problem Schema with Hierarchical Exercise Graph for Knowledge Tracing
    arXiv.cs.CY Pub Date : 2020-06-13
    Hanshuang Tong; Yun Zhou; Zhen Wang

    Knowledge tracing (KT) which aims at predicting learner's knowledge mastery plays an important role in the computer-aided educational system. Given learners' exercise records, a knowledge tracing model can trace their hidden knowledge state dynamically. In recent years, many deep learning models have been applied to tackle the KT task, which has shown promising results. However, they still have limitations

    更新日期:2020-07-01
  • Turbulence on the Global Economy influenced by Artificial Intelligence and Foreign Policy Inefficiencies
    arXiv.cs.CY Pub Date : 2020-06-19
    Kwadwo Osei Bonsu; Jie Song

    It is said that Data and Information are the new oil. One, who handles the data, handles the emerging future of the global economy. Complex algorithms and intelligence-based filter programs are utilized to manage, store, handle and maneuver vast amounts of data for the fulfillment of specific purposes. This paper seeks to find the bridge between artificial intelligence and its impact on the international

    更新日期:2020-07-01
  • A data science approach to drug safety: Semantic and visual mining of adverse drug events from clinical trials of pain treatments
    arXiv.cs.CY Pub Date : 2020-06-19
    Jean-Baptiste Lamy

    Clinical trials are the basis of Evidence-Based Medicine. Trial results are reviewed by experts and consensus panels for producing meta-analyses and clinical practice guidelines. However, reviewing these results is a long and tedious task, hence the meta-analyses and guidelines are not updated each time a new trial is published. Moreover, the independence of experts may be difficult to appraise. On

    更新日期:2020-07-01
  • From Simple Features to Moving Features and Beyond?
    arXiv.cs.CY Pub Date : 2020-06-26
    Anita Graser; Esteban Zimányi; Krishna Chaitanya Bommakanti

    Mobility data science lacks common data structures and analytical functions. This position paper assesses the current status and open issues towards a universal API for mobility data science. In particular, we look at standardization efforts revolving around the OGC Moving Features standard which, so far, has not attracted much attention within the mobility data science community. We discuss the hurdles

    更新日期:2020-07-01
  • A Systematic Review of the Digital Interventions for Fighting COVID-19: The Bangladesh Perspective
    arXiv.cs.CY Pub Date : 2020-06-28
    Muhammad Nazrul Islam; A. K. M. Najmul Islam

    The objective of this paper is to synthesize the digital interventions initiatives to fight against COVID-19 in Bangladesh and compare with other countries. In order to obtain our research objective, we conducted a systematic review of the online content. We first reviewed the digital interventions that have been used to fight against COVID-19 across the globe. We then reviewed the initiatives that

    更新日期:2020-07-01
  • Combating Anti-Blackness in the AI Community
    arXiv.cs.CY Pub Date : 2020-06-18
    Devin Guillory

    In response to a national and international awakening on the issues of anti-Blackness and systemic discrimination, we have penned this piece to serve as a resource for allies in the AI community who are wondering how they can more effectively engage with dismantling racist systems. This work aims to help elucidate areas where the AI community actively and passively contributes to anti-Blackness and

    更新日期:2020-07-01
  • I call BS: Fraud Detection in Crowdfunding Campaigns
    arXiv.cs.CY Pub Date : 2020-06-30
    Beatrice Perez; Sara R. Machado; Jerone T. A. Andrews; Nicolas Kourtellis

    Donations to charity-based crowdfunding environments have been on the rise in the last few years. Unsurprisingly, deception and fraud in such platforms have also increased, but have not been thoroughly studied to understand what characteristics can expose such behavior and allow its automatic detection and blocking. Indeed, crowdfunding platforms are the only ones typically performing oversight for

    更新日期:2020-07-01
  • The COVID-19 pandemic's impact on U.S. electricity demand and supply: an early view from the data
    arXiv.cs.CY Pub Date : 2020-06-30
    Duzgun Agdas; Prabir Barooah

