Ubiquitous computing places humans in the center of environments saturated withcomputing and wireless communications capabilities, yet gracefully integrated, so that technology recedes in the background of everyday a...
详细信息
ISBN:
(纸本)9781581139648
Ubiquitous computing places humans in the center of environments saturated withcomputing and wireless communications capabilities, yet gracefully integrated, so that technology recedes in the background of everyday activities. the ubiquitous computing world then, is a world largely defined by applications. But such applications present an altogether new set of requirements. the special track on ubiquitous computing applications, first introduced in acm SAC 2004 and running for the second time in acm SAC 2005, provides a forum for the discussion of all types of ubiquitous computing applications and related specialized infrastructures built for the deployment of targeted applications. Individual papers place applications within their use context and introduce novel and appropriate interaction paradigms while at the same time addressing related technical and business aspects and consequently identify novel opportunities or constraints.
CSP++ is an object-oriented application framework for execution of CSP specifications that have been automatically translated into C++ source code by a tool called cspt. this approach makes CSP specifications directly...
详细信息
ISBN:
(纸本)9781581139648
CSP++ is an object-oriented application framework for execution of CSP specifications that have been automatically translated into C++ source code by a tool called cspt. this approach makes CSP specifications directly executable, and extensible via the ability to incorporate user-coded functions. Designers can exploit "selective formalism" to code some system functionality in CSP for formal verification purposes, and other functionality directly in C++. the translator has now been enhanced to accept input in CSPm syntax, the same dialect processed by the commercial verification tool, FDR2, and we demonstrate this with a new ATM case study. Copyright 2005 acm.
By immersing computational systems into the physical world, pervasive computing brings us from traditional desktop computing interactions into a form closer to human interactions, which are characterized by their depe...
详细信息
ISBN:
(纸本)9781581139648
By immersing computational systems into the physical world, pervasive computing brings us from traditional desktop computing interactions into a form closer to human interactions, which are characterized by their dependance on the environment. Furthermore, acting within the environment can contribute in many cases to a form of implicit interaction in which no explicit communication message is exchanged. However, this way of interacting cannot be achieved without a shared common knowledge with a well defined semantic. this appeals to explore a new approach of interaction mediated by the environment, closer to human interactions, and therefore, more suitable to achieve the intended silent computation of pervasive computing. To address this issue, we present in this paper XCM;a generic coordination model for pervasive computing. XCM is organized around few abstract concepts (entity, environment, social law and port) and is expressed as an ontology. While the abstract concepts of XCM deal withthe environmental representation and context-dependency, the ontological representation allows to achieve knowledge sharing and context reasoning. Copyright 2005 acm.
In many practical applications, we are interested in computingthe product of given matrices and/or a power of a given matrix. In some cases, the initial matrices are only known with interval uncertainty. It turns out...
详细信息
ISBN:
(纸本)9781581139648
In many practical applications, we are interested in computingthe product of given matrices and/or a power of a given matrix. In some cases, the initial matrices are only known with interval uncertainty. It turns out that under this uncertainty, there is a principal difference between the product of two matrices and the product of three (or more) matrices: on the one hand, it is more or less known that the problems of computingthe exact range for the product of two matrices - and for the square of a matrix - are computationally feasible;on the other hand, we prove that the problems of computingthe exact ranges for the product of three matrices - and for the third power of a matrix - are NP-hard. Copyright 2005 acm.
In this paper, we describe PUMAS [3], a framework based on Ubiquitous Agents for accessing Web Information Systems (WIS) through Mobile Devices (MD). the objective of PUMAS is to adapt the information delivered to a n...
详细信息
ISBN:
(纸本)9781581139648
In this paper, we describe PUMAS [3], a framework based on Ubiquitous Agents for accessing Web Information Systems (WIS) through Mobile Devices (MD). the objective of PUMAS is to adapt the information delivered to a nomadic user (who often changes her/his location) according to her/his preferences, intentions and history in the system and, to the limited capacities of her/his MD. We use some AUML (Agent Unified Modelling Language) [11] diagrams for representing the messages exchange between the agents and the PUMAS components. Copyright 2005 acm.
