Blended learning (BL) is a hybrid of classroom learning and online learning that includes the conveniences of online courses without the complete loss of face-to-face (F2F) contact. Advancements in communication techn...
详细信息
Globally distributed software development (GSD) and agile methods are two current and important trends in software and systems.engineering. While agile methods seem to cope well with increasingly changing business env...
详细信息
Globally distributed software development (GSD) and agile methods are two current and important trends in software and systems.engineering. While agile methods seem to cope well with increasingly changing business environments, it is far from obvious how these light-weight processes can best contribute to GSD. In this paper, method rationale is proposed as an analytical tool to understand the values that underpin agile methods and how these map to the GSD domain. Specifically, the paper presents an initial analysis of the values and goals embraced by the 'agile manifesto' and compares briefly with partial results from an ongoing study on the use of agile methods in GSD.
Many continuously recorded data streams are generated by non-stationary processes, which may change over time, in some cases even drastically. Some adaptive learning agents deal with time-changing data streams by gene...
详细信息
FlowUML is a logic-based system to validate information flow policies at the requirements specification phase of UML based designs. It uses Horn clauses to specify information flow polices that can be checked against ...
详细信息
Embedded digital signal processors for software defined radio have stringent design constraints including high computational bandwidth, low power consumption, and low interrupt latency. Furthermore, due to rapidly evo...
详细信息
Multi-hop cellular networks offer attractive benefits for the next generation of wireless communication by integrating ad hoc relaying to cellular networks. However, most of the existing architectures and protocols fo...
详细信息
Multi-hop cellular networks offer attractive benefits for the next generation of wireless communication by integrating ad hoc relaying to cellular networks. However, most of the existing architectures and protocols for multi-hop cellular networks suffer from a variety of security threats in an adversarial environment. The existing architectures and protocols are not capable of providing end-to-end security protection for mobile users. A generalized multi-hop security protocol (GMSP) is proposed in this paper to achieve an effective route discovery protection from a range of potential security threats. The proposed multi-hop security protocol integrates mobile IP security and ad hoc security schemes. Moreover, the proposed protocol is flexible enough for fulfilling security protection for most existing heterogeneous multi-hop cellular architectures
There are many difficult challenges ahead in the design of an energy-efficient communication stack for wireless sensor networks. Due to the severe sensor node constraints, protocols have to be simple yet scalable. To ...
详细信息
This paper describes an effort to identify common metrics for task-oriented human-robot interaction (HRI). We begin by discussing the need for a toolkit of HRI metrics. We then describe the framework of our work and i...
详细信息
ISBN:
(纸本)1595932941
This paper describes an effort to identify common metrics for task-oriented human-robot interaction (HRI). We begin by discussing the need for a toolkit of HRI metrics. We then describe the framework of our work and identify important biasing factors that must be taken into consideration. Finally, we present suggested common metrics for standardization and a case study. Preparation of a larger, more detailed toolkit is in progress. Copyright 2006 ACM.
In this paper, we propose a proximity based automated access control (PBAC) model for smart-ED environments which improves the existing ED work-flow by automating mundane administrative procedure for secure informatio...
详细信息
In this paper, we propose a proximity based automated access control (PBAC) model for smart-ED environments which improves the existing ED work-flow by automating mundane administrative procedure for secure information access, allowing caregivers to focus on the treatment of patients. The proposed access model builds on the traditional role-based access control model and extends it by including multiple authentication levels for preventing unauthorized access. We also provide a semi-formal specification for the PBAC model. We further validate it using ultra-wide-band (UWB) based prototype which was tested in ED
暂无评论