This paper examines the process of technology appropriation and the triggers that encourage and discourage longer term use of an Information System (IS). In a longitudinal study over 14 months, we examine use of a Lea...
详细信息
Gas recognition is a new emerging research area with many civil, military, and industrial applications. The successof any gas recognition system depends on its computationalcomplexity and its robustness. In this work,...
Gas recognition is a new emerging research area with many civil, military, and industrial applications. The success
of any gas recognition system depends on its computational
complexity and its robustness. In this work, we propose a
new low-complexity recognition method which is tested and
successfully validated for tin-oxide gas sensor array chip. The
recognition system is based on a vector angle similarity measure
between the query gas and the representatives of the different gas
classes. The latter are obtained using a clustering algorithm based
on the same measure within the training data set. Experimented results on our in-house gas sensors array show more than 98 % of correct recognition. The robustness of the proposed method
is tested by recognizing gas measurements with simulated drift.
Less than 1 % of performance degradation is noted at the worst case
scenario which represents a significant improvement when
compared to the current state-of-the-art.
Agents' pro attitudes such as goals, intentions, desires, wishes, and judgements of satisfactoriness play an important role in how agents act rationally. To provide a natural and satisfying formalization of these ...
详细信息
This paper examines software designs produced by students nearing completion of their computerscience degrees. The results of this multi-national, multi institutional experiment present some interesting implications ...
详细信息
ISBN:
(纸本)9781595932594
This paper examines software designs produced by students nearing completion of their computerscience degrees. The results of this multi-national, multi institutional experiment present some interesting implications for educators. Copyright 2006 ACM.
Mobile games are one of the primary entertainment applications at present. Limited by scarce resources, such as memory, CPU, input and output, etc, mobile game development is more difficult than desktop application de...
详细信息
This paper is part of an ongoing series of projects in which we are investigating "threshold concepts": concepts that, among other things, transforms the way a student looks as the discipline and are often t...
详细信息
ISBN:
(纸本)9781595938411
This paper is part of an ongoing series of projects in which we are investigating "threshold concepts": concepts that, among other things, transforms the way a student looks as the discipline and are often troublesome to learn. The word "threshold" might imply that students cross the threshold in a single "aha" moment, but often they seem to take longer. Meyer and Land introduce the term "liminal space" for the transitional period between beginning to learn a concept and fully mastering it. Based on in-depth interviews with graduating seniors, we found that the liminal space can provide a useful metaphor for the concept learning process. In addition to observing the standard features of liminal spaces, we have identified some that may be specific to computing, specifically those relating to levels of abstraction. Copyright 2007 ACM.
In this paper, we study the problem of testing intrusion detection systems (IDS) in mobile ad hoc networks (MANET). Testing is achieved by simulating different measurements. We modify the testing measurements of infra...
详细信息
In this paper, we study the problem of testing intrusion detection systems (IDS) in mobile ad hoc networks (MANET). Testing is achieved by simulating different measurements. We modify the testing measurements of infrastructure-based networks to be compatible with the characteristics of MANET. Moreover, we add some new features and their associated measurements that we believe important for testing new proposed IDS. The modified measurements with the new added ones form a set of measurements that will be used throughout the testing process. To the best of our knowledge, there has not been any work done for testing IDS in MANET. Simulators are the most common tools used for testing the IDS. Therefore, we add some precautions for choosing a simulator and a list of available simulators. The precautions will help researchers to test the measurements efficiently and the list of simulators will guide them to select one according to their needs. Finally, we present some input parameter precautions that help on having more trustworthy testing results.
Fault detection and isolation is a key component of any safety-critical system. Although diagnosis methods based on discrete event systems have been recognized as a promising framework, they cannot be easily applied t...
详细信息
Fault detection and isolation is a key component of any safety-critical system. Although diagnosis methods based on discrete event systems have been recognized as a promising framework, they cannot be easily applied to systems with complex continuous dynamics. This paper presents a novel approach for discrete event system diagnosis of continuous systems based on a qualitative abstraction of the measurement deviations from the nominal behavior. We systematically derive a diagnosis model, provide diagnosability analysis, and design a diagnoser. Our results show that the proposed approach is easily applicable and can be used for online diagnosis of abrupt faults in continuous systems.
Utility computing has been anticipated to be the next generation of computing usage. Users have the freedom to easily switch to any commercial computing service to complete jobs whenever the need arises and simply pay...
详细信息
Utility computing has been anticipated to be the next generation of computing usage. Users have the freedom to easily switch to any commercial computing service to complete jobs whenever the need arises and simply pay only on usage, without any investment costs. A commercial computing service however has certain objectives or goals that it aims to achieve. In this paper, we identify three essential objectives for a commercial computing service: (i) meet SLA, (ii) maintain reliability, and (iii) earn profit. This leads to the problem of whether a resource management policy implemented in the commercial computing service is able to meet the required objectives or not. So, we also develop two evaluation methods that are simple and intuitive: (i) separate and (ii) integrated risk analysis to analyze the effectiveness of resource management policies in achieving the required objectives. Evaluation results based on five policies successfully demonstrate the applicability of separate and integrated risk analysis to assess policies in terms of the required objectives.
In this paper, we present the design of Aneka, a .NET based service-oriented platform for desktop grid computing that provides: (i) a configurable service container hosting pluggable services for discovering, scheduli...
详细信息
In this paper, we present the design of Aneka, a .NET based service-oriented platform for desktop grid computing that provides: (i) a configurable service container hosting pluggable services for discovering, scheduling and balancing various types of workloads and (ii) a flexible and extensible framework/API supporting various programming models including threading, batch processing, MPI and dataflow. Users and developers can easily use different programming models and the services provided by the container to run their applications over desktop Grids managed by Aneka. We present the implementation of both the essential and advanced services within the platform. We evaluate the system with applications using the grid task and dataflow models on top of the infrastructure and conclude with some future directions of the current system.
暂无评论