Note: This page contains sample records for the topic ieee pervasive computing from Science.gov.
While these samples are representative of the content of Science.gov,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of Science.gov
to obtain the most current and comprehensive results.
Last update: November 12, 2013.
1

Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom 2003)  

Microsoft Academic Search

A large number of sensors networked together form selforganizing pervasive systems that provide the basis for implementation of several applications involving distributed, collaborative computations. Energy dissipation is a critical issue for these networks, as their life-time is limited by the battery power of the sensors. In this paper, we focus on design of an energy-balanced, energy-optimal algorithm for sorting in

Mitali Singh; Viktor K. Prasanna

2003-01-01

2

Representations in Pervasive Computing1  

Microsoft Academic Search

The idea behind pervasive computing is that embedded and invisible technology calms our lives by removing the annoyances. Everyday life, however, is shaped by what people do, how they do it, and how they perceive what they are doing. As a consequence everyday life is difficult to grasp in computational terms. A look at the pervasive computing literature indicates that

Christopher Lueg

2002-01-01

3

Philosophy, privacy, and pervasive computing  

Microsoft Academic Search

Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the\\u000a development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons\\u000a in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked\\u000a computing, where everyday transactions

Diane P. Michelfelder

2010-01-01

4

Pervasive computing: vision and challenges  

Microsoft Academic Search

This article discusses the challenges in computer systems research posed by the emerging field of pervasive computing. It first examines the relationship of this new field to its predecessors: distributed systems and mobile computing. It then identifies four new research thrusts: effective use of smart spaces, invisibility, localized scalability, and masking uneven conditioning. Next, it sketches a couple of hypothetical

M. Satyanarayanan

2001-01-01

5

Security in Pervasive Computing  

Microsoft Academic Search

\\u000a The audience of SPC 2003 needs no introduction to the Mark Weiser vision of ubiquitous computing: the etymological meaning\\u000a of ”computing present or found everywhere” is not to be taken in the narrow sense of ”a computer on every desk” but rather\\u000a in that of embedding computing and communication capabilities into all the everyday objects that surround us.\\u000a \\u000a \\u000a Various embodiments

Frank Stajano

2003-01-01

6

Challenges: an application model for pervasive computing  

Microsoft Academic Search

The way mobile computing devices and applications are developed, deployed and used today does not meet the expectations of the user community and falls far short of the potential for pervasive computing. This paper challenges the mobile computing community by questioning the roles of devices, applications, and a user's environment. A vision of pervasive computing is described, along with attributes

Guruduth Banavar; James Beck; Eugene Gluzberg; Jonathan Munson; Jeremy B. Sussman; Deborra J. Zukowski

2000-01-01

7

Expected Environmental Impacts of Pervasive Computing  

Microsoft Academic Search

Pervasive Computing will bring about both additional loads on and benefits to the environment. The prevailing assessment of positive and negative effects will depend on how effectively energy and waste policy governs the development of ICT infrastructures and applications in the coming years. Although Pervasive Computing is not expected to change the impact of the technosphere on the environment radically,

Andreas Köhler; Lorenz Erdmann

2004-01-01

8

Pervasive. Computing: What. is. it. Anyway?  

Microsoft Academic Search

In this chapter, we introduce the key ideas related to the paradigm of pervasive computing. We discuss its concepts, challenges, and current solutions by dividing it into four research areas. Such division is how we were able to understand what really is involved in pervasive computing at different levels. Our intent is to provide readers with introductory theoretical support in

Emerson Lourero

9

User Experience in the Pervasive Computing Age  

Microsoft Academic Search

The pervasive computing age will provide easier and more satisfying ways for people to interact with their world. As a result, the ways we interact with people, information, organizations, processes, devices, appliances, places, and everyday things will change. We describe four aspects of living in the pervasive computing age from a user experience perspective: life networks will make it easy

Jim Spohrer; Mitch Stein

2000-01-01

10

Addressing Security Challenges in Pervasive Computing Applications.  

National Technical Information Service (NTIS)

Pervasive computing provides services that use knowledge about the operating environment. The very knowledge that enables an application to provide better services may, however, be misused, causing security and privacy breaches. Uncontrolled disclosure of...

I. Ray I. Ray

2010-01-01

11

Emotions in Pervasive Computing Environments  

Microsoft Academic Search

The ability of an intelligent environment to connect and adapt to real internal sates, needs and behaviors' meaning of humans can be made possible by considering users' emotional states as contextual parameters. In this paper, we build on enactive psychology and investigate the incorporation of emotions in pervasive systems. We define emotions, and discuss the coding of emotional human markers

Nevin Vunka Jungum; Eric Laurent

2009-01-01

12

Development framework for pervasive computing applications  

Microsoft Academic Search

Pervasive computing [1] brings the technology closer to the users by enabling the users to use daily-life devices (mobile phones, TVs, touch screen walls, etc.) for controlling their environment and accessing information virtually anywhere. Interacting with such devices does not remind users of classical computers and enables them to more naturally interact with the controlled system, if user interface is

Václav Slová?ek; Miroslav Macík; Martin Klíma

2009-01-01

13

Towards Security and Privacy for Pervasive Computing  

Microsoft Academic Search

Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives. While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored in any depth. While traditional distributed computing research attempts

Roy H. Campbell; Jalal Al-muhtadi; Prasad Naldurg; Geetanjali Sampemane; M. Dennis Mickunas

2002-01-01

14

Complex Event Detection in Pervasive Computing  

Microsoft Academic Search

In pervasive computing environments, wide deployment of sensor devices has generated an unprecedented volume of atomic events. However, most applications such as healthcare, surveillance and facility management, as well as environmental monitoring require such events to be filtered and correlated for complex event detection. Therefore how to extract interesting, useful and complex events from low-level atomic events is becoming more

Chunjie Zhou; Xiaofeng Meng

2009-01-01

15

Pervasive Social Computing: Augmenting Five Facets of Human Intelligence  

Microsoft Academic Search

Pervasive Social Computing is a novel collective paradigm, derived from pervasive computing, social media, social networking, social signal processing, etc. This paper reviews Pervasive Social Computing as an integrated computing environment, which promises to augment five facets of human intelligence in physical environment awareness, behavior awareness, community awareness, interaction awareness, and content awareness. Reviews of related studies are given and

Jiehan Zhou; Junzhao Sun; Kumaripaba Athukorala; Dinesh Wijekoon

2010-01-01

16

Using OWL in a Pervasive Computing Broker  

Microsoft Academic Search

Computing is moving toward a pervasive context-aware en- vironment in which agents with limited resources will re- quire external support to help them become context-aware. In this paper, we describe an agent based architecture called Context Broker Architecture (CoBrA) to help these agents to acquire, reason about and share context knowledge. A key component in our architecture is an explicit

Harry Chen; Timothy W. Finin; Anupam Joshi

2003-01-01

17

Is cloud computing essential to the future of pervasive services?  

Microsoft Academic Search

Cloud computing is a new paradigm for deploying computing\\/information services, which is based pervasive and on demand access to computing utilities, an abstraction of unlimited computing resources, and a usage-based payment model made users essentially \\

Julie A. McCann; Manish Parashar; Omer Rana; Luca Foschini; Tim Kindberg

2009-01-01

18

A Pervasive Computing Platform for Individualized Higher Education  

Microsoft Academic Search

Advances in database management, distributed computing, computational intelligence, and especially pervasive systems, provide fertile ground for radical changes in pedagogy. We propose a pervasive educational platform that builds on these technologies to facilitate customization of courses and degree programs to the needs, interests, and backgrounds of individual students. Computer-based teaching tools are coupled with remote access to course content to

Ali R. Hurson; Sahra Sedigh

2009-01-01

19

Shadow attacks on users' anonymity in pervasive computing environments  

Microsoft Academic Search

Privacy preserving technologies are likely to become an essential component of adaptive services in pervasive and mobile computing. Although privacy issues have been studied for a long time in computer science as well as in other fields, most studies are focused on the release of data from large repositories. Mobile and pervasive computing pose new challenges, requiring specific formal models

Daniele Riboni; Linda Pareschi; Claudio Bettini

2008-01-01

20

A Policy Language for a Pervasive Computing Environment  

Microsoft Academic Search

In this paper we describe a policy language designed for pervasive computing applications that is based on de- ontic concepts and grounded in a semantic language. The pervasive computing environments under consideration are those in which people and devices are mobile and use var- ious wireless networking technologies to discover and ac- cess services and devices in their vicinity. Such

Lalana Kagal; Timothy W. Finin; Anupam Joshi

2003-01-01

21

Flying Control System Architecture of Informationization for Pervasive Computing  

Microsoft Academic Search

The paper involves one kind of mobile autonomous running system for pervasive computing. The developing requirements about aircraft flying control system of informationization were firstly analyzed, then the architecture on aircraft flying control system of informationization based on pervasive computing was presented. Lastly the design conception and its accuracy were verified by principle prototypes.

