Advances in spatially enabled semantic computing can provide situation aware assistance for mobile users. This intelligent and context-aware technology presents the right information at the right time, place and situa...
详细信息
ISBN:
(纸本)9781581138122
Advances in spatially enabled semantic computing can provide situation aware assistance for mobile users. This intelligent and context-aware technology presents the right information at the right time, place and situation by exploiting semantically referenced data for knowledge discovery. The system takes advantage of new metadata standards to enable semantic, user, and device adapted transactions on multimedia datasets. Information accessed in the past and the activities planned by the user, the situation dependencies (e.g. location) of these activities are used to infer future information requirements. The focus of this paper describes an application of the above functionalities for performing mobile context-aware queries and updating of a multimedia spatial database of cultural heritage artifacts concerning early 20th century Dublin. It aims to exploit current consumer trends in mobile device usage by opening new markets for the increasing number of visitors to Dublin's streets. An on-going development of this technology, the project MoCHA (Mobile Cultural Heritage Adventures), will allow the mobile cultural heritage consumer to explore a personally tailored view of Dublin's treasured artefacts, historical events and districts in an interactive and intuitive way directly on their spatially enabled PDA.
In this paper an automatic and effective method was proposed for mass segmentation in mammography. Based on the facts that mass edges are continuous and closed curves consisted of points which have larger gradient tra...
详细信息
ISBN:
(纸本)1595934804;9781595934802
In this paper an automatic and effective method was proposed for mass segmentation in mammography. Based on the facts that mass edges are continuous and closed curves consisted of points which have larger gradient transformation, a plane fitting method and a dynamic programming technique were applied. The regions of interest (ROIs) used in this study were extracted from DDSM. The preliminary experimental results show that the segmentation algorithm performs well for various types of masses. Copyright 2007 acm.
This paper introduces an infrastructure for engineering environments for multi-agent systems. Such an infrastructure is based on a component model specification, named CMS, which promotes dynamic unanticipated evoluti...
详细信息
ISBN:
(纸本)1595934804;9781595934802
This paper introduces an infrastructure for engineering environments for multi-agent systems. Such an infrastructure is based on a component model specification, named CMS, which promotes dynamic unanticipated evolution of software. We propose an Agent Model Specification (AMS), focusing on environment engineering issues. Moreover, we present a Java framework that implements AMS and a case study to exemplify the application of our approach. Copyright 2007 acm.
Designing open and distributed systems that can dynamically adapt in a predictable way to unexpected events is a challenging issue still not solved. Achieving this objective is a very complex task since it implies rea...
详细信息
ISBN:
(纸本)1595934804;9781595934802
Designing open and distributed systems that can dynamically adapt in a predictable way to unexpected events is a challenging issue still not solved. Achieving this objective is a very complex task since it implies reasoning at run-time, explicitly and in a combined way, on a system's functional and non-functional characteristics. This paper proposes a service-oriented architectural model allowing the dynamic enforcement of formally expressed metadata-based resilience policies. It also describes preliminary dynamic resilience experiments acting as proof of concept. Copyright 2007 acm.
Peer-to-Peer (P2P) networking is aimed at exploiting the potential of widely distributed information pools and its effortless access and retrieval irrespectively of underlying networking protocols, operating systems o...
详细信息
ISBN:
(纸本)9781581138122
Peer-to-Peer (P2P) networking is aimed at exploiting the potential of widely distributed information pools and its effortless access and retrieval irrespectively of underlying networking protocols, operating systems or devices. However, prohibiting limitations have been identified and perhaps the most important one is the successful location of relevant information sources and the efficient query routing in large, highly distributed P2P networks. In this paper, a novel, cluster-based architecture for IR over P2P networks is presented and its evaluation is focused on retrieval effectiveness. We reason in favour of using clustering for P2P IR, by considering two fundamental hypotheses drawn from current P2P file-sharing systems. We also study the potential usefulness of a simplified version of Dempster-Shafer (D-S) theory of evidence combination for results fusion in the network. We simulated the IR behaviour of the system by using the TREC 6 and 7 ad-hoc track. The proposed architecture bears very promising results in terms of precision and recall.
