Realizing operational analytics solutions where large and complex data must be analyzed in a time-critical fashion entails integrating many different types of technology. This paper focuses on an interdisciplinary com...
详细信息
Handheld computing is an emerging mobile computing paradigm that promotes using handheld wireless devices (or mobile devices) such as cellular phones and Personal Digital Assistants (PDAs) to accomplish various comput...
ISBN:
(纸本)9781595931085
Handheld computing is an emerging mobile computing paradigm that promotes using handheld wireless devices (or mobile devices) such as cellular phones and Personal Digital Assistants (PDAs) to accomplish various computing tasks. As handheld devices continue to appear in many forms with diverse functionalities, handheld computing will become the dominant computing paradigm in many fields including education, enterprises, and healthcare.
In the last decade, a great deal of work has been devoted to the elaboration of a sampling theory for smooth surfaces. The goal was to ensure a good reconstruction of a given surface S from a finite subset E of S. The...
详细信息
ISBN:
(纸本)1595933409
In the last decade, a great deal of work has been devoted to the elaboration of a sampling theory for smooth surfaces. The goal was to ensure a good reconstruction of a given surface S from a finite subset E of S. The sampling conditions proposed so far offer guarantees provided that E is sufficiently dense with respect to the local feature size of S, which can be true only if S is smooth since the local feature size vanishes at singular points. In this paper, we introduce a new measurable quantity, called the Lipschitz radius, which plays a role similar to that of the local feature size in the smooth setting, but which is well-defined and positive on a much larger class of shapes. Specifically, it characterizes the class of Lipschitz surfaces, which includes in particular all piecewise smooth surfaces such that the normal deviation is not too large around singular points. Our main result is that, if S is a Lipschitz surface and E is a sample of S such that any point of S is at distance less than a fraction of the Lipschitz radius of S, then we obtain similar guarantees as in the smooth setting. More precisely, we show that the Delaunay triangulation of E restricted to S is a 2-manifold isotopic to S lying at bounded Hausdorff distance from S, provided that its facets are not too skinny. We further extend this result to the case of loose samples. As an application, the Delaunay refinement algorithm we proved correct for smooth surfaces works as well and comes with similar guarantees when applied to Lipschitz surfaces. Copyright 2006 acm.
Geometric computing and Reasoning (GCR) is a new track of SAC and it is dedicated to the recent trends in the domain of geometric constraint solving and automated, or computer aided, deduction in geometry.
ISBN:
(纸本)9781595931085
Geometric computing and Reasoning (GCR) is a new track of SAC and it is dedicated to the recent trends in the domain of geometric constraint solving and automated, or computer aided, deduction in geometry.
Ubiquitous technologies, infrastructures, applications and services that operate across physical environments (e.g. neighbourhood, home, car etc) will soon be spanning all the different spheres of everyday life. Ubiqu...
ISBN:
(纸本)9781595931085
Ubiquitous technologies, infrastructures, applications and services that operate across physical environments (e.g. neighbourhood, home, car etc) will soon be spanning all the different spheres of everyday life. Ubiquitous computing places humans in the center of environments saturated with computing and wireless communications capabilities, yet gracefully integrated, so that technology recedes in the background of everyday activities. The ubiquitous computing world is largely defined by applications, which present an altogether new set of requirements. In order to assess the impact of ubiquitous computing and discover caveats as early in the adoption process as possible, we need to study and analyze working prototypes applied in real-life settings and scenarios. The special track on ubiquitous computing applications, now in its third year, provides a forum for the discussion of all types of ubiquitous computing applications and related specialized infrastructures built for the deployment of targeted applications. Individual papers place applications within their use context and introduce novel and appropriate interaction paradigms while at the same time addressing related technical and business aspects and consequently identify novel opportunities or constraints.
The release of computer hardware devices based on "trusted computing" technologies is heralding a paradigm shift that will have profound implications for digital forensics. In this paper, we map out the cont...
详细信息
ISBN:
(纸本)9781595931085
The release of computer hardware devices based on "trusted computing" technologies is heralding a paradigm shift that will have profound implications for digital forensics. In this paper, we map out the contours of a trusted environment in order to establish the context for the paper. This is followed by the main components of the TC architecture with an emphasis on the Trusted Platform and the Trusted Platform Module (TPM). The next section presents a synopsis based on three threat models, viz., (i) pc owner-centric, (ii) trusted computing-centric, and (iii) digital forensics-centric and then briefly touches on the implications and unintended consequences of trusted computing for digital forensics. Finally, the last section of the concludes with a recommendation on how to mitigate the negative effects of trusted computing.
Global public computing platforms, such as PlanetLab, grid computing systems, and XenoServers, require facilities for managing trust to allow their participants to interact effectively in an open and untrusted environ...
详细信息
ISBN:
(纸本)9781595931085
Global public computing platforms, such as PlanetLab, grid computing systems, and XenoServers, require facilities for managing trust to allow their participants to interact effectively in an open and untrusted environment. In this paper, we describe BambooTrust, a practical, high-performance distributed trust management system for global public computing platforms. We present our peer-to-peer architecture, based on the XenoTrust model and the Bamboo distributed hash table. We describe the initial BambooTrust implementation and deployment, and demonstrate that the system performs and scales more than adequately well by means of experimental evaluation.
Riding on the success of the previous Mobile computing and Applications Track in 2003 to 2005, we are delighted to present the 2006 Mobile computing and Applications Track that features research papers drawn from a hi...
ISBN:
(纸本)9781595931085
Riding on the success of the previous Mobile computing and Applications Track in 2003 to 2005, we are delighted to present the 2006 Mobile computing and Applications Track that features research papers drawn from a highly diversified spectrum of mobile computing. We have continued to receive a significant number of submissions this year. The papers collected in this track cover three different and yet complementary areas: mobile communications that forms the basis for higher level applications, inclusive of mobile data management as a support for practical mobile applications. In particular, special attention was dedicated to draw upon research efforts and expertise from different areas of research, so as to promote better synergy and to bring forth not only core communications and modeling that support data management policies to lay the foundation for application development, but also important research applications to realize the benefits of anywhere, any place and anytime pervasive and ubiquitous computing.
In this paper, we propose an adaptive task allocation framework to perform BLAST searches in a grid environment against sequence database segments. The framework, called PackageBLAST, provides an infrastructure to cho...
详细信息
ISBN:
(纸本)9781595931085
In this paper, we propose an adaptive task allocation framework to perform BLAST searches in a grid environment against sequence database segments. The framework, called PackageBLAST, provides an infrastructure to choose or incorporate task allocation strategies. Furthermore, we propose a mechanism to compute grid nodes execution weight, adapting the chosen allocation policy to the current computational power of the nodes. Our results present very good speedups and also show that no single allocation strategy is able to achieve the lowest execution times for all scenarios.
暂无评论