Lin Jinyong; Zhang Jun; Dong Wenjie; Gao Xiaoying; Qi Chuntang

2010-01-01

22

Autoconfiguration, registration, and mobility management for pervasive computing  

Microsoft Academic Search

In the vision of pervasive computing, users will exchange information and control their environments from anywhere using various wireline\\/wireless networks and computing devices. We believe that current protocols, such as DHCP, PPP, and Mobile IP, must be enhanced to support pervasive network access. In particular, this article identifies three fundamental functions: autoconfiguration, registration, and mobility management, that need such enhancements.

Archan MISRA; Subir Das; Anthony McAuley; Sajal K. Das

2001-01-01

23

New directions for system support in Pervasive Computing  

Microsoft Academic Search

In this paper, we discuss alternative paths towards system support for Pervasive Computing that are based on a balanced combination between global services and situated devices that we hypothesise will be the key to widespread deployment of Pervasive Computing: global services provide functionality that can be relevant anywhere, thus obviating the need to create dedicated services on a case-by-case basis;

Helena Rodrigues; Rui Jose; Arlindo Santos; Bruno Silva

2012-01-01

24

Integrated Contextual Information Service for Pervasive Computing Applications.  

National Technical Information Service (NTIS)

Pervasive computing applications are increasingly leveraging contextual information from several sources to provide users with behavior appropriate to the environment in which they reside. If these sources of contextual information are used and deployed i...

G. Judd P. Steenkiste

2003-01-01

25

A mobile context monitoring platform for pervasive computing environments  

Microsoft Academic Search

In this paper, we present a new mobile platform to support emerging pervasive applications in a Personal Area Network (PAN)-scale dynamic mobile computing environment. The PAN-scale computing environment will constitute an important part of future pervasive-space technology with highly proactive applications, requiring continuous monitoring of users' contexts. The context-aware applications impose heavy workloads on the mobile device and the sensor

Youngki Lee; Chulhong Min; Younghyun Ju; Saumay Pushp; Junehwa Song

2011-01-01

26

Building Efficient Wireless Infrastructures for Pervasive Computing Environments  

ERIC Educational Resources Information Center

Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…

Sheng, Bo

2010-01-01

27

Piecewise Network Awareness Service for Wireless\\/Mobile Pervasive Computing  

Microsoft Academic Search

This paper presents a piecewise framework for network awareness service (NAS) for wireless\\/mobile pervasive computing. We investigate how piecewise consideration of wired and wireless elements of the framework architecture benefits service advertisement and discovery and network-awareness techniques. We also discuss scalability of the NAS framework with respect to platform computing capabilities. The framework is suitable for a wide range of

Liang Cheng; Ivan Marsic

2002-01-01

28

Enabling location-aware pervasive computing applications for the elderly  

Microsoft Academic Search

The Pervasive Computing Laboratory at the University of Florida is dedicated to creating smart environments and assistants to enable elderly persons to live a longer and a more independent life at home. By achieving this goal, technology will increase the chances of successful aging despite an ailing health care system (e.g. Medicaid). One of the essential services required to maximize

Sumi Helal; Bryon Winkler; Choonhwa Lee; Youssef Kaddoura; Lisa Ran; Carlos Giraldo; Sree Kuchibhotla; William Mann

2003-01-01

29

Context reasoning using extended evidence theory in pervasive computing environments  

Microsoft Academic Search

Most existing context reasoning approaches implicitly assume that contexts are precise and complete. This assumption cannot be held in pervasive computing environments, where contexts are often imprecise and incomplete due to unreliable connectivity, user mobility and resource constraints. To this end, we propose an approach called CRET: Context Reasoning using extended Evidence Theory. CRET applies the evidence theory to context

Daqiang Zhang; Minyi Guo; Jingyu Zhou; Dazhou Kang; Jiannong Cao

2010-01-01

30

Exploiting information relationships for access control in pervasive computing  

Microsoft Academic Search

Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a person's calendar entry can reveal information about the person's location or activity. To avoid rich information from leaking its included information, we must consider the semantics of the rich information when controlling access to this

Urs Hengartner; Peter Steenkiste

31

Protecting Users' Anonymity in Pervasive Computing Environments  

Microsoft Academic Search

The large scale adoption of adaptive services in perva- sive and mobile computing is likely to be conditioned to the availability of reliable privacy-preserving technologies. Unfortunately, the research in this eld can still be consid- ered in its infancy. This paper considers a specic perva- sive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of

Linda Pareschi; Daniele Riboni; Claudio Bettini

2008-01-01

32

Harmonious Human-Computer Interaction in Pervasive Environment  

Microsoft Academic Search

This paper presents harmonious human-computer interaction research in pervasive environment based on dynamic sharing niche technology and co-evolutionary learning. It begins with a discussion of some important issues related to user-centered human-computer interaction. Then it describes niched co-evolving approach, and based on dynamic sharing niche technology and homophily principle, the group model and classified algorithm is introduced. At last, it

Hong Liu; Wenhao Li; Jianguo Li

2008-01-01

33

Learning Automation Policies for Pervasive Computing Environments  

Microsoft Academic Search

If current trends in cellular phone technology, personal digital assistants, and wireless networking are indicative of the future, we can expect our environments to contain an abundance of networked computational devices and re- sources. We envision these devices acting in an orchestrated manner to meet users' needs, pushing the level of interac- tion away from particular devices and towards interactions

Brian D. Ziebart; Dan Roth; Roy H. Campbell; Anind K. Dey

34

A Pervasive Computing Platform for Wearable Sensors  

Microsoft Academic Search

Wireless wearable sensors are collections of independent devices with computational, sensing and communication capabilities. Research in this area has been growing in the past few years given the wide range of applications that can benefit from such a technology. Wearable technology is ubiquitous to the user. Thus, it has the potential to be significantly disruptive to the user?s daily life.

Ramin Vatanparast

2009-01-01

35

Secure Smart Environments: Security Requirements, Challenges and Experiences in Pervasive Computing  

Microsoft Academic Search

In an ideal pervasive computing environment, a large num- ber of connected smart devices are deployed to collaboratively provision seamless services to users. Pervasive computing is enabled by various advanced technologies, particularly wire- less technologies and the Internet. It has become a trend for our future lives. A pervasive computing environment can be extremely heterogeneous. We can imagine how many

Jun Wang; Yaling Yang; William Yurcik

36

An Adaptive Sensor Mining Framework for Pervasive Computing Applications  

NASA Astrophysics Data System (ADS)

Analyzing sensor data in pervasive computing applications brings unique challenges to the KDD community. The challenge is heightened when the underlying data source is dynamic and the patterns change. We introduce a new adaptive mining framework that detects patterns in sensor data, and more importantly, adapts to the changes in the underlying model. In our framework, the frequent and periodic patterns of data are first discovered by the Frequent and Periodic Pattern Miner (FPPM) algorithm; and then any changes in the discovered patterns over the lifetime of the system are discovered by the Pattern Adaptation Miner (PAM) algorithm, in order to adapt to the changing environment. This framework also captures vital context information present in pervasive computing applications, such as the startup triggers and temporal information. In this paper, we present a description of our mining framework and validate the approach using data collected in the CASAS smart home testbed.