    After the onset of the recent COVID-19 pandemic, a number of studies reported on possible changes in electricity consumption trends. The overall theme of these reports was that ``electricity use has decreased during the pandemic, but the power grid is still reliable''---mostly due to reduced economic activity. In this paper we analyze electricity data upto end of May 2020, examining both electricity

    更新日期:2020-07-01
  • A perspective on how to conduct responsible anti-human trafficking research in operations and analytics
    arXiv.cs.CY Pub Date : 2020-06-30
    Renata Konrad; Kayse Lee Maass; Andrew C. Trapp

    Human trafficking, the commercial exploitation of individuals, is a gross violation of human rights and harms societies, economies, health and development. The related disciplines of Operations Management (OM), Analytics, and Operations Research (OR) are uniquely positioned to support trafficking prevention and intervention efforts by efficiently evaluating a plethora of decision alternatives, and

    更新日期:2020-07-01
  • Reading Between the Demographic Lines: Resolving Sources of Bias in Toxicity Classifiers
    arXiv.cs.CY Pub Date : 2020-06-29
    Elizabeth Reichert; Helen Qiu; Jasmine Bayrooti

    The censorship of toxic comments is often left to the judgment of imperfect models. Perspective API, a creation of Google technology incubator Jigsaw, is perhaps the most widely used toxicity classifier in industry; the model is employed by several online communities including The New York Times to identify and filter out toxic comments with the goal of preserving online safety. Unfortunately, Google's

    更新日期:2020-07-01
  • Bucking the Trend: An Agentive Perspective of Managerial Influence on Blogs Attractiveness
    arXiv.cs.CY Pub Date : 2020-06-30
    Carlos Denner dos Santos; Isadora Castro; George Kuk; Silvia Onoyama; Marina Moreira

    Blog management is central to the digitalization of work. However, existing theories tend to focus on environmental influence rather than managerial control of a blogs attractiveness at a microlevel. This study provides an agentive account of the adaptive behaviours exerted by the bloggers through the ways they use contents of their blogs to locate and harness their structural network positions of

    更新日期:2020-07-01
  • Mobile Link Prediction: Automated Creation and Crowd-sourced Validation of Knowledge Graphs
    arXiv.cs.CY Pub Date : 2020-06-30
    Mark Christopher Ballandies; Evangelos Pournaras

    Building trustworthy knowledge graphs for cyber-physical social systems (CPSS) is a challenge. In particular, current approaches relying on human experts have limited scalability, while automated approaches are often not accountable to users resulting in knowledge graphs of questionable quality. This paper introduces a novel pervasive knowledge graph builder that brings together automation, experts'

    更新日期:2020-07-01
  • On the Applicability of ML Fairness Notions
    arXiv.cs.CY Pub Date : 2020-06-30
    Karima Makhlouf; Sami Zhioua; Catuscia Palamidessi

    ML-based predictive systems are increasingly used to support decisions with a critical impact on individuals' lives such as college admission, job hiring, child custody, criminal risk assessment, etc. As a result, fairness emerged as an important requirement to guarantee that predictive systems do not discriminate against specific individuals or entire sub-populations, in particular, minorities. Given

    更新日期:2020-07-01
  • Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory
    arXiv.cs.CY Pub Date : 2020-06-29
    Ploy Unchit; Sanchari Das; Andrew Kim; L. Jean Camp

    Spear phishing is a deceptive attack that uses social engineering to obtain confidential information through targeted victimization. It is distinguished by its use of social cues and personalized information to target specific victims. Previous work on resilience to spear phishing has focused on convenience samples, with a disproportionate focus on students. In contrast, here, we report on an evaluation

    更新日期:2020-07-01
  • Legal Risks of Adversarial Machine Learning Research
    arXiv.cs.CY Pub Date : 2020-06-29
    Ram Shankar Siva Kumar; Jonathon Penney; Bruce Schneier; Kendra Albert

    Adversarial Machine Learning is booming with ML researchers increasingly targeting commercial ML systems such as those used in Facebook, Tesla, Microsoft, IBM, Google to demonstrate vulnerabilities. In this paper, we ask, "What are the potential legal risks to adversarial ML researchers when they attack ML systems?" Studying or testing the security of any operational system potentially runs afoul the

