We test a method of clustering dialects of English according to patterns of shared phonological features. Previous linguistic research has generally considered phonological features as independent of each other, but c...
详细信息
the process we propose in this paper is in keeping with a more general thought about e-learning systems reengineering. It deals more precisely with pedagogical scenario reengineering by assisting designers in the uses...
详细信息
ISBN:
(纸本)0769523382
the process we propose in this paper is in keeping with a more general thought about e-learning systems reengineering. It deals more precisely with pedagogical scenario reengineering by assisting designers in the uses tracking definition phase in order to allow them to a posteriori understanding of the learning session sequence. From this point of view, our process presents some advantages. First, it allows the recommendation of uses to track from the designer built scenario structure. then, it proposes a formal way to transcribe these observed uses in a design interpretable language, and thus to compare a priori scenario to the one resulting from a posteriori observed uses. Lastly, it relies on an analysis at a meta-model level of the pedagogical modeling language chosen by designers and, therefore, allows complete dissociation from a chosen language.
Tourists who don't select standard guided tours have to rely on a map or on signs to explore an unknown city on their own. they often end up looking for information about an attraction they're at - but there...
详细信息
the proceedings contain 188 papers from the Computational Science - ICCS 2005: 5thinternationalconference - Part III. the topics discussed include: a data-driven multi-field analysis of nanocomposites for hydrogen s...
详细信息
the proceedings contain 188 papers from the Computational Science - ICCS 2005: 5thinternationalconference - Part III. the topics discussed include: a data-driven multi-field analysis of nanocomposites for hydrogen storage;multiscale angiogenesis modeling;application benefits of advanced equation-based multiphysics modeling;mathematical model of environmental pollution by motorcar in an urban area;on the impact of reservations from the grid on planning-based resource management;performance analysis of interconnection networks for multi-cluster systems;triggering network services through context-tagged flows;and near-optimal algorithm for self-configuration of ad-hoc wireless networks.
Collaborative learning can be motivated through environments that provide tools for communication. However, most available environments do not provide support neither for the students' reflection and self-regulati...
详细信息
this paper discusses how to exploit annotations as a useful context in order to search and retrieve relevant documents for a user query. this paper provides a formal framework which can be useful in facing this proble...
详细信息
ISBN:
(纸本)3540261788
this paper discusses how to exploit annotations as a useful context in order to search and retrieve relevant documents for a user query. this paper provides a formal framework which can be useful in facing this problem and shows how this framework can be employed, by using techniques which come from the hypertext information retrieval and data fusion fields.
Withthe recent growth of interest in microarray technology and the improvement of the technology responsible for producing these images, massive amounts of microarray images are currently being produced. In this pape...
详细信息
ISBN:
(纸本)0889865280
Withthe recent growth of interest in microarray technology and the improvement of the technology responsible for producing these images, massive amounts of microarray images are currently being produced. In this paper, we present a new lossless method for efficiently compress microarray images based on arithmetic coding using a 3D context model. Our method produces an embedded bitstream that allows progressive decoding. We present the compression results using 49 publicly available images and we compare these results withthree image coding standards: lossless JPEG2000, JBIG and JPEG-LS. the proposed method gives better results for all images of the test set.
context-awareness has become a necessity for adaptable intelligent applications and services. It is crucial for ubiquitous and pervasive computing because the context of a user or device serves as the source of inform...
详细信息
ISBN:
(纸本)3540262628
context-awareness has become a necessity for adaptable intelligent applications and services. It is crucial for ubiquitous and pervasive computing because the context of a user or device serves as the source of information to adapt services. In this paper, we propose a modular context management system that is able to collect, transform, reason on and use context information to adapt services. By employing a component-based approach, we enable our infrastructure not only to support context-aware adaptation of services, but also to support adaptation of the context management system itself at deployment time and at runtime. this self-adaptation is based upon the service requirements and the current context of the device, such as the current resource usage or other devices in the neighborhood, resulting in an adaptive context management system for improved quality of service.
the proceedings contain 21 papers from the Distributed Applications and Interoperable Systems: 5th IFIP WG 6.1 internationalconference, DAIS 2005. the topics discussed include: adaptive context management using a com...
详细信息
the proceedings contain 21 papers from the Distributed Applications and Interoperable Systems: 5th IFIP WG 6.1 internationalconference, DAIS 2005. the topics discussed include: adaptive context management using a component-based approach;customized billing for location-based services;loosely-coupled integration of CSCW systems;interoperability and eServices;model-driven self-management of legacy applications;model-driven methodology for building QoS-optimized web service compositions;designing self-adaptive multimedia applications through hierarchical reconfiguration;enriching UDDI information model with an integrated service profile;and an architecture for implementation application interoperation with heterogeneous systems.
the volume of Internet spam has reached alarming proportions. this raises interesting debates on a variety of ethical, social, legal and technical issues. Although a fair amount of spam research has been conducted in ...
详细信息
ISBN:
(纸本)0975339346
the volume of Internet spam has reached alarming proportions. this raises interesting debates on a variety of ethical, social, legal and technical issues. Although a fair amount of spam research has been conducted in the developed world, the socioeconomic context and technical infrastructure in South Africa is more typical of a developing world and many issues take on new dimensions. this research used a survey to obtain the perceptions of e-mail users on various social and ethical issues regarding spam. Information about the legal and technical issues was gathered using structured face-to-face interviews with six ISPs. the research confirms the typical findings about the high levels of spam, the nuisance factor, the invasion of privacy and cost in terms of time and bandwidth. However, it was also found that that many users find different types of spam morally very offensive. While Bayesian and open source spam-filtering mechanisms are in place at South African ISPs, spam levels are about the same as in Europe and North America. Also, ISPs found that the recently promulgated South African ECT Act fails to deal conclusively with spam.
暂无评论