545 results on '"1700 General Computer Science"'
Search Results
2. A multi-domain ontology on healthy ageing for the characterization of older adults status and behaviour
- Author
-
Mastropietro, Alfonso, Palumbo, Filippo, Orte, Silvia, Girolami, Michele, Furfari, Francesco, Baronti, Paolo, Candea, Ciprian, Röcke, Christina, Tarro, Lucia, Sykora, Martin, Porcelli, Simone, Rizzo, Giovanna, University of Zurich, and Palumbo, Filippo
- Subjects
General Computer Science ,Ontology ,Physical activity ,10093 Institute of Psychology ,Knowledge representation and reasoning ,03 medical and health sciences ,0302 clinical medicine ,Cognition ,Healthy ageing model ,Social behaviour ,030212 general & internal medicine ,1700 General Computer Science ,150 Psychology ,030217 neurology & neurosurgery ,Nutrition ,OWL - Abstract
Ageing is a multi-factorial physiological process and the development of novel IoT systems, tools and devices, specifically targeted to older people, must be based on a holistic framework built on robust scientific knowledge in different health domains. Furthermore, interoperability must be guaranteed using standardized frameworks or approaches. These aspects still largely lack in the specific literature. The main aim of the paper is to develop a new ontology (the NESTORE ontology) to extend the available ontologies provided by universAAL-IoT (uAAL-IoT). The ontology is based on a multidomain healthy ageing holistic model, structuring well-assessed scientific knowledge, specifically targeted to healthy older adults aged between 65 and 75. The tool is intended to support, and standardize heterogeneous data about ageing in compliance with the uAAL-IoT framework. The NESTORE ontology covers all the relevant concepts to represent 3 significant domains of ageing: (1) Physiological Status and Physical Activity Behaviour; (2) Nutrition; and (3) Cognitive and Mental Status and Social Behaviour. In total, 12 sub-ontologies were modelled with more than 60 classes and sub-classes referenced among them by using more than 100 relations and around 20 enumerations. The proposed ontology increases the uAAL collection by 40%. NESTORE ontology provides innovation both in terms of semantic content and technological approach. The thorough use of this ontology can support the development of a decision support system, to promote healthy ageing, with the capacity to do dynamic multi-scale modelling of user-specific data based on the semantic annotations of users’ profile.
- Published
- 2023
3. What is 'technology integration' and how is it measured in K-12 education? A systematic review of survey instruments from 2010 to 2021
- Author
-
Consoli, Tessa, Désiron, Juliette, Cattaneo, Alberto, University of Zurich, and Consoli, Tessa
- Subjects
General Computer Science ,10091 Institute of Education ,Improving classroom teaching ,1700 General Computer Science ,Secondary education ,370 Education ,Primary education ,3304 Education ,Education - Abstract
This systematic review provides an overview and analysis of the survey instruments measuring technology integration (TI) in educational settings from 2010 to 2021. Given the importance of addressing aspects related to the quality of TI (e.g., the use of technology to support pedagogical goals), we paid particular attention to them. Search results from the PsycINFO, ERIC, Web of Science, and Scopus databases yielded 695 records. Thirty-five different survey instruments used in 36 studies met our eligibility criteria and were then analyzed by applyingcontent analysis. Our results indicate that the diversity of operationalizations is very high and that several instruments have no explicit conceptual or theoretical underpinnings. Most of the instruments measure aspects related to classroom practices and measure TI from the teachers' point of view. The most frequently measured pedagogical aspects of TI in instructional practices include the use of technology to (1) enhance students’ cognitive engagement, (2) promote collaboration between students, and (3) allow students to conduct research online. The study concludes with some perspectives for future research, an attempt to formulate a definition of TI, and some more general recommendations to ensure terminological unambiguity in TI research.
- Published
- 2023
4. A Methodology for Evaluating the Robustness of Anomaly Detectors to Adversarial Attacks in Industrial Scenarios
- Author
-
Lorenzo Fernández Maimó, Javier Maroto, Alberto Huertas Celdrán, Félix Jesús Garcia Clemente, Ángel Luis Perales Gómez, Gérôme Bovet, University of Zurich, and Perales Gómez, Ángel L
- Subjects
perturbation methods ,industries ,General Computer Science ,10009 Department of Informatics ,2208 Electrical and Electronic Engineering ,industrial control systems ,evasion attacks ,General Engineering ,deep learning ,robustness ,000 Computer science, knowledge & systems ,neural networks ,2500 General Materials Science ,adversarial attacks ,machine learning ,2200 General Engineering ,General Materials Science ,1700 General Computer Science ,transforms ,Electrical and Electronic Engineering ,detectors - Abstract
Anomaly Detection systems based on Machine and Deep learning are the most promising solutions to detect cyberattacks in the industry. However, these techniques are vulnerable to adversarial attacks that downgrade prediction performance. Several techniques have been proposed to measure the robustness of Anomaly Detection in the literature. However, they do not consider that, although a small perturbation in an anomalous sample belonging to an attack, i.e., Denial of Service, could cause it to be misclassified as normal while retaining its ability to damage, an excessive perturbation might also transform it into a truly normal sample, with no real impact on the industrial system. This paper presents a methodology to calculate the robustness of Anomaly Detection models in industrial scenarios. The methodology comprises four steps and uses a set of additional models called support models to determine if an adversarial sample remains anomalous. We carried out the validation using the Tennessee Eastman process, a simulated testbed of a chemical process. In such a scenario, we applied the methodology to both a Long-Short Term Memory (LSTM) neural network and 1-dimensional Convolutional Neural Network (1D-CNN) focused on detecting anomalies produced by different cyberattacks. The experiments showed that 1D-CNN is significantly more robust than LSTM for our testbed. Specifically, a perturbation of 60% (empirical robustness of 0.6) of the original sample is needed to generate adversarial samples for LSTM, whereas in 1D-CNN the perturbation required increases up to 111% (empirical robustness of 1.11).
- Published
- 2022
5. Landmark-free Statistical Shape Modeling via Neural Flow Deformations
- Author
-
Lüdke, David, Amiranashvili, Tamaz, Ambellan, Felix, Ezhov, Ivan, Menze, Bjoern H, Zachow, Stefan, University of Zurich, Wang, Linwei, Dou, Qi, Fletcher, Thomas P, Speidel, Stefanie, Liu, Shuo, and Amiranashvili, Tamaz
- Subjects
FOS: Computer and information sciences ,Computer Science - Machine Learning ,Computer Vision and Pattern Recognition (cs.CV) ,Computer Science - Computer Vision and Pattern Recognition ,610 Medicine & health ,1700 General Computer Science ,2614 Theoretical Computer Science ,11493 Department of Quantitative Biomedicine ,Machine Learning (cs.LG) - Abstract
Statistical shape modeling aims at capturing shape variations of an anatomical structure that occur within a given population. Shape models are employed in many tasks, such as shape reconstruction and image segmentation, but also shape generation and classification. Existing shape priors either require dense correspondence between training examples or lack robustness and topological guarantees. We present FlowSSM, a novel shape modeling approach that learns shape variability without requiring dense correspondence between training instances. It relies on a hierarchy of continuous deformation flows, which are parametrized by a neural network. Our model outperforms state-of-the-art methods in providing an expressive and robust shape prior for distal femur and liver. We show that the emerging latent representation is discriminative by separating healthy from pathological shapes. Ultimately, we demonstrate its effectiveness on two shape reconstruction tasks from partial data. Our source code is publicly available (https://github.com/davecasp/flowssm)., accepted for MICCAI 2022
- Published
- 2022
6. Extended Overview of HIPE-2022: Named Entity Recognition and Linking in Multilingual Historical Documents
- Author
-
Ehrmann, Maud, Romanello, Matteo, Najem-Meyer, Sven, Doucet, Antoine, Clematide, Simon, University of Zurich, Faggioli, Gulielmo, Ferro, Nicola, Hanbury, Alan, Potthast, Martin, and Ehrmann, Maud
- Subjects
Classical commentaries ,Entity linking ,Digitised newspapers ,Information extraction ,10105 Institute of Computational Linguistics ,Historical texts ,410 Linguistics ,1700 General Computer Science ,000 Computer science, knowledge & systems ,Evaluation ,Named entity recognition and classification ,Digital humanities - Abstract
This paper presents an overview of the second edition of HIPE (Identifying Historical People, Places and other Entities), a shared task on named entity recognition and linking in multilingual historical documents. Following the success of the first CLEF-HIPE-2020 evaluation lab, HIPE-2022 confronts systems with the challenges of dealing with more languages, learning domain-specific entities, and adapting to diverse annotation tag sets. This shared task is part of the ongoing efforts of the natural language processing and digital humanities communities to adapt and develop appropriate technologies to efficiently retrieve and explore information from historical texts. On such material, however, named entity processing techniques face the challenges of domain heterogeneity, input noisiness, dynamics of language, and lack of resources. In this context, the main objective of HIPE-2022, run as an evaluation lab of the CLEF 2022 conference, is to gain new insights into the transferability of named entity processing approaches across languages, time periods, document types, and annotation tag sets. Tasks, corpora, and results of participating teams are presented. Compared to the condensed overview, this paper contains more refined statistics on the datasets, a break down of the results per type of entity, and a discussion of the `challenges' proposed in the shared task. For code and data, see the HIPE-eval github organisation: https://github.com/hipe-eval
- Published
- 2022
7. Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors
- Author
-
Pedro Miguel Sanchez Sanchez, Alberto Huertas Celdran, Timo Schenk, Adrian Lars Benjamin Iten, Gerome Bovet, Gregorio Martinez Perez, Burkhard Stiller, and University of Zurich
- Subjects
FOS: Computer and information sciences ,Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence ,10009 Department of Informatics ,Sensors ,2208 Electrical and Electronic Engineering ,Data models ,Crowdsensing ,Behavioral science ,000 Computer science, knowledge & systems ,Fingerprint recognition ,Artificial Intelligence (cs.AI) ,1700 General Computer Science ,Electrical and Electronic Engineering ,Sensor phenomena and characterization ,Robustness ,Cryptography and Security (cs.CR) - Abstract
Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance when detecting cyberattacks targeting data managed by resource-constrained spectrum sensors. However, the amount of data needed to train models and the privacy concerns of such scenarios limit the applicability of centralized ML/DL-based approaches. Federated learning (FL) addresses these limitations by creating federated and privacy-preserving models. However, FL is vulnerable to malicious participants, and the impact of adversarial attacks on federated models detecting spectrum sensing data falsification (SSDF) attacks on spectrum sensors has not been studied. To address this challenge, the first contribution of this work is the creation of a novel dataset suitable for FL and modeling the behavior (usage of CPU, memory, or file system, among others) of resource-constrained spectrum sensors affected by different SSDF attacks. The second contribution is a pool of experiments analyzing and comparing the robustness of federated models according to i) three families of spectrum sensors, ii) eight SSDF attacks, iii) four scenarios dealing with unsupervised (anomaly detection) and supervised (binary classification) federated models, iv) up to 33% of malicious participants implementing data and model poisoning attacks, and v) four aggregation functions acting as anti-adversarial mechanisms to increase the models robustness.
