Skip to Content

4,339 Results Found

  • Article
  • Open Access
2 Citations
1,361 Views
15 Pages

This study investigates how Greek professionals formulate upward requests and simultaneously manage rapport and workplace identity within hierarchical exchanges. The data comprise 400 written requests elicited through a discourse–completion tas...

  • Article
  • Open Access
2 Citations
3,344 Views
18 Pages

19 August 2021

This study offers a new perspective in analyzing 311 service requests (SRs) across the country by representing cities based on the types of their SRs. This not only uncovers temporal patterns of SRs in each city over the years but also detects cities...

  • Article
  • Open Access
5 Citations
3,584 Views
17 Pages

A Machine Learning Approach for Detecting Rescue Requests from Social Media

  • Zheye Wang,
  • Nina S. N. Lam,
  • Mingxuan Sun,
  • Xiao Huang,
  • Jin Shang,
  • Lei Zou,
  • Yue Wu and
  • Volodymyr V. Mihunov

Hurricane Harvey in 2017 marked an important transition where many disaster victims used social media rather than the overloaded 911 system to seek rescue. This article presents a machine-learning-based detector of rescue requests from Harvey-related...

  • Article
  • Open Access
575 Views
35 Pages

30 December 2025

This study explores how Spanish/Catalan bilinguals acquire requests in Greek as a Foreign Language (FL), focusing on the role of proficiency in different communicative contexts. Fifty-four learners of Greek from different proficiency levels and fifty...

  • Article
  • Open Access
16 Citations
6,012 Views
25 Pages

Take-Over Requests after Waking in Autonomous Vehicles

  • Won Kim,
  • Eunki Jeon,
  • Gwangbin Kim,
  • Dohyeon Yeo and
  • SeungJun Kim

28 January 2022

Autonomous vehicles (AVs) enable drivers to devote their primary attention to non-driving-related tasks (NDRTs). Consequently, AVs must provide intelligibility services appropriate to drivers’ in-situ states and in-car activities to ensure driv...

  • Article
  • Open Access
7 Citations
5,280 Views
24 Pages

3 February 2022

Context: In a social coding platform such as GitHub, a pull-request mechanism is frequently used by contributors to submit their code changes to reviewers of a given repository. In general, these code changes are either to add a new feature or to fix...

  • Article
  • Open Access
2 Citations
3,020 Views
18 Pages

Data Requests in Value Chains: The Effects of Corporate Sustainability Reporting on SMEs in The Netherlands

  • Ludger Niemann,
  • Sebastiaan Morssinkhof,
  • Martijn Jeroen van der Linden and
  • Karl de Vries

5 September 2025

This study examines the effects of sustainability-related data requests—spurred by the EU Corporate Sustainability Reporting Directive (CSRD)—on small and medium-sized enterprises (SMEs) in the Netherlands. Using a representative survey o...

  • Article
  • Open Access
6 Citations
1,785 Views
16 Pages

Link Resource-Aware RMSA Algorithm for Advance Reservation Requests in Semi-Filterless Optical Networks

  • Junling Yuan,
  • Suhua Wang,
  • Yanyan Xie,
  • Xuhong Li,
  • Qikun Zhang and
  • Jing Zhang

14 September 2023

This paper investigates the routing, modulation, and spectrum assignment (RMSA) problem for advance reservation (AR) requests in semi-filterless optical networks (semi-FONs). A link resource-aware (LRA) algorithm consisting of three parts is proposed...

  • Article
  • Open Access
7 Citations
3,127 Views
14 Pages

10 November 2022

In the past few years, the ability of wireless network operators to monitor audience using control frames emitted by client devices has been compromised, both by legislation treating client MAC addresses as private information and by the difficulty o...

  • Article
  • Open Access
4 Citations
3,294 Views
26 Pages

29 August 2023

The current experiment employs a variational pragmatics perspective to explore how the contextual variables of power, distance, and imposition jointly affect social groups’ and individuals’ choice of verb forms in requests in Madrid, Spai...

