Secure provenance techniques are essential in generating trustworthy provenance records, where one is interested in protecting their integrity, confidentiality, and availability. In this work, we suggest an architectu...
详细信息
This report summarizes the proceedings of the second workshop of the 'Minimum Information for Biological and Biomedical Investigations' (MIBBI) consortium held on Dec 1-2, 2010 in Rüdesheim, Germany throu...
详细信息
This report summarizes the proceedings of the second workshop of the 'Minimum Information for Biological and Biomedical Investigations' (MIBBI) consortium held on Dec 1-2, 2010 in Rüdesheim, Germany through the sponsorship of the Beilstein-Institute. MIBBI is an umbrella organization uniting communities developing Minimum Information (MI) checklists to standardize the description of data sets, the workflows by which they were generated and the scientific context for the work. This workshop brought together representatives of more than twenty communities to present the status of their MI checklists and plans for future development. Shared challenges and solutions were identified and the role of MIBBI in MI checklist development was discussed. The meeting featured some thirty presentations, wide-ranging discussions and breakout groups. The top outcomes of the two-day workshop as defined by the participants were: 1) the chance to share best practices and to identify areas of synergy; 2) defining a series of tasks for updating the MIBBI Portal; 3) reemphasizing the need to maintain independent MI checklists for various communities while leveraging common terms and workflow elements contained in multiple checklists; and 4) revision of the concept of the MIBBI Foundry to focus on the creation of a core set of MIBBI modules intended for reuse by individual MI checklist projects while maintaining the integrity of each MI project. Further information about MIBBI and its range of activities can be found at http://***/.
Software technologies, such as model-based testing approaches, have specific characteristics and limitations that can affect their use in software projects. To make available knowledge regarding such technologies is i...
详细信息
ISBN:
(纸本)9781605580302
Software technologies, such as model-based testing approaches, have specific characteristics and limitations that can affect their use in software projects. To make available knowledge regarding such technologies is important to support the decision regarding their use in software projects. In particular, a choice of model-based testing approach can influence testing success or failure. Therefore, this paper aims at describing knowledge acquired from a systematic review regarding model-based testing approaches and proposing an infrastructure towards supporting their selection for software projects. Copyright 2008 ACM.
Teaching engineering and technology subjects involves conveying understanding of abstract information structures and processes such as complex telecommunications protocols, complex mathematical concepts, and data stru...
详细信息
Teaching engineering and technology subjects involves conveying understanding of abstract information structures and processes such as complex telecommunications protocols, complex mathematical concepts, and data structures. These are multidimensional and can be difficult to grasp quickly. Supported by a Hewlett-Packard (HP) Technology for Teaching grant, the School of engineering and Technology at National University has embarked on a project to enable students to grasp these complex concepts more quickly and easily, using continuous dialog among students and instructors as the structures are first introduced and then examined from multiple perspectives through real-time interaction among students, small groups, and instructors. HP Wireless Tablet PCs are used to discuss and experiment with diagrams and processes in realtime. This allows combining lectures and problem-solving sessions into a single class session. Our hypothesis is that: 1) an in-depth learning of theory is accomplished, and 2) student engagement is enhanced. Presentation of theory by the instructor is integrated with application while the theory is still in the student's short-term memory. Students no longer have to wait for a separate session such as a recitation session to apply the concepts. This approach often takes less time. In addition to accelerating the learning process, expert instructors find this approach more rewarding as students grasp new concepts more quickly. Analysis of data captured from both students and instructors are presented to support our hypotheses, and our results are compared with similar research carried out by other universities. In addition, the level of interaction enabled by the use of HP Tablets in on-line classes is discussed. The best teaching tools available in existing on-line teaching platforms are compared with the additional tools available in on-site courses when every student has a wireless Tablet PC and specific recommendations are made to on-line teachi
Experimental studies have been used as a mechanism to acquire knowledge through a scientific approach based on measurement of phenomena in different areas. However it is hard to run such studies when they require mode...
详细信息
Experimental studies have been used as a mechanism to acquire knowledge through a scientific approach based on measurement of phenomena in different areas. However it is hard to run such studies when they require models (simulation), produce amount of information, and explore science in scale. In this case, a computerized infrastructure is necessary and constitutes a complex system to be built. In this paper we discuss an experimentation environment that has being built to support large scale experimentation and scientific knowledge management in software engineering.
Secure provenance techniques are essential in generating trustworthy provenance records, where one is interested in protecting their integrity, confidentiality, and availability. In this work, we suggest an architectu...
详细信息
Secure provenance techniques are essential in generating trustworthy provenance records, where one is interested in protecting their integrity, confidentiality, and availability. In this work, we suggest an architecture to provide protection of authorship and temporal information in grid-enabled provenance systems. It can be used in the resolution of conflicting intellectual property claims, and in the reliable chronological reconstitution of scientific experiments. We observe that some techniques from public key infrastructures can be readily applied for this purpose. We discuss the issues involved in the implementation of such architecture and describe some experiments realized with the proposed techniques.
In this paper we present the architecture for the Personal Autonomic Desktop Manager, a self managing application designed to act on behalf of the user in several aspects: protection, healing, optimization and configu...
详细信息
In this paper we present the architecture for the Personal Autonomic Desktop Manager, a self managing application designed to act on behalf of the user in several aspects: protection, healing, optimization and configuration. The overall goal of this research is to improve the correlation of the autonomic self{sup}* properties and doing so also enhance the overall self-management capacity of the desktop (autonomicity). We introduce the Circulatory Computing (CC) model, a self-managing system initiative based on the biological metaphor of the cardiovascular system, and use its concepts in the design and implementation of the architecture.
Voltage spikes are ubiquitous in biological nervous systems. How spikes can be used to encode signals, facilitate communication, and implement important computations is an important question of contemporary neuroscien...
详细信息
Voltage spikes are ubiquitous in biological nervous systems. How spikes can be used to encode signals, facilitate communication, and implement important computations is an important question of contemporary neuroscience. Acoustic processing tasks provide a rich range of applications for this encoding scheme. As a summary of the Ph.D. research of the first author, we present two analog VLSI spike-based example systems that process acoustic information using spikes: a model of the neural signal processing involved in bat echolocation, and a low-power, time-domain acoustic periodicity detector.
To support our ongoing work in modeling bat echolocation, an artificial bat head was designed and fabricated using a 3D printer, an ultrasonic cochlea-like filter bank with 16 channels was designed with moderate quali...
详细信息
To support our ongoing work in modeling bat echolocation, an artificial bat head was designed and fabricated using a 3D printer, an ultrasonic cochlea-like filter bank with 16 channels was designed with moderate quality (Q) factor, and 128 spiking neurons convert these signals to spike trains. A two-dimensional address-event arbiter is used to transmit these spikes off of the chip. We demonstrate that the population of spiking neurons can be decoded to estimate azimuth and elevation of ultrasonic chirps. This chip was fabricated in a commercially-available 0.5(mu)m CMOS process and consumes approximately 36(mu)W.
暂无评论