- Published
- 2022
8. Toward a Collective Agenda on AI for Earth Science Data Analysis
- Author
-
Jan Dirk Wegner, Xiao Xiang Zhu, Devis Tuia, Ribana Roscher, Gustau Camps-Valls, Nathan Jacobs, and University of Zurich
- Subjects
Signal Processing (eess.SP) ,FOS: Computer and information sciences ,010504 meteorology & atmospheric sciences ,General Computer Science ,530 Physics ,Interface (Java) ,Computer Vision and Pattern Recognition (cs.CV) ,Earth science ,data analysis ,Computer Science - Computer Vision and Pattern Recognition ,0211 other engineering and technologies ,earth observation ,02 engineering and technology ,01 natural sciences ,Environmental science ,Data modeling ,FOS: Electrical engineering, electronic engineering, information engineering ,Climate science ,1700 General Computer Science ,Electrical Engineering and Systems Science - Signal Processing ,Electrical and Electronic Engineering ,Instrumentation ,021101 geological & geomatics engineering ,0105 earth and related environmental sciences ,11476 Digital Society Initiative ,3105 Instrumentation ,2208 Electrical and Electronic Engineering ,1900 General Earth and Planetary Sciences ,Deep learning ,interpretable AI ,Remote sensing ,artificial intelligence ,hybrid models ,Earth system science ,AI ,Remote sensing (archaeology) ,10231 Institute for Computational Science ,General Earth and Planetary Sciences ,Potential game ,Discipline - Abstract
In the last years we have witnessed the fields of geosciences and remote sensing and artificial intelligence to become closer. Thanks to both the massive availability of observational data, improved simulations, and algorithmic advances, these disciplines have found common objectives and challenges to advance the modeling and understanding of the Earth system. Despite such great opportunities, we also observed a worrying tendency to remain in disciplinary comfort zones applying recent advances from artificial intelligence on well resolved remote sensing problems. Here we take a position on research directions where we think the interface between these fields will have the most impact and become potential game changers. In our declared agenda for AI on Earth sciences, we aim to inspire researchers, especially the younger generations, to tackle these challenges for a real advance of remote sensing and the geosciences., Comment: In press at IEEE Geoscience and Remote Sensing Magazine
- Published
- 2021
9. Overview of HIPE-2022: Named Entity Recognition and Linking in Multilingual Historical Documents
- Author
-
Ehrmann, Maud, Romanello, Matteo, Najem-Meyer, Sven, Doucet, Antoine, Clematide, Simon, University of Zurich, Barrón-Cedeño, Alberto, Da San Martino, Giovanni, Degli Esposti, Mirko, Sebastiani, Fabrizio, Macdonald, Craig, Pasini, Gabriella, Hanbury, Allan, Potthast, Martin, Faggioli, Guglielmo, Ferro, Nicola, and Ehrmann, Maud
- Subjects
Named entity recognition and classification Entity linking Historical texts Information extraction Digitised newspapers Digital humanities ,10105 Institute of Computational Linguistics ,410 Linguistics ,1700 General Computer Science ,000 Computer science, knowledge & systems ,2614 Theoretical Computer Science - Published
- 2022
10. Morphological analysis for design science research: The case of human-drone collaboration in emergencies
- Author
-
Mateusz Dolata, Kiram Ben Aleya, University of Zurich, Drechsler, Andreas, Gerber, Aurona, Hevner, Alan, and Dolata, Mateusz
- Subjects
10009 Department of Informatics ,1700 General Computer Science ,000 Computer science, knowledge & systems ,2614 Theoretical Computer Science - Published
- 2022
11. Conditional Generative Data Augmentation for Clinical Audio Datasets
- Author
-
Seibold, M, Hoch, A, Farshad, M, Navab, N, Fürnstahl, P, University of Zurich, and Seibold, M
- Subjects
FOS: Computer and information sciences ,Sound (cs.SD) ,Computer Science - Machine Learning ,Audio and Speech Processing (eess.AS) ,FOS: Electrical engineering, electronic engineering, information engineering ,610 Medicine & health ,10046 Balgrist University Hospital, Swiss Spinal Cord Injury Center ,1700 General Computer Science ,2614 Theoretical Computer Science ,Computer Science - Sound ,Machine Learning (cs.LG) ,Electrical Engineering and Systems Science - Audio and Speech Processing - Abstract
In this work, we propose a novel data augmentation method for clinical audio datasets based on a conditional Wasserstein Generative Adversarial Network with Gradient Penalty (cWGAN-GP), operating on log-mel spectrograms. To validate our method, we created a clinical audio dataset which was recorded in a real-world operating room during Total Hip Arthroplasty (THA) procedures and contains typical sounds which resemble the different phases of the intervention. We demonstrate the capability of the proposed method to generate realistic class-conditioned samples from the dataset distribution and show that training with the generated augmented samples outperforms classical audio augmentation methods in terms of classification performance. The performance was evaluated using a ResNet-18 classifier which shows a mean Macro F1-score improvement of 1.70% in a 5-fold cross validation experiment using the proposed augmentation method. Because clinical data is often expensive to acquire, the development of realistic and high-quality data augmentation methods is crucial to improve the robustness and generalization capabilities of learning-based algorithms which is especially important for safety-critical medical applications. Therefore, the proposed data augmentation method is an important step towards improving the data bottleneck for clinical audio-based machine learning systems.
- Published
- 2022
12. An Efficient Index for Reachability Queries in Public Transport Networks
- Author
-
Michael H. Böhlen, Christian S. Jensen, Bezaye Tesfaye, Nikolaus Augsten, Mateusz Pawlik, Darmont, Jérôme, Novikov, Boris, Wrembel, Robert, University of Zurich, and Tesfaye, Bezaye
- Subjects
Spatial network databases ,Temporal graphs ,Theoretical computer science ,Point of interest ,business.industry ,Computer science ,10009 Department of Informatics ,02 engineering and technology ,000 Computer science, knowledge & systems ,Partition (database) ,Article ,Tree traversal ,Reachability ,020204 information systems ,Public transport ,Shortest path problem ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,1700 General Computer Science ,Reachability queries ,business ,2614 Theoretical Computer Science ,Dijkstra's algorithm ,Geomarketing ,Public transport networks - Abstract
Computing path queries such as the shortest path in public transport networks is challenging because the path costs between nodes change over time. A reachability query from a node at a given start time on such a network retrieves all points of interest (POIs) that are reachable within a given cost budget. Reachability queries are essential building blocks in many applications, for example, group recommendations, ranking spatial queries, or geomarketing. We propose an efficient solution for reachability queries in public transport networks. Currently, there are two options to solve reachability queries. (1) Execute a modified version of Dijkstra’s algorithm that supports time-dependent edge traversal costs; this solution is slow since it must expand edge by edge and does not use an index. (2) Issue a separate path query for each single POI, i.e., a single reachability query requires answering many path queries. None of these solutions scales to large networks with many POIs. We propose a novel and lightweight reachability index. The key idea is to partition the network into cells. Then, in contrast to other approaches, we expand the network cell by cell. Empirical evaluations on synthetic and real-world networks confirm the efficiency and the effectiveness of our index-based reachability query solution.
