Mobile phones that currently cause interruptions by blindly allowing calls to ring at busy moments and inappropriate situations can be managed using context aware computing, ubiquitous computing, and the available sen...
详细信息
In this paper, we make the study on the unique solution for the P3P problem. After partitioning the space into several regions, the parametric function and target function for each region are presented. Under the cond...
详细信息
ISBN:
(纸本)9781605581668
In this paper, we make the study on the unique solution for the P3P problem. After partitioning the space into several regions, the parametric function and target function for each region are presented. Under the condition of knowing the approximate relative position between center of perspective and control points, the unique solution can be obtained.
This work describes a system that enables non-commercial communities, e.g. students and researchers, to deploy pre-configured clusters of virtual machines on arbritary cloud computing stacks implementing the Open Clou...
详细信息
ISBN:
(纸本)9781450316569
This work describes a system that enables non-commercial communities, e.g. students and researchers, to deploy pre-configured clusters of virtual machines on arbritary cloud computing stacks implementing the Open Cloud computing Interface (OCCI). As a key enabling technology, the virtualization and provisioning available in such infrastructure as a service clouds is leveraged in order to instantiate and setup clusters on a user's demand. A simple, web-based market system is provided as the user interface. It allows the browsing, configuring and launching of different clusters of appliances. Running virtual machines are accessible directly from the market via integrated remote desktop software. Copyright 2013 acm.
As biomedical researchers are amassing a plethora of information in a variety of forms resulting from the advancements in biomedical research, there is a critical need for innovative information management and knowled...
详细信息
As biomedical researchers are amassing a plethora of information in a variety of forms resulting from the advancements in biomedical research, there is a critical need for innovative information management and knowledge discovery tools to sift through these vast volumes of heterogeneous data and analysis tools. In this paper we present a general model for an information management system that is adaptable and scalable, followed by a detailed design and implementation of one component of the model. The prototype, called BioSifter, was applied to problems in the bioinformatics area. The results indicate that BioSifter is a powerful tool for biological researchers to automatically retrieve relevant text documents from biological literature based on their interest profile. The paper also presents experimental studies with real users to illustrate the efficacy of the approach.
Debugging physical computing projects provides a rich context to understand cross-disciplinary problem solving that integrates multiple domains of computing and engineering. Yet understanding and assessing students...
详细信息
ISBN:
(纸本)9798400704239
Debugging physical computing projects provides a rich context to understand cross-disciplinary problem solving that integrates multiple domains of computing and engineering. Yet understanding and assessing students' learning of debugging remains a challenge, particularly in understudied areas such as physical computing, since finding and fixing hardware and software bugs is a deeply contextual practice. In this paper we draw on the rich history of clinical interviews to develop and pilot "failure artifact scenarios" in order to study changes in students' approaches to debugging and troubleshooting electronic textiles (e-textiles). We applied this clinical interview protocol before and after an eight-week-long e-textiles unit. We analyzed pre/post clinical interviews from 18 students at four different schools. The analysis revealed that students improved in identifying bugs with greater specificity, and across domains, and in considering multiple causes for bugs. We discuss implications for developing tools to assess students' debugging abilities through contextualized debugging scenarios in physical computing.
Data for decision oriented technologies, like data warehousing and On-Line Analytical Processing (OLAP) systems, are ever increasing, As they store and handle data of historical nature, the volume of data involved cou...
详细信息
Ubiquitous computing brings a set of characteristics that are not commonly found in conventional software projects. One of the consequences is an increase in the software development complexity. Additionally, traditio...
详细信息
This paper shows the efficiency of prefix and non-prefix codes for searching over compressed handheld databases. Byte Pair Encoding (BPE), Tagged Suboptimal Code (TSC), and Huffman encoding are the compression techniq...
详细信息
ISBN:
(纸本)9781581139648
This paper shows the efficiency of prefix and non-prefix codes for searching over compressed handheld databases. Byte Pair Encoding (BPE), Tagged Suboptimal Code (TSC), and Huffman encoding are the compression techniques used in the evaluation. By compressing handheld databases and searching over compressed text without needing to expand the databases, more data will be stored and more applications can be used. Experimental results show that about 33% more space has been achieved in the compressed handhelds' databases when using Searching over Compressed Text using BPE (SCTB) or Searching over Compressed Text using TSC (SCTT) solutions. Moreover, both solutions are 6.6 times faster than decompressing the databases followed by a linear search in all different sizes of databases. Efficiency performance shows that SCTB is the recommended solution for databases consisting of large-sized records and rarely updated, and SCTT is the recommended method for frequently updated databases or consisting of small-sized records. TSC and BPE compression schemes could also be used to accelerate wireless connectivity, web clipping, or databases transfer between handheld devices and computers, since these databases are usually small in size. Copyright 2005 acm.
Context free grammars present the desirable cryptographic property that it is easy to generate and validate strings from a given grammar, however it is hard to identify a grammar given only the strings generated by it...
详细信息
ISBN:
(纸本)9781581134452
Context free grammars present the desirable cryptographic property that it is easy to generate and validate strings from a given grammar, however it is hard to identify a grammar given only the strings generated by it. The algorithm used in the authentication protocol proposed in this paper makes use of context free grammars. This authentication protocol is a perfect candidate for the offline generation and validation of a disposable credit card number. The proposed protocol can be used alone and it does not rely on any other cryptographic protocols like SSL for its security. This paper presents and analyses the protocol with respect to its robustness against malicious attacks.
Social computing applications hold immense potential in enriching communication, enabling collaboration and fostering innovation. However, little work has been done to studying social computing applications in library...
详细信息
暂无评论