• Title/Summary/Keyword: information theory

Search Result 7,430, Processing Time 0.029 seconds

Monitoring Method for Fault Tolerance of Real-time System (실시간 시스템의 Fault Tolerance를 위한 모니터링 기법)

  • SIM Jae-Hwan;KIM Jin-Hyun;YANG Jin-Seok;CHOI Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.772-774
    • /
    • 2005
  • 안전성이 강조되는 실시간 시스템에서 시스템이 시간의 제약을 만족해야만 한다. 실시간 시스템에서 오류는 잘못된 응답 뿐 만이 아니라 시간적으로 늦은 응답에 대해서도 오류로 분류를 할 수가 있다. 이런 오류들을 모니터하기 위해서 본 논문에서는 커널에 Timed Conformance Monitor를 모듈로 추가하였다. Timed Conformance Monitor를 통해서 실시간 태스크가 시간의 제약을 만족하는지를 분석하고 또한 분석 결과에 따라 오류를 처리할 수 있는 Fault Handler를 추가하여 실시간 시스템에 대한 Fault Tolerance를 보장해 줄 수 있다.

  • PDF

Optimality Theory in Semantics and the Anaphora Resolution in Korean: An Adumbration

  • Hong, Min-Pyo
    • Language and Information
    • /
    • v.6 no.2
    • /
    • pp.129-152
    • /
    • 2002
  • This paper argues for a need to adopt a conceptually radical approach to zero anaphora resolution in Korean. It is shown that a number of apparently conflicting constraints, mostly motivated by lexical, syntactic, semantic, and pragmatic factors, are involved in determining the referential identity of zero pronouns in Korean. It is also argued that some of the major concepts of Optimality Theory can provide a good theoretical framework to predict the antecedents to zero pronouns in general. A partial formalization of 07-based constraints at the morpho-syntactic and lexico-semantical level is provided. It is argued that the lexico-semantic restrictions on adjacent expressions play the most important role in the anaphora resolution process along with a variant of the binding principle, formulated in semantic terms. Other pragmatically motivated constraints that incorporate some important intuitions of Centering Theory are proposed too.

  • PDF

The Interpretation of VP-ellipsis: based on the default-inheritance theory. (VP-생략구문의 해석 : 디폴트 상속 이론을 기반으로)

  • Lee, Hae-Yun
    • Language and Information
    • /
    • v.3 no.1
    • /
    • pp.21-37
    • /
    • 1999
  • The purpose of this paper is to propose a theory for the interpretation of VP-ellipsis. Although there have been various proposals such as Sag(1976), Williams(1977), Darlymple et al.(1991), there remain many problems, especially with respect to the interpretation of pronouns. Assuming that a coordinate sentence forms a kind of discourse, we propose a theory which consists of two subparts, i. e. a revised HPSG for the syntactic treatment and a so-called 'default-inheritance' mechanism for the interpretation of elliptical parts. By means of this theory, we can explain various elliptical constructions of Fiengo and May(1994), in which pronouns are interpreted ambiguously within the elliptical conjuncts of coordinate sentences according to the related syntactic and the discourse structures.

  • PDF

Factors Affecting the Intention to Invade Privacy on Social Network Service (SNS에서 프라이버시 침해의도에 영향을 미치는 요인)

  • Ahn, Soomi;Jang, Jaeyoung;Kim, Jidong;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.16 no.2
    • /
    • pp.1-23
    • /
    • 2014
  • With side effects such as Phishing and Spam using personal information in Social Network Service, there is a growing need for studies related to harmful behaviors such as the reason for privacy violation. As such, this study assumed privacy violation to be ethical decision, making behavior and used the Theory of Planned Behavior and Motivation Theory, which are mostly used in social science to identify the factors affecting privacy violation. The results suggested that the Perceived Enjoyment and Punishment used in motivation studies affected privacy violation behaviors, and that the factors of the Theory of Planned Behavior such as Attitude toward Privacy Violation, Subjective Norms of Privacy Violation, and Perceived Behavioral Control with regard to Privacy Violation significantly influenced the Intention to Privacy Violation. On the other hand, Perceived Curiosity and Subjective Norms of Privacy Violation did not affect the Intention to Privacy Violation. Therefore, this study confirmed that the Theory of Planned Behavior was appropriate to explain the Intention to Privacy Violation, and that the variables of the Motivation Theory generally influenced the Attitude toward Privacy Violation. This study was significant since it extended the scope of theoretical privacy study from users and victims centered to inflictor and applied the Extended Theory of Planned Behavior using the variables of the Motivation Theory in the study of Intention to Privacy Violation. From the practical aspect, it provided the ground for privacy education based on the fact that the Attitude toward Privacy Violation can be curbed when education on the Privacy Concerns, Perceived Enjoyment, and Punishment with regard to privacy is strengthened. It also cited the need for the punishment of privacy violation and the practical ground to amend the terms and conditions of user license and Personal Information Protection Act to provide policy support.