In this paper, we presented a method to improve structural modeling based on conserved domain clusters and structure-anchored alignments. We first constructed a template library of structural clusters for all conserve...
详细信息
ISBN:
(纸本)1595934804;9781595934802
In this paper, we presented a method to improve structural modeling based on conserved domain clusters and structure-anchored alignments. We first constructed a template library of structural clusters for all conserved sequence domains. Then, for each cluster, we built the profile using the structure and sequence information. Finally we use the profile and structural alignments as anchors to increase the alignment accuracy between a query and its templates. Our preliminary results show that this method can be used for the partial prediction for a majority of known protein sequences with better qualities. Copyright 2007 acm.
This article presents several independent optimizations of operations on monitors. They do not involve the low-level mutual exclusion mechanisms but rather their integration with and usage within higher-level construc...
详细信息
ISBN:
(纸本)9781450324694
This article presents several independent optimizations of operations on monitors. They do not involve the low-level mutual exclusion mechanisms but rather their integration with and usage within higher-level constructs of the language. The paper reports acceleration of Hop, the Web programming language for which these optimizations have been created. The paper shows that other languages such as C and Java would also benefit from these optimizations. Copyright 2014 acm.
In this paper we investigated the issues pertaining to streaming generalized XML documents over the wireless environment. We highlight the disadvantages of employing existing approach to fragment and manage the transf...
详细信息
ISBN:
(纸本)9781581138122
In this paper we investigated the issues pertaining to streaming generalized XML documents over the wireless environment. We highlight the disadvantages of employing existing approach to fragment and manage the transfer of XML contents across a wireless environment. In particular, existing approach of fragmenting data takes no consideration of the structure and semantics of the XML data. Also, using the connection-oriented transport protocol, such as TCP, will result in lower throughput due to the head-of-line blocking and inefficient error control mechanisms operating in an error-prone environment. We proposed Xstream to focus on the flexible management of XML data operating over the wireless environment. Xstream leverages the structural characteristics of XML documents to fragment XML contents into autonomous units called Xstream Data Unit (XDU). Also, it incrementally sends fragments over a wireless link and performs look-ahead processing of the document. This facilitates the efficient use of scarce bandwidth, In this paper we describe the Xstream framework and the techniques involved. A complete deployment and setup of Xstream is discussed and the empirical performances are evaluated to verify the benefits of streaming XML documents using Xstream.
Ubiquitous computing places humans in the center of environments saturated with computing and wireless communications capabilities, yet gracefully integrated, so that technology recedes in the background of everyday a...
详细信息
ISBN:
(纸本)9781581139648
Ubiquitous computing places humans in the center of environments saturated with computing and wireless communications capabilities, yet gracefully integrated, so that technology recedes in the background of everyday activities. The ubiquitous computing world then, is a world largely defined by applications. But such applications present an altogether new set of requirements. The special track on ubiquitous computing applications, first introduced in acm SAC 2004 and running for the second time in acm SAC 2005, provides a forum for the discussion of all types of ubiquitous computing applications and related specialized infrastructures built for the deployment of targeted applications. Individual papers place applications within their use context and introduce novel and appropriate interaction paradigms while at the same time addressing related technical and business aspects and consequently identify novel opportunities or constraints.
Due to the preeminent work of the real-time specification for Java(RTSJ), Java is increasingly expected to become the leading programming language in real-time systems. To provide a Java platform suitable for real-tim...
详细信息
ISBN:
(纸本)1595934804;9781595934802
Due to the preeminent work of the real-time specification for Java(RTSJ), Java is increasingly expected to become the leading programming language in real-time systems. To provide a Java platform suitable for real-time applications, a real-time Java processor can execute Java bytecode directly is proposed in this paper. This processor provides efficient support in hardware for mechanisms specified in the RTSJ and offers a simpler programming model through ameliorating the scoped memory of the RTSJ. The most important characteristic of the processor is that its WCET(worst case execution time) of the bytecode execution is predictable. It is vital for the real-time systems. Copyright 2007 acm.
暂无评论