You are currently viewing a new version of our website. To view the old version click .

Information, Volume 10, Issue 8

August 2019 - 19 articles

Cover Story: Attention and activity seem to follow conflicting dynamics. On the one hand, humans have limited abilities to keep up with larger number of peers or topics: social and semantic attention capacities are generally limited. On the other hand, there appear to be occasions of reinforcing coupling between attention and activity. We used Twitter as a platform, featuring both social network and semantic capabilities, to study attention in a way that encompasses both interaction and information processing. We observed that most users possess a “two-level flow of attention” by first focusing on a core of peers or topics and then redistributing their attention uniformly within that range. Further, we found strong correlation between an individual’s social and semantic attention. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (19)

  • Article
  • Open Access
2 Citations
4,488 Views
18 Pages

20 August 2019

The current trend in the European Union (EU) is to support the development of online dispute resolution (ODR) that saves financial and human resources. Therefore, research articles mainly deal with the design of new ODR solutions, without researching...

  • Article
  • Open Access
3 Citations
8,420 Views
18 Pages

Network Anomaly Detection by Using a Time-Decay Closed Frequent Pattern

  • Ying Zhao,
  • Junjun Chen,
  • Di Wu,
  • Jian Teng,
  • Nabin Sharma,
  • Atul Sajjanhar and
  • Michael Blumenstein

17 August 2019

Anomaly detection of network traffic flows is a non-trivial problem in the field of network security due to the complexity of network traffic. However, most machine learning-based detection methods focus on network anomaly detection but ignore the us...

  • Feature Paper
  • Article
  • Open Access
13 Citations
6,648 Views
16 Pages

16 August 2019

This article empirically demonstrates the impacts of truthfully sharing forecast information and using forecast combinations in a fast-moving-consumer-goods (FMCG) supply chain. Although it is known a priori that sharing information improves the over...

  • Article
  • Open Access
16 Citations
7,913 Views
33 Pages

16 August 2019

An important problem in machine learning is that, when using more than two labels, it is very difficult to construct and optimize a group of learning functions that are still useful when the prior distribution of instances is changed. To resolve this...

  • Review
  • Open Access
6 Citations
5,922 Views
15 Pages

Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing

  • Jie Yuan,
  • Erxia Li,
  • Chaoqun Kang,
  • Fangyuan Chang and
  • Xiaoyong Li

15 August 2019

Mobile edge computing (MEC) effectively integrates wireless network and Internet technologies and adds computing, storage, and processing functions to the edge of cellular networks. This new network architecture model can deliver services directly fr...

  • Article
  • Open Access
11 Citations
4,017 Views
16 Pages

14 August 2019

With the construction of the urban rail transit (URT) network, the explosion of passenger volume is more rapid than the increased capacity of the newly built infrastructure, which results in serious passenger flow congestion (PLC). Understanding the...

  • Article
  • Open Access
19 Citations
7,227 Views
15 Pages

Visual Saliency Prediction Based on Deep Learning

  • Bashir Ghariba,
  • Mohamed S. Shehata and
  • Peter McGuire

12 August 2019

Human eye movement is one of the most important functions for understanding our surroundings. When a human eye processes a scene, it quickly focuses on dominant parts of the scene, commonly known as a visual saliency detection or visual attention pre...

  • Article
  • Open Access
7 Citations
8,444 Views
20 Pages

9 August 2019

Unmanned and unwomaned aerial vehicles (UAV), or drones, are breaking and creating new boundaries of image-based communication. Using social network analysis and critical discourse analysis, we examine the 60 most popular question threads about drone...

  • Feature Paper
  • Article
  • Open Access
26 Citations
9,324 Views
14 Pages

8 August 2019

There has been an enormous technological boom that impacted all areas of geoscience in the past few decades. Part of the change was also the process of democratization of cartography as well as geographic information systems (GIS), together with new...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489