- Published
- 2020
13. When the System Does Not Fit: Coping Strategies of Employment Consultants
- Author
-
Mateusz Dolata, Alina Marti, Gerhard Schwabe, Birgit Schenk, Jara Fuhrer, University of Zurich, and Dolata, Mateusz
- Subjects
General Computer Science ,10009 Department of Informatics ,business.industry ,media_common.quotation_subject ,Service provision ,05 social sciences ,Social Welfare ,000 Computer science, knowledge & systems ,Public relations ,language.human_language ,0506 political science ,German ,03 medical and health sciences ,Politics ,0302 clinical medicine ,Public employment ,050602 political science & public administration ,language ,1700 General Computer Science ,030212 general & internal medicine ,Business ,Bureaucracy ,Competence (human resources) ,media_common - Abstract
Case and knowledge management systems are spread at the frontline across public agencies. However, such systems are dedicated for the collaboration within the agency rather than for the face-to-face interaction with the clients. If used as a collaborative resource at the frontline, case and knowledge management systems might disturb the service provision by displaying unfiltered internal information, disclosing private data of other clients, or revealing the limits of frontline employees’ competence (if they cannot explain something) or their authority (if they cannot override something). Observation in the German Public Employment Agency shows that employment consultants make use of various coping strategies during face-to-face consultations to extend existing boundaries set by the case and knowledge management systems and by the rules considering their usage. The analysis of these coping strategies unveils the forces that shape the conduct of employment consultants during their contacts with clients: the consultants’ own understanding of work, the actual and the perceived needs of the clients, and the political mission as well as the internal rules of the employment agency. The findings form a twofold contribution: First, they contribute to the discourse on work in employment agencies by illustrating how the complexities of social welfare apparatus demonstrate themselves in singular behavioural patterns. Second, they contribute to the discourse on screen-level bureaucracy by depicting the consultants as active and conscious mediators rather than passive interfaces between the system and the client.
- Published
- 2020
14. FedCostWAvg: A New Averaging for Better Federated Learning
- Author
-
Mächler, Leon, Ezhov, Ivan, Kofler, Florian, Shit, Suprosanna, Paetzold, Johannes C, Loehr, Timo, Zimmer, Claus, Wiestler, Benedikt, Menze, Bjoern H, University of Zurich, Crimi, Alessandro, Bakas, Spyridon, and Mächler, Leon
- Subjects
610 Medicine & health ,1700 General Computer Science ,2614 Theoretical Computer Science ,Brain Tumor Segmentation ,Federated Learning ,Machine Learning ,Miccai Challenges ,Mri ,Multi-modal Medical Imaging ,11493 Department of Quantitative Biomedicine - Abstract
We propose a simple new aggregation strategy for federated learning that won the MICCAI Federated Tumor Segmentation Challenge 2021 (FETS), the first ever challenge on Federated Learning in the Machine Learning community. Our method addresses the problem of how to aggregate multiple models that were trained on different data sets. Conceptually, we propose a new way to choose the weights when averaging the different models, thereby extending the current state of the art (FedAvg). Empirical validation demonstrates that our approach reaches a notable improvement in segmentation performance compared to FedAvg.
- Published
- 2022
15. Can Artificial Intelligence Help Used-Car Dealers Survive in a Data-Driven Used-Car Market?
- Author
-
Eckhardt, Sven, Sprenkamp, Kilian, Zavolokina, Liudmila, Bauer, Ingrid, Schwabe, Gerhard, University of Zurich, and Eckhardt, Sven
- Subjects
Car Market ,10009 Department of Informatics ,Artificial Intelligence ,11476 Digital Society Initiative ,1700 General Computer Science ,000 Computer science, knowledge & systems ,2614 Theoretical Computer Science ,Used ,Trust ,Transaction Costs - Published
- 2022
16. Gauging awareness of accessibility in Open Educational Resources
- Author
-
Pierrès, Oriane, Darvishy, Alireza, University of Zurich, Miesenberger, Klaus, Kouroupetroglou, Georgios, Mavrou, Katerina, Manduchi, Roberto, Covarrubias Rodriguez, Mario, Penáz, Petr, and Pierrès, Oriane
- Subjects
305: Personengruppen (Alter, Herkunft, Geschlecht, Einkommen) ,Accessibility awareness ,10222 Institute of Biomedical Ethics and History of Medicine ,Higher-education ,378: Hochschulbildung ,610 Medicine & health ,1700 General Computer Science ,2614 Theoretical Computer Science ,Open educational resources - Abstract
Open Educational Resources (OERs) have been widely promoted in the higher education community in recent years. However, the accessibility of OERs for people with disabilities has received relatively little attention. This paper presents the results of interviews carried out with people at higher education institutions worldwide who are involved in the creation and implementation of OERs. The goal is to gauge the awareness of accessibility issues in OERs. This paper raises the following research questions: How much do OER creators know about accessibility? What measures are needed to ensure accessibility in OERs? Results suggest that OER creators are aware about some issues around accessibility, but they still need further training on how to solve them. OER creators lack time, skills, and awareness to create accessible OERs. Support from specialists and colleagues and hands-on trainings can help cope with these challenges.
- Published
- 2022
- Full Text
- View/download PDF
17. Ensembling and Score-Based Filtering in Sentence Alignment for Automatic Simplification of German Texts
- Author
-
Sarah Ebling, Nicolas Spring, Annette Rios, Marek Kostrzewa, University of Zurich, and Spring, Nicolas
- Subjects
10105 Institute of Computational Linguistics ,410 Linguistics ,1700 General Computer Science ,000 Computer science, knowledge & systems ,2614 Theoretical Computer Science - Published
- 2022
18. Landscape of IoT security
- Author
-
Eryk Schiller, Andy Aidoo, Jara Fuhrer, Jonathan Stahl, Michael Ziörjen, Burkhard Stiller, University of Zurich, and Schiller, Eryk
- Subjects
IoT, Security, Taxonomy, Attack Vectors, Countermeasures, GDPR ,IoT ,Attack vectors ,Countermeasures ,General Computer Science ,10009 Department of Informatics ,Security ,1700 General Computer Science ,000 Computer science, knowledge & systems ,GDPR ,2614 Theoretical Computer Science ,Theoretical Computer Science ,Taxonomy - Abstract
Landscape of IoT Securityis a survey paper that overviews the IoT security landscape intending to emphasize the demand for secured IoT-related products and applications. Therefore, this paper derives (a) a list of key challenges of securing IoT devices is determined by examining their particular characteristics, (b) major security objectives for secured IoT systems are defined, (c) a threat taxonomy, which outlines potential security gaps prevalent in current IoT systems, and (d) key countermeasures against the aforementioned threats, for selected IoT security-related technologies available on the market. Considering the vast number of Internet of Things (IoT) devices currently being deployed and the number of devices that are estimated to exist beyond 2025, it is indisputable that IoT will significantly impact society and the economy. IoT devices rapidly become part of everyday life, and all relevant sectors will encounter them. Selected industries are already fully involved in developing IoT applications: factories, medical institutions, homes, and cities. Due to this growth and entanglement into everyday life, IoT failures and attacks can be severe. Hence, IoT security is a concern of extreme significance. Several studies infer that several challenges in securing IoT devices and networks exist. Due to the particular characteristics of IoT devices, it is not feasible to apply traditional IT countermeasures since only dedicated IoT security procedures have to be developed. However, since there is already considerable progress made in relevant fields, especially IoT device hardware, network management, authentication, privacy policies, forensics, and lifecycle management, the path to secure IoT has been opened. The fast progress of IoT security research identified in this can be supported by various products emerging on the market. While products can be distinguished as Software, Hardware/ Firmware, Service/Cloud, and Home solutions depending on where security measures are applied, for software solutions, the most common approach still refers to Intrusion Detection Systems. Hardware and firmware solutions secure IoT devices without installing additional software and are primarily intended for IoT manufacturers. Service and cloud products focus on securing the entire network of distributed IoT devices by checking their configuration and monitoring their behavior to detect unusual actions. In private households, the key objective of IoT security is to protect the users' privacy. Home Solutions can scan data traffic and ensure no sensitive information is leaked. Within the same context, the need for regulations arose. Multiple projects and working groups, such as the Internet Engineering Task Force (IETF), Global System for Mobile Communications Association (GSMA), Open Web Application Security Project (OWASP), or Broadband Internet Technical Advisory Group (BITAG), elaborate best practices for the design, development, and deployment of secure IoT services and products. This shared knowledge makes it possible for smaller manufacturers with negligible expertise and limited resources to offer secure IoT ecosystems. Furthermore, governmental agencies, like the American Homeland Security, the National Institute of Standards and Technology (NIST), or the European Union Agency for Cybersecurity (ENISA), work on regulations or guidelines to protect the population. However, several gaps between existing regulations like General Data Protection Regulation (GDPR) and the IoT still need to be addressed. The threat taxonomy, developed in this paper and based on the literature reviews, provides a more exhaustive view of possible IoT threats and IoT attack vectors than existing taxonomies do. However, while the taxonomy is based on the standard three-layer IoT architecture, the categorization based on layers helps to visualize where a threat can occur, which is limited due to its simplicity. For selected threats, it is not trivial where they should be positioned within the taxonomy. For example, a Distributed Denial of Service (DDoS) threat can affect the network and the application layer. Additionally, the taxonomy does not address that selected threats differing in nature depending on the context: a node within the system can be on the receiving end of a DDoS attack, i.e., if other nodes are sending requests to it, or on the sending end, i.e., if it was compromised and sent requests to other nodes. Additionally, the survey highlights the importance of considering the complete lifecycle of IoT devices when addressing security concerns. However, the taxonomy presented needs to account for the dynamic nature of IoT systems, where devices might join a network at any time and belong to multiple owners during their lifecycle. Thus, such a false impression of addressing IoT security as a single task has to be countermeasured since securing the system needs to be a permanent task. Future versions of the taxonomy developed can address these aspects by incorporating a dynamic view of IoT security. Additionally, they can include a ranking of threats based on metrics, such as the Common Vulnerability Scoring System (CVSS) by NIST. By adding data from public data sets, such as the Common Vulnerabilities and Exposure (CVE) database, which lists known vulnerabilities, an additional perspective can be determined on how common specific threats are. Exploring how these threats can be combined to form a standard attack surface that a malicious user might take will be interesting.
