In demanding academic environments students expect 100% uptime. It is rarely the case when dealing with school technology including Macs, PCs, printers, servers, complex networks and numerous peripherals that everythi...
详细信息
As a user of products and technology, one often experiences a wide range of emotions: happiness, frustration, gratitude, irritation, excitement, and apathy amongst others. Yet, as designers and deliverers of these too...
详细信息
ISBN:
(纸本)9781450314947
As a user of products and technology, one often experiences a wide range of emotions: happiness, frustration, gratitude, irritation, excitement, and apathy amongst others. Yet, as designers and deliverers of these tools and services, the human factor is often neglected with dire consequences. Deadlines and budgets become more important than analyzing the needs and behaviors of the user, unlinking the resource from its consumer. this degrades the perception of the offering and can be irreversible (and potentially fatal) to the reputation of software companies, IT departments, and hardware manufacturers. Despite the failings of many companies that have neglected the human element - companies that lacked empathy for their users - products continue to be delivered that are unintuitive, over designed, or inefficient. A great product or offering considers the user's experience (UX) when interacting withthe service. the product is efficient and intuitive, while being transparent in presentation. UX is generally associated with software, but experiences are designed outside of computing as well. An often-polarizing example is customer service;customers remember great customer service experiences as much as they remember poor experiences. Technology often enhances the user experience, but the experience itself is not confined to interactions with specific tools. Training IT help desk staff on how to interact with customers may not be something traditionally thought of as a UX initiative, but this is one small part of the experience that is designed for individuals having issues withtheir devices. At Santa Clara Law, the Law Technology and Academic computing (LTAC) group has improved efficiency, customer satisfaction, and saved time by considering UX principles early and often. Decisions once made with dangerous assumptions on the user's behalf are now considered with comprehensive data collected from a variety of different sources. Listening to what users are saying also h
the proceedings contain 294 papers. the topics discussed include: raster image representation of fingerprint minutiae;fusion in fingerprint authentication: two finger types vs. two scanner types;keystroke dynamics aut...
ISBN:
(纸本)9781450301138
the proceedings contain 294 papers. the topics discussed include: raster image representation of fingerprint minutiae;fusion in fingerprint authentication: two finger types vs. two scanner types;keystroke dynamics authentication for mobile phones;random forgery attacks against DTW-based online signature verification algorithm;a location-aware rogue AP detection system based on wireless packet sniffing of sensor APs;a model transformation approach for verifying multi-agent systems using spin;tagging web product titles based on hidden Markov model;a pattern-based verification approach for a multi-core system development;an approach of creative application evolution on cloud computing platform;change impact analysis for object-oriented programs evolved to aspect-oriented programs;harmonic functions based semi-supervised learning for web spam detection;and efficient clustering of populations using a minimal SNP panel.
Weeds cause harm to crops by competing for water, light, nutrients and space, reducing crop yields and inhibiting the efficiency of machinery. Although there is a large volume of work on this topic, previous studies h...
详细信息
ISBN:
(纸本)9781450305716
Weeds cause harm to crops by competing for water, light, nutrients and space, reducing crop yields and inhibiting the efficiency of machinery. Although there is a large volume of work on this topic, previous studies have lacked accuracy and efficiency. In this paper an algorithm has been developed and analyzed for real-time specific weeds discrimination that is employed Haar Wavelet Transform (HWT). there are three stages of this paper, segmentation stage, feature extraction stage, and classification stage. Based on the proposed algorithm, 200 highest and informative coefficients are extracted at feature extraction stage, then at the classification stage, a well known classifier k-NN (k-Nearest Neighbor, for which k = 2) has been applied. the proposed method was tested on the database of 200 samples of each category. Furthermore, the result of our proposed method improves the performance by 7-10% as compared with some of the existing techniques that used histogram maxima withthreshold, and angular cross sectional intensities. In conclusion, the proposed technique is more accurate at weed leaf classification than the existing techniques when images are captured by a CCD camera. the overall accuracy and efficiency utilizing the proposed method using haar wavelet transform is 94% and 40 ms respectively. Copyright 2011 acm.
Gaussian similarity is usually used in spectral clustering. It generates the affinity matrix by mainly considering point-to-point distances in a local region with respect to the scaling parameters Δ. As a result, glo...
详细信息
the current Virtual Machine (VM) live migration research mainly focuses on transferring run-time memory state of VMs, but neglects the consistency of the network state while migration. this paper designs an Efficient ...
详细信息
Ubiquitous computing brings a set of characteristics that are not commonly found in conventional software projects. One of the consequences is an increase in the software development complexity. Additionally, traditio...
详细信息
the proceedings contain 449 papers. the topics discussed include: text versus non-text distinction in online handwritten documents;enhancing document structure analysis using visual analytics;an automatic linking serv...
ISBN:
(纸本)9781605586380
the proceedings contain 449 papers. the topics discussed include: text versus non-text distinction in online handwritten documents;enhancing document structure analysis using visual analytics;an automatic linking service of document images reducing the effects of OCR errors with latent semantics;standardized interoperable image retrieval;RecoMap: an interactive and adaptive map-based recommender;convex onion peeling genetic algorithm: an efficient solution to map labeling of point-feature;modeling cardinal directions in the 3D space withthe objects interaction cube matrix;a wavelet-based sampling algorithm for wireless sensor networks applications;data stream anomaly detection through principal subspace tracking;a fast approximation strategy for summarizing a set of streaming time series;and online mining of temporal maximal utility itemsets from data streams.
this paper proposes a software architecture and a development process for engineering dependable and controllable self-organising (SO) systems. Our approach addresses dependability by exploiting metadata to support de...
详细信息
Mobile phones that currently cause interruptions by blindly allowing calls to ring at busy moments and inappropriate situations can be managed using context aware computing, ubiquitous computing, and the available sen...
详细信息
暂无评论