Rashidi, Parisa; Cook, Diane J.

37

Activity Policy-Based Service Discovery for Pervasive Computing  

Microsoft Academic Search

\\u000a Service discovery is an essential technique to provide applications with appropriate resources. However, user mobility and\\u000a heterogeneous environments make the discovery of appropriate resources difficult. The execution environments will be rapidly\\u000a changed, so developers cannot predict available resources exactly in design time. Thus, service discovery frameworks for pervasive\\u000a computing must guarantee transparent development environments to application developers. In this paper,

Woohyun Kim; Saehoon Kang; Younghee Lee; Dongman Lee; In-young Ko

2006-01-01

38

Exploiting information relationships for access control in pervasive computing  

Microsoft Academic Search

Abstract Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a person’s calendar entry can reveal information,about the person’s location or activity. To avoid rich information from leaking its included information, we must consider the semantics of the rich information when,controlling access to this information.

Urs Hengartner; Peter Steenkiste

2006-01-01

39

IEEE-CS\\/ACM computing curricula: software engineering volume  

Microsoft Academic Search

One of the problems in advancing the state of the software engineering discipline is the inadequate preparation of students entering the profession from undergraduate computing programs. This panel reports on the IEEE-CS\\/ACM Computing Curricula project and the guidance it will provide for developing undergraduate software engineering programs. In particular, the panel will address the development process used to construct the

Ann E. K. Sobel; Tim Lethbridge

2003-01-01

40

A hybrid approach to context modelling in large-scale pervasive computing environments  

Microsoft Academic Search

Pervasive computing aims to unobtrusively embed computer systems into everyday life environments to enrich the user experience without demanding the user's explicit attention. For pervasive computing to be minimally invasive, computer systems must be conscious of and ultimately, be able to act according to the context of the user and her intelligent environment. However, such context is often heterogeneous as

Deirdre Lee; René Meier

2009-01-01

41

Context-Aware Computing: A Guide for the Pervasive Computing Community  

Microsoft Academic Search

There is a high interest on context-aware computing expressed by the pervasive computing community, which considers context as a key to design more adaptive applications. Due to this interest, a huge amount of contributions have been made in the field as we can notice from the increasing amount of publications on context and context-aware computing. However, the user interested in

G. K. Mostefaoui; J. Pasquier-Rocha; P. Brezillon

2004-01-01

42

Towards the adaptive integration of multiple context reasoners in pervasive computing environments  

Microsoft Academic Search

The pervasive computing vision consists in realizing ubiquitous technologies to support the execution of people's everyday tasks by proactively providing appropriate information and services in a natural and transparent way based on the current context. Hence, a fundamental ingredient of pervasive computing is a mechanism to recognize the current high level context of users based on lower level context data

Daniele Riboni; Linda Pareschi; Claudio Bettini

2010-01-01

43

Smart Classroom: Bringing Pervasive Computing into Distance Learning  

NASA Astrophysics Data System (ADS)

In recent years, distance learning has increasingly become one of themost important applications on the internet and is being discussed and studied by various universities, institutes and companies. The Web/Internet provides relatively easy ways to publish hyper-linked multimedia content for more audiences. Yet, we find that most of the courseware are simply shifted from textbook to HTML files. However, in ost cases the teacher's live instruction is very important for catching the attention and interest of the students. That's why Real-Time Interactive Virtual Classroom (RTIVC) always plays an indispensable role in distance learning, where teachers nd students located in different places can take part in the class synchronously through certain multimedia communication systems and obtain real-time and mediarich interactions using Pervasive Computing technologies [1]. The Classroom 2000 project [2] at GIT has been devoted to the automated capturing of the classroom experience. Likewise, the Smart Classroom project [3] at our institute is focused on Tele-education. Most currently deployed real-time Tele-education systems are desktop-based, in which the teacher's experience is totally different from teaching in a real classroom.

Shi, Yuanchun; Qin, Weijun; Suo, Yue; Xiao, Xin

44

Pervasive Computing and Autism: Assisting Caregivers of Children with Special Needs  

Microsoft Academic Search

Pervasive computing technologies can support children with autism and their caregivers. Work continues on systems that aid record collection and analysis, decision making, communication, and assessment of children's internal states

Julie A. Kientz; Gillian R. Hayes; Tracy L. Westeyn; Thad Starner

2007-01-01

45

The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing  

Microsoft Academic Search

In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the all-or-nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the all-or-nothing anti-theft policy is to chain devices together in friendly networks so that any device will only work when it can see all of its

Jakob Illeborg Pagter; Michael Østergaard Pedersen

2007-01-01

46

Wireless Adaptive Therapeutic TeleGaming in a Pervasive Computing Environment  

Microsoft Academic Search

\\u000a This chapter introduces a wireless, pervasive computing approach to adaptive therapeutic telegaming considered in the context\\u000a of near set theory. Near set theory provides a formal basis for observation, comparison and classification of perceptual granules.\\u000a A perceptual granule is defined by a collection of objects that are graspable by the senses or by the mind. In the proposed pervasive computing

James F. Peters; Tony Szturm; Maciej Borkowski; Dan Lockery; Sheela Ramanna; Barbara Shay

2009-01-01

47

IEEE Computer Society/Software Engineering Institute Software Process Achievement (SPA) Award 2009.  

National Technical Information Service (NTIS)

Infosys Technologies Limited received the IEEE Computer Society/Software Engineering Institute Software Process Achievement (SPA) Award 2009 for establishing a cost-effective, sustained, and culturally integrated quality and productivity improvement progr...

S. Kumar

2011-01-01

48

DynamicSD: Discover Dynamic and Uncertain Services in Pervasive Computing Environments  

Microsoft Academic Search

Pervasive computing environments consist of thousands of heterogeneous devices and network services. Service discovery protocols provide essential functionalities for users and client devices to discover and access services. Most existing protocols, however, only support discovery via static service attributes. Dynamic information such as service conditions, quality, and reliability is not available to users and clients. To disseminate dynamic service information,

Feng Zhu; Ajinkya Kulkarni

2011-01-01

49

Designing Pervasive Computing for Hospitals: Learning from the Media Affordances of Paper-Based Medication Charts  

Microsoft Academic Search

The current article investigates the affordances associated with paper out of the motivation that this can help inform design of pervasive and ubiquitous computing solutions for clinical use. In particular, we focus on paper-based medication charts, and discuss how these artifacts differ from various digital and context-aware solutions both in terms of media properties and functionalities. Based on a comparison

Yngve Dahl; Dag Svanaes; Oystein Nytro

2006-01-01

50

AN ARCHITECTURE FOR PRESENTING AUDITORY AWARENESS INFORMATION IN PERVASIVE COMPUTING ENVIRONMENTS  

Microsoft Academic Search

In this paper we present how awareness can be supported in pervasive computing environments through auditory information. We introduce an application which uses soundscapes to support people' s awareness of each other' s presence in an office environment. We describe several techniques for construction and control of such soundscapes. Finally, we present an architecture for designing and controlling soundscapes. The

Anssi Kainulainen; Markku Turunen; Jaakko Hakulinen

51

Heuristics-Based Strategies for Resolving Context Inconsistencies in Pervasive Computing Applications  

Microsoft Academic Search

Context$awareness allows pervasive applications to adapt to changeable computing environments. Con$ texts, the pieces of information that capture the cha$ racteristics of environments, are often error$prone and inconsistent due to noises. Various strategies have been proposed to enable automatic context inconsis$ tency resolution. They are formulated on different as$ sumptions that may not hold in practice. This causes applications to

Chang Xu; Shing-chi Cheung; Wing Kwon Chan; Chunyang Ye

2008-01-01

52

Workshop Summary - ICSE Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments (SEPCASE)  

Microsoft Academic Search

This workshop aims to provide a forum for researchers to discuss the state of the art of software engineering practices and research challenges in designing and building pervasive computing systems and applications. Such systems are intended to support seamless mobility of users across different physical spaces by providing context-aware adaptation of their applications in regard to functionality, transparent resource discovery