    更新日期:2020-06-30
  • Passive Wi-Fi Monitoring in Public Transport: A case study in the Madeira Island
    arXiv.cs.CY Pub Date : 2020-06-29
    Miguel Ribeiro; Bernardo Galvão; Catia Prandi; Nuno Nunes

    Transportation has become of evermore importance in the last years, affecting people's satisfaction and significantly impacting their quality of life. In this paper we present a low-cost infrastructure to collect passive Wi-Fi probes with the aim of monitoring, optimizing and personalizing public transport, towards a more sustainable mobility. We developed an embedded system deployed in 19 public transportation

    更新日期:2020-06-30
  • CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks
    arXiv.cs.CY Pub Date : 2020-06-29
    Shehroze Farooqi; Maaz Musa; Zubair Shafiq; Fareed Zaffar

    Online social networks support a vibrant ecosystem of third-party apps that get access to personal information of a large number of users. Despite several recent high-profile incidents, methods to systematically detect data misuse by third-party apps on online social networks are lacking. We propose CanaryTrap to detect misuse of data shared with third-party apps. CanaryTrap associates a honeytoken

    更新日期:2020-06-30
  • A method to calculate Great Britains half-hourly electrical demand from publicly available data
    arXiv.cs.CY Pub Date : 2020-06-28
    IA Grant Wilson; Shivangi Sharma; Joseph Day; Noah Godfrey

    Publicly available electrical generation and interconnector data is combined to create a half-hourly dataset for Great Britains electrical demand. The method uses Elexon data for power plants connected at the transmission level, monitored as part of the balancing mechanism, and combines these with the estimates for embedded generation for solar and wind generation from the system operator National

    更新日期:2020-06-30
  • Selling sex: what determines rates and popularity? An analysis of 11.5 thousand online profiles
    arXiv.cs.CY Pub Date : 2020-06-28
    Alicia Mergenthaler; Taha Yasseri

    Sex work, or the exchange of sexual services for money or goods, is ubiquitous across eras and cultures. However, the practice of selling sex is often hidden due to stigma and the varying legal status of sex work. Online platforms that sex workers use to advertise services have become an increasingly important tool in studying a market that is largely hidden. Although prior literature has primarily

    更新日期:2020-06-30
  • A Case Study to Identify the Hindrances to Widespread Adoption of Electric Vehicles in Qatar
    arXiv.cs.CY Pub Date : 2020-06-27
    Amith Khandakar; Annaufal Rizqullah; Anas Ashraf Abdou Berbar; Mohammad Rafi Ahmed; Atif Iqbal; Muhammad E. H. Chowdhury; S. M. Ashfaq Uz Zaman

    The adoption of electric vehicles (EVs) have proven to be a crucial factor to decreasing the emission of greenhouse gases (GHG) into the atmosphere. However, there are various hurdles that impede people from purchasing EVs. For example, long charging time, short driving range, cost and insufficient charging infrastructures available, etc. This article reports the public perception of EV-adoption using

    更新日期:2020-06-30
  • Mapping the South African health landscape in response to COVID-19
    arXiv.cs.CY Pub Date : 2020-06-26
    Nompumelelo Mtsweni; Herkulaas MvE Combrink; Vukosi Marivate

    When the COVID-19 disease pandemic infiltrated the world, there was an immediate need for accurate information. As with any outbreak, the outbreak follows a clear trajectory, and subsequently, the supporting information for that outbreak needs to address the needs associated with that stage of the outbreak. At first, there was a need to inform the public of the information related to the initial situation

    更新日期:2020-06-30
  • Distributed consent and its impact on privacy and observability in social networks
    arXiv.cs.CY Pub Date : 2020-06-29
    Juniper Lovato; Antoine Allard; Randall Harp; Laurent Hébert-Dufresne

    Personal data is not discrete in socially-networked digital environments. A single user who consents to allow access to their own profile can thereby expose the personal data of their network connections to non-consented access. The traditional (informed individual) consent model is therefore not appropriate in online social networks where informed consent may not be possible for all users affected