Next-generation mobile devices will be multi-functional and be expected to execute a broad range of compute-intensive applications. they are constraint by their device and mobility characteristics in achieving these e...
详细信息
ISBN:
(纸本)9781581139648
Next-generation mobile devices will be multi-functional and be expected to execute a broad range of compute-intensive applications. they are constraint by their device and mobility characteristics in achieving these expectations. Reconfigurable logic has vast potential to facilitate mobile devices in meeting these future system performance requirements. this paper proposes incorporating reconfigurable computing and agent technology into mobile device environments. Agent technology is an ideal middleware for mobile device management enabling effective utilization of reconfigurable resources. Reconfigurable logic is integrated into the environment of a mobile device i.e. both into the physical device and into surrounding adaptive servers. An outline of the overall strategy is described. A detailed examination of enabling a client mobile device to dynamically offload reconfigurable hardware-software based computations to neighboring adaptive servers is presented. In addition, the paper details an initial demonstrator system within a medical environment. Copyright 2005 acm.
the paradigm of Ubiquitous computing seeks to build a computing environment that responds to user context. An ideal file system for the Ubiquitous environment is one that can successfully recognize the present context...
详细信息
ISBN:
(纸本)9781581139648
the paradigm of Ubiquitous computing seeks to build a computing environment that responds to user context. An ideal file system for the Ubiquitous environment is one that can successfully recognize the present context and automate file management. the intelligence in the Ubiquitous file management is achieved by applying a heuristics based clustering approach to the system. the applied heuristics are those that are used on file attributes by users to manually manage files in a traditional file system. File attributes can be used to relate files to the most appropriate work-context and also draw inter-file relationships. We discuss methods to harness the given file information from the file-system to form a context-relation wrapper over disparate files. this enables management of files as context related working sets rather than as individual files. A survey was conducted among regular computer users and the compiled results supported our context based file clustering approach. the experiments also showed promising results that confirm our model on the file heuristics, thus finding semantic relations between those files. Copyright 2005 acm.
Pegasus is a planning framework for mapping abstract workflows for execution on the Grid. this paper presents the implementation of a web-based portal for submitting workflows to the Grid using Pegasus. the portal als...
详细信息
ISBN:
(纸本)9781581139648
Pegasus is a planning framework for mapping abstract workflows for execution on the Grid. this paper presents the implementation of a web-based portal for submitting workflows to the Grid using Pegasus. the portal also includes components for generating abstract workflows based on a metadata description of the desired data products and application-specific services. We describe our experiences in using this portal for two Grid applications. A major contribution of our work is in introducing several components that can be useful for Grid portals and hence should be included in Grid portal development toolkits. Copyright 2005 acm.
Network forensics and honeynet systems have the same features of collecting information about the computer misuses. Honeynet system can lure attackers and gain information about new types of intrusions. Network forens...
详细信息
ISBN:
(纸本)9781581139648
Network forensics and honeynet systems have the same features of collecting information about the computer misuses. Honeynet system can lure attackers and gain information about new types of intrusions. Network forensics system can analysis and reconstruct the attack behaviors. these two systems integrating together can help to build an active self-learning and response system to profile the intrusion behavior features and investigate the attack original source. In this paper, we present a design of honeynet based active network intrusion response system. the features of our system are distributed adaptive network forensics and active real time network investigation. Copyright 2005 acm.
the sharing of tacit knowledge is a strategic factor for the success of software process, from a number of perspectives: training, project assimilation, and reducing noise in knowledge transfer. Pair programming is su...
详细信息
ISBN:
(纸本)9781581139648
the sharing of tacit knowledge is a strategic factor for the success of software process, from a number of perspectives: training, project assimilation, and reducing noise in knowledge transfer. Pair programming is supposed to be a practice suitable for this purpose. Unfortunately, the building of tacit knowledge is determined by factors that are difficult to isolate and capture because they concern personal attitude and capability. thus, we have focused on the possible causes forming the individual ability, that can be isolated and studied, such as the individual education background. We have appliedthe practice of working in pairs to the design phase. We have made an experiment and a replica in academic environment, in order to understand the relationship between the building of knowledge through the practice and the individual background. In this paper we discuss the replica and compare the results withthe first experiment's ones. Copyright 2005 acm.
暂无评论