  • Article
  • Open Access
6 Citations
3,081 Views
23 Pages

21 February 2020

The selection of the delivery scheme is one of the most complicated problems and the results of its solution condition the sustainable development of the whole market of transportation services. Freight forwarders should consider numerous random para...

  • Article
  • Open Access
900 Views
16 Pages

8 January 2026

This study examined how cultural background and self-reported gender influence student–faculty email communication in English-Medium Instruction (EMI) settings. Advanced international language learners (N = 113) wrote emails in English to eithe...

  • Article
  • Open Access
1 Citations
2,220 Views
16 Pages

26 February 2021

We report two experiments on the emission of questions to request the names of unfamiliar stimuli by preschoolers. In the first experiment, 19 preschoolers with and without disabilities served as participants. Experiment 1 was a descriptive analysis...

  • Data Descriptor
  • Open Access
1,894 Views
11 Pages

11 November 2025

We present a real-world dataset capturing thirty consecutive days of malicious HTTP traffic filtered and blocked by the OWASP ModSecurity Web Application Firewall (WAF) on a live production server. Each entry corresponds to a request that triggered o...

  • Article
  • Open Access
3 Citations
2,859 Views
25 Pages

2 December 2024

This paper introduces a novel model for virtual machine (VM) requests with predefined start and end times, referred to as scheduled virtual machine demands (SVMs). In cloud computing environments, SVMs represent anticipated resource requirements deri...

  • Article
  • Open Access
13 Citations
4,020 Views
24 Pages

21 April 2021

Mobile application (app) reviews are feedback about experiences, requirements, and issues raised after users have used the app. The iteration of an app is driven by bug reports and user requirements analyzed and extracted from app reviews, which is a...

  • Article
  • Open Access
2,171 Views
17 Pages

8 December 2022

Recently, open-source repositories have grown rapidly due to volunteer contributions worldwide. Collaboration software platforms have gained popularity as thousands of external contributors have contributed to open-source repositories. Although data...

  • Article
  • Open Access
7 Citations
2,974 Views
21 Pages

7 April 2019

In this paper, a home service problem is studied, where a capacitated vehicle collects customers’ parcels in one pick-up tour. We consider a situation where customers, who have scheduled their services in advance, may call to cancel their appoi...

  • Proceeding Paper
  • Open Access
2,501 Views
6 Pages

The COVID-19 (SARS-CoV-2) pandemic required changes to be made, especially in formal education processes. In order for the students to stay safe and healthy, many educational institutions switched to the distance learning method for the rest of the s...

  • Article
  • Open Access
7 Citations
3,734 Views
31 Pages

Routing, Modulation Level, and Spectrum Assignment in Elastic Optical Networks—A Serial Stage Approach with Multiple Sub-Sets of Requests Based on Integer Linear Programming

  • Luis Víctor Maidana Benítez,
  • Melisa María Rosa Villamayor Paredes,
  • José Colbes,
  • César F. Bogado-Martínez,
  • Benjamin Barán and
  • Diego P. Pinto-Roa

This paper addresses serialized approaches of the routing, modulation level, and spectrum assignment (RMLSA) problem in elastic optical networks, using multiple sequential sub-sets of requests, under Integer Linear Programming (ILP). The literature h...

  • Article
  • Open Access
2 Citations
1,323 Views
30 Pages

25 May 2025

Container drayage, as a pivotal element of door-to-door intermodal transportation, has garnered increasing attention due to its significant influence on container logistics costs. Although various types of transport requests have been defined in the...