    更新日期:2020-06-30
  • An Analysis of Academic Performance of University Students in Namibia
    arXiv.cs.CY Pub Date : 2020-06-26
    Nils Clausen

    Based on observations it seems that a considerable proportion of university students in Namibia need to enhance their academic performance in regard to be fully competitive in a globalised working environment. This specifically includes thorough understanding of mathematics, as it forms an integral part of modern knowledge disciplines such as information technology and the management sciences. Yet

    更新日期:2020-06-30
  • Privacy Risk and Preservation For COVID-19 Contact Tracing Apps
    arXiv.cs.CY Pub Date : 2020-06-27
    Dong Wang; Fang Liu

    Contact tracing in the COVID-19 pandemic is key to prevent the further spread of COVID-19. Countries and regions around the world have developed and deployed or are considering adopting contact-tracing software or mobile apps. While contact tracing apps and software play an important role in the pandemic, red flags have been raised regarding the privacy risk associated with contact tracing. In this

    更新日期:2020-06-30
  • Interdisciplinary research and technological impact
    arXiv.cs.CY Pub Date : 2020-06-27
    Qing Ke

    Interdisciplinary research has been considered as a solution to today's complex societal challenges. While its relationship with scientific impact has been extensively studied, the technological impact of interdisciplinary research remains unexplored. Here, we examine how interdisciplinarity is associated with technological impact at the paper level. We measure the degree of interdisciplinarity of

    更新日期:2020-06-30
  • Uncovering socioeconomic gaps in mobility reduction during the COVID-19 pandemic using location data
    arXiv.cs.CY Pub Date : 2020-06-26
    Samuel P. Fraiberger; Pablo Astudillo; Lorenzo Candeago; Alex Chunet; Nicholas K. W. Jones; Maham Faisal Khan; Bruno Lepri; Nancy Lozano Gracia; Lorenzo Lucchini; Emanuele Massaro; Aleister Montfort

    Using smartphone location data from Colombia, Mexico, and Indonesia, we investigate how non-pharmaceutical policy interventions intended to mitigate the spread of the COVID-19 pandemic impact human mobility. In all three countries, we find that following the implementation of mobility restriction measures, human movement decreased substantially. Importantly, we also uncover large and persistent differences

    更新日期:2020-06-30
  • Could regulating the creators deliver trustworthy AI?
    arXiv.cs.CY Pub Date : 2020-06-26
    Labhaoise Ni Fhaolain; Andrew Hines

    Is a new regulated profession, such as Artificial Intelligence (AI) Architect who is responsible and accountable for AI outputs necessary to ensure trustworthy AI? AI is becoming all pervasive and is often deployed in everyday technologies, devices and services without our knowledge. There is heightened awareness of AI in recent years which has brought with it fear. This fear is compounded by the inability

    更新日期:2020-06-29
  • Towards an automated repository for indexing, analysis and characterization of municipal e-government websites in Mexico
    arXiv.cs.CY Pub Date : 2020-06-26
    Sergio R. Coria; Leonardo Marcos-Santiago; Christian A. Cruz-Melendez; Juan M. Jimenez-Canseco

    This article addresses a problem in the electronic government discipline with special interest in Mexico: the need for a concentrated and updated information source about municipal e-government websites. One reason for this is the lack of a complete and updated database containing the electronic addresses (web domain names) of the municipal governments having a website. Due to diverse causes, not all

    更新日期:2020-06-29
  • New Metrics for Learning Evaluation in Digital Education Platforms
    arXiv.cs.CY Pub Date : 2020-06-25
    Gabriel Leitão; Juan Colonna; Edwin Monteiro; Elaine Oliveira; Raimundo Barreto

    Technology applied in education can provide great benefits and overcome challenges by facilitating access to learning objects anywhere and anytime. However, technology alone is not enough, since it requires suitable planning and learning methodologies. Using technology can be problematic, especially in determining whether learning has occurred or not. Futhermore, if learning has not occured, technology