Anand Tripathi; Roy H. Campbell; Liviu Iftode; Paolo Bellavista

2007-01-01

53

FINDING EMO: AN EDITABLE MODEL OBJECT SIMULATION FRAMEWORK FOR THE DEPLOYMENT AND EVALUATION OF PERVASIVE COMPUTING APPLICATIONS  

Microsoft Academic Search

Large-scale pervasive computing environments are dynamically created from interconnecting devices and services, often during run- time. Pervasive computing applications within this environment require a context comprising environmental factors that should also be present during the development cycle. Frameworks and protocols to support dynamic scenarios are being developed which address low-level issues such as communication, handshaking and quality of service. Physically

Phil Watten; Paul Newbury; Mohammad Hamdhaidari; Nik Martin; Ben Jackson; Paul Lister

2006-01-01

54

Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments  

Microsoft Academic Search

The exchange of user-related sensitive data within a Per- vasive Computing Environment (PCE) raises security and privacy con- cerns. On one hand, service providers require user authentication and authorization prior to the provision of a service, while at the same time users require anonymity, i.e., untraceability and unlinkability for their transactions. In this paper we discuss privacy and security requirements

Emmanouil Magkos; Panayiotis Kotzanikolaou

2010-01-01

55

Split Smart Messages: Middleware for Pervasive Computing on Smart Phones  

Microsoft Academic Search

Smart Phone is a recently emerged technology that sup- ports Java program execution and provides both short- range wireless connectivity (Bluetooth\\/IrDA) and Internet connectivity (GPRS\\/3G). Smart Phones represent the first viable ubiquitous computing devices because they are be- coming an integral part of our daily life. Although these phones are closed systems with limited resources, we be- lieve that a

Nishkam Ravi; Cristian Borcea; Liviu Iftode

56

Bridging context management systems for different types of pervasive computing environments  

Microsoft Academic Search

A context management system is a distributed system that enables applications to obtain context information about (mobile) users and forms a key component of any pervasive computing environment. Context management systems are however very environment-specific (e.g., specific for home environments) and therefore do not interoperate very well. This limits the operation of context-aware applications because they cannot get context information

Cristian Hesselman; Hartmut Benz; Pravin Pawar; Fei Liu; Maarten Wegdam; Martin Wibbels; Tom Broens; Jacco Brok

2008-01-01

57

Creating Innovative Solutions for Future Hotel Rooms with Intelligent Multimedia and Pervasive Computing  

Microsoft Academic Search

\\u000a Pervasive computing and intelligent multimedia technologies are becoming increasingly important to the modern way of living.\\u000a However, many of their potential applications have not been fully realized yet. This chapter explores how innovative applications\\u000a can be developed to meet the needs of the next generation hotels. Futuristic hotel rooms aim to be more than “home-away-from-home,”\\u000a and as a consequence, offer

Nalin K. Sharda

58

Identity-Based Inter-domain Authentication Scheme in Pervasive Computing Environments  

NASA Astrophysics Data System (ADS)

An Identity-based signature scheme is proposed based on additive elliptic curve group. The verification result of the signature is a constant with respect to the signer's identifier. Then an inter-domain authentication scheme is constructed by combining the proposed signature scheme. During the authentication, a user constructs the signature of timestamp as authentication proof, which realizes secure inter-domain authentication and user anonymity. It is showed that the proposed scheme has superiority in both security and efficiency, and is more suitable for pervasive computing.

Huo, Shi-Wei; Luo, Chang-Yuan; Xin, Hong-Zhi

59

Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile Phones  

Microsoft Academic Search

Passive RFID technology and unobtrusive Bluetooth- enabled active tags are means to augment products and everyday objects with information technology invisible to human users. This paper analyzes general interaction pat- terns in such pervasive computing settings where informa- tion about the user's context is derived by a combination of active and passive tags present in the user's environment. The concept

Frank Siegemund; Christian Flöer

2003-01-01

60

Software Aspects of IEEE Floating-Point Computations for Numerical Applications in High Energy Physics  

ScienceCinema

Floating-point computations are at the heart of much of the computing done in high energy physics. The correctness, speed and accuracy of these computations are of paramount importance. The lack of any of these characteristics can mean the difference between new, exciting physics and an embarrassing correction. This talk will examine practical aspects of IEEE 754-2008 floating-point arithmetic as encountered in HEP applications. After describing the basic features of IEEE floating-point arithmetic, the presentation will cover: common hardware implementations (SSE, x87) techniques for improving the accuracy of summation, multiplication and data interchange compiler options for gcc and icc affecting floating-point operations hazards to be avoided About the speaker Jeffrey M Arnold is a Senior Software Engineer in the Intel Compiler and Languages group at Intel Corporation. He has been part of the Digital->Compaq->Intel compiler organization for nearly 20 years; part of that time, he worked on both low- and high-level math libraries. Prior to that, he was in the VMS Engineering organization at Digital Equipment Corporation. In the late 1980s, Jeff spent 2½ years at CERN as part of the CERN/Digital Joint Project. In 2008, he returned to CERN to spent 10 weeks working with CERN/openlab. Since that time, he has returned to CERN multiple times to teach at openlab workshops and consult with various LHC experiments. Jeff received his Ph.D. in physics from Case Western Reserve University.

61

Pervasive sensing  

NASA Astrophysics Data System (ADS)

The coordinated exploitation of modern communication, micro- sensor and computer technologies makes it possible to give global reach to our senses. Web-cameras for vision, web- microphones for hearing and web-'noses' for smelling, plus the abilities to sense many factors we cannot ordinarily perceive, are either available or will be soon. Applications include (1) determination of weather and environmental conditions on dense grids or over large areas, (2) monitoring of energy usage in buildings, (3) sensing the condition of hardware in electrical power distribution and information systems, (4) improving process control and other manufacturing, (5) development of intelligent terrestrial, marine, aeronautical and space transportation systems, (6) managing the continuum of routine security monitoring, diverse crises and military actions, and (7) medicine, notably the monitoring of the physiology and living conditions of individuals. Some of the emerging capabilities, such as the ability to measure remotely the conditions inside of people in real time, raise interesting social concerns centered on privacy issues. Methods for sensor data fusion and designs for human-computer interfaces are both crucial for the full realization of the potential of pervasive sensing. Computer-generated virtual reality, augmented with real-time sensor data, should be an effective means for presenting information from distributed sensors.

Nagel, David J.

2000-11-01

62

Pervasive and Trustworthy Healthcare  

Microsoft Academic Search

Healthcare is an information intensive industry. Pervasive computing, as the third wave of computing technology and when applied to healthcare systems, could potentially revolutionize next generation medical applications and significantly improve the quality of healthcare services. Healthcare information is very sensitive and security, privacy, and trust have been critical issues in health care and medical information systems. Due to the

Kai Wang; Yan Sui; Xukai Zou; Arjan Durresi; Shiaofen Fang

2008-01-01

63

Pervasive Healthcare  

Microsoft Academic Search

The US healthcare industry is confronting a number of challenges, including skyrocketing costs, a growing incidence of medical errors, inadequate staffing, and lack of coverage in rural and underserved urban areas. Healthcare workers are under increasing pressure to provide better services to more people using limited financial and human resources. One proposed solution to the current crisis is pervasive healthcare.