- Published
- 2022
- Full Text
- View/download PDF
19. Dynamic Spanning Trees for Connectivity Queries on Fully-dynamic Undirected Graphs
- Author
-
Chen, Qing, Lachish, Oded, Helmer, Sven, Böhlen, Michael Hanspeter, and University of Zurich
- Subjects
10009 Department of Informatics ,General Engineering ,1700 General Computer Science ,000 Computer science, knowledge & systems ,1701 Computer Science (miscellaneous) - Abstract
Answering connectivity queries is fundamental to fully dynamic graphs where edges and vertices are inserted and deleted frequently. Existing work proposes data structures and algorithms with worst case guarantees. We propose a new data structure, the dynamic tree (D-tree), together with algorithms to construct and maintain it. The D-tree is the first data structure that scales to fully dynamic graphs with millions of vertices and edges and, on average, answers connectivity queries much faster than data structures with worst case guarantees.
- Published
- 2022
- Full Text
- View/download PDF
20. Challenges for Using Impact Regularizers to Avoid Negative Side Effects
- Author
-
Lindner, David, Matoba, Kyle, Meulemans, Alexander, and University of Zurich
- Subjects
FOS: Computer and information sciences ,Computer Science - Machine Learning ,Artificial Intelligence (cs.AI) ,Computer Science - Artificial Intelligence ,570 Life sciences ,biology ,1700 General Computer Science ,10194 Institute of Neuroinformatics ,Machine Learning (cs.LG) - Abstract
Designing reward functions for reinforcement learning is difficult: besides specifying which behavior is rewarded for a task, the reward also has to discourage undesired outcomes. Misspecified reward functions can lead to unintended negative side effects, and overall unsafe behavior. To overcome this problem, recent work proposed to augment the specified reward function with an impact regularizer that discourages behavior that has a big impact on the environment. Although initial results with impact regularizers seem promising in mitigating some types of side effects, important challenges remain. In this paper, we examine the main current challenges of impact regularizers and relate them to fundamental design decisions. We discuss in detail which challenges recent approaches address and which remain unsolved. Finally, we explore promising directions to overcome the unsolved challenges in preventing negative side effects with impact regularizers., Comment: Presented at the SafeAI workshop at AAAI 2021
- Published
- 2022
21. Stabilized reduced-order models for unsteady incompressible flows in three-dimensional parametrized domains
- Author
-
Buoso, Stefano, Manzoni, Andrea, Alkadhi, Hatem, Kurtcuoglu, Vartan, University of Zurich, and Buoso, Stefano
- Subjects
Stabilization techniques ,General Computer Science ,Reduced order modeling ,2200 General Engineering ,General Engineering ,570 Life sciences ,biology ,610 Medicine & health ,1700 General Computer Science ,Computational fluid dynamics ,Proper orthogonal decomposition ,Discrete empirical interpolation ,10052 Institute of Physiology ,Finite-elements - Published
- 2022
- Full Text
- View/download PDF
22. Educating moral sensitivity in business: An experimental study to evaluate the effectiveness of a serious moral game
- Author
-
Tanner, Carmen, Schmocker, David, Katsarov, Johannes, Christen, Markus, University of Zurich, and Tanner, Carmen
- Subjects
General Computer Science ,11476 Digital Society Initiative ,10222 Institute of Biomedical Ethics and History of Medicine ,610 Medicine & health ,1700 General Computer Science ,10003 Department of Banking and Finance ,3304 Education ,Education - Published
- 2022
- Full Text
- View/download PDF
23. Appearance Manipulation in Spatial Augmented Reality using Image Differences
- Author
-
Gigilashvili, Davit, Trumpy, Giorgio, University of Zurich, and Gigilashvili, Davit
- Subjects
700 Arts ,1700 General Computer Science ,Augmented reality ,10114 Institute of Cinema Studies ,translucency ,gloss ,900 History ,appearance - Abstract
Rapidly emerging augmented reality technologies enable us to virtually alter appearance of objects and materials in a fast and efficient way. The state-of-the-art research shows that the human visual system has a poor ability to invert the optical processes in the scene and rather relies on images cues and spatial distribution of luminance to perceive appearance attributes, such as gloss and translucency. For this reason, we hypothesize that it is possible to alter gloss and translucency appearance by projecting an image onto the original to mimic the luminance distribution characteristic of the target appearance. To demonstrate feasibility of this approach, we use pairs of physically-based renderings of glossy and matte, and translucent and opaque materials, respectively; we calculate a compensation image – a luminance difference between them, and subsequently, we demonstrate that by algebraic addition of luminance, an image of matte object can appear glossy, and an image of opaque object can appear translucent, when respective compensation images are projected onto them. Furthermore, we introduce a novel method to increase apparent opacity of translucent materials. Finally, we propose a future direction, which could enable nearly real-time appearance manipulation.
- Published
- 2022
24. Prediction: An Algorithmic Principle Meeting Neuroscience and Machine Learning Halfway
- Author
-
Bouhadjar, Younes, Moruzzi, Caterina, Payvand, Melika, Bundy, Alan, Mareschal, Denis, University of Zurich, and Moruzzi, Caterina
- Subjects
Algorithmic Principles ,Computation ,570 Life sciences ,biology ,1700 General Computer Science ,Reasoning ,Bottom-up ,ddc:004 ,Prediction ,Neuroscience ,Top-down ,Prediction, interdisciplinary, bottom-up, top-down ,10194 Institute of Neuroinformatics - Abstract
In this paper, we support the relevance of the collaboration and mutual inspiration between research in Artificial Intelligence and neuroscience to create truly intelligent and efficient systems. In contrast to the traditional top-down and bottom-up strategies designed to study and emulate the brain, we propose an alternative approach where these two strategies are met halfway, defining a set of algorithmic principles. We present prediction as a core algorithmic principle and advocate for applying the same approach to identify other neural principles which can constitute core mechanisms of new Machine Learning frameworks., CEUR Workshop Proceedings, 3227, ISSN:1613-0073, Proceedings of the 3rd Human-Like Computing Workshop (HLC 2022)
- Published
- 2022
- Full Text
- View/download PDF
25. 'Development and validation of the ICAP Technology Scale to measure how teachers integrate technology into learning activities'
- Author
-
Antonietti, Chiara, Schmitz, Maria-Luisa, Consoli, Tessa, Cattaneo, Alberto, Gonon, Philipp, Petko, Dominik, University of Zurich, and Antonietti, Chiara
- Subjects
Cognitive engagement ,General Computer Science ,technology use ,10091 Institute of Education ,ICAP ,Learning activities ,1700 General Computer Science ,370 Education ,3304 Education ,Education - Abstract
Previous research investigating the use of technology in school has focused mainly on the frequency of use of digital tools during lessons rather than investigating how technology is integrated with respect to different kinds of learning activities. Since the impact of technology use on learning depends on how it is used and on what activities supported by technology are implemented in lessons, a measurement instrument assessing how technology is integrated into learning activities is necessary to investigate its impact on teaching and learning processes. According to the interactive, constructive, active, and passive (ICAP) framework, which distinguishes four different learning activities based on the level of students’ cognitive engagement, we developed the 12-item ICAP Technology Scale (ICAP-TS) that accounts for all four dimensions of technology integration in lessons. We used confirmatory factor analysis to validate the four-factor structure of the ICAP-TS with a sample of 1059 upper-secondary school teachers from Switzerland. We also examined reliability using classical test theory and Rasch model analysis to assess the scale’s psychometric characteristics. We then analyzed the associations between the ICAP-TS and a general use frequency measure of 12 educational technologies to test the criterion validity. The results confirmed the four-factor structure of the ICAP-TS and revealed good instrument accuracy. The most difficult items to endorse are those describing the integration of technology into interactive learning activities. Furthermore, all 12 items significantly correlated with the frequency of use of 12 educational technologies. We recommend the ICAP-TS as a short and reliable measurement scale for assessing how technology is integrated into lessons, considering different learning activities based on the ICAP theoretical model.