    更新日期:2020-06-29
  • The State of AI Ethics Report (June 2020)
    arXiv.cs.CY Pub Date : 2020-06-25
    Abhishek GuptaMontreal AI Ethics InstituteMicrosoft; Camylle LanteigneMontreal AI Ethics InstituteMcGill University; Victoria HeathMontreal AI Ethics InstituteCreative Commons; Marianna Bergamaschi GanapiniMontreal AI Ethics InstituteUnion College; Erick GalinkinMontreal AI Ethics InstituteRapid7; Allison CohenMontreal AI Ethics InstituteAI Global; Tania De GasperisMontreal AI Ethics InstituteOCAD

    These past few months have been especially challenging, and the deployment of technology in ways hitherto untested at an unrivalled pace has left the internet and technology watchers aghast. Artificial intelligence has become the byword for technological progress and is being used in everything from helping us combat the COVID-19 pandemic to nudging our attention in different directions as we all spend

    更新日期:2020-06-29
  • Machine learning-based clinical prediction modeling -- A practical guide for clinicians
    arXiv.cs.CY Pub Date : 2020-06-23
    Julius M. Kernbach; Victor E. Staartjes

    In the emerging era of big data, larger available clinical datasets and computational advances have sparked a massive interest in machine learning-based approaches. The number of manuscripts related to machine learning or artificial intelligence has exponentially increased over the past years. As analytical machine learning tools become readily available for clinicians to use, the understanding of

    更新日期:2020-06-29
  • CyRes -- Avoiding Catastrophic Failure in Connected and Autonomous Vehicles (Extended Abstract)
    arXiv.cs.CY Pub Date : 2020-06-26
    Carsten Maple; Peter Davies; Kerstin Eder; Chris Hankin; Greg Chance; Gregory Ephiphaniou

    Existing approaches to cyber security and regulation in the automotive sector cannot achieve the quality of outcome necessary to ensure the safe mass deployment of advanced vehicle technologies and smart mobility systems. Without sustainable resilience hard-fought public trust will evaporate, derailing emerging global initiatives to improve the efficiency, safety and environmental impact of future

    更新日期:2020-06-29
  • An Interactive Data Visualization and Analytics Tool to Evaluate Mobility and Sociability Trends During COVID-19
    arXiv.cs.CY Pub Date : 2020-06-26
    Fan Zuo; Jingxing Wang; Jingqin Gao; Kaan Ozbay; Xuegang Jeff Ban; Yubin Shen; Hong Yang; Shri Iyer

    The COVID-19 outbreak has dramatically changed travel behavior in affected cities. The C2SMART research team has been investigating the impact of COVID-19 on mobility and sociability. New York City (NYC) and Seattle, two of the cities most affected by COVID-19 in the U.S. were included in our initial study. An all-in-one dashboard with data mining and cloud computing capabilities was developed for

    更新日期:2020-06-29
  • Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting
    arXiv.cs.CY Pub Date : 2020-06-26
    Will Abramson; Nicole E. van Deursen; William J Buchanan

    A substantial administrative burden is placed on healthcare professionals as they manage and progress through their careers. Identity verification, pre-employment screening and appraisals: the bureaucracy associated with each of these processes takes precious time out of a healthcare professional's day. Time that could have been spent focused on patient care. In the midst of the COVID-19 crisis, it

    更新日期:2020-06-29
  • On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities
    arXiv.cs.CY Pub Date : 2020-06-25
    Paul M. Berges; Basavesh Ammanaghatta Shivakumar; Timothy Graziano; Ryan Gerdes; Z. Berkay Celik

    Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and inexpensive

    更新日期:2020-06-29
  • LPar -- A Distributed Multi Agent platform for building Polyglot, Omni Channel and Industrial grade Natural Language Interfaces
    arXiv.cs.CY Pub Date : 2020-06-25
    Pranav Sharma

    The goal of serving and delighting customers in a personal and near human like manner is very high on automation agendas of most Enterprises. Last few years, have seen huge progress in Natural Language Processing domain which has led to deployments of conversational agents in many enterprises. Most of the current industrial deployments tend to use Monolithic Single Agent designs that model the entire