Upkar Varshney

2003-01-01

64

Towards an Indoor Location System Using RF Signal Strength in IEEE 802.11 Networks  

Microsoft Academic Search

Location is one of the most important contexts used in pervasive computing environments. GPS systems are intensely used to detect the location information; they mainly work in outdoor environment. Applications call for precise, easy-to-build, and easy-to-use indoor location systems. This paper presents our work to implement an indoor location determination system for Microsoft-Windows-based platforms using a preexisting IEEE 802.11 wireless

Adam Harder; Lanlan Song; Yu Wang

2005-01-01

65

The Gator Tech Smart House: A Programmable Pervasive Space  

Microsoft Academic Search

Research groups in both academia and industry have developed prototype systems to demonstrate the benefits of pervasive computing in various application domains. Unfortunately, many first-generation pervasive computing systems lack the ability to evolve as new technologies emerge or as an application domain matures. To address this limitation, the University of Florida's Mobile and Pervasive Computing Laboratory is developing programmable pervasive

Sumi Helal; William C. Mann; Hicham El-zabadani; Jeffrey King; Youssef Kaddoura; Erwin Jansen

2005-01-01

66

Pervasive computing and an aging populace : Methodological challenges for understanding privacy implications  

Microsoft Academic Search

Purpose – The purpose of this paper is to describe some of the methodological challenges of investigating privacy and ubiquitous computing in the home, particularly among the healthy elderly. Design\\/methodology\\/approach – The paper is based on focus groups with 60 senior citizens either living independently or in an assisted living facility. Prototypes of home-based ubiquitous computing devices were created and

Kalpana Shankar

2010-01-01

67

IEEE computer society conference on computer vision and pattern recognition (CVPR 1989)  

SciTech Connect

The authors reports on the current theory and experimentation in computer vision and pattern recognition. Topics covered include: Robust edge detection; Shape understanding from Lambertian photometric flow fields; Adding scale to the primal sketch; Outdoor vehicle navigation using passive 3D vision; Processing of line drawings in a hierarchical environment; and Parallel memory systems for image processing.

Not Available

1989-01-01

68

Studying the Elusive Experience in Pervasive Games  

ERIC Educational Resources Information Center

Studying pervasive games is inherently difficult and different from studying computer or board games. This article builds upon the experiences of staging and studying several playful pervasive technology prototypes. It discusses the challenges and pitfalls of evaluating pervasive game prototypes and charts methods that have proven useful in…

Stenros, Jaakko; Waern, Annika; Montola, Markus

2012-01-01

69

Systems Support for Pervasive Query Processing  

Microsoft Academic Search

Database queries, in particular, event-driven continuous queries, are useful for many pervasive computing applications, such as video surveillance. In order to enable these applications, we have developed a pervasive query processing framework called Aorta. Unlike traditional database systems, a pervasive query processor requires systems support for managing a large number of networked, heterogeneous devices. In this paper, we present the

Wenwei Xue; Qiong Luo; Lionel M. Ni

2005-01-01

70

Studying the Elusive Experience in Pervasive Games  

ERIC Educational Resources Information Center

|Studying pervasive games is inherently difficult and different from studying computer or board games. This article builds upon the experiences of staging and studying several playful pervasive technology prototypes. It discusses the challenges and pitfalls of evaluating pervasive game prototypes and charts methods that have proven useful in…

Stenros, Jaakko; Waern, Annika; Montola, Markus

2012-01-01

71

Ecological Validity and Pervasiveness in the Evaluation of Ubiquitous Computing Technologies for Health Care  

Microsoft Academic Search

The difficulties associated with the evaluation of ubiquitous computing (Ubicomp) technologies increase in application domains such as hospitals, where human life can be at risk, privacy of personal records is paramount, and labor is costly and highly distributed across space and time. For the last 6 years numerous Ubicomp technologies in support of hospital work have been created and pilot-tested.

Jesús Favela; Monica Tentori; Víctor M. González

2010-01-01

72

Guest Editors' Introduction: The Smart Phone--A First Platform for Pervasive Computing  

Microsoft Academic Search

The mobile or smart phone is ushering in the real age of ubiquitous computing, and we shouldn?t undervalue its importance. This issue highlights work that presents specific smart phone applications as well as programming infrastructure for further development and studies of emergent uses.

Gregory D. Abowd; Liviu Iftode; H. Mitchell

2005-01-01

73

rfid in pervasive computing: State-of-the-art and outlook  

Microsoft Academic Search

RFID has already found its way into a variety of large scale applications and arguably it is already one of the most successful technologies in the history of computing. Beyond doubt, RFID is an efiective automatic identiflcation technology for a variety of objects including natural, manufactured and handmade artifacts; humans and other species; locations; and increasingly media content and mobile

George Roussos; Vassilis Kostakos

2009-01-01

74

Towards the realisation of context-risk-aware access control in pervasive computing  

Microsoft Academic Search

This paper proposes a novel Context-Risk-Aware Access Control (CRAAC) model for Ubiquitous Computing (UbiComp) environments. Context-aware access control allows access permissions to be adjusted\\u000a dynamically in adaptation to the changes in the surrounding context. Though current context-aware access control solutions\\u000a can, to a certain extent, achieve such context adaptation, there are still limitations in these solutions. One of the limitations

Ali Ahmed; Ning Zhang

2010-01-01

75

Using Logic Programming to Detect Activities in Pervasive Healthcare  

Microsoft Academic Search

In this experience paper we present a case study in using logic pro- gramming in a pervasive computing project in the healthcare domain. An expert system is used to detect healthcare activities in a pervasive hospital environment where positions of people and things are tracked. Based on detected activities an activity-driven computing infrastructure provides computational assistance to healthcare staff on

Henrik Bærbak Christensen

2002-01-01

76

A Framework for Safe Composition of Heterogeneous SOA Services in a Pervasive Computing Environment with Resource Constraints  

ERIC Educational Resources Information Center

|The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…

Reyes Alamo, Jose M.

2010-01-01

77

48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.  

Code of Federal Regulations, 2010 CFR

... (a) Definitions. As used in this clauseâ Computer monitor means a video display unit used with a computer...means a notebook computer, a desktop computer, or a computer monitor, and any peripheral equipment that is...

2010-10-01

78

48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.  

Code of Federal Regulations, 2010 CFR

... (a) Definitions. As used in this clauseâ Computer monitor means a video display unit used with a computer...means a notebook computer, a desktop computer, or a computer monitor, and any peripheral equipment that is...

2009-10-01

79

Making voice knowledge pervasive  

Microsoft Academic Search

Until recently, voice knowledge has been ignored as a tangible information asset, mostly because of difficulties in collecting and organizing it. Using the most pervasive device available today - the telephone - and advances in speech recognition technology and voice markup languages, we have built a service architecture that transforms the telephone from a simple communication medium to an information

Nikos Anerousis; Euthimios Panagos

2002-01-01

80

SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications  

Microsoft Academic Search

We describe a shared ontology called SOUPA - Stan- dard Ontology for Ubiquitous and Pervasive Applications. SOUPA is designed to model and support pervasive comput- ing applications. This ontology is expressed using the Web Ontology Language OWL and includes modular component vocabularies to represent intelligent agents with associated beliefs, desires, and intentions, time, space, events, user profiles, actions, and policies

Harry Chen; Filip Perich; Timothy W. Finin; Anupam Joshi

2004-01-01

81

MHS: a context-enabled regulated framework for pervasive services  

Microsoft Academic Search

Purpose – Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future. The key to enhance these system environments with services relies on the ability to effectively model and represent contextual information, as well as spontaneity in downloading and executing the service interface on a mobile device. The system needs to provide

Evi Syukur; Seng Wai Loke

2010-01-01

82

Pervasive GamePlay: Theoretical Reflections And Classifications  

Microsoft Academic Search

This article explores the theoretical nature of pervasive games (PG). After an epigrammatic introduction to the novel paradigm of pervasive computing and its influence on the making and understanding of games followed by a classification of what I call the four \\

Bo Kampmann Walther

83

Consistent Music Recommendation in Heterogeneous Pervasive Environment  

Microsoft Academic Search

Seamlessly integrating services in a heterogeneous environment is a hot topic in pervasive computing. Given information explosion, it is wise to provide users services of recommending personalized information, although recommendation quality in a P2P network usually can not be compared with that in a centralized environment. In this paper, we introduce a music collaborative filtering system combining centralized and P2P

Linchun Cao; Minyi Guo

2008-01-01

84

Research on Intelligence Model in Pervasive Environment  

Microsoft Academic Search

It is an important research field of pervasive computing for man-machine interaction in intelligence space. By the analysis of the information interaction feature in intelligence environment and the model function of intelligence space, a dynamic four-level intelligence space model is presented. In the transfer period of data information, MPLS technology is adopted to have an impact on short time delay