- Published
- 2023
26. Quantitative Evaluation of Enhanced Multi-plane Clinical Fetal Diffusion MRI with a Crossing-Fiber Phantom
- Author
-
Kebiri, Hamza, Lajous, Helena, Aleman-Gomez, Yasser, Girard, Gabriel, Rodriguez, Erick Canales, Tourbier, Sebastien, Pizzolato, M, Ledoux, Jean-Baptiste, Fornari, Eleonora, Jakab, András, University of Zurich, Cetin-Karayumak, Suheyla, Christiaens, Daan, Figini, Matteo, Guevara, Pamela, Gyori, Noemi, Nath, Vishwesh, Pieciak, Tomasz, and Kebiri, Hamza
- Subjects
10036 Medical Clinic ,610 Medicine & health ,1700 General Computer Science ,2614 Theoretical Computer Science - Published
- 2021
27. Sickle Cell Disease Severity Prediction from Percoll Gradient Images using Graph Convolutional Networks
- Author
-
Ario Sadafi, Anna Bogdanova, Carsten Marr, Asya Makhro, Shadi Albarqouni, Leonid Livshits, Nassir Navab, University of Zurich, Albarqouni, Shadi, Cardoso, M. Jorge, Dou, Qi, Kamnitsas, Konstantinos, Khanal, Bishesh, Rekik, Islem, Rieke, Nicola, Sheet, Debdoot, Tsaftaris, Sotirios, Xu, Daguang, Xu, Ziyue, and Marr, Carsten
- Subjects
FOS: Computer and information sciences ,Computer science ,Low resource ,Computer Vision and Pattern Recognition (cs.CV) ,Computer Science - Computer Vision and Pattern Recognition ,Convolutional neural network ,Disease severity ,FOS: Electrical engineering, electronic engineering, information engineering ,medicine ,Blood test ,1700 General Computer Science ,2614 Theoretical Computer Science ,medicine.diagnostic_test ,Artificial neural network ,business.industry ,Image and Video Processing (eess.IV) ,Pattern recognition ,Electrical Engineering and Systems Science - Image and Video Processing ,10081 Institute of Veterinary Physiology ,Feature (computer vision) ,10076 Center for Integrative Human Physiology ,570 Life sciences ,biology ,Graph (abstract data type) ,Artificial intelligence ,business ,Percoll - Abstract
Sickle cell disease (SCD) is a severe genetic hemoglobin disorder that results in premature destruction of red blood cells. Assessment of the severity of the disease is a challenging task in clinical routine since the causes of broad variance in SCD manifestation despite the common genetic cause remain unclear. Identification of the biomarkers that would predict the severity grade is of importance for prognosis and assessment of responsiveness of patients to therapy. Detection of the changes in red blood cell (RBC) density through separation of Percoll density gradient could be such marker as it allows to resolve intercellular differences and follow the most damaged dense cells prone to destruction and vaso-occlusion. Quantification of the images obtained from the distribution of RBCs in Percoll gradient and interpretation of the obtained is an important prerequisite for establishment of this approach. Here, we propose a novel approach combining a graph convolutional network, a convolutional neural network, fast Fourier transform, and recursive feature elimination to predict the severity of SCD directly from a Percoll image. Two important but expensive laboratory blood test parameters measurements are used for training the graph convolutional network. To make the model independent from such tests during prediction, the two parameters are estimated by a neural network from the Percoll image directly. On a cohort of 216 subjects, we achieve a prediction performance that is only slightly below an approach where the groundtruth laboratory measurements are used. Our proposed method is the first computational approach for the difficult task of SCD severity prediction. The two-step approach relies solely on inexpensive and simple blood analysis tools and can have a significant impact on the patients' survival in underdeveloped countries where access to medical instruments and doctors is limited, Accepted for publication at MICCAI 2021 workshop on aFfordable healthcare and AI for Resource diverse global health (FAIR)
- Published
- 2021
28. XCoref: Cross-document Coreference Resolution in the Wild
- Author
-
Zhukova, Anastasia, Hamborg, Felix, Donnay, Karsten, Gipp, Bela, University of Zurich, Smits, Malte, and Zhukova, Anastasia
- Subjects
FOS: Computer and information sciences ,Computer Science - Computation and Language ,document coreference resolution ,Cross ,11476 Digital Society Initiative ,media bias ,320 Political science ,10113 Institute of Political Science ,1700 General Computer Science ,2614 Theoretical Computer Science ,news analysis ,Computation and Language (cs.CL) - Abstract
Datasets and methods for cross-document coreference resolution (CDCR) focus on events or entities with strict coreference relations. They lack, however, annotating and resolving coreference mentions with more abstract or loose relations that may occur when news articles report about controversial and polarized events. Bridging and loose coreference relations trigger associations that may lead to exposing news readers to bias by word choice and labeling. For example, coreferential mentions of "direct talks between U.S. President Donald Trump and Kim" such as "an extraordinary meeting following months of heated rhetoric" or "great chance to solve a world problem" form a more positive perception of this event. A step towards bringing awareness of bias by word choice and labeling is the reliable resolution of coreferences with high lexical diversity. We propose an unsupervised method named XCoref, which is a CDCR method that capably resolves not only previously prevalent entities, such as persons, e.g., "Donald Trump," but also abstractly defined concepts, such as groups of persons, "caravan of immigrants," events and actions, e.g., "marching to the U.S. border." In an extensive evaluation, we compare the proposed XCoref to a state-of-the-art CDCR method and a previous method TCA that resolves such complex coreference relations and find that XCoref outperforms these methods. Outperforming an established CDCR model shows that the new CDCR models need to be evaluated on semantically complex mentions with more loose coreference relations to indicate their applicability of models to resolve mentions in the "wild" of political news articles.
- Published
- 2021
29. Conservative scheme compatible with some other conservation laws: Conservation of the local angular momentum
- Author
-
Abgrall, Remi, Nassajian Mojarrad, Fatemeh, University of Zurich, and Nassajian Mojarrad, Fatemeh
- Subjects
10123 Institute of Mathematics ,510 Mathematics ,General Computer Science ,2200 General Engineering ,General Engineering ,1700 General Computer Science ,Mathematics - Numerical Analysis ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
We are interested in building schemes for the compressible Euler equations that are also locally conserving the angular momentum. We present a general framework, describe a few examples of schemes and show results. These schemes can be of arbitrary order.
- Published
- 2022
30. Disentangling Sources of Influence in Online Social Networks
- Author
-
Matija Piskorec, Tomislav Šmuc, Mile Šikić, University of Zurich, and Piskorec, Matija
- Subjects
FOS: Computer and information sciences ,Physics - Physics and Society ,General Computer Science ,Computer science ,10009 Department of Informatics ,Inference ,FOS: Physical sciences ,050801 communication & media studies ,050109 social psychology ,maximum likelihood estimation ,Physics and Society (physics.soc-ph) ,000 Computer science, knowledge & systems ,influence ,social networks: peer and authority ,0508 media and communications ,0501 psychology and cognitive sciences ,General Materials Science ,1700 General Computer Science ,information diffusion ,News media ,Social and Information Networks (cs.SI) ,Social network ,business.industry ,05 social sciences ,General Engineering ,Computing ,Computer Science - Social and Information Networks ,Data science ,2500 General Materials Science ,statistical learning ,online social networks ,2200 General Engineering ,Data collection ,ComputingMilieux_COMPUTERSANDSOCIETY ,social network services ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 - Abstract
Information propagation in online social networks is facilitated by two types of influence - endogenous (peer) influence that acts between users of the social network and exogenous (external) that corresponds to various external mediators such as online news media. However, inference of these influences from data remains a challenge, especially when data on the activation of users is scarce. In this paper we propose a methodology that yields estimates of both endogenous and exogenous influence using only a social network structure and a single activation cascade. Our method exploits the statistical differences between the two types of influence - endogenous is dependent on the social network structure and current state of each user while exogenous is independent of these. We evaluate our methodology on simulated activation cascades as well as on cascades obtained from several large Facebook political survey applications. We show that our methodology is able to provide estimates of endogenous and exogenous influence in online social networks, characterize activation of each individual user as being endogenously or exogenously driven, and identify most influential groups of users.