    更新日期:2020-06-29
  • Blockchain-Based Applications in Higher Education: A Systematic Mapping Study
    arXiv.cs.CY Pub Date : 2020-06-25
    B. Awaji; E. Solaiman; A. Albshri

    The utilisation of blockchain has moved beyond digital currency to other fields such as health, the Internet of Things, and education. In this paper, we present a systematic mapping study to collect and analyse relevant research on blockchain technology related to the higher education field. The paper concentrates on two main themes. First, it examines state of the art in blockchain-based applications

    更新日期:2020-06-26
  • Case study: Mapping potential informal settlements areas in Tegucigalpa with machine learning to plan ground survey
    arXiv.cs.CY Pub Date : 2020-06-25
    Federico Bayle; Damian E. Silvani

    Data collection through censuses is conducted every 10 years on average in Latin America, making it difficult to monitor the growth and support needed by communities living in these settlements. Conducting a field survey requires logistical resources to be able to do it exhaustively. The increasing availability of open data, high-resolution satellite images, and free software to process them allow

    更新日期:2020-06-26
  • Fair navigation planning: a humanitarian robot use case
    arXiv.cs.CY Pub Date : 2020-06-25
    Martim Brandao

    In this paper we investigate potential issues of fairness related to the motion of mobile robots. We focus on the particular use case of humanitarian mapping and disaster response. We start by showing that there is a fairness dimension to robot navigation, and use a walkthrough example to bring out design choices and issues that arise during the development of a fair system. We discuss indirect discrimination

    更新日期:2020-06-26
  • On the Nature of Programming Exercises
    arXiv.cs.CY Pub Date : 2020-06-25
    Alberto Simões; Ricardo Queirós

    There are countless reasons cited in scientific studies to explain the difficulties in programming learning. The reasons range from the subject's complexity, the ineffective teaching and study methods, to psychological aspects such as demotivation. Still, learning programming often boils down to practice on exercise solving. Hence, it is essential to understand that the nature of a programming exercise

    更新日期:2020-06-26
  • Snitches Get Stitches: On The Difficulty of Whistleblowing
    arXiv.cs.CY Pub Date : 2020-06-25
    Mansoor Ahmed-Rengers; Ross Anderson; Darija Halatova; Ilia Shumailov

    One of the most critical security protocol problems for humans is when you are betraying a trust, perhaps for some higher purpose, and the world can turn against you if you're caught. In this short paper, we report on efforts to enable whistleblowers to leak sensitive documents to journalists more safely. Following a survey of cases where whistleblowers were discovered due to operational or technological

    更新日期:2020-06-26
  • Usability, Accessibility and Web Security Assessment of E-government Websites in Tanzania
    arXiv.cs.CY Pub Date : 2020-06-25
    Noe Elisa

    In spite of the fact that e-government agency (ega) in Tanzania emphasize on the use of ICT within public institutions in Tanzania, accessibility, usability and web security vulnerabilities are still not considered by the majority of web developers. The main objective of this study is to assess the usability, accessibility and web security vulnerabilities of selected Tanzania e-government websites

    更新日期:2020-06-26
  • Confidential Computing for Privacy-Preserving Contact Tracing
    arXiv.cs.CY Pub Date : 2020-06-25
    David Sturzenegger; Aetienne Sardon; Stefan Deml; Thomas Hardjono

    Contact tracing is paramount to fighting the pandemic but it comes with legitimate privacy concerns. This paper proposes a system enabling both, contact tracing and data privacy. We propose the use of the Intel SGX trusted execution environment to build a privacy-preserving contact tracing backend. While the concept of a confidential computing backend proposed in this paper can be combined with any

    更新日期:2020-06-26
  • A Protocol to Convert Infrastructure Data from Computer-Aided Design (CAD) to Geographic Information Systems (GIS)
    arXiv.cs.CY Pub Date : 2020-06-25
    Eric Sergio Boria; Mohamed Badhrudeen; Guillemette Fonteix; Sybil Derrible; Michael Siciliano