Jia Zongpu; Li Gang; Yu Jinxia

2010-01-01

85

Information Agents for Pervasive Sensor Networks  

Microsoft Academic Search

In this paper, we describe an information agent, that re- sides on a mobile computer or personal digital assistant (PDA), that can autonomously acquire sensor readings from pervasive sensor networks (deciding when and which sen- sor to acquire readings from at any time). Moreover, it can perform a range of information processing tasks including modelling the accuracy of the sensor

Alex Rogers; Mike Osborne; Sarvapali D. Ramchurn; Stephen Roberts; Nicholas R. Jennings

2008-01-01

86

Pervasive Developmental Disorders in Girls  

Microsoft Academic Search

Pervasive developmental disorders are a group of conditions sharing as their common features impairment in social reciprocity,\\u000a developmental disturbances affecting communication, and manifestation of restricted and repetitive behaviors. Autism is the\\u000a prototypical pervasive developmental disorder, and others include Asperger's Disorder, Rett's Disorder, Childhood Disintegrative\\u000a Disorder, and Pervasive Developmental Disorder-Not Otherwise Specified (PDD-NOS). Critical to understanding these conditions\\u000a is appreciation of

Kathleen Koenig; Katherine D. Tsatsanis

87

A Conceptual Framework and Principles for Trusted Pervasive Health  

PubMed Central

Background Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new concept—pervasive health—which takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. Objective This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and polices which can make pervasive health trustworthy. Methods In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. Results In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that any stakeholder or system collecting or processing health data must support transparency and shall publish its trust and privacy attributes and even its domain specific policies. Conclusions The developed principles enable trustworthiness and guarantee privacy in pervasive health. The implementation of principles requires new infrastructural services such as trust verification and policy conflict resolution. After implementation, the accuracy and usability of principles should be analyzed.

Blobel, Bernd Gerhard; Seppala, Antto Veikko; Sorvari, Hannu Olavi; Nykanen, Pirkko Anneli

2012-01-01

88

Task Scheduling on Heterogeneous Devices in Parallel Pervasive Systems (P2S)  

Microsoft Academic Search

Parallel Pervasive Systems (P2S) comprise an ad hoc networkof pervasive devices such as cell phones, handheld computers, laptops,sensors and other devices that essentially form a parallel system.Most of the current work in pervasive computing and mobile adhoc networksexploit resources on remote devices to execute compute intensivetasks. In this paper, we present a distributed task scheduling algorithmcalled cluster based scheduling algorithm

Sagar A. Tamhane; Mohan Kumar

2008-01-01

89

Framework for pervasive health monitoring  

Microsoft Academic Search

Recent years have shown impressive growth in the development of pervasive healthcare systems, which are primarily being designed to provide emergency and preventive healthcare to citizens anywhere\\/anytime using wired and wireless mobile technologies. This paper presents an e-healthcare framework with pervasive sensor network for the disabled and elderly people. A home healthcare server collects user health information and sends the

Li Xuemei; Jiang Liangzhong; Li Jincheng

2008-01-01

90

Player Feedback Evaluation: Indicating Mass Public Potential for Pervasive Games  

Microsoft Academic Search

Player feedback data was collected for the pervasive game “Meet Your Heartbeat Twin”, an event-type LBS (Location-Based Service)\\u000a game including affective computing through the player’s live heartbeats. Correlation analysis of the data demonstrates broad\\u000a client profile for pervasive games, covering age, gender and hobbies. The data also shows that Urban Games are clearly a novel\\u000a experience; they are not an

Ivo Flammer; Chen Yan; Wolf Ka; August Flammer; Jean-paul Cheung; Romain Pellerin

2009-01-01

91

IEEE Smart Grid Series of Standards IEEE 2030 (Interoperability) and IEEE 1547 (Interconnection) Status: Preprint  

SciTech Connect

The IEEE American National Standards smart grid publications and standards development projects IEEE 2030, which addresses smart grid interoperability, and IEEE 1547TM, which addresses distributed resources interconnection with the grid, have made substantial progress since 2009. The IEEE 2030TM and 1547 standards series focus on systems-level aspects and cover many of the technical integration issues involved in a mature smart grid. The status and highlights of these two IEEE series of standards, which are sponsored by IEEE Standards Coordinating Committee 21 (SCC21), are provided in this paper.

Basso, T.; DeBlasio, R.

2012-04-01

92

Policy-Based Ambiguity Reduction in Pervasive Context-Aware Systems  

Microsoft Academic Search

Summary There has been an ever-increasing interest in context- aware computing expressed by the pervasive computing community. As researchers attempt to create pervasive systems that are unobtrusively embedded in the environment, completely connected, intuitive, effortlessly portable, and constantly available, often do they run into the problem of ambiguity in the determination of the surrounding context. With the presence of context

Sherif G. Aly

2007-01-01

93

Reconfigurable Fabric: An enabling technology for pervasive medical monitoring1  

Microsoft Academic Search

In the past few years exciting advances in the development of pervasive computing technologies have taken place, in particular the field of flexible electronics is emerging: electronic components such as transistors and wires can be built on a thin flexible material, and polymer wires can be made to be flexible and durable. These technologies offer the opportunity to weave computation,

Fang-Chung Chen; Foad Dabiri; Roozbeh Jafari; Eren Kursun; Vijay Raghunathan; Thomas Schoellhammer

94

Educational activities of the IEEE  

Microsoft Academic Search

A strategic objective of the Educational Activities Board (EAB) of the IEEE is the reshaping of educational programs to help members prepare for careers and employment in a rapidly changing technical arena. The Educational Activities Board works with IEEE Sections to promote an awareness of the available educational resources and in planning educational programs. The IEEE encourages the involvement of

P. F. Wahid

1995-01-01

95

A survey on nature-inspired metaphors for pervasive service ecosystems  

Microsoft Academic Search

Purpose – Emerging pervasive computing scenarios require open service frameworks promoting situated and self-adaptive behaviors, and supporting diversity in services and long-term evolvability. This suggests adopting a nature-inspired approach, where pervasive services are modeled and deployed as autonomous individuals in an ecosystem of other services, data sources, and pervasive devices. However, there are many possibly nature-inspired metaphors that can be

Franco Zambonelli; Mirko Viroli

2011-01-01

96

The Institute of Electrical and Electronics Engineers, Inc. (IEEE)  

NSDL National Science Digital Library

"The IEEE (Eye-triple-E) is a non-profit, technical professional association of more than 365,000 individual members in approximately 150countries. The full name is the "Institute of Electrical and Electronics Engineers, Inc., although the organization is most popularly known and referredto by the letters I-E-E-E.Through its members, the IEEE is a leading authority in technical areas ranging from computer engineering, biomedical technology and telecommunications, to electric power, aerospace engineering and consumer electronics, among others."Description courtesy of http://www.ieee.org/

2005-10-31

97

Urban Space and Pervasive Systems  

Microsoft Academic Search

In this paper we present an early approach for developing a theoretical framework and understanding for designing pervasive systems as an integral part of the urban landscape. The research will be conducted in the city of Bath as part of the CityWare project, in a heritage environment with tourist attractions. Here we propose to investigate the application of research methods

Ava Fatah; Irene Lopez de Vallejo; Alan Penn

98

Pervasive technology to facilitate wellness  

Microsoft Academic Search

In this paper we evaluate the state of the art in systems with the ability to monitor health and wellness. We report on three categories of system: home telehealth monitoring, accelerometer based systems for classifying movement and state, and systems designed to provide feedback for athletes and sports enthusiasts. As these latter two approaches become pervasive, they can find application

Paul J. McCullagh; M. Beattie; Chris D. Nugent

2010-01-01

99

Software Agent-Virtualized Application Mobility in Pervasive Environments  

Microsoft Academic Search

In virtualized computing environments, users' mobility in physical space poses a challenge in the research on the applications' mobility in cyber space. The characteristics of network-intensiveness and resource-intensiveness in pervasive environments provide an opportunity for application mobility. To support it, the paper exploits software Agents to realize the resource virtualization in cyber space. It investigates the application mobility from the