  • Technical Note
  • Open Access
11 Citations
6,981 Views
12 Pages

Westdrive X LoopAR: An Open-Access Virtual Reality Project in Unity for Evaluating User Interaction Methods during Takeover Requests

  • Farbod N. Nezami,
  • Maximilian A. Wächter,
  • Nora Maleki,
  • Philipp Spaniol,
  • Lea M. Kühne,
  • Anke Haas,
  • Johannes M. Pingel,
  • Linus Tiemann,
  • Frederik Nienhaus and
  • Gordon Pipa
  • + 3 authors

8 March 2021

With the further development of highly automated vehicles, drivers will engage in non-related tasks while being driven. Still, drivers have to take over control when requested by the car. Here, the question arises, how potentially distracted drivers...

  • Article
  • Open Access
182 Views
17 Pages

1 February 2026

Pull request templates are used to reduce inconsistencies in information included in submitted pull requests in GitHub. A few studies have explored the effectiveness of employing pull request template. However, there is still a lack of how to evolve...

  • Article
  • Open Access
5 Citations
4,046 Views
12 Pages

Culture Requests and Multi-Drug Resistance among Suspected Urinary Tract Infections in Two Tertiary Hospitals in Freetown, Sierra Leone (2017–21): A Cross-Sectional Study

  • Julian S. O. Campbell,
  • Saskia van Henten,
  • Zikan Koroma,
  • Ibrahim Franklyn Kamara,
  • Gladys N. Kamara,
  • Hemant Deepak Shewade and
  • Anthony D. Harries

In sub-Saharan Africa, there is limited information about the use of microbiology laboratory services in patients with suspected urinary tract infections (UTIs). This cross-sectional study assessed the requests for urine culture in patients with susp...

  • Article
  • Open Access
18 Citations
5,310 Views
21 Pages

27 April 2023

When a conditionally automated vehicle controlled by the machine faces situations beyond the capability of the machine, the human driver is requested to take over the vehicle. This study aims to assess the short-term effects of three factors on the t...

  • Article
  • Open Access
172 Views
27 Pages

Multi-Objective Joint Optimization for Microservice Deployment and Request Routing

  • Zhengying Cai,
  • Fang Yu,
  • Wenjuan Li,
  • Junyu Liu and
  • Mingyue Zhang

20 January 2026

Microservice deployment and request routing can help improve server efficiency and the performance of large-scale mobile edge computing (MEC). However, the joint optimization of microservice deployment and request routing is extremely challenging, as...

  • Article
  • Open Access
3 Citations
9,384 Views
17 Pages

Coexistence of WiFi and WiMAX Systems Based on PS-Request Protocols

  • Jongwoo Kim,
  • Suwon Park,
  • Seung Hyong Rhee,
  • Yong-Hoon Choi,
  • Young-uk Chung and
  • Ho Young Hwang

13 October 2011

We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised...

  • Article
  • Open Access
20 Citations
7,582 Views
17 Pages

Probe Request Based Device Identification Attack and Defense

  • Xiaolin Gu,
  • Wenjia Wu,
  • Xiaodan Gu,
  • Zhen Ling,
  • Ming Yang and
  • Aibo Song

17 August 2020

Wi-Fi network has an open nature so that it needs to face greater security risks compared to wired network. The MAC address represents the unique identifier of the device, and is easily obtained by an attacker. Therefore MAC address randomization is...

  • Article
  • Open Access
2 Citations
2,149 Views
21 Pages

A Throughput Request Satisfaction Method for Concurrently Communicating Multiple Hosts in Wireless Local Area Network

  • Md. Mahbubur Rahman,
  • Nobuo Funabiki,
  • Kwenga Ismael Munene,
  • Sujan Chandra Roy,
  • Minoru Kuribayashi,
  • Melki Mario Gulo and
  • Wen-Chung Kao

15 November 2022

Nowadays, the IEEE 802.11 wireless local area network (WLAN) has been widely used for Internet access services around the world. Then, the unfairness or insufficiency in meeting the throughput request can appear among concurrently communicating hosts...

