首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 0 毫秒
1.
This study aims at exploring the suitability of virtual environments for safety training in large public spaces. A virtual library was constructed which simulated many of the physical and normative characteristics of the ‘real’ university library which was the target of the virtual safety training project. In the virtual library, two different types of signals (fixed red signs vs. moving green arrows) for guiding people to the emergency exits were presented, and their efficacy on escape times was tested in three different conditions, differing with respect to the distance of participants from the escape exits (measured according to the number of corners separating participants from direct visual discovery of the emergency exit). No significant differences between the different kinds of signals were found, whereas surprising discrepancies among the three conditions appeared. The differences in performance in the three conditions were contingent upon the presence in the virtual library of peculiar environmental features embodying social norms – like a red ribbon indicating no transit. Uncertainty about the sense of such normative features in the context of the simulated emergency made some participants prone to peculiar knowledge-based errors consisting of inadequate sense-making of the normative aspects of the ongoing situation. This kind of error shows that the simulation succeeded in capturing one of the crucial characteristics of ‘real’ social context: ambiguity, which mostly depends on the fact that the social norms structuring public spaces and defining their legitimate uses are often ill defined and context dependent. Every valid experience in safety training requires coping with ambiguity in situations.  相似文献   

2.
Scenario Management: An Interdisciplinary Approach   总被引:2,自引:0,他引:2  
  相似文献   

3.
*Formerly at the Department of Communication Studies, Linko¨ping University, Sweden. Most of this work was conducted during the author’s employment at the Department of Communication Studies. Recent research concerning the control of complex systems stresses the systemic character of the work of the controlling system, including the number of people and artefacts as well as the environment. This study adds to the growing body of knowledge by focusing on the internal working of such a system. Our vantage point is the theoretical framework of distributed cognition. Through a field study of an emergency co-ordination centre we try to demonstrate how the team’s cognitive tasks, to assess an event and to dispatch adequate resources, are achieved by mutual awareness, joint situation assessment, and the co-ordinated use of the technology and the physical arrangement of the co-ordination room.  相似文献   

4.
This paper describes an approach to cognitive and cooperative operator assistance in the field of tactical flight mission management. A framework for a generic functional concept is derived from general considerations of human performance and cognitive engineering. A system built according to these human-centred design principles will be able to keep up with the change of situation parameters, in order to provide situational adapted operator assistance. Such a cognitive assistant system represents an approach to ensure the highest degree possible of situation awareness of the flight deck crew as well as a satisfactory workload level. This generic approach to mission management and crew assistance for military aircraft has been realised in different application domains such as military transport and air-to-ground attack. The Crew Assistant Military Aircraft is a functional prototype for the air transport application. Even applications in the domain of uninhabited aerial vehicles (UAV) are in reach. This paper mainly covers one state-of-the-art research and development activity in the domain of combat aircraft: the TMM – Tactical Mission Management System is an experimental solution for the air-to-ground attack role. The TMM has been implemented as a functional prototype in the mission avionics experimental cockpit (MAXC), a development flight simulator at ESG and evaluated with German Air Force pilots as subjects in simulator trials. Therefore, the TMM has been compared with a reference cockpit avionics configuration in terms of task performance, workload, situation awareness and operator acceptance. After giving an overview of the system concepts this paper reports on the experimental design and results of the simulator trial campaign.  相似文献   

5.
This paper presents a field study at a Stockholm underground control room, with particular focus on the different interactional affordances of the artifacts, used by the operators. The analysis is based on the notion that the design of cognitive artifacts affords different degrees of openness, i.e. to what extent they render the interaction of a task performer with the artifact open to others in the vicinity. A comparison between the dayshift and nightshift demonstrates how the various levels of openness are manifested during work. Some tentative design comments are made with regard to computer support systems for the underground line control.  相似文献   

6.
Preventing Requirement Defects: An Experiment in Process Improvement   总被引:3,自引:2,他引:3  
Inadequate requirements cause many problems in software products. This paper reports on an experiment to reduce the number of requirement defects. We analysed the present defects in a real-life product and estimated the likely effect of 44 prevention techniques. We had hoped a novel combination of techniques would come up, but the best approach was quite well known, although new to the company: study the user tasks better, make early prototypes of the user interface, and test them for usability. This approach was tried out in a new development project in the same company. Due to the new approach, there was no doubt about requirements during programming, and as a result it became the first project in the company that was completed on time and without stress. Usability was drastically improved, and as a result the product sold twice as many units as similar products, and at twice the unit price.  相似文献   