- Published
- 2019
31. Latent: A Flexible Data Collection Tool to Research Human Behavior in the Context of Web Navigation
- Author
-
Hugo Silva, Ricardo Tonet, Marcus Cheetham, Cátia Cepeda, Hugo Gamboa, Edouard Battegay, Daniel Faustino de Noronha Osório, University of Zurich, and Cepeda, Catia
- Subjects
General Computer Science ,Computer science ,data acquisition ,Digital content ,Context (language use) ,610 Medicine & health ,UFSP13-4 Dynamics of Healthy Aging ,Digital media ,World Wide Web ,User experience design ,Web navigation ,General Materials Science ,1700 General Computer Science ,Browser extension ,Data collection ,Human–computer interaction ,business.industry ,General Engineering ,Usability ,2500 General Materials Science ,web search ,2200 General Engineering ,The Internet ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,10029 Clinic and Policlinic for Internal Medicine ,business ,lcsh:TK1-9971 - Abstract
Internet usage has grown dramatically since the early years of its inception. The rich field of data provided by internet users in interaction with digital media content can provide insight into web-based navigation behavior and underlying psychological dimensions. Human-computer interaction in the web is an underutilized source of data for understanding human online behavior. While researchers and usability testing services do use these sources to analyze human behavior and user experience, access to the diverse range of other potentially useful data available during web-based interaction for research is limited. In this paper, we propose a novel tool in the form of a web browser extension, referred to as Latent, which can be used to simultaneously capture information from different sources while users interact with digital content. The data acquisition capabilities of Latent makes it suitable for various research purposes, ranging from studies of usability to decision-making and personality. A particular advantage of Latent is that the method and control of data acquisition is completely transparent to the user. We present the architecture of the web browser extension, describe the data that can be acquired, and report on the residual impact of the tool on the user's computer processing resources.
- Published
- 2019
32. Imbalance-Aware Self-Supervised Learning for 3D Radiomic Representations
- Author
-
Ivan Ezhov, Krishna Chaitanya, Shengda Luo, Fei-Fei Xue, Hongwei Li, Benedikt Wiestler, Jianguo Zhang, Bjoern H. Menze, University of Zurich, de Buijne, Marleen, Cotin, Stéphane, Speidel, Stefanie, Zhen, Yefeng, Essert, Caroline, and Zhang, Jianguo
- Subjects
FOS: Computer and information sciences ,Modalities ,Computer science ,business.industry ,Computer Science - Artificial Intelligence ,Deep learning ,Computer Vision and Pattern Recognition (cs.CV) ,Supervised learning ,Computer Science - Computer Vision and Pattern Recognition ,610 Medicine & health ,Overfitting ,Machine learning ,computer.software_genre ,Artificial Intelligence (cs.AI) ,ComputingMethodologies_PATTERNRECOGNITION ,Feature (computer vision) ,Artificial intelligence ,1700 General Computer Science ,Representation (mathematics) ,business ,2614 Theoretical Computer Science ,Feature learning ,computer ,11493 Department of Quantitative Biomedicine ,Complement (set theory) - Abstract
Radiomic representations can quantify properties of regions of interest in medical image data. Classically, they account for pre-defined statistics of shape, texture, and other low-level image features. Alternatively, deep learning-based representations are derived from supervised learning but require expensive annotations from experts and often suffer from overfitting and data imbalance issues. In this work, we address the challenge of learning representations of 3D medical images for an effective quantification under data imbalance. We propose a \emph{self-supervised} representation learning framework to learn high-level features of 3D volumes as a complement to existing radiomics features. Specifically, we demonstrate how to learn image representations in a self-supervised fashion using a 3D Siamese network. More importantly, we deal with data imbalance by exploiting two unsupervised strategies: a) sample re-weighting, and b) balancing the composition of training batches. When combining our learned self-supervised feature with traditional radiomics, we show significant improvement in brain tumor classification and lung cancer staging tasks covering MRI and CT imaging modalities., camera-ready version in MICCAI 2021
- Published
- 2021
33. Acoustic-Based Spatio-Temporal Learning for Press-Fit Evaluation of Femoral Stem Implants
- Author
-
Philipp Fürnstahl, Nassir Navab, Matthias Seibold, Armando Hoch, Daniel M. Suter, Patrick O. Zingg, Mazda Farshad, University of Zurich, MICCAI, and Seibold, Matthias
- Subjects
Hip surgery ,Computer science ,business.industry ,610 Medicine & health ,Femoral stem ,Convolutional neural network ,Broaching ,law.invention ,law ,Spectrogram ,Computer vision ,10046 Balgrist University Hospital, Swiss Spinal Cord Injury Center ,Hammer ,Artificial intelligence ,1700 General Computer Science ,Cadaveric spasm ,business ,2614 Theoretical Computer Science ,Total hip arthroplasty - Abstract
In this work, we propose a method utilizing tool-integrated vibroacoustic measurements and a spatio-temporal learning-based framework for the detection of the insertion endpoint during femoral stem implantation in cementless Total Hip Arthroplasty (THA). In current practice, the optimal insertion endpoint is intraoperatively identified based on surgical experience and dependent on a subjective decision. Leveraging spectogram features and time-variant sequences of acoustic hammer blow events, our proposed solution can give real-time feedback to the surgeon during the insertion procedure and prevent adverse events in clinical practice. To validate our method on real data, we built a realistic experimental human cadaveric setup and acquired acoustic signals of hammer blows during broaching the femoral stem cavity with a novel inserter tool which was enhanced by contact microphones. The optimal insertion endpoint was determined by a standardized preoperative plan following clinical guidelines and executed by a board-certified surgeon. We train and evaluate a Long-Term Recurrent Convolutional Neural Network (LRCN) on sequences of spectrograms to detect a reached target press fit corresponding to a seated implant. The proposed method achieves an overall per-class recall of \(93.82\pm 5.11\%\) for detecting an ongoing insertion and \(70.88\pm 11.83\%\) for identifying a reached target press fit for five independent test specimens. The obtained results open the path for the development of automated systems for intra-operative decision support, error prevention and robotic applications in hip surgery.
- Published
- 2021
34. READ for Solving Manuscript Riddles: A Preliminary Study of the Manuscripts of the 3rd ṣaṭka of the Jayadrathayāmala
- Author
-
Stephen White, Olga Serbaeva, University of Zurich, Barney Smith, Elisa, Pal, Umapada, and Serbaeva, Olga
- Subjects
Computer science ,Syllable frequency ,180 Ancient, medieval & eastern philosophy ,computer.software_genre ,290 Other religions ,Virtual research environment ,Linguistics ,Software framework ,Identification (information) ,Workflow ,Palaeography ,Scripting language ,10106 Institute of Asian and Oriental Studies ,Statistical analysis ,1700 General Computer Science ,2614 Theoretical Computer Science ,computer - Abstract
This is a part of an in-depth study of a set of the manuscripts related to the Jayadrathayāmala. Taking JY.3.9 as a test-chapter, a comparative paleography analysis of the 11 manuscripts was made within READ software framework. The workflow within READ minimized the effort to make a few important discoveries (manuscripts containing more than one script, identification of the manuscripts potentially written by the same person) as well as to create an overview of the shift from Nāgarī to Newārī and, finally, to Devanāgarī scripts within the history of manuscript transmission of a single chapter. Exploratory statistical analysis in R of the syllable frequency in each manuscript, based on the paleography analysis export from READ, helped to establish that there are potentially two lines of manuscript transmission of the JY.3.9.
- Published
- 2021
- Full Text
- View/download PDF
35. The Detection of Actors for German
- Author
-
Klenner, Manfred, Gohring, Anne, University of Zurich, Ekštein, K, Pártl, F, Konopík, M, and Klenner, Manfred
- Subjects
Computer science ,Head (linguistics) ,business.industry ,410 Linguistics ,000 Computer science, knowledge & systems ,computer.software_genre ,language.human_language ,Noun phrase ,Newspaper ,German ,Identification (information) ,10105 Institute of Computational Linguistics ,Multilayer perceptron ,Noun ,language ,1700 General Computer Science ,Artificial intelligence ,2614 Theoretical Computer Science ,business ,computer ,Word (computer architecture) ,Natural language processing - Abstract
In this short paper, we discuss a straight-forward approach for the identification of noun phrases denoting actors (agents). We use a multilayer perceptron applied to the word embeddings of the head nouns in order to learn a model. A list of 9,000 actors together with 11,000 non-actors generated from a newspaper corpus are used as a silver standard. An evaluation of the results seems to indicate that the model generalises well on unseen data.
- Published
- 2021
36. WikiFlash: Generating Flashcards from Wikipedia Articles
- Author
-
Cheng, Yuang, Ding, Yue, Foucher, Sebastien, Pascual, Damián, Richter, Oliver, Volk, Martin, Wattenhofer, Roger, University of Zurich, Mantoro, T, et al, and Pascual, Damián
- Subjects
10105 Institute of Computational Linguistics ,410 Linguistics ,1700 General Computer Science ,000 Computer science, knowledge & systems ,2614 Theoretical Computer Science - Published
- 2021
37. Deep Conditional Transformation Models
- Author
-
Torsten Hothorn, Philipp F. M. Baumann, David Rügamer, University of Zurich, Oliver, Nuria, et al, and Baumann, Philipp F M
- Subjects
FOS: Computer and information sciences ,Computer Science - Machine Learning ,Computer science ,Machine Learning (stat.ML) ,610 Medicine & health ,Machine learning ,computer.software_genre ,Transformation models ,Machine Learning (cs.LG) ,Statistics - Machine Learning ,1700 General Computer Science ,2614 Theoretical Computer Science ,Parametric statistics ,Interpretability ,Network architecture ,Artificial neural network ,business.industry ,Deep learning ,Cumulative distribution function ,Linear model ,Unstructured data ,Distributional regression ,10060 Epidemiology, Biostatistics and Prevention Institute (EBPI) ,Semi ,structured regression ,Artificial intelligence ,business ,computer ,Normalizing flows - Abstract
Learning the cumulative distribution function (CDF) of an outcome variable conditional on a set of features remains challenging, especially in high-dimensional settings. Conditional transformation models provide a semi-parametric approach that allows to model a large class of conditional CDFs without an explicit parametric distribution assumption and with only a few parameters. Existing estimation approaches within this class are, however, either limited in their complexity and applicability to unstructured data sources such as images or text, lack interpretability, or are restricted to certain types of outcomes. We close this gap by introducing the class of deep conditional transformation models which unifies existing approaches and allows to learn both interpretable (non-)linear model terms and more complex neural network predictors in one holistic framework. To this end we propose a novel network architecture, provide details on different model definitions and derive suitable constraints as well as network regularization terms. We demonstrate the efficacy of our approach through numerical experiments and applications.
