A user's profile, for the purpose of location management in a PCS network, is formalized as a subgraph of the network graph. This subgraph, the so-called individual profile graph (IPG), is determined after a perio...
详细信息
The problem considered is that of recognizing if a given convex polygon comes from a known collection by applying probes. Existing approaches use a number of probes that is linear in the number of sides of the polygon...
详细信息
Designing component-based application that meets performance requirements remains a challenging problem, and usually requires a prototype to be constructed to benchmark performance. Building a custom benchmark suite i...
详细信息
Nowadays, Problem-Based Learning (PBL for short) is a popular teaching strategy for teachers. In the PBL environment students can learn how to solve the real life problems by discussing with their teammates and develo...
详细信息
One-on-one educational computing refers to I student I computing device, which means every student in a group uses a digital learning device. In this paper, we present a model of student question generation called AGQ...
详细信息
ISBN:
(纸本)0805857826
One-on-one educational computing refers to I student I computing device, which means every student in a group uses a digital learning device. In this paper, we present a model of student question generation called AGQ, which stands for "asking a good question," supported by one-on-one educational computing in the classroom settings. AGQ is designed for engaging students in a challenging learning activity that potentially involves higher-level cognitive processing operations. We shall describe the general design of AGQ, called Product Evolution, and that the current version is a variation of it.
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us with valuable informations on dependenci...
详细信息
ISBN:
(纸本)9781595930453
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us with valuable informations on dependencies between document nodes, but at the same time presenting the risk of undesirable data disclosure. In this paper we introduce the notion of relevancy-based access control, which realizes protection of versioned XML documents by various types of relevancy, such as version dependencies, schema similarities and temporal proximity. We define a new path query language XVerPath over XML document versions, which can be utilized for specifying relevancy-based access control policies. We also introduce the notion of relevancy class, for collectively and compactly specifying relevancy-based policies. Copyright 2005 ACM.
The MVDR beamformer is the most extensively used array processing algorithm and involves inverting the sample covariance matrix. In the snapshot deficient scenario, when the number of sensors is greater than or approx...
详细信息
Today's collaborative applications over the web span domains as diverse as enterprise e-commerce applications and biomedical applications. We have previously developed and formally investigated "Web Coordinat...
详细信息
ISBN:
(纸本)0769523129
Today's collaborative applications over the web span domains as diverse as enterprise e-commerce applications and biomedical applications. We have previously developed and formally investigated "Web Coordination Bonds," a theoretically powerful artifact for interconnecting autonomous web objects for control and data flows, and for enforcing dependencies. Here, we describe BondFlow, a system that enables the configuration and execution of workflows using web bonds over heterogeneous web objects. The system automatically generates lightweight proxy wrapper objects to enable encapsulated web services to be interconnected through web bonds. The small footprint wrappers (less than 10 KB) can reside on Java-enabled handheld devices. We describe the design, architecture and performance of the Bond-Flow system. Our initial performance results indicate that both wrapper creation time and web bond related execution time are small. In contrast to our BondFlow system, existing systems need expert programming to create workflows, do not easily allow distributed coordination of workflows, and usually do not support heterogeneity of device, data and network. The system is preliminary, and further research is ongoing to extend its configuration and execution platforms.
This session relates directly to this year's conference theme Sparking Synergies: Bringing Research and Practice Together as it brings together researchers from different disciplines (information science and educa...
This session relates directly to this year's conference theme Sparking Synergies: Bringing Research and Practice Together as it brings together researchers from different disciplines (information science and educational technology) to discuss current issues and trends related to Web usage across student populations. “Complex design problems require more knowledge than any single person possesses” (Arias, Eden, Fischer, Gorman, and Scharff, 2000, p. 84), thus each panelist will contribute highlights of his or her current research regarding the design, information, and pedagogical, needs of specific student populations (K-12 to higher education). After the panelists have presented their findings Diane Nahl will intertwine the threads of the panelists' conversations and, with the audience's assistance, begin to weave a fabric to uncover common usability issues.
This paper presents an analysis of the applicability of Sparse Kernel Principal Component Analysis (SKPCA) for feature extraction in speech recognition, as well as, a proposed approach to make the SKPCA technique real...
详细信息
暂无评论