The following topics are dealt with: informationtechnology and education; Web/information retrieval; document management/text compression; coding/error control; mobile commerce - enabling technologies; networks; vide...
详细信息
The following topics are dealt with: informationtechnology and education; Web/information retrieval; document management/text compression; coding/error control; mobile commerce - enabling technologies; networks; video processing; modern Web and hypermedia systems; wavelets; image processing; watermarking/image compression; Internet/mobile networking; and data handling and management.
The paper discusses a technique for on-line compression of ASCII files. There is a need for fast compression technique that can also produce no overhead data, and with a set amount of. memory. Current text compression...
详细信息
ISBN:
(纸本)0769521088
The paper discusses a technique for on-line compression of ASCII files. There is a need for fast compression technique that can also produce no overhead data, and with a set amount of. memory. Current text compression methods are possibly far superior with some of the characteristics, but none meet all of these needs. The proposed compression scheme uses multiple static dictionaries and a pre-generated variable length code. The method compresses text files of various sizes to approximately 60 percent of their original size.
Current business presentations are commonly multimedia-based and with the realization of the mobile enterprise, accessing of such presentations stored on servers from mobile devices will become increasingly common. Ho...
详细信息
ISBN:
(纸本)0769521088
Current business presentations are commonly multimedia-based and with the realization of the mobile enterprise, accessing of such presentations stored on servers from mobile devices will become increasingly common. However as a roaming mobile device user moves, factors that change include the local wireless network technology, the available bandwidth, the currently closest source of the media files and even the continuity of wireless access. The XML-based standard, Synchronized Multimedia Integration Language (SMIL), provides a format to specify the display sequence and layout of media files in a multimedia presentation. In this paper we present a SMIL-based system for mobile devices that is able to dynamically adapt presentations in response to such changing mobile computing-related factors as those given above.
This paper makes recommendations about teaching online professional courses to students lacking relevant professional experience. The course was on ethics and professional writing. Students substituted personal ethics...
详细信息
ISBN:
(纸本)0769521088
This paper makes recommendations about teaching online professional courses to students lacking relevant professional experience. The course was on ethics and professional writing. Students substituted personal ethics for professional ethics and relied on the skills they had in textual explication and narrative development to defend personal judgments. Instead of putting greater emphasis on theory and formal analysis, the author recommends simulating the experience of professional writing by relying on case study methods, peer critiques, and Internet resources, such as discussion boards where professional writers gossip, complain, and argue about their professional experience.
As distributed computing is going to take an important role in business automation through Bangladesh, software used here must be secured enough to provide a reliable business automation environment. Software giant Mi...
详细信息
ISBN:
(纸本)0769521088
As distributed computing is going to take an important role in business automation through Bangladesh, software used here must be secured enough to provide a reliable business automation environment. Software giant Microsoft Corp. recently offered a completely new development platform, named .NET Framework, which contains new and innovative idea considering software security issues and easy-to-use toolset to build highly customized and secure distributed business applications. As .NET Framework reliefs developers from writing huge lines of code and making complicated security decisions, it can be the best and intelligent choice for the software engineers and architects of Bangladesh.
Establishing the security properties of executable code provides an important challenge for advocates of ubiquitous computing. We provide a framework that utilises component composition techniques in order to establis...
详细信息
ISBN:
(纸本)0769521088
Establishing the security properties of executable code provides an important challenge for advocates of ubiquitous computing. We provide a framework that utilises component composition techniques in order to establish such properties for a composed application in a ubiquitous environment. The framework accounts for the need to establish the properties of individual components, and draws on composition results in order to establish overall properties for composed applications. The framework utilises XML composition templates to provide extensibility, so that new composition results will further enhance its effectiveness.
The application of information technologies (IT) to government services is termed electronic government (e-government). The drive to implement e-government is a global phenomenon. This research is concerned about the ...
详细信息
ISBN:
(纸本)0769521088
The application of information technologies (IT) to government services is termed electronic government (e-government). The drive to implement e-government is a global phenomenon. This research is concerned about the application of IT for online education and training (also known as, e-learning) for government employees and citizens. A summary review of the latest technological developments and practices in e-learning have been provided to help the professionals, managers, and policy makers of both profit and nonprofit organizations to identify the areas of IT they can invest to bring about efficiency and cost savings in continuous education and training. The research also identifies several research projects within the area to further advance the field.
A routine is a temporal context sequence that occurs often. In routine learning, already recognized contexts are utilized in modeling the user behavior. The methodology is presented via a use case scenario. Data colle...
详细信息
ISBN:
(纸本)0769521088
A routine is a temporal context sequence that occurs often. In routine learning, already recognized contexts are utilized in modeling the user behavior. The methodology is presented via a use case scenario. Data collected from various ubiquitous sensors are used in recognizing and defining contexts, and association rules determine the routines. The focus is on testing the suitability of the Apriori algorithm for this application area. Several useful routines were derived from the user data, and the results show that data mining can be utilized in pervasive computing.
This work discusses a conceptual model for automatic acquisition and processing of knowledge about users and devices in computer networks. It employs autonomous agents for distributed knowledge management and integrat...
详细信息
ISBN:
(纸本)0769521088
This work discusses a conceptual model for automatic acquisition and processing of knowledge about users and devices in computer networks. It employs autonomous agents for distributed knowledge management and integrates them into an autonomic middleware component. Agents grouped into distributed communities act as mediators between users, devices, and network resources. Communicating between each other they make decisions on whether a certain user or device can be given access to a requested resource. In other words, agents in our system perform user/device authentication, authorisation, and maintenance of user credentials.
Face routing is one of the effective techniques for constructing source destination route in mobile ad-hoc networks (MANET). Face routing can always construct path if the MANET is connected. However, face routing can ...
详细信息
ISBN:
(纸本)0769521088
Face routing is one of the effective techniques for constructing source destination route in mobile ad-hoc networks (MANET). Face routing can always construct path if the MANET is connected. However, face routing can generate routes with large number of hops. We propose an improved face routing algorithm that constructs shorter routes even when the route is forced to go through a face with large number of edges. We propose a new data structure ExtDCEL that can be used to represent both planar and non-planar networks. We present an implementation of several location based routing algorithms by using the proposed data structure.
暂无评论