- Published
- 2021
38. Competitive Interactive Video Retrieval in Virtual Reality with vitrivr-VR
- Author
-
Silvan Heller, Loris Sauter, Florian Spiess, Heiko Schuldt, Ralph Gasser, Luca Rossetto, University of Zurich, and Spiess, Florian
- Subjects
Modality (human–computer interaction) ,10009 Department of Informatics ,business.industry ,Computer science ,media_common.quotation_subject ,Feature vector ,Relevance feedback ,02 engineering and technology ,000 Computer science, knowledge & systems ,Virtual reality ,Presentation ,Human–computer interaction ,Feature (computer vision) ,0202 electrical engineering, electronic engineering, information engineering ,Interactive video retrieval ,020201 artificial intelligence & image processing ,1700 General Computer Science ,2614 Theoretical Computer Science ,business ,Interactive media ,media_common - Abstract
Virtual Reality (VR) has emerged and developed as a new modality to interact with multimedia data. In this paper, we present vitrivr-VR, a prototype of an interactive multimedia retrieval system in VR based on the open source full-stack multimedia retrieval system vitrivr. We have implemented query formulation tailored to VR: Users can use speech-to-text to search collections via text for concepts, OCR and ASR data as well as entire scene descriptions through a video-text co-embedding feature that embeds sentences and video sequences into the same feature space. Result presentation and relevance feedback in vitrivr-VR leverages the capabilities of virtual spaces.
- Published
- 2021
39. A New Approach to Orthopedic Surgery Planning Using Deep Reinforcement Learning and Simulation
- Author
-
Ackermann, Joëlle, Wieland, M, Hoch, Armando, Ganz, R, Snedeker, J G, Oswald, M R, Pollefeys, Marc, Zingg, P O, Esfandiari, H, Fürnstahl, Philipp, University of Zurich, de Bruijne, M, Cattin, P C, Cotin, S, Padoy, N, Speidel, S, Zheng, Y, Essert, C, and Ackermann, Joëlle
- Subjects
610 Medicine & health ,10046 Balgrist University Hospital, Swiss Spinal Cord Injury Center ,1700 General Computer Science ,2614 Theoretical Computer Science - Published
- 2021
- Full Text
- View/download PDF
40. Autonomous Driving of a Rover-Like Robot Using Neuromorphic Computing
- Author
-
Piñero-Fuentes, Enrique, Canas-Moreno, Salvador, Rios-Navarro, Antonio, Delbruck, Tobi, Linares-Barranco, Alejandro, University of Zurich, Rojas, Ignacio, Joya, Gonzalo, Català, Andreu, and Piñero-Fuentes, Enrique
- Subjects
business.industry ,Computer science ,Deep learning ,Real-time computing ,Frame (networking) ,Process (computing) ,Bottleneck ,Neuromorphic engineering ,570 Life sciences ,biology ,Robot ,1700 General Computer Science ,Artificial intelligence ,2614 Theoretical Computer Science ,business ,Field-programmable gate array ,Edge computing ,10194 Institute of Neuroinformatics - Abstract
Autonomous driving solutions are based on artificial vision and machine learning for understanding the environment and facilitate decision making tasks. Similar techniques are used for indoor robot navigation. Deep learning architectures, which are usually computationally expensive, are impacting our daily lives. This technology is evolving with a notable improvement of cost-efficiency in terms of energy consumption, enabling AI-edge computing. However, these architectures are usually trained on powerful GPUs, what represents the limit for edge computing. Nevertheless, after this training, efficient edge computing devices can process these architectures locally. Neuromorphic engineering shows off on solving the energy bottleneck problem through bio-inspired sensors, processors and spike-based computation techniques. This work presents a mobile robotic platform commanded through the Robotic Operating System (ROS), which obeys the classification output of an AI-edge CNN accelerator for FPGA connected to a neuromorphic dynamic vision sensor. The classification system is able to process up to 200 fps for 64 \(\times \) 64 histograms collected with 2k events per frame and executing a 5 layer CNN with 18MOPs for indoor robot navigation. A traffic sign dataset has been used for training achieving a measured accuracy of 97.62% and 99.96% in the validation and test datasets respectively.
- Published
- 2021
41. Rotation Invariance and Extensive Data Augmentation: A Strategy for the MItosis DOmain Generalization (MIDOG) Challenge
- Author
-
Lafarge, Maxime W, Koelzer, Viktor H, University of Zurich, and Lafarge, Maxime W
- Subjects
FOS: Computer and information sciences ,Computer Vision and Pattern Recognition (cs.CV) ,10049 Institute of Pathology and Molecular Pathology ,Computer Science - Computer Vision and Pattern Recognition ,610 Medicine & health ,1700 General Computer Science ,2614 Theoretical Computer Science - Abstract
Automated detection of mitotic figures in histopathology images is a challenging task: here, we present the different steps that describe the strategy we applied to participate in the MIDOG 2021 competition. The purpose of the competition was to evaluate the generalization of solutions to images acquired with unseen target scanners (hidden for the participants) under the constraint of using training data from a limited set of four independent source scanners. Given this goal and constraints, we joined the challenge by proposing a straight-forward solution based on a combination of state-of-the-art deep learning methods with the aim of yielding robustness to possible scanner-related distributional shifts at inference time. Our solution combines methods that were previously shown to be efficient for mitosis detection: hard negative mining, extensive data augmentation, rotation-invariant convolutional networks. We trained five models with different splits of the provided dataset. The subsequent classifiers produced F1-scores with a mean and standard deviation of 0.747+/-0.032 on the test splits. The resulting ensemble constitutes our candidate algorithm: its automated evaluation on the preliminary test set of the challenge returned a F1-score of 0.6828.
