A routine is a temporal context sequence that occurs often. In routine learning, already recognized contexts are utilized in modeling the user behavior. The methodology is presented via a use case scenario. Data colle...
详细信息
ISBN:
(纸本)0769521088
A routine is a temporal context sequence that occurs often. In routine learning, already recognized contexts are utilized in modeling the user behavior. The methodology is presented via a use case scenario. Data collected from various ubiquitous sensors are used in recognizing and defining contexts, and association rules determine the routines. The focus is on testing the suitability of the Apriori algorithm for this application area. Several useful routines were derived from the user data, and the results show that data mining can be utilized in pervasive computing.
In combination of web service and wireless technology, grid computing is evolved into a de facto standard for shared-resource computations. Although numerous efforts have been made on the construction of grid systems,...
详细信息
ISBN:
(纸本)0769523153
In combination of web service and wireless technology, grid computing is evolved into a de facto standard for shared-resource computations. Although numerous efforts have been made on the construction of grid systems, stateless web set-vice composition has not been addressed sufficiently in grid environment, which is usually service-conscious. This paper attempts to address this issue through a novel work flow model which not only builds tasks through web services, also handles state control through the grid platform. Based on this model a grid system can ultimately compose web services and give user a better tool for supercomputing.
In this paper we present a polling scheme which allows for augmenting the support of voice communications in point co-ordination function (PCF) of IEEE 802. 11 wireless networks. In this scheme, the Access Point (AP) ...
详细信息
ISBN:
(纸本)0769523153
In this paper we present a polling scheme which allows for augmenting the support of voice communications in point co-ordination function (PCF) of IEEE 802. 11 wireless networks. In this scheme, the Access Point (AP) of the Basic Service Set (BSS) maintains two polling lists, i.e. the talking list and the silence list. Based on the talking status of the stations identified via silence detection, the two lists are dynamically adjusted by the AR Temporary removal is applied to the stations in the silence list to further upgrade the performance. The conducted study based on simulation has shown that the proposed scheme is able to support more voice stations and has a lower packet loss rate compared to that obtained by four reference polling algorithms.
In the paper, we propose a media access framework for supporting integrated service including the real-time service, the controlled load service, and the best effort service in wireless networks. Three medium access m...
详细信息
This paper describes the motivation, development and current status of the informationtechnology Bachelor of Science degree program at the University of Central Florida. Our goal is to provide our particular point of...
ISBN:
(纸本)0769519164
This paper describes the motivation, development and current status of the informationtechnology Bachelor of Science degree program at the University of Central Florida. Our goal is to provide our particular point of view on what should comprise an IT degree and thereby to elicit open dialogue with others who may have similar or even completely differing points of view.
This work discusses a conceptual model for automatic acquisition and processing of knowledge about users and devices in computer networks. It employs autonomous agents for distributed knowledge management and integrat...
详细信息
ISBN:
(纸本)0769521088
This work discusses a conceptual model for automatic acquisition and processing of knowledge about users and devices in computer networks. It employs autonomous agents for distributed knowledge management and integrates them into an autonomic middleware component. Agents grouped into distributed communities act as mediators between users, devices, and network resources. Communicating between each other they make decisions on whether a certain user or device can be given access to a requested resource. In other words, agents in our system perform user/device authentication, authorisation, and maintenance of user credentials.
To extract informative terms through known relevance information for query expansion is an important issue in the design of an effective text retrieval system. Various discriminant functions have been developed as a d...
详细信息
ISBN:
(纸本)0769515061;076951507X
To extract informative terms through known relevance information for query expansion is an important issue in the design of an effective text retrieval system. Various discriminant functions have been developed as a device for eliciting good terms. In this paper the notion of informativeness of terms is interpreted and discriminant functions are formalised both based on information-theoretic ideas for auromatic query expansion. Preliminary, results show that the approach adopted in this paper is worthy of continued investigation.
In this paper, e-words are used for coding k-ary trees with n internal nodes. The properties of e-words are discussed in depth, such as the necessary and sufficient condition of e-words, and based on the properties, a...
详细信息
ISBN:
(纸本)076951507X
In this paper, e-words are used for coding k-ary trees with n internal nodes. The properties of e-words are discussed in depth, such as the necessary and sufficient condition of e-words, and based on the properties, a loopless algorithm is obtained to generate e-words for k-ary trees in lexicographic order, which is more efficient in both space and time than the previous algorithm. In addition, e-words can also be easily generated in lexicographic order by a recursive algorithm, and in the order with the Strong Minimal Change Property (SMCP) by a loopless algorithm.
The upcoming H.264/MPEG-4 Advanced Video coding (AVC) video compression standard promises a significant improvement over all previous video compression standards. In this paper, we study the impact of low delay constr...
详细信息
ISBN:
(纸本)0769521088
The upcoming H.264/MPEG-4 Advanced Video coding (AVC) video compression standard promises a significant improvement over all previous video compression standards. In this paper, we study the impact of low delay constraint on the rate control algorithm proposed for AVC, and show that the performance of AVC rate control is degraded under such low delay constraint. This results in PSNR degradation and many skipped frames. We then propose an improved rate control scheme to effectively allocate the number of bits and monitor the buffer fullness. Simulation results show that our proposed rate control scheme encodes the video sequences with less frame skipping and with higher PSNR compared to rate control for AVC.
Face routing is one of the effective techniques for constructing source destination route in mobile ad-hoc networks (MANET). Face routing can always construct path if the MANET is connected. However, face routing can ...
详细信息
ISBN:
(纸本)0769521088
Face routing is one of the effective techniques for constructing source destination route in mobile ad-hoc networks (MANET). Face routing can always construct path if the MANET is connected. However, face routing can generate routes with large number of hops. We propose an improved face routing algorithm that constructs shorter routes even when the route is forced to go through a face with large number of edges. We propose a new data structure ExtDCEL that can be used to represent both planar and non-planar networks. We present an implementation of several location based routing algorithms by using the proposed data structure.
暂无评论