  • Article
  • Open Access
1 Citations
2,272 Views
33 Pages

12 March 2024

D2D coded caching, originally introduced by Ji, Caire, and Molisch, significantly improves communication efficiency by applying the multi-cast technology proposed by Maddah-Ali and Niesen to the D2D network. Most prior works on D2D coded caching are...

  • Article
  • Open Access
1,421 Views
6 Pages

Maternal Request Is not to Blame for an Increase in the Rate of Cesarean Section

  • Justina Kačerauskienė,
  • Eglė Barčaitė,
  • Arnoldas Bartusevičius,
  • Dalia Railaitė and
  • Rūta Nadišauskienė

4 January 2013

Background and Objective. The aim of this study was to establish whether Lithuanian women would request an elective cesarean section in a low-risk pregnancy and to compare how the women’s opinion changed during the 5-year period.

Material and Methods
...

  • Article
  • Open Access
4 Citations
3,031 Views
18 Pages

DNS Request Log Analysis of Universities in Shanghai: A CDN Service Provider’s Perspective

  • Zhiyang Sun,
  • Tiancheng Guo,
  • Shiyu Luo,
  • Yingqiu Zhuang,
  • Yuke Ma,
  • Yang Chen and
  • Xin Wang

15 November 2022

Understanding the network usage patterns of university users is very important today. This paper focuses on the research of DNS request behaviors of university users in Shanghai, China. Based on the DNS logs of a large number of university users reco...

  • Article
  • Open Access
13 Citations
4,472 Views
18 Pages

16 January 2018

In this paper, we proposed a coarse-alignment method for strapdown inertial navigation systems based on attitude determination. The observation vectors, which can be obtained by inertial sensors, usually contain various types of noise, which affects...

  • Article
  • Open Access
3 Citations
2,093 Views
15 Pages

8 February 2023

To improve the stability of automatic retransmission requests, a competition control method for automatic retransmission requests of cooperative-based listening nodes is proposed. Because the number of source nodes involved in retransmission communic...

  • Article
  • Open Access
10 Citations
5,255 Views
27 Pages

Non-Intrusive Privacy-Preserving Approach for Presence Monitoring Based on WiFi Probe Requests

  • Aleš Simončič,
  • Miha Mohorčič,
  • Mihael Mohorčič and
  • Andrej Hrovat

26 February 2023

Monitoring the presence and movements of individuals or crowds in a given area can provide valuable insight into actual behavior patterns and hidden trends. Therefore, it is crucial in areas such as public safety, transportation, urban planning, disa...

  • Article
  • Open Access
2 Citations
6,467 Views
18 Pages

The Power of Requests in a Redistribution Game: An Experimental Study

  • Riccardo Pedersini,
  • Rosemarie Nagel and
  • Marc Le Menestrel

1 July 2019

In most situations of voluntary contribution people are willing to give at the beginning, however contribution rates decay over time. In a new setup we introduce non-enforceable sharing rules, as requests, in a repeated redistribution game (called ti...

  • Article
  • Open Access
505 Views
17 Pages

25 November 2025

Autonomous vehicles (AVs) at SAE Levels 3 require a take-over request to switch from autonomous to manual mode when leaving the operational design domain (ODD). An appropriate take-over request lead time (TORlt) is necessary for safe interaction betw...

  • Article
  • Open Access
11 Citations
3,265 Views
12 Pages

Conditionally automated driving (CAD) systems allow the driver to temporarily disengage from driving tasks. The significant concern of CAD is to ensure a safe and timely transition to the manual driving mode when the system exceeds its limits and iss...

  • Article
  • Open Access
2 Citations
4,278 Views
22 Pages

Telco content delivery networks (CDNs) have envisioned building highly distributed and cloudified sites to provide a high-quality CDN service in the 5G era. However, there are still two open problems to be addressed. First, telco CDNs are operated up...

  • Article
  • Open Access
6 Citations
4,830 Views
19 Pages

3 October 2023

V2X communication is susceptible to attenuation and fading caused by external interference. This interference often leads to bit error and poor quality and stability of the wireless link, and it can easily disrupt packet transmission. In order to enh...