    While many municipalities and organizations see value in converting infrastructure data from Computer-Aided Design (CAD) to Geographic Information System (GIS) format, the process can be complex, expensive, and time-consuming. Given that municipal employees often prefer to continue performing work in both CAD and GIS, depending on the type of work required, an improved conversion process would help

    更新日期:2020-06-26
  • Mobility operator resource-pooling contract design to hedge against network disruptions
    arXiv.cs.CY Pub Date : 2020-06-25
    Theodoros P. Pantelidis; Joseph Y. J. Chow; Oded Cats

    Public transportation delays due to systematic failures have a major impact on network users. We propose designing capacity pooling contracts to facilitate horizontal cooperation among operators to mitigate those costs and improve service resilience. When two or more public transport providers agree upon sharing resources, the total transportation costs can be reduced due to added flexibility in the

    更新日期:2020-06-26
  • Differentially Private Health Tokens for Estimating COVID-19 Risk
    arXiv.cs.CY Pub Date : 2020-06-25
    David Butler; Chris Hicks; James Bell; Carsten Maple; Jon Crowcroft

    In the fight against Covid-19, many governments and businesses are in the process of evaluating, trialling and even implementing so-called immunity passports. Also known as antibody or health certificates, there is a clear demand for this technology that could allow people to return to work without placing others at risk. One of the major criticisms of health certificates is that they could be misused

    更新日期:2020-06-26
  • Privacy at Facebook Scale
    arXiv.cs.CY Pub Date : 2020-06-25
    Paulo Tanaka; Sameet Sapra; Nikolay Laptev

    Most organizations today collect data across every facet of their business. There becomes no shortage of data in these businesses as this data eventually gets copied, transformed, and scattered across the organization's data warehouse. During privacy-related audits, organizations are required to locate all instances of a certain type of data to enforce privacy and security related policies around this

    更新日期:2020-06-26
  • Design And Develop Network Storage Virtualization By Using GNS3
    arXiv.cs.CY Pub Date : 2020-06-24
    Abdul Ahad Abro; Ufaque Shaikh

    Virtualization is an emerging and optimistic prospect in the IT industry. Its impact has a footprint widely in digital infrastructure. Many innovativeness sectors utilized the concept of virtualization to reduce the cost of frameworks. In this paper, we have designed and developed storage virtualization for physical functional solutions. It is an auspicious type of virtualization that is accessible

    更新日期:2020-06-26
  • K-Prototype Segmentation Analysis on Large-scale Ridesourcing Trip Data
    arXiv.cs.CY Pub Date : 2020-06-24
    J Soria; Y Chen; A Stathopoulos

    Shared mobility-on-demand services are expanding rapidly in cities around the world. As a prominent example, app-based ridesourcing is becoming an integral part of many urban transportation ecosystems. Despite the centrality, limited public availability of detailed temporal and spatial data on ridesourcing trips has limited research on how new services interact with traditional mobility options and

    更新日期:2020-06-25
  • A Cloud Computing Capability Model for Large-Scale Semantic Annotation
    arXiv.cs.CY Pub Date : 2020-06-24
    Oluwasegun Adedugbe; Elhadj Benkhelifa

    Semantic technologies are designed to facilitate context-awareness for web content, enabling machines to understand and process them. However, this has been faced with several challenges, such as disparate nature of existing solutions and lack of scalability in proportion to web scale. With a holistic perspective to web content semantic annotation, this paper focuses on leveraging cloud computing for

    更新日期:2020-06-25
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
自然科研论文编辑服务
ACS ES&T Engineering
ACS ES&T Water
屿渡论文,编辑服务
鲁照永
复旦大学
苏州大学
南京工业大学
南开大学
中科大
唐勇
跟Nature、Science文章学绘图
隐藏1h前已浏览文章
中洪博元
课题组网站
新版X-MOL期刊搜索和高级搜索功能介绍
ACS材料视界
x-mol收录
广东实验室
南京大学
陈永胜
南科大
刘尊峰
湖南大学
清华大学
王小野
中山大学化学工程与技术学院
试剂库存
天合科研
down
wechat
bug