Automated analysis of object-oriented design models can provide insight into the quality of a given software design. Data obtained from automated analysis, however, is often too complex to be easily understood by a de...
详细信息
Today, we witness a transformation of radio access network topologies from strictly tree-structured towards meshed architectures. Yet, these edge networks follow mostly circuit-switched paradigms to support quality of...
详细信息
The discovery of the association between terms and a specified topic is a difficult task. A new data mining technique, topic-oriented mining and reasoning, is presented for this task. The technique consists of two thr...
详细信息
The full-bridge converter with current-doubter synchronous rectifier (FB-CDSR) is a promising topology to implement low-voltage high-current power supplies. This paper proposes a novel control for this converter, whic...
详细信息
distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collaboration is ad-hoc, and virtual workspac...
详细信息
ISBN:
(纸本)9781604235531
distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collaboration is ad-hoc, and virtual workspaces are set up anew for each new instance of collaboration. We propose that much of the ad-hoc collaboration can be captured and transformed into patterns for reuse in future collaboration. This paper presents the results of the past five years of our work in this area. We introduce the notion of patterns of virtual collaboration;present a framework for extracting patterns of work in virtual workspace systems;and introduce an information model of virtual collaboration. We then present an overview of our data and process mining methods and reverse engineering techniques for discerning work processes carried out through virtual workspace systems. Finally we present our visual mining techniques that we use to discern aspects of work processes in virtual workspaces.
This paper describes an empirical study that investigates the knowledge that computer Science students have about the extent of their own previous learning. The study compares self-generated estimates of performance w...
详细信息
ISBN:
(纸本)1595930248
This paper describes an empirical study that investigates the knowledge that computer Science students have about the extent of their own previous learning. The study compares self-generated estimates of performance with actual performance on a data structures quiz taken by undergraduate students in courses requiring data structures as a pre-requisite. The study is contextualized and grounded within a research paradigm in Psychology called calibration of knowledge that suggests that self-knowledge across a range of disciplines is highly unreliable. Such self-knowledge is important because of its role in meta-cognition, particularly in cognitive self-regulation and monitoring. It is also important because of the credence that faculty give to student self-reports. Our results indicate that computer Science student self-estimates correlate moderately with their performance on a quiz, more so for estimates provided after they have taken the quiz than before. The pedagogical implications are that students should be provided with regular opportunities for empirical validation of their knowledge as well as being taught the metacognitive skills of regular self-testing in order to overcome validation bias. Copyright 2005 ACM.
Recent advances in wireless technology have enabled the rapid development of wireless sensor networks. Such networks, consisting of ten to thousands of randomly deployed nodes collaborating to achieve a goal, are used...
详细信息
Recent advances in wireless technology have enabled the rapid development of wireless sensor networks. Such networks, consisting of ten to thousands of randomly deployed nodes collaborating to achieve a goal, are used in a variety of applications. We have developed a new framework called TinyMaCLaS(tiny middleware and compositional language for sensor networks) for sensor networks that simplifies the process of developing applications. As a part of this framework, we have developed a COMiS(component oriented middleware for sensor networks). Most of the protocols and middleware argue scalability through simulations. Unfortunately, theoretical analysis does not exist for scalability. We have done theoretical analysis, in order to prove the scalability of our middleware. The paper presents the theoretical analysis, and it can be used for any middleware or protocol.
Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a ...
详细信息
Many of the community-area networks use commodity 802.11 hardware to form small wireless networks. Generally organized as a mesh, employing a single channel, and having a few gateways for wider-area access, they tend ...
详细信息
Many of the community-area networks use commodity 802.11 hardware to form small wireless networks. Generally organized as a mesh, employing a single channel, and having a few gateways for wider-area access, they tend to offer poor bandwidth to end users. To increase bandwidth, the idea of leveraging multiple interfaces operating on different, non-overlapping, channels has been put forward recently. In this paper, we examine the performance of community wireless networks based on such multi-interface nodes. Our experiments demonstrate that the mere use of more dual-interface nodes does not necessarily create higher capacity. Indeed, in a number of cases we show that the throughput is lower than cases where fewer interfaces are used. We identify three causes for this throughput limitation: channel load, RTS/CTS and exposed nodes, and unfairness due to local traffic. Furthermore, we show that in random topologies, it is very often hard to achieve adequate throughput gain.
The paper focuses on software distribution over the Internet, points to weaknesses of the current practice and argues for removing the weaknesses by introducing a ubiquitous distribution framework at the middleware le...
详细信息
The paper focuses on software distribution over the Internet, points to weaknesses of the current practice and argues for removing the weaknesses by introducing a ubiquitous distribution framework at the middleware level. The paper describes our design and implementation of such a framework, capable of supporting complex distribution and licensing models.
暂无评论