7.
To simplify the task of building distributed streaming applications, we propose a new abstraction for information flow – Infopipes. Infopipes make information flow primary, not an auxiliary mechanism that is hidden away. Systems are built by connecting predefined component Infopipes such as sources, sinks, buffers, filters, broadcasting pipes, and multiplexing pipes. The goal of Infopipes is not to hide communication, like an RPC system, but to reify it: to represent communication explicitly as objects that the program can interrogate and manipulate. Moreover, these objects represent communication in application-level terms, not in terms of network or process implementation.  相似文献   

8.
The basis of this study was the ageing of the population all over the world. The study concentrated on finding out the key service needs of elderly people. The service needs from the end users’ as well as the experts’ perspective were gathered by means of various group methods such ideation sessions. Four mobile communication service concepts were created using these groups’ opinions. After diverse communication, these concepts were tested by the elderly. The research methods comprised a user study and a concept study.  Based on the results, the needs could be prioritised. Additionally, the main trend of the results confirmed the opinions presented in the literature. One important finding was the positive opinions about additional value of wireless devices and services. This knowledge can be used in mobile communication product development. Most of the elderly are ready to accept new forms of mobile communication service. Ease of use and actual need of the services are important criteria. The elderly are ready to begin using the services as long as they truly facilitate independent living.  相似文献   

9.
Information systems security issues have usually been considered only after the system has been developed completely, and rarely during its design, coding, testing or deployment. However, the advisability of considering security from the very beginning of the system development has recently begun to be appreciated, and in particular in the system requirements specification phase. We present a practical method to elicit and specify the system and software requirements, including a repository containing reusable requirements, a spiral process model, and a set of requirements documents templates. In this paper, this method is focused on the security of information systems and, thus, the reusable requirements repository contains all the requirements taken from MAGERIT, the Spanish public administration risk analysis and management method, which conforms to ISO 15408, Common Criteria Framework. Any information system including these security requirements must therefore pass a risk analysis and management study performed with MAGERIT. The requirements specification templates are hierarchically structured and are based on IEEE standards. Finally, we show a case study in a system of our regional administration aimed at managing state subsidies.  相似文献   

10.
This paper presents a call admission control (CAC) algorithm for multimedia communication systems with diverse bit-rate media sources. The proposed algorithm for making bandwidth allocation decisions is based on bounding the probability of demand for excess bandwidth and the loss (or blocking) probability. Recursion formulas for calculating these probabilities are derived. An algorithm based on these probabilities executes quickly enough so that the response time to a bandwidth request is acceptable.  相似文献   

11.
Active rules for XML: A new paradigm for E-services   总被引:1,自引:0,他引:1  
XML is rapidly becoming one of the most widely adopted technologies for information exchange and representation. As the use of XML becomes more widespread, we foresee the development of active XML rules, i.e., rules explicitly designed for the management of XML information. In particular, we argue that active rules for XML offer a natural paradigm for the rapid development of innovative e-services. In the paper, we show how active rules can be specified in the context of XSLT, a pattern-based language for publishing XML documents (promoted by the W3C) which is receiving strong commercial support, and Lorel, a query language for XML documents that is quite popular in the research world. We demonstrate, through simple examples of active rules for XSLT and Lorel, that active rules can be effective for the implementation of e-commerce services. We also discuss the various issues that need to be considered in adapting the notion of relational triggers to the XML context. Received: 30 October 2000 / Accepted: 19 December 2000 Published online: 27 April 2001  相似文献   

12.
Recent technology advances have made multimedia on-demand services, such as home entertainment and home-shopping, important to the consumer market. One of the most challenging aspects of this type of service is providing access either instantaneously or within a small and reasonable latency upon request. We consider improvements in the performance of multimedia storage servers through data sharing between requests for popular objects, assuming that the I/O bandwidth is the critical resource in the system. We discuss a novel approach to data sharing, termed adaptive piggybacking, which can be used to reduce the aggregate I/O demand on the multimedia storage server and thus reduce latency for servicing new requests.  相似文献   

