In this paper, we propose a new algorithm for computing transitive closures. It needs only O(e·b) time and O(n·b) space, where n represents the number of the nodes of a DAG (directed acyclic graph), e the nu...
详细信息
ISBN:
(纸本)9781581138122
In this paper, we propose a new algorithm for computing transitive closures. It needs only O(e·b) time and O(n·b) space, where n represents the number of the nodes of a DAG (directed acyclic graph), e the numbers of the edges, and b the DAG's breadth.
Travel has many situations where context-aware computing can bring important benefits. In this paper, we describe an approach for integrating context-aware computing to a mobile travel assistant. Travel plans, generat...
详细信息
ISBN:
(纸本)9781581138122
Travel has many situations where context-aware computing can bring important benefits. In this paper, we describe an approach for integrating context-aware computing to a mobile travel assistant. Travel plans, generated using reality [2], are enriched within compact and powerful structures, called User Task Models. These structures are transferred to a mobile device enabling the support for the traveler during his trip.
Today, OpenMP is the de facto standard for portable shared-memory programming supporting multiple levels of parallelism. Unfortunately, most of the current OpenMP implementations are not capable of fully exploiting mo...
详细信息
ISBN:
(纸本)9781581138122
Today, OpenMP is the de facto standard for portable shared-memory programming supporting multiple levels of parallelism. Unfortunately, most of the current OpenMP implementations are not capable of fully exploiting more than one level of parallelism. With the increasing number of processors available in high-performance computing resources, the number of applications that would benefit from multilevel parallelism is also increasing. Applying automatic differentiation to OpenMP programs is introduced as a new class of OpenMP applications with nested parallelism.
Ubiquitous computing places humans in the center of environments saturated with computing and wireless communications capabilities, yet gracefully integrated, so that technology recedes in the background of everyday a...
详细信息
Ubiquitous computing places humans in the center of environments saturated with computing and wireless communications capabilities, yet gracefully integrated, so that technology recedes in the background of everyday activities. The ubiquitous computing world then, is a world largely defined by applications. But such applications present an altogether new set of requirements. The special track on ubiquitous computing applications, first introduced in acm SAC 2004, provides a forum for the discussion of all types of ubiquitous computing applications and related specialized infrastructures built for the deployment of targeted applications. Individual papers place applications within their use context and introduce novel and appropriate interaction paradigms while at the same time addressing related technical and business aspects and consequently identify novel opportunities or constraints.
This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agent-based network security approach. MAST has been designed to support flexible and customizable ne...
详细信息
ISBN:
(纸本)9781581138122
This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agent-based network security approach. MAST has been designed to support flexible and customizable network security tasks and training. This paper focuses on the implementation details and security aspects of MAST's components, services, and mobile-agent architecture.
In this paper, we propose a new index structure for object-oriented databases. The main idea of this is a graph structure, called a signature graph, which is constructed over a signature file generated for a class and...
详细信息
In this paper, we propose a new index structure for object-oriented databases. The main idea of this is a graph structure, called a signature graph, which is constructed over a signature file generated for a class and improves the search of a signature file dramatically. In addition, the signature files (accordingly, the signature graphs) can be organized into a hierarchy according to the nested structure (called the aggregation hierarchy) of classes in an object-oriented database, which leads to another significant improvements.
Context-awareness is a key concept in ubiquitous computing, which sometimes seems to be a technology looking for a purpose. In this paper we report on the application of context-aware computing for medical work in hos...
详细信息
Context-awareness is a key concept in ubiquitous computing, which sometimes seems to be a technology looking for a purpose. In this paper we report on the application of context-aware computing for medical work in hospitals, which has appeared to be a strong case for applying context-aware computing. We present the design of a context-aware pill container and a context-aware hospital bed, both of which reacts and adapts according to what is happening in their context. The applications have been evaluated in a number of workshop with clinicians and patients. Based on this empirical work of designing, developing, and evaluating context-aware clinical applications, the paper outlines some key design principles for a context-awareness framework, supporting the development and deployment of context-aware clinical computer applications.
Mobile computing allows for the development of new and sophisticated database applications. Such applications require the reading of current and consistent data. In order to improve data availability, increase perform...
详细信息
ISBN:
(纸本)1595934804;9781595934802
Mobile computing allows for the development of new and sophisticated database applications. Such applications require the reading of current and consistent data. In order to improve data availability, increase performance and maximize throughput, data replication is used. However, due to inherent limitations in mobile and other loosely-coupled environments, the concurrency control and replica control mechanisms must be revisited. This paper proposes a new protocol that guarantees the consistency of replicated data in a mobile computing environment, while provide high data availability and ensure an eventual replica convergence towards a strongly consistent state. Copyright 2007 acm.
Ubiquitous computing bears a high potential in the area of aircraft maintenance. Extensive requirements regarding quality, safety, and documentation as well as high costs for having aircrafts idle during maintenance d...
详细信息
ISBN:
(纸本)9781581138122
Ubiquitous computing bears a high potential in the area of aircraft maintenance. Extensive requirements regarding quality, safety, and documentation as well as high costs for having aircrafts idle during maintenance demand for an efficient execution of the process. Major weaknesses that impact the efficiency of the process are an inadequate tool management, human errors, and labour intensive manual documentation and check procedures. In this paper we propose a solution using ubiquitous computing technologies that improves aircraft maintenance and provides a high level of usability. A scenario, a systems architecture, and maintenance applications are presented. The Smart Toolbox and the Smart Tool Inventory were implemented as proof of concept.
暂无评论