A Study on the Development of Lesson Plan and Effectiveness Analysis for "Library and Information Life" Subjects using Gagné's Instructional Events Theory (가네의 교수사태 이론을 적용한 "도서관과 정보생활" 교과목 지도안 개발 및 효과분석에 관한 연구)

  • Seong-Hwa Jeong;Byeong-Ki Lee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.4
    • /
    • pp.5-27
    • /
    • 2023
  • Gagné proposed nine instructional events, gain attention of the students, inform students of the objectives, stimulate recall of prior learning, present the content, provide learning guidance, elicit performance(practice), provide feedback, assess performance, enhance retention and transfer for effective teaching & learning practice. Gagné's theory is widely applied in various subjects because it increases student participation and allows classes to be developed systematically. The purpose of this study is to develop a lesson plans for the 'library and information life' subjects in middle school using Gagné's nine instructional events theory, conduct actual instructions, and verify its effectiveness. The research procedure was conducted as follows. Development of lesson plan that using Gagné's theory to Section III (Information Analysis and Interpretation) of 'Library and Information Life' in middle school. Actual instruction were conducted and student survey, peer teacher assessment, and instructor self-assessment were conducted. Based on the evaluation results, a elements to revise and improve the lesson plan was presented.

Performance Analysis of Cellular Networks with D2D communication Based on Queuing Theory Model

  • Xin, Jianfang;Zhu, Qi;Liang, Guangjun;Zhang, Tiaojiao;Zhao, Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2450-2469
    • /
    • 2018
  • In this paper, we develop a spatiotemporal model to analysis of cellular user in underlay D2D communication by using stochastic geometry and queuing theory. Firstly, by exploring stochastic geometry to model the user locations, we derive the probability that the SINR of cellular user in a predefined interval, which constrains the corresponding transmission rate of cellular user. Secondly, in contrast to the previous studies with full traffic models, we employ queueing theory to evaluate the performance parameters of dynamic traffic model and formulate the cellular user transmission mechanism as a M/G/1 queuing model. In the derivation, Embedded Markov chain is introduced to depict the stationary distribution of cellular user queue status. Thirdly, the expressions of performance metrics in terms of mean queue length, mean throughput, mean delay and mean dropping probability are obtained, respectively. Simulation results show the validity and rationality of the theoretical analysis under different channel conditions.

Anonymous and Non-anonymous User Behavior on Social Media: A Case Study of Jodel and Instagram

  • Kasakowskij, Regina;Friedrich, Natalie;Fietkiewicz, Kaja J.;Stock, Wolfgang G.
    • Journal of Information Science Theory and Practice
    • /
    • v.6 no.3
    • /
    • pp.25-36
    • /
    • 2018
  • Anonymity plays an increasingly important role on social media. This is reflected by more and more applications enabling anonymous interactions. However, do social media users behave different when they are anonymous? In our research, we investigated social media services meant for solely anonymous use (Jodel) and for widely spread non-anonymous sharing of pictures and videos (Instagram). This study examines the impact of anonymity on the behavior of users on Jodel compared to their non-anonymous use of Instagram as well as the differences between the user types: producer, consumer, and participant. Our approach is based on the uses and gratifications theory (U>) by E. Katz, specifically on the sought gratifications (motivations) of self-presentation, information, socialization, and entertainment. Since Jodel is mostly used in Germany, we developed an online survey in German. The questions addressed the three different user types and were subdivided according to the four motivation categories of the U>. In total 664 test persons completed the questionnaire. The results show that anonymity indeed influences users' usage behavior depending on user types and different U> categories.

An Investigation of the Factors that Influence the Compliance to Information Security Policy: From Risk Compensation Theory (정보보안 정책 준수에 영향을 미치는 요인: 위험보상이론 관점에서)

  • Yim, Myung-Seong;Han, Kun Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.153-168
    • /
    • 2013
  • Information security has been a major concern in organizations. The longstanding question of how to improve employees security behaviors and reduce human errors remains unanswered and requires further exploration in the information security domain. To do this, we propose a risk compensation theory-based model and examine the model. Research results shows that the relationships between information security countermeasures and information security compliance intention of employees are moderated by system vulnerability. However, the finding is contrary to the previously held risk compensation assumption and deserve further study. In addition, system quality does not play a moderator role in the relationship. Conclusions and implications are discussed.

A Grounded Theory Approach to the Procedure of Customized Service Experiences (온라인 맞춤형 서비스 경험 과정에 관한 근거이론적 연구)

  • Kim, Chae Ri;Lee, Jung Hoon;Kwon, Won Jin
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.1
    • /
    • pp.39-51
    • /
    • 2019
  • As data grows rapidly, the provision of appropriate information needed by individuals has become an area of new services, and customized services which is enabling the analysis of optimal services through collecting, storing, and analyzing personal data are emerging in many fields. However, due to the characteristics of customized services based on various information collected by customers during the use of the service, the problem of privacy infringement is raised at the same time, and many studies are being actively conducted to solve this problem. This study seeks to explore how the customer's in-depth and customized services has an impact on their customers, which has not been derived from quantitative research using the grounded theory methodology. Through this, 84 concepts, 33 subcategories, 13 Categories and paradigm models were derived. In addition, 'Understanding and acceptance of online behavioral advertising (OBA)' was derived as a core category, and finally, acceptance types of OBA were classified into 'positive acceptance type', 'indifferent type', 'calculating type', and 'active resistance type' based on the key categories. This study divides the acceptance types of online behavioral advertising through the emotions and behaviors of the consumers throughout the procedure of online behavioral advertising experiences. In addition to the statistical and quantitative information currently used for providing behavioral advertising, it provides new criteria to reflect the refinement of behavioral advertising and personal tendencies or characteristics.