Yu ZHOU; MA Xiao-Xing; CAO Jian-Nong; YU Ping; LÜ Jian

2007-01-01

100

Integrating pervasive middleware with social networks in SAPERE  

Microsoft Academic Search

Any middleware for pervasive computing services has to e ectively support both spatially-situated activities and social models of interactions. In this paper, we present the solution integrated in the tuple-based SAPERE middleware to tackle this problem. The idea is to exploit the graph of a social network along with relations deriving from spatial proximity to rule the actual topology of

Franco Zambonelli; Gabriella Castelli; Marco Mamei; Alberto Rosi

2011-01-01

101

An intelligent architecture for service provisioning in pervasive environments  

Microsoft Academic Search

The vision of pervasive environments is being re- alized more than ever with the proliferation of services and computing resources located in our surrounding environments. Identifying those services that deserve the attention of the user is becoming an increasingly-challenging task. In this paper, we present an adaptive multi-criteria decision making mechanism for recommending relevant services to the mobile user. In

Anis Yazidi; Frank Reichert; Ole-Christoffer Granmo; B. John Oommen; Martin Gerdes

2011-01-01

102

Everything is Animated: Pervasive Media and the Networked Subject  

Microsoft Academic Search

In a world of pervasive media and ubiquitous computing, this article asks what happens as everything (objects, subjects, and actions) moves toward animation across a network. How do media and mediation affect our sense of agency? I argue that the contemporary subject, as described by real-world media practice and animated film, exists within a space of accelerated mediation that distorts

Beth Coleman

2012-01-01

103

Lifelong Learner Modeling for Lifelong Personalized Pervasive Learning  

Microsoft Academic Search

Pervasive and ubiquitous computing has the potential to make huge changes in the ways that we will learn throughout our lives. This paper presents a vision for the lifelong user model as a first class citizen, existing independently of any single application and controlled by the learner. The paper argues that this has a key role for a vision of

Judy Kay

2008-01-01

104

Pervasive play for everyone using the weather  

Microsoft Academic Search

Casual and pervasive games are difficult to merge. It would be interesting to bring the advantages of pervasive play to the mass market to which casual games are designed for. In this article, a merge of pervasive and casual is proposed through the influence of real weather in the games. A framework that integrates a Weather Module, which retrieves and

Sofia Reis; Teresa Romão; Nuno Correia

2010-01-01

105

A Pervasive Augmented Reality Serious Game  

Microsoft Academic Search

This paper presents a pervasive augmented reality serious game that can be used to enhance entertainment using a multimodal tracking interface. The main objective of the research is to design and implement generic pervasive interfaces that are user-friendly and can be used by a wide range of users including people with disabilities. A pervasive AR racing game has been designed

Fotis Liarokapis; Louis Macan; Garry Malone; Genaro Rebolledo-Mendez; Sara de Freitas

2009-01-01

106

Pervasive play, immersion and story: designing interference  

Microsoft Academic Search

Pervasive games are games that are played in the real world - they are not played as a computerized simulation or on a limited physical game arena. The central attraction for pervasive games is that they offer the pleasure of doing things for real. The world is a vast and infinitely changing resource of content for pervasive games. Interference is

John-paul Bichard; Annika Waern

2008-01-01

107

Understanding Pervasive Games through Gameplay Design Patterns  

Microsoft Academic Search

This paper reports on a cluster analysis of pervasive games through a bottom-up approach based upon 120 game examples. The basis for the clustering algorithm relies on the identification of pervasive gameplay design patterns for each game from a set of 75 possible patterns. The resulting hierarchy presents a view of the design space of pervasive games, and details of

Staffan Björk; Johan Peitz

2007-01-01

108

Pervasive developmental disorders and psychosis  

Microsoft Academic Search

Pervasive developmental disorders (PDDs) and infantile schizophrenia were initially thought to be the same condition, but\\u000a distinct differences were described in later research. However, attempts to identify psychosis in individuals with PDDs continue\\u000a to be challenging and controversial. The two disorders share many similar features, including perceptual abnormalities, thought\\u000a disorder, catatonia, and deficiencies in reality testing. Progress has been made

Jean Starling; David Dossetor

2009-01-01

109

Semantic Memory for Pervasive Architecture  

Microsoft Academic Search

\\u000a Pervasive environments become a reality and involve a large variety of networking smart devices. This ambient intelligence\\u000a tends to complex interactions. Lots of researches have been done on intelligent and reactive architectures able to manage\\u000a multiple events and act in the environment. In the Robotics domain, a decision process must be implemented in the robot brain\\u000a or a collective intelligence

Sébastien Dourlens; Amar Ramdane-Cherif

2010-01-01

110

Analysis of Pervasive Mobile Ad Hoc Routing Protocols  

NASA Astrophysics Data System (ADS)

Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

Qadri, Nadia N.; Liotta, Antonio

111

Electronic textiles: a platform for pervasive computing  

Microsoft Academic Search

Abstract: this paper, welook at the synergistic relationship between textiles and computingand identify the need for their "integration" using tools providedby an emerging new field of research that combines the strengthsand capabilities of electronics and textiles into one: electronictextiles, or e-textiles. E-textiles, also called smart fabrics, havenot only "wearable" capabilities like any other garment, butManuscript received March 1, 2003; revised

DIANA MARCULESCU; RADU MARCULESCU; NICHOLAS H. ZAMORA; PRADEEP K. KHOSLA; Jayaraman Jung; L. Weber; K. Cottet; Grzyb; Troster; Nakad

2003-01-01

112

Enabling pervasive computing with smart phones  

Microsoft Academic Search

Mobile telephony's technical and market success in Europe attracted researchers' interest in mobile systems. Some researchers began investigating appropriate architectures for providing information services to cellular mobile telephony users, and the quest for the \\

George Roussos; Andy J. Marsh; Stavroula Maglavera

2005-01-01

113

Risk Governance of Pervasing Computing Technologies  

Microsoft Academic Search

Innovation in fields of risk technologies is not contingent merely on the reactions of those who are directly affected. It is also influenced by the wider public sphere. Taking into consideration the changing value structures in modern western societies, we expect that forces of the public sphere, particularly seen in the reactions of NGOs, the media and the public as

Piet Sellke

114

Towards pervasive instant messaging and presence awareness  

Microsoft Academic Search

This work envisions the benefits of applying the Instant Messaging (IM) paradigm in pervasive computing envi- ronments. With IM in such an environment, all smart entities, human or not, can interact using IM as the unified interface. To realize this vision, the design of a Smart Instant Messaging (SIM) system is proposed, which features context-aware presence management, user-centric resource configuration,

Xiaolei Zhang; Chun-Fai Law; Cho-Li Wang; Francis C. M. Lau

2009-01-01

115

Bidirectional promoters generate pervasive transcription in yeast  

Microsoft Academic Search

Genome-wide pervasive transcription has been reported in many eukaryotic organisms, revealing a highly interleaved transcriptome organization that involves hundreds of previously unknown non-coding RNAs. These recently identified transcripts either exist stably in cells (stable unannotated transcripts, SUTs) or are rapidly degraded by the RNA surveillance pathway (cryptic unstable transcripts, CUTs). One characteristic of pervasive transcription is the extensive overlap of

Zhenyu Xu; Wu Wei; Julien Gagneur; Fabiana Perocchi; Sandra Clauder-Münster; Jurgi Camblong; Elisa Guffanti; Françoise Stutz; Wolfgang Huber; Lars M. Steinmetz

2009-01-01

116

A taxonomy of mobile and pervasive applications  

Microsoft Academic Search

In this paper we present a taxonomy for characterizing pervasive applications. This taxonomy focuses on abstracting application characteristics, independent of the characteristics of the middleware or infrastructure that support the application, and provides a controlled vocabulary for thinking about the application. We provide an informal verification for the taxonomy by using it to categorize a range of pervasive applications, culled

Krista M. Dombroviak; Rajiv Ramnath

2007-01-01

117

The 2007 IEEE CEC simulated car racing competition  

Microsoft Academic Search

This paper describes the simulated car racing competition that was arranged as part of the 2007 IEEE Congress on Evolutionary Computation. Both the game that was used as the domain for the competition, the controllers submitted as entries to the competition and its results are presented. With this paper, we hope to provide some insight into the efficacy of various