- Published
- 2021
- Full Text
- View/download PDF
42. Detecting Race and Gender Bias in Visual Representation of AI on Web Search Engines
- Author
-
Roberto Ulloa, Aleksandra Urman, Mykola Makhortykh, Boratto, Ludovico, Faralli, Stefano, Marras, Mirko, Stilo, Giovanni, University of Zurich, and Makhortykh, Mykola
- Subjects
FOS: Computer and information sciences ,10009 Department of Informatics ,Computer science ,representation ,media_common.quotation_subject ,Social reality ,web search ,bias ,artificial intelligence ,000 Computer science, knowledge & systems ,search engine ,ddc:070 ,Computer Science - Information Retrieval ,Ranking (information retrieval) ,Race (biology) ,Search engine ,Interactive, electronic Media ,H.3.3 ,Perception ,Gender bias ,1700 General Computer Science ,information retrieval ,interaktive, elektronische Medien ,künstliche Intelligenz ,2600 General Mathematics ,media_common ,News media, journalism, publishing ,Repräsentation ,Information retrieval ,algorithm ,Representation (systemics) ,Contrast (statistics) ,artificial intelligence ,Suchmaschine ,Algorithmus ,online service ,trend ,Online-Dienst ,Publizistische Medien, Journalismus,Verlagswesen ,Information Retrieval (cs.IR) - Abstract
Web search engines influence perception of social reality by filtering and ranking information. However, their outputs are often subjected to bias that can lead to skewed representation of subjects such as professional occupations or gender. In our paper, we use a mixed-method approach to investigate presence of race and gender bias in representation of artificial intelligence (AI) in image search results coming from six different search engines. Our findings show that search engines prioritize anthropomorphic images of AI that portray it as white, whereas non-white images of AI are present only in non-Western search engines. By contrast, gender representation of AI is more diverse and less skewed towards a specific gender that can be attributed to higher awareness about gender bias in search outputs. Our observations indicate both the the need and the possibility for addressing bias in representation of societally relevant subjects, such as technological innovation, and emphasize the importance of designing new approaches for detecting bias in information retrieval systems., Comment: 16 pages, 3 figures
- Published
- 2021
43. Aν-Net: Automatic Detection and Segmentation of Aneurysm
- Author
-
Shit, Suprosanna, Ezhov, Ivan, Paetzold, Johannes C, Menze, Bjoern, University of Zurich, Hennemuth, A, and Shit, Suprosanna
- Subjects
610 Medicine & health ,1700 General Computer Science ,2614 Theoretical Computer Science ,11493 Department of Quantitative Biomedicine - Published
- 2021
44. Coping With Imbalanced Data in the Automated Detection of Reminiscence From Everyday Life Conversations of Older Adults
- Author
-
Stoev, Teodor, Ferrario, Andrea, Demiray, Burcu, Luo, Minxia, Martin, Mike, Yordanova, Kristina, and University of Zurich
- Subjects
reminiscence ,General Computer Science ,10093 Institute of Psychology ,Natural language processing ,General Engineering ,UFSP13-4 Dynamics of Healthy Aging ,2500 General Materials Science ,TK1-9971 ,machine learning ,well-being ,2200 General Engineering ,General Materials Science ,Electrical engineering. Electronics. Nuclear engineering ,1700 General Computer Science ,150 Psychology ,older adults ,data augmentation ,BERT ,Data augmentation - Abstract
Reminiscence-the act of recalling or telling others about relevant personal past experiences-plays an important role in the well-being of older adults. Therefore, it is relevant to develop intelligent systems aiming at improving the well-being of the elderly by reliably detecting reminiscence in their everyday life conversations. Data imbalance is one of the main challenges in the automatic detection of reminiscence from everyday conversations, as reminiscing is a rare event. In this paper, we address the problem by proposing a methodology for coping with imbalanced data in the detection of reminiscence in conversations of older adults. The methodology combines data augmentation using BERT (Bidirectional Encoder Representations from Transformer) and feature extraction techniques leveraging natural language processing for the German language. We evaluate the proposed methodology on a dataset comprising transcripts of social conversations of older adults held in German. We compare our results with a previous work addressing the problem on the same dataset and we show that our approach strongly outperforms the baseline. The results in this study may support the development of intelligent systems for the real-time detection of reminiscence in everyday life of older adults and the design of digital health interventions to support their well-being., IEEE Access, 9, ISSN:2169-3536
- Published
- 2021
45. Velocity-To-Pressure (V2P) - Net: Inferring Relative Pressures from Time-Varying 3D Fluid Flow Velocities
- Author
-
Shit, Suprosanna, Das, Dhritiman, Ezhov, Ivan, Paetzold, Johannes C, Sanches, Augusto F, Thuerey, Nils, Menze, Bjoern H, University of Zurich, Feragen, Aasa, Sommer, Stefan, Schnabel, J, Nielsen, Mads, and Shit, Suprosanna
- Subjects
610 Medicine & health ,1700 General Computer Science ,2614 Theoretical Computer Science ,11493 Department of Quantitative Biomedicine - Published
- 2021
46. VideoGraph – Towards Using Knowledge Graphs for Interactive Video Retrieval
- Author
-
Narges Ashena, Abraham Bernstein, Romana Pernisch, Matthias R. Baumgartner, Lucien Heitz, Luca Rossetto, Florian Ruosch, University of Zurich, and Rossetto, Luca
- Subjects
Modalities ,Information retrieval ,Computer science ,10009 Department of Informatics ,11476 Digital Society Initiative ,Context (language use) ,000 Computer science, knowledge & systems ,Variety (cybernetics) ,Annotation ,Knowledge graph ,Graph traversal ,Graph (abstract data type) ,1700 General Computer Science ,Representation (mathematics) ,2614 Theoretical Computer Science - Abstract
Video is a very expressive medium, able to capture a wide variety of information in different ways. While there have been many advances in the recent past, which enable the annotation of semantic concepts as well as individual objects within video, their larger context has so far not extensively been used for the purpose of retrieval. In this paper, we introduce the first iteration of VideoGraph, a knowledge graph-based video retrieval system. VideoGraph combines information extracted from multiple video modalities with external knowledge bases to produce a semantically enriched representation of the content in a video collection, which can then be retrieved using graph traversal. For the 2021 Video Browser Showdown, we show the first proof-of-concept of such a graph-based video retrieval approach.
- Published
- 2021
- Full Text
- View/download PDF
47. A System for Interactive Multimedia Retrieval Evaluations
- Author
-
Loris Sauter, Ralph Gasser, Heiko Schuldt, Luca Rossetto, Abraham Bernstein, University of Zurich, and Rossetto, Luca
- Subjects
Evaluation system ,Multimedia ,10009 Department of Informatics ,Computer science ,business.industry ,11476 Digital Society Initiative ,020207 software engineering ,02 engineering and technology ,000 Computer science, knowledge & systems ,computer.software_genre ,Constraint (information theory) ,Time frame ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Distributed retrieval ,1700 General Computer Science ,2614 Theoretical Computer Science ,Set (psychology) ,business ,computer ,Interactive media - Abstract
The evaluation of the performance of interactive multimedia retrieval systems is a methodologically non-trivial endeavour and requires specialized infrastructure. Current evaluation campaigns have so far relied on a local setting, where all retrieval systems needed to be evaluated at the same physical location at the same time. This constraint does not only complicate the organization and coordination but also limits the number of systems which can reasonably be evaluated within a set time frame. Travel restrictions might further limit the possibility for such evaluations. To address these problems, evaluations need to be conducted in a (geographically) distributed setting, which was so far not possible due to the lack of supporting infrastructure. In this paper, we present the Distributed Retrieval Evaluation Server (DRES), an open-source evaluation system to facilitate evaluation campaigns for interactive multimedia retrieval systems in both traditional on-site as well as fully distributed settings which has already proven effective in a competitive evaluation.
- Published
- 2021
48. MRbox: Simplifying Working with Remote Heterogeneous Analytics and Storage Services via Localised Views
- Author
-
Kyriakou, Athina, Klampanos, Iraklis A., and University of Zurich
- Subjects
10009 Department of Informatics ,1700 General Computer Science ,000 Computer science, knowledge & systems - Published
- 2021
- Full Text
- View/download PDF
49. Towards Target-Dependent Sentiment Classification in News Articles
- Author
-
Bela Gipp, Felix Hamborg, Karsten Donnay, University of Zurich, Toeppe, Katharina, Yan, Hui, Chu, Samuel Kai Wah, and Hamborg, Felix
- Subjects
FOS: Computer and information sciences ,Relation (database) ,Computer science ,Natural language understanding ,Context (language use) ,computer.software_genre ,Computer Science - Computers and Society ,Computers and Society (cs.CY) ,320 Political science ,sentiment classification ,news bias ,Average recall ,Social media ,1700 General Computer Science ,2614 Theoretical Computer Science ,Computer Science - Computation and Language ,business.industry ,11476 Digital Society Initiative ,media bias ,Information source ,10113 Institute of Political Science ,Artificial intelligence ,stance detection ,business ,Computation and Language (cs.CL) ,computer ,Natural language processing - Abstract
Extensive research on target-dependent sentiment classification (TSC) has led to strong classification performances in domains where authors tend to explicitly express sentiment about specific entities or topics, such as in reviews or on social media. We investigate TSC in news articles, a much less researched domain, despite the importance of news as an essential information source in individual and societal decision making. This article introduces NewsTSC, a manually annotated dataset to explore TSC on news articles. Investigating characteristics of sentiment in news and contrasting them to popular TSC domains, we find that sentiment in the news is expressed less explicitly, is more dependent on context and readership, and requires a greater degree of interpretation. In an extensive evaluation, we find that the state of the art in TSC performs worse on news articles than on other domains (average recall AvgRec = 69.8 on NewsTSC compared to AvgRev = [75.6, 82.2] on established TSC datasets). Reasons include incorrectly resolved relation of target and sentiment-bearing phrases and off-context dependence. As a major improvement over previous news TSC, we find that BERT's natural language understanding capabilities capture the less explicit sentiment used in news articles.
- Published
- 2021
50. When barriers are not an issue: Tracing the relationship between hindering factors and technology use in secondary schools across Europe
- Author
-
Schmitz, Maria-Luisa, Antonietti, Chiara, Cattaneo, Alberto, Gonon, Philipp, Petko, Dominik, University of Zurich, and Schmitz, Maria-Luisa
- Subjects
General Computer Science ,4. Education ,05 social sciences ,Pedagogical issues ,050401 social sciences methods ,050301 education ,Teacher professional development ,Secondary education ,Education ,0504 sociology ,10091 Institute of Education ,Improving classroom teaching ,1700 General Computer Science ,370 Education ,0503 education ,3304 Education - Abstract
Many researchers have investigated how barriers to technology integration affect the use of digital technologies in teaching and learning. However, the results have varied across educational contexts and countries. Large-scale assessment studies have described barriers only on a descriptive level instead of analyzing the effects of barriers on actual indicators of technology integration, such as technology use. Therefore, this study investigated the effects of barriers on technology use through the lens of the “will, skill, tool” model (WST model) in different European countries while taking the countries’ technological development level into account. A regression analysis showed that barriers had only a minor impact on the frequency of technology use in the classroom in the large majority of countries. In accordance with theoretical expectations, we found country-specific patterns, with a higher negative impact of technological barriers in less technologically developed countries and teacher-belief related barriers prevalent in developed countries. These findings may help policy makers identify needed interventions in different contexts.
- Published
- 2022
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.