Among the many challenges of engineering dependable, self-managed, component-based systems is their need to make informed decisions about adaptive reconfigurations in response to changing requirements or a changing en...
详细信息
there are several challenges for monitoring the patients with specific requirements such as people with dementia. For example, vascular dementia which is caused generally after stroke could result in serious condition...
详细信息
ISBN:
(纸本)9781450324694
there are several challenges for monitoring the patients with specific requirements such as people with dementia. For example, vascular dementia which is caused generally after stroke could result in serious conditions and change of behaviour such as wandering, loss of vision and speech. Although the nursing staff make sincere effort for taking care and monitoring of the patients, it is rare that a nursing staff is allocated to each patient. Hence even a minor lack of attention can lead to havoc situation if any of the patient is found to be missing. this results in high stress for the nursing staff and the hospital management. the aim of this work is to develop techniques for secure monitoring of dementia patients in hospital environments. Our model tracks the patients in real time and can generate alarms if the location of the patients is found to be suspicious. Furthermore, our model makes use of the existing infrastructures to minimize the cost of deployment. Copyright 2014 acm.
the proceedings contain 303 papers. the topics discussed include: formal analysis of the biological circuits using higher-order-logic theorem proving;de novo drug design using self attention mechanism;survey of public...
ISBN:
(纸本)9781450368667
the proceedings contain 303 papers. the topics discussed include: formal analysis of the biological circuits using higher-order-logic theorem proving;de novo drug design using self attention mechanism;survey of public assay data: opportunities and challenges to understanding antimicrobial resistance;student research abstract: multimodal deep learning based approach for cells state classification;process discovery using in-database minimum self distance abstractions;event-log abstraction using batch session identification and clustering;resource-centric process mining: clustering using local process models;enhancing business processes with trustworthiness using blockchain: a goal-oriented approach;a subprocess discovery framework for process model modularization and abstraction;identification of data propagation paths for efficient dynamic information flow tracking;comparing identifiers and comments in engineered and non-engineered code: a large-scale empirical study;is there a correlation between code comments and issues? - an exploratory study;and evaluating techniques for method-exact energy measurements: towards a framework for platform-independent code-level energy measurements.
We express in terms of binary trees seen as Gödel System T types (withthe empty type as the only primitive type) arithmetic computations within time and space bounds comparable to binary arithmetic and derive an...
详细信息
this paper describes a new approach to document classification based on visual features alone. Text-based retrieval systems perform poorly on noisy text. We have conducted series of experiments using cosine distance a...
详细信息
Cloud computing is one of the most booming trends in the ICT fields. It is promoted as a cost saver as it moves the burden of provisioning capital IT investments to the side of the cloud provider. However, there are n...
详细信息
Next-generation mobile devices will be multi-functional and be expected to execute a broad range of compute-intensive applications. they are constraint by their device and mobility characteristics in achieving these e...
详细信息
ISBN:
(纸本)9781581139648
Next-generation mobile devices will be multi-functional and be expected to execute a broad range of compute-intensive applications. they are constraint by their device and mobility characteristics in achieving these expectations. Reconfigurable logic has vast potential to facilitate mobile devices in meeting these future system performance requirements. this paper proposes incorporating reconfigurable computing and agent technology into mobile device environments. Agent technology is an ideal middleware for mobile device management enabling effective utilization of reconfigurable resources. Reconfigurable logic is integrated into the environment of a mobile device i.e. both into the physical device and into surrounding adaptive servers. An outline of the overall strategy is described. A detailed examination of enabling a client mobile device to dynamically offload reconfigurable hardware-software based computations to neighboring adaptive servers is presented. In addition, the paper details an initial demonstrator system within a medical environment. Copyright 2005 acm.
In cloud-based Internet of things (IoT), sharing of data withthird-party services and other users, inherently incurs potential risk and leads to unique security and privacy concerns. Existing cryptographic solutions ...
详细信息
ISBN:
(纸本)9781450359337
In cloud-based Internet of things (IoT), sharing of data withthird-party services and other users, inherently incurs potential risk and leads to unique security and privacy concerns. Existing cryptographic solutions ensure the security of IoT data, but due to their significant computational overhead, most of them are not suitable for resource-constrained IoT devices. To address these concerns, we propose a data protection system to store encrypted IoT data in a cloud while still allowing query processing over the encrypted data. More importantly, our proposed system features a novel encrypted data sharing scheme based on Boneh-Goh-Nissim (BGN) cryptosystem, with revocation capabilities and in-situ key update. We perform exhaustive experiments on real datasets, primarily to assess the feasibility of the proposed system on resource-constrained IoT devices. We next measure the computation overhead, storage overhead and throughput. the experimental results show that our system is not only feasible, but also provides a high level of security. Furthermore, the results show that our system is 34% more computationally faster, requires 25% less storage and 15% more throughput than the best performed system in the state-of-the-art.
the proceedings contain 294 papers. the topics discussed include: raster image representation of fingerprint minutiae;fusion in fingerprint authentication: two finger types vs. two scanner types;keystroke dynamics aut...
ISBN:
(纸本)9781450301138
the proceedings contain 294 papers. the topics discussed include: raster image representation of fingerprint minutiae;fusion in fingerprint authentication: two finger types vs. two scanner types;keystroke dynamics authentication for mobile phones;random forgery attacks against DTW-based online signature verification algorithm;a location-aware rogue AP detection system based on wireless packet sniffing of sensor APs;a model transformation approach for verifying multi-agent systems using spin;tagging web product titles based on hidden Markov model;a pattern-based verification approach for a multi-core system development;an approach of creative application evolution on cloud computing platform;change impact analysis for object-oriented programs evolved to aspect-oriented programs;harmonic functions based semi-supervised learning for web spam detection;and efficient clustering of populations using a minimal SNP panel.
the long term vision of smart service systems in which electronic environments are made sensitive and responsive to the presence of, possibly many, people is gradually taking shape through a number of pilot projects. ...
详细信息
暂无评论