Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collaboration is ad-hoc, and virtual workspac...
详细信息
ISBN:
(纸本)9781604235531
Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collaboration is ad-hoc, and virtual workspaces are set up anew for each new instance of collaboration. We propose that much of the ad-hoc collaboration can be captured and transformed into patterns for reuse in future collaboration. This paper presents the results of the past five years of our work in this area. We introduce the notion of patterns of virtual collaboration;present a framework for extracting patterns of work in virtual workspace systems;and introduce an information model of virtual collaboration. We then present an overview of our data and process mining methods and reverse engineering techniques for discerning work processes carried out through virtual workspace systems. Finally we present our visual mining techniques that we use to discern aspects of work processes in virtual workspaces.
This paper describes an empirical study that investigates the knowledge that computer Science students have about the extent of their own previous learning. The study compares self-generated estimates of performance w...
详细信息
ISBN:
(纸本)1595930248
This paper describes an empirical study that investigates the knowledge that computer Science students have about the extent of their own previous learning. The study compares self-generated estimates of performance with actual performance on a data structures quiz taken by undergraduate students in courses requiring data structures as a pre-requisite. The study is contextualized and grounded within a research paradigm in Psychology called calibration of knowledge that suggests that self-knowledge across a range of disciplines is highly unreliable. Such self-knowledge is important because of its role in meta-cognition, particularly in cognitive self-regulation and monitoring. It is also important because of the credence that faculty give to student self-reports. Our results indicate that computer Science student self-estimates correlate moderately with their performance on a quiz, more so for estimates provided after they have taken the quiz than before. The pedagogical implications are that students should be provided with regular opportunities for empirical validation of their knowledge as well as being taught the metacognitive skills of regular self-testing in order to overcome validation bias. Copyright 2005 ACM.
Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a ...
详细信息
As UML statechart diagrams are the core for modeling the dynamic aspects of softwaresystems, we have been studying their understandability for the last three years. In previous researches, we have already studied the...
详细信息
For generations, the academic community has relied on peer review as a way of encouraging scholarship and enhancing the knowledge base. Peer review has been widely used in the classroom since at least the 1970s, with ...
详细信息
ISBN:
(纸本)1581139977
For generations, the academic community has relied on peer review as a way of encouraging scholarship and enhancing the knowledge base. Peer review has been widely used in the classroom since at least the 1970s, with hundreds of papers on its use in diverse academic fields appearing in the literature (for a comprehensive survey, see [1]). Its use appears to be on the upswing, given the current interest in active learning and teamwork. In computer science, peer review seems to have very broad application. It can be used to evaluate the contributions of various members to a project team;it can be used for design documents and code reviews, in writing assignments, and in capstone project courses. The experience of the panelists is illustrative of the wide range of peer-review practices. This panel will serve to introduce the audience to some of these applications. Since many computer-science instructors have experimented with peer review, we are anxious to have them share their experiences during the open discussion period.
The scale, heterogeneity, and dynamism of emerging distributed and decentralized environments make coordination a significant and challenging problem. In this paper we present Comet, a scalable peer-to-peer content-ba...
详细信息
The scale, heterogeneity, and dynamism of emerging distributed and decentralized environments make coordination a significant and challenging problem. In this paper we present Comet, a scalable peer-to-peer content-based coordination space. Comet provides a global virtual shared-space that can be associatively accessed by all peer nodes in the system, and access is independent of the physical location of the tuples or identifiers of the host. Dynamically constructed, transient coordination spaces are also supported to enable context locality to be explicitly exploited for improving system performance. The design, implementation, and experimental evaluation of Comet using the PlanetLab platform are presented.
This article addresses the generation of traces to monitor the execution of distributed Java systems, and investigates the use of Aspect-Oriented Programming (AOP) as the instrumentation strategy to get the necessary ...
详细信息
Location tracking in a personal communications services (PCS) network requires location update and paging. These procedures incur a large signaling cost as the demand for these services increases. In a location update...
详细信息
Location tracking in a personal communications services (PCS) network requires location update and paging. These procedures incur a large signaling cost as the demand for these services increases. In a location update process, the mobile terminal (MT) registers with the system when it enters into a new location area (LA) that contains many cells. In a paging process, the network system initiates a search process to find the mobile terminal to deliver an incoming call. A heuristic location tracking strategy is proposed based on location probability models that aims to reduce the signaling cost involved in paging process under delay bounds. Numerical results demonstrate that this paging strategy performs better than other methods [W. Wang et al., (2001)] for both uniform and non-uniform location probability distributions.
This paper describes a comprehensive prototype of large-scale fault adaptive embedded software developed for the proposed Fermilab BTeV high energy physics experiment. Lightweight self-optimizing agents embedded withi...
详细信息
Reconfiguration and self-adaptation are vital capabilities of sensor networks and networked embedded systems that are required to operate in dynamic environments. This paper presents an approach for software reconfigu...
详细信息
Reconfiguration and self-adaptation are vital capabilities of sensor networks and networked embedded systems that are required to operate in dynamic environments. This paper presents an approach for software reconfiguration based on exploration of the design space of the application. The design space is represented by formally modeling all the software components, their alternative implementations and their interactions. Reconfiguration is triggered by monitoring the system and is performed by transitioning to a new configuration that satisfies the system constraints. The approach is demonstrated using experimental results for a representative tracking application.
暂无评论