Personal learning environments (PLEs) require new ways to motivate and scaffold learners. In particular, practice sharing is of importance for learner-centric approaches in the scope of (technology-enhanced) lifelong ...
详细信息
ISBN:
(纸本)9783642034251
Personal learning environments (PLEs) require new ways to motivate and scaffold learners. In particular, practice sharing is of importance for learner-centric approaches in the scope of (technology-enhanced) lifelong learning, as it is an enabler for community building and sustaining. In this paper we elaborate prerequisites for 'good practice sharing' and explain how we realized these aspects in our PLE solution named Mash-Up Personal Learning Environments (***). Finally, we argue for the utility of our MUPPLE approach by highlighting two different strategies of good practice sharing and their benefits for learning and community building.
RSS (Really Simple Syndication), an XML-based format for sharing and distributing web content to the RSS reader has actively been used for retrieving the latest update's weblogs information among the bloggers in b...
详细信息
ISBN:
(纸本)9781605586595
RSS (Really Simple Syndication), an XML-based format for sharing and distributing web content to the RSS reader has actively been used for retrieving the latest update's weblogs information among the bloggers in blogosphere environment. However, RSS aggregators that are used to feed the RSS web-contained from the different formats have lead to the issues of RSS syndication confusion. Although their ability to aggregate the latest updated weblogs in timely manner, weblogs that are published in chronological order from multiple sites with different RSS syndication format have lead to ambiguity problem, resulting an uncategorized and irrelevancy of aggregated result. In this paper, a synthetic analyzer named PheRSS is presented. PheRSS is able to collect the different syndication format to achieve a broader set of metadata. Withthe rules and constraints applied, a more relevant set of data based on user interest can be obtained. the experiment is done to evaluate the accuracy of the result. It is founded that the result achieved better accuracy comparing to Feed Demon. Copyright 2009 ACM.
Recently, digital photography is definitely becoming very popular. thus, there is a large increase in the number of captured photos, which demands better methods to manage this data. An approach is to allow the user t...
详细信息
ISBN:
(纸本)9781605586595
Recently, digital photography is definitely becoming very popular. thus, there is a large increase in the number of captured photos, which demands better methods to manage this data. An approach is to allow the user to annotate some information in those photos, for instance, the people who appear in them. In this paper, two solutions are proposed in order to assist the user in the process of annotating people in photos, using mobile devices. the first one, called on-line, accesses a server to produce the results and the other one, called off-line, utilizes the mobile device itself to compute the results. Finally, a comparative study between the solutions, using parameters such as hit rate and performance, is presented. Copyright 2009 ACM.
Mobile applications have made their position clear and proven viable to business operations. Many techniques have been developed to improve performance of mobile computing;one is data replication. this paper explores ...
详细信息
ISBN:
(纸本)9781605586595
Mobile applications have made their position clear and proven viable to business operations. Many techniques have been developed to improve performance of mobile computing;one is data replication. this paper explores different data replication problems and proposes a solution to address the context-aware data replication problem, where every single record and entry is tracked and analyzed, while enabling mobile users and main server to exchange data between other and resolve conflicts. the proposed solution makes use of a shadow table, triggers, Remote Data Access (RDA), and a repetition frequency technique to enable the recording of transactional information changes in a data source and reflection of these changes back to the target and vice versa. While the main advantage of the proposed solution is the increase in accuracy in replicated data, the main disadvantage is the slight increase in processing time caused by the time spent in resolving conflicts between mobile devices. thus, the proposed solution is better suited for non-real time applications, but where accuracy is central. Copyright 2009 ACM.
Assistive technology is becoming increasingly prevalent within today's ageing society to help improve mobility, communication and learning capabilities for persons who have disabilities, chronic diseases and age r...
