National Geoinformation Center of Bulgaria is a national scientific infrastructure – a consortium with a mission to produce and provide value-added products of Earth observation data gathered by various agencies gove...
详细信息
this paper presents a model of contextual awareness implemented for a social communicative robot Leolani. Our model starts from the assumption that robots and humans need to establish a common ground about the world t...
详细信息
the ICT are part of our everyday lives1. the teaching-learning processes must transform in order to adapt to our modern times. the education professionals should be experts in educommunication to take advantage of the...
详细信息
Organizations learn by comparing practices of employees under different aspects and leverage the lessons learned in improved procedures [9]. this paper reports on a pilot research project that shows how the theory of ...
详细信息
the integration of WLANs and CDMA networks has recently evolved into a very hot issue. In order to support a vertical handoff, we propose a context based vertical handoff decision process and the corresponding algorit...
详细信息
Setswana is an under-resourced Bantu African language that is morphologically rich withthe disjunctive writing system. Developing NLP pipeline tools for such a language could be challenging, due to the need to balanc...
详细信息
the governments of cities like Ambato face difficult geographic conditions for establishing a clean and efficient transportation system. this paper shows the results of 1) a theoretical study that measured the expecte...
详细信息
ISBN:
(纸本)9781538625194
the governments of cities like Ambato face difficult geographic conditions for establishing a clean and efficient transportation system. this paper shows the results of 1) a theoretical study that measured the expected incidence of a reputation-based shared transportation system for e-collaboration and social welfare in a medium-size community and 2) an experimental evaluation of the effectiveness of a value-based reputation system with malicious user detection in such a scenario of e-collaboration. the study was conducted based on economic savings. the theoretical study involved the participation of 185 young citizens and 160 in the experimental evaluation. the theoretical results show that e-collaboration is meant to be successful in a shared transportation system in Ambato providing that trust is guaranteed. the experiment results show that the proposed model made it possible to detect 85% of malicious service consumers and that the satisfaction withthe recommendations of the system is pretty high. these results are encouraging for usingthe proposed method in the implementation of a shared transport system in medium-size cities. therefore, it is assumed that the obtained results are extrapolates to the context of a generic e-collaborative system.
the cloud computing system, which operates via the Internet, provides large, scalable computer resources to users as a service. this technique has attracted significant attention from the scientific and corporate worl...
详细信息
Twitter is nowadays an excellent tool for gathering user's perceptions on food choices and consumption. thus, by analyzing consumers' tweets, we have studied their points of view regarding the agri-food short ...
详细信息
the proceedings contain 23 papers. the special focus in this conference is on Interoperability architectures, Methodological aspects, Service discovery, Configurable communication, Interoperability architectures II an...
ISBN:
(纸本)9783540262626
the proceedings contain 23 papers. the special focus in this conference is on Interoperability architectures, Methodological aspects, Service discovery, Configurable communication, Interoperability architectures II and Performance and optimization. the topics include: Towards real-time middleware for applications of vehicular ad hoc networks;adaptive context management using a component-based approach;customised billing for location-based services;loosely-coupled integration of CSCW systems;interoperability and eservices;model-driven self-management of legacy applications;model-driven methodology for building qos-optimised web service compositions;how to implement software connectors? a reusable, abstract, adaptable connector;designing self-adaptive multimedia applications through hierarchical reconfiguration;transformation composition modelling framework;proximity-based service discovery in mobile Ad Hoc networks;enriching UDDI information model with an integrated service profile;building a configurable publish/subscribe notification service;protocol reconfiguration using component-based design;a secure and efficient communication resume protocol for secure wireless networks;an architecture for collaborative scenarios applying a ommon BPMN-repository;a flexible and modular framework for implementing infrastructures for global computing;an architecture for implementing application interoperation with heterogeneous systems;optimizing the access to read-only data in grid computing and using data item relationships to adaptively select data for synchronization;a client/intercept based system for optimizing wireless access to web services.
暂无评论