Skip Content
You are currently on the new version of our website. Access the old version .

Information, Volume 10, Issue 8

2019 August - 19 articles

Cover Story: Attention and activity seem to follow conflicting dynamics. On the one hand, humans have limited abilities to keep up with larger number of peers or topics: social and semantic attention capacities are generally limited. On the other hand, there appear to be occasions of reinforcing coupling between attention and activity. We used Twitter as a platform, featuring both social network and semantic capabilities, to study attention in a way that encompasses both interaction and information processing. We observed that most users possess a “two-level flow of attention” by first focusing on a core of peers or topics and then redistributing their attention uniformly within that range. Further, we found strong correlation between an individual’s social and semantic attention. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (19)

  • Article
  • Open Access
2 Citations
4,537 Views
18 Pages

20 August 2019

The current trend in the European Union (EU) is to support the development of online dispute resolution (ODR) that saves financial and human resources. Therefore, research articles mainly deal with the design of new ODR solutions, without researching...

  • Article
  • Open Access
3 Citations
8,539 Views
18 Pages

Network Anomaly Detection by Using a Time-Decay Closed Frequent Pattern

  • Ying Zhao,
  • Junjun Chen,
  • Di Wu,
  • Jian Teng,
  • Nabin Sharma,
  • Atul Sajjanhar and
  • Michael Blumenstein

17 August 2019

Anomaly detection of network traffic flows is a non-trivial problem in the field of network security due to the complexity of network traffic. However, most machine learning-based detection methods focus on network anomaly detection but ignore the us...

  • Feature Paper
  • Article
  • Open Access
13 Citations
6,735 Views
16 Pages

16 August 2019

This article empirically demonstrates the impacts of truthfully sharing forecast information and using forecast combinations in a fast-moving-consumer-goods (FMCG) supply chain. Although it is known a priori that sharing information improves the over...

  • Article
  • Open Access
17 Citations
8,013 Views
33 Pages

16 August 2019

An important problem in machine learning is that, when using more than two labels, it is very difficult to construct and optimize a group of learning functions that are still useful when the prior distribution of instances is changed. To resolve this...

  • Review
  • Open Access
6 Citations
5,964 Views
15 Pages

Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing

  • Jie Yuan,
  • Erxia Li,
  • Chaoqun Kang,
  • Fangyuan Chang and
  • Xiaoyong Li

15 August 2019

Mobile edge computing (MEC) effectively integrates wireless network and Internet technologies and adds computing, storage, and processing functions to the edge of cellular networks. This new network architecture model can deliver services directly fr...

  • Article
  • Open Access
11 Citations
4,048 Views
16 Pages

14 August 2019

With the construction of the urban rail transit (URT) network, the explosion of passenger volume is more rapid than the increased capacity of the newly built infrastructure, which results in serious passenger flow congestion (PLC). Understanding the...

  • Article
  • Open Access
19 Citations
7,484 Views
15 Pages

Visual Saliency Prediction Based on Deep Learning

  • Bashir Ghariba,
  • Mohamed S. Shehata and
  • Peter McGuire

12 August 2019

Human eye movement is one of the most important functions for understanding our surroundings. When a human eye processes a scene, it quickly focuses on dominant parts of the scene, commonly known as a visual saliency detection or visual attention pre...

  • Article
  • Open Access
7 Citations
8,530 Views
20 Pages

9 August 2019

Unmanned and unwomaned aerial vehicles (UAV), or drones, are breaking and creating new boundaries of image-based communication. Using social network analysis and critical discourse analysis, we examine the 60 most popular question threads about drone...

  • Feature Paper
  • Article
  • Open Access
26 Citations
9,501 Views
14 Pages

8 August 2019

There has been an enormous technological boom that impacted all areas of geoscience in the past few decades. Part of the change was also the process of democratization of cartography as well as geographic information systems (GIS), together with new...