详细信息
ISBN:
(纸本)9783642028670
Assistive technology is becoming increasingly prevalent within today's ageing society to help improve mobility, communication and learning capabilities for persons who have disabilities, chronic diseases and age related impairments. the effect of using such technology promotes a level of independence in addition to improving social awareness and interactions [I]. As trends in life expectancy increase, the number of age related impairments and chronic disease within the elderly population will also rise. While for some of these conditions there is no cure, withthe help of assistive technology, diseases such as Alzheimer's for example may be effectively managed. Assistive technology within this domain can be used to support activities such as medication reminders, picture dialing phones and clocks to support day/night orientation. this paper presents an overview of the challenges associated withthose suffering from chronic disease, in particular Alzheimer's disease and defines the methodology of how current advances in mobile phone technology and their associated services may be used to alleviate some of the issues experienced by chronic disease patients.
Radio Frequency Identification (RFID) is becoming attractive technology as an alternative to barcode systems. RFID systems provide an automatic identification method, relying on storing and remotely retrieving data us...
详细信息
ISBN:
(纸本)9781605586595
Radio Frequency Identification (RFID) is becoming attractive technology as an alternative to barcode systems. RFID systems provide an automatic identification method, relying on storing and remotely retrieving data using RFID tags or transponders. An RFID tag is an object that can be attached to or incorporated into a product, animal, or person for the purpose of identification using radio waves. Chip-based RFID tags contain silicon chips and antennae. In this paper, we develop a smart shopping system that allows customers to manage their shopping list while shopping and only pay the bill at the checkout counter. the shopping cart has the ability to automatically calculate and display the total prices of all the products inside it. this makes it easy for the customer to know how much he or she has to pay while shopping and not at the checkout counter. this way the customer can also control his or her budget and receive faster service at the checkout. An advantage for the shop owners is that they would need a fewer cashiers, which would result in a large cut in their costs. In this paper, we also provide a mathematical model to calculate the estimated delay for each cart to access the system through the ad hoc or WLAN networks. Copyright 2009 ACM.
Along withthe rapid development of mobile devices having embedded positioning technology, location-based services have become more and more popular. In order to use the services, users often disclose some parts of th...
详细信息
ISBN:
(纸本)9781605586595
Along withthe rapid development of mobile devices having embedded positioning technology, location-based services have become more and more popular. In order to use the services, users often disclose some parts of their private information, especially their location-related information. thus, it raises a great concern in the users' privacy preserving in location-based services. this paper proposes a solution with a memorizing algorithm working on a trusted middleware. Withthe proposed solution, the space is organized in a flexible grid and the middleware cloaks the user's location information in an anonymization area before sending it to the service providers. A concerned problem is that overlapped areas among anonymization areas can be used to explore the true position of a user because the overlapped areas have a higher probability of having a user. Our newly introduced memorizing algorithm calculates on the spatial grid to decrease the overlapped areas as much as possible. the solution aims at protecting the user's privacy not only at the time using the service but also against data mining techniques wrt. their history location data. Experimental results with synthesis moving objects over real world maps will establish our theoretical analyses as well as the practical value of the proposed solution. Copyright 2009 ACM.
In a variety of applications, ranging from data integration to distributed query evaluation, there is a need to obtain sets of data items from several sources (peers) and compute their union. As these sets often conta...
详细信息
ISBN:
(纸本)9781605584225
In a variety of applications, ranging from data integration to distributed query evaluation, there is a need to obtain sets of data items from several sources (peers) and compute their union. As these sets often contain common data items, avoiding the transmission of redundant information is essential for effective union computation. In this paper we define the notion of optimal union plans for non-disjoint data sets residing on distinct peers, and present efficient algorithms for computing and executing such optimal plans. Our algorithms avoid redundant data transmission and optimally exploit the network bandwidth capabilities. A challenge in the design of optimal plans is the lack of a complete map of the distribution of the data items among peers. We analyze the information required for optimal planning and propose novel techniques to obtain compact, cheap to communicate, description of the data sources. We then exploit it for efficient union computation with reasonable accuracy. We demonstrate experimentally the superiority of our approach over the common naive union computation, showing it improves the performance by an order of magnitude. Copyright 2009 ACM.
this paper describes a visualization method for showing clusters of video stories for the purpose of summarizing an episode of a TV series. Key frames from the video story segments are automatically extracted and clus...
详细信息
Visibility estimation is one of the most difficult problems in multi-view reconstruction using volumetric approaches. In this paper, we present a novel approach called layer-constraint-based visibility (LCBV) to estim...
详细信息
暂无评论