  • Article
  • Open Access
11 Citations
4,897 Views
19 Pages

Dynamic Cost-Aware Routing of Web Requests

  • Gandhimathi Velusamy and
  • Ricardo Lent

Work within next generation networks considers additional network convergence possibilities and the integration of new services to the web. This trend responds to the ongoing growth of end-user demand for services that can be delivered anytime, anywh...

  • Article
  • Open Access
1 Citations
1,691 Views
24 Pages

31 October 2025

The present study pursued three objectives: (i) to examine whether self-access web-based instruction could significantly improve EFL students’ ability to formulate pragmatically appropriate email requests; (ii) to determine whether L2 proficien...

  • Systematic Review
  • Open Access
1 Citations
3,563 Views
16 Pages

Despite the increased use of diagnostic imaging in Africa, the completion of the Radiology Request Form (RRF) remains suboptimal, often relying on paper-based communication. To examine the practices surrounding RRF completion in the African continent...

  • Communication
  • Open Access
72 Citations
9,753 Views
11 Pages

Processing Phage Therapy Requests in a Brussels Military Hospital: Lessons Identified

  • Sarah Djebara,
  • Christiane Maussen,
  • Daniel De Vos,
  • Maya Merabishvili,
  • Benjamin Damanet,
  • Kim Win Pang,
  • Peggy De Leenheer,
  • Isabella Strachinaru,
  • Patrick Soentjens and
  • Jean-Paul Pirnay

17 March 2019

There is a growing interest in phage therapy as a complementary tool against antimicrobial resistant infections. Since 2007, phages have been used sporadically to treat bacterial infections in well-defined cases in the Queen Astrid military hospital...

  • Article
  • Open Access
46 Citations
8,645 Views
12 Pages

Natural Language Processing Model for Managing Maintenance Requests in Buildings

  • Yassine Bouabdallaoui,
  • Zoubeir Lafhaj,
  • Pascal Yim,
  • Laure Ducoulombier and
  • Belkacem Bennadji

7 September 2020

In recent years, facility management (FM) has adopted many computer technology solutions for building maintenance, such as building information modelling (BIM) and computerized maintenance management systems (CMMS). However, maintenance requests mana...

  • Feature Paper
  • Review
  • Open Access
131 Citations
14,163 Views
34 Pages

Automated Driving: A Literature Review of the Take over Request in Conditional Automation

  • Walter Morales-Alvarez,
  • Oscar Sipele,
  • Régis Léberon,
  • Hadj Hamma Tadjine and
  • Cristina Olaverri-Monreal

7 December 2020

In conditional automation (level 3), human drivers can hand over the Driving Dynamic Task (DDT) to the Automated Driving System (ADS) and only be ready to resume control in emergency situations, allowing them to be engaged in non-driving related task...

  • Article
  • Open Access
9 Citations
2,525 Views
19 Pages

13 July 2023

In the context of partial autonomy, where autonomous vehicles and humans share control of the vehicle, bringing out-of-the-loop drivers back into the loop is a significant challenge. While warning signal design guidelines are commonly used to provide...

  • Article
  • Open Access
10 Citations
6,662 Views
22 Pages

Belgium through the Lens of Rail Travel Requests: Does Geography Still Matter?

  • Jonathan Jones,
  • Christophe Cloquet,
  • Arnaud Adam,
  • Adeline Decuyper and
  • Isabelle Thomas

This paper uses on-line railway travel requests from the iRail schedule-finder application for assessing the suitability of that kind of big data for transportation planning and to examine the temporal and regional variations of the travel demand by...

  • Article
  • Open Access
224 Views
32 Pages

21 February 2026

In modern organizations, IT Service Management (ITSM) relies on the efficient handling of large volumes of unstructured textual data, such as support tickets and incident reports. This study investigates the automated classification of IT support req...

of 87