13.
Excessive buffer requirement to handle continuous-media playbacks is an impediment to cost- effective provisioning for on-line video retrieval. Given the skewed distribution of video popularity, it is expected that often there are concurrent playbacks of the same video file within a short time interval. This creates an opportunity to batch multiple requests and to service them with a single stream from the disk without violating the on-demand constraint. However, there is a need to keep data in memory between successive uses to do this. This leads to a buffer space trade-off between servicing a request in memory mode vs. servicing it in disk-mode. In this work, we develop a novel algorithm to minimize the buffer requirement to support a set of concurrent playbacks. One of the beauties of the proposed scheme is that it enables the server to dynamically adapt to the changing workload while minimizing the total buffer space requirement. Our algorithm makes a significant contribution in decreasing the total buffer requirement, especially when the user access pattern is biased in favor of a small set of files. The idea of the proposed scheme is modeled in detail using an analytical formulation, and optimality of the algorithm is proved. An analytical framework is developed so that the proposed scheme can be used in combination with various existing disk-scheduling strategies. Our simulation results confirm that under certain circumstances, it is much more resource efficient to support some of the playbacks in memory mode and subsequently the proposed scheme enables the server to minimize the overall buffer space requirement.  相似文献   

14.
This paper addresses the political nature of requirements for large systems, and argues that requirements engineering theory and practice must become more engaged with these issues. It argues that large-scale system requirements is constructed through a political decision process, whereby requirements emerge as a set of mappings between consecutive solution spaces justified by a problem space of concern to a set of principals. These solution spaces are complex socio-technical ensembles that often exhibit non-linear behaviour in expansion due to domain complexity and political ambiguity. Stabilisation of solutions into agreed-on specifications occurs only through the exercise of organisational power. Effective requirements engineering in such cases is most effectively seen as a form of heterogeneous engineering in which technical, social, economic and institutional factors are brought together in a current solution space that provides the baseline for construction of proposed new solution spaces.  相似文献   

15.
This paper looks from an ethnographic viewpoint at the case of two information systems in a multinational engineering consultancy. It proposes using the rich findings from ethnographic analysis during requirements discovery. The paper shows how context – organisational and social – can be taken into account during an information system development process. Socio-technical approaches are holistic in nature and provide opportunities to produce information systems utilising social science insights, computer science technical competence and psychological approaches. These approaches provide fact-finding methods that are appropriate to system participants’ and organisational stakeholders’ needs.  The paper recommends a method of modelling that results in a computerised information system data model that reflects the conflicting and competing data and multiple perspectives of participants and stakeholders, and that improves interactivity and conflict management.  相似文献   

16.
This study deals with cognitive cooperation in the context of the design of cooperative computer support for sharing aircraft conflict detection and resolution tasks between human and machine in air traffic control. In order to specify some necessary cooperative capabilities of such a system, we have observed an artificial situation on a simulator where two radar controllers (RCs) had to cooperate for the management of a heavy traffic within a single sector. This paper reports the analysis of the verbal communications between the two RCs recorded during the simulation. The results enabled us to describe the elements of a common frame of reference (COFOR), elaborated and updated by the two RCs, as a crucial cooperative activity in this kind of situation. They also show the role of this COFOR in the implicit detection and resolution of interference between the RCs’ individual activities. Their contribution to design, associated with other investigations and the state of the art, is discussed.  相似文献   

17.
Pratibha Jolly 《AI & Society》2002,16(1-2):148-162
We describe our attempts at curriculum development at the undergraduate level working within the constraints of a large traditional university system. Curriculum reform is described as a three-step process of product innovation, accommodation and assimilation. In a dual-pronged strategy, students are constructively engaged, first, in investigative projects and assigned specific tasks, giving them a flavour of creative research, and, second, in development of curricular products. The process of transfer of pedagogic innovations into the formal classroom is enhanced by a teacher training programme that aims to provide experiential learning of research-based innovative teaching practices, catalyse a process of reflection through classroom research and establish a collaborative network of teachers.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号