  • Article
  • Open Access
12 Citations
4,921 Views
18 Pages

Experimenting Mobile and e-Health Services with Frail MCI Older People

  • Franca Delmastro,
  • Cristina Dolciotti,
  • Davide La Rosa,
  • Flavio Di Martino,
  • Massimo Magrini,
  • Simone Coscetti and
  • Filippo Palumbo

5 August 2019

The ageing population has become an increasing phenomenon world-wide, leading to a growing need for specialised help. Improving the quality of life of older people can lower the risk of depression and social isolation, but it requires a multi-dimensi...

  • Article
  • Open Access
30 Citations
8,083 Views
15 Pages

Aggregation of Linked Data in the Cultural Heritage Domain: A Case Study in the Europeana Network

  • Nuno Freire,
  • René Voorburg,
  • Roland Cornelissen,
  • Sjors de Valk,
  • Enno Meijers and
  • Antoine Isaac

30 July 2019

Online cultural heritage resources are widely available through digital libraries maintained by numerous organizations. In order to improve discoverability in cultural heritage, the typical approach is metadata aggregation, a method where centralized...

  • Article
  • Open Access
3 Citations
4,993 Views
16 Pages

Interactional and Informational Attention on Twitter

  • Agathe Baltzer,
  • Márton Karsai and
  • Camille Roth

29 July 2019

Twitter may be considered to be a decentralized social information processing platform whose users constantly receive their followees’ information feeds, which they may in turn dispatch to their followers. This decentralization is not devoid of...

  • Article
  • Open Access
14 Citations
5,076 Views
14 Pages

Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees

  • Erxia Li,
  • Chaoqun Kang,
  • Deyu Huang,
  • Modi Hu,
  • Fangyuan Chang,
  • Lianjie He and
  • Xiaoyong Li

29 July 2019

This study focuses on the problem of attack quantification in distribution automation systems (DASs) and proposes a quantitative model of attacks based on the common vulnerability scoring system (CVSS) and attack trees (ATs) to conduct a quantitative...

  • Feature Paper
  • Article
  • Open Access
14 Citations
5,182 Views
27 Pages

Interoperability Conflicts in Linked Open Statistical Data

  • Evangelos Kalampokis,
  • Areti Karamanou and
  • Konstantinos Tarabanis

27 July 2019

An important part of Open Data is of a statistical nature and describes economic and social indicators monitoring population size, inflation, trade, and employment. Combining and analyzing Open Data from multiple datasets and sources enable the perfo...

  • Feature Paper
  • Article
  • Open Access
45 Citations
12,567 Views
17 Pages

Transfer Learning for Named Entity Recognition in Financial and Biomedical Documents

  • Sumam Francis,
  • Jordy Van Landeghem and
  • Marie-Francine Moens

26 July 2019

Recent deep learning approaches have shown promising results for named entity recognition (NER). A reasonable assumption for training robust deep learning models is that a sufficient amount of high-quality annotated training data is available. Howeve...

  • Article
  • Open Access
5 Citations
5,546 Views
12 Pages

25 July 2019

Collecting speech data for a low-resource language is challenging when funding and resources are limited. This paper describes the process of designing, creating and using the Paldaruo Speech Corpus for developing speech technology for Welsh. Specifi...

  • Article
  • Open Access
2 Citations
5,014 Views
15 Pages

24 July 2019

Given its generality in applications and its high time-efficiency on big data-sets, in recent years, the technique of text filtering through pattern matching has been attracting increasing attention from the field of information retrieval and Natural...

  • Review
  • Open Access
60 Citations
9,443 Views
28 Pages

Human Activity Recognition for Production and Logistics—A Systematic Literature Review

  • Christopher Reining,
  • Friedrich Niemann,
  • Fernando Moya Rueda,
  • Gernot A. Fink and
  • Michael ten Hompel

24 July 2019

This contribution provides a systematic literature review of Human Activity Recognition for Production and Logistics. An initial list of 1243 publications that complies with predefined Inclusion Criteria was surveyed by three reviewers. Fifty-two pub...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489