Julian Togelius; Simon M. Lucas; Ho Duc Thang; Jonathan M. Garibaldi; Tomoharu Nakashima; Chin Hiong Tan; Itamar Elhanany; Shay Berant; Philip Hingston; Robert M. Maccallum; Thomas Haferlach; Aravind Gowrisankar; Pete Burrow

2008-01-01

118

IEEE 1599: a Multi-layer Approach to Music Description  

Microsoft Academic Search

IEEE 1599 is a new XML-based format to describe heterogeneous music contents comprehensively. In a single file, music symbols, printed scores, audio tracks, computer-driven performances, catalogue metadata, text and graphic contents related to a single music piece are linked and mutually synchronized within the same framework. Heterogeneous contents are organized in a multilayered structure that supports different encoding formats and

Luca A. Ludovico

2009-01-01

119

Proceedings of the 1989 IEEE international conference on robotics and automation  

SciTech Connect

This book contains the proceedings of the 1988 IEEE International Conference on Robotics and Automation. Topics covered include: Computer-Based, Tele- Operation of a New Highwall Mining System and learning control with neutral networks.

Not Available

1989-01-01

120

Coloured Petri Nets in Development of a Pervasive Health Care System  

Microsoft Academic Search

\\u000a Pervasive computing implies new challenges for software developers. In addition to tackling common problems pertaining to IT systems in general,\\u000a new issues like mobility and context-awareness must be dealt with. The contribution of this paper is to demonstrate that Coloured Petri Nets (CPN) have potential as an aid in the development of pervasive systems. On a case study of a

Jens Bæk Jørgensen

2003-01-01

121

Simulating the pervasive fracture of materials and structures using randomly close packed Voronoi tessellations  

Microsoft Academic Search

Under extreme loading conditions most often the extent of material and structural fracture is pervasive in the sense that\\u000a a multitude of cracks are nucleating, propagating in arbitrary directions, coalescing, and branching. Pervasive fracture is\\u000a a highly nonlinear process involving complex material constitutive behavior, material softening, localization, surface generation,\\u000a and ubiquitous contact. A pure Lagrangian computational method based on randomly

Joseph E. Bishop

2009-01-01

122

Adaptive Scheduling of Prioritized Traffic in IEEE 802.16j Wireless Networks  

Microsoft Academic Search

In this paper we propose an adaptive scheduling algorithm for IEEE 802.16j based wireless broadband networks. Computation of an optimal schedule for prioritized traffic in OFDMA based IEEE 802.16 wireless network is an NP-Hard problem. Hence, we propose a scheduling heuristic for an OFDMA based WiMAX relay network. The ORS (OFDMA Relay Sched- uler) heuristic computes the zone boundaries (relay

Debalina Ghosh; Ashima Gupta; Prasant Mohapatra

2009-01-01

123

Mobile phone-based pervasive fall detection  

Microsoft Academic Search

Falls are a major health risk that diminishes the quality of life among the elderly people. The importance of fall detection\\u000a increases as the elderly population surges, especially with aging “baby boomers”. However, existing commercial products and\\u000a academic solutions all fall short of pervasive fall detection. In this paper, we propose utilizing mobile phones as a platform for developing pervasive

Jiangpeng Dai; Xiaole Bai; Zhimin Yang; Zhaohui Shen; Dong Xuan

2010-01-01

124

Tangible Pleasures of Pervasive Role-Playing  

Microsoft Academic Search

The traditional forms of role-playing include tabletop role- playing, larp and online role-playing. In this paper I describe a fourth form, pervasive role-playing, which often follows many conventions of larp, but break out of the magic circle of gameplay in order to interact with surrounding society. The central pleasures of pervasive role-playing are related to playing for real, with the

Markus Montola

2007-01-01

125

Analysis of the IEEE 802.11e EDCA Under Statistical Traffic  

Microsoft Academic Search

Many models have been proposed to analyze the performance of the IEEE 802.11 distributed coordination function (DCF) and the IEEE 802.11e enhanced distributed coordination function (EDCA) under saturation condition. To analyze DCF under statistical traffic, Foh and Zukerman introduce a model that uses Markovian Framework to compute the throughput and delay performance. In this paper, we analyze the protocol service

Juki Wirawan Tantra; Chuan Heng Foh; Ilenia Tinnirello; Giuseppe Bianchi

2006-01-01

126

People First, Computers Second  

Microsoft Academic Search

Although systems designers haven't yet successfully integrated computing into healthcare in the ubiquitous sense, healthcare has the potential to be a well-matched application domain for pervasive computing. The pervasive computing research community should face this opportunity-and the associated challenges-head-on.

Roy Want

2007-01-01

127

IEEE-USA: Today's Engineer  

NSDL National Science Digital Library

IEEE-USA, a unit of the Institute of Electrical and Electronics Engineers, maintains this monthly Webzine to inform industry workers and professionals about issues relevant to their careers. Business trends, ethics, public policy, engineering performance, and management are just a few of the focus areas addressed in Today's Engineer. Reader polls provide insight into thoughts and values of engineers around the country. The Web site also keeps archives of both career and policy feature stories that date back to January 2001.

2005-11-08

128

IEEE in Asia and Pacific: A Brief History of IEEE Region 10  

Microsoft Academic Search

This is a brief history of IEEE in the Asia-Pacific region. It accounts the early establishment of IEEE Sections in the region which led to the formation of the Region 10 in 1967. The paper describes the phenomenal growth of IEEE membership in the region and ever expanding professional activities organized by the Regional Committee and volunteers of the local

Yong Jin Park; Zia Ahmed

2009-01-01

129

PERLA: A Data Language for Pervasive Systems  

Microsoft Academic Search

A language is presented for managing data in highly pervasive systems made of very different devices as to their technology and functional capabilities. Functional and nonfunctional requirements are dealt with in a transparent mode by a SQL like interface. In this paper the most relevant features of the language, the related data structures and some query examples are briefly introduced.

Fabio A. Schreiber; Romolo Camplani; Marco Fortunato; Marco Marelli; Filippo Pacifici

2008-01-01

130

Virtual Video Prototyping of Pervasive Healthcare Systems  

Microsoft Academic Search

Virtual studio technology enables the mixing of physical and digital 3D objects and thus expands the way of representing design ideas in terms of virtual video prototypes, which offers new possibilities for designers by combining elements of prototypes, mock-ups, scenarios, and conventional video. In this article we report our initial experience in the domain of pervasive healthcare with producing virtual

Andreas Lykke-Olesen?; Kim Halskov

131

Virtual video prototyping of pervasive healthcare systems  

Microsoft Academic Search

Virtual studio technology enables the mixing of physical and digital 3D objects and thus expands the way of representing design ideas in terms of virtual video prototypes, which offers new possibilities for designers by combining elements of prototypes, mock-ups, scenarios, and conventional video. In this article we report our initial experience in the domain of pervasive healthcare with producing virtual

Jakob Bardram; Claus Bossen; Andreas Lykke-Olesen; Rune Nielsen; Kim Halskov Madsen

2002-01-01

132

A case study in pervasive retail  

Microsoft Academic Search

In this paper we discuss the rationale for the development of MyGrocer, a second-generation pervasive retail system, as well as its implications for the fast moving consumer goods (FMCG) sector. We will only touch upon the technology infrastructure and the required technical developments since these have been discussed extensively elsewhere. The focus here is on the one hand, on the

George Roussos; Juha Tuominen; Leda Koukara; Olli Seppala; Panos Kourouthanasis; George M. Giaglis; Jeroen Frissaer

2002-01-01

133

Asynchronous gameplay in pervasive multiplayer mobile games  

Microsoft Academic Search

One of the interesting features in pervasive multiplayer games is that gaming can be blended into other daily activities. However, the players' current context creates challenges for this parallel activity and therefore, the game design should enable the players to participate in the game whenever it is suitable for them. In this paper, we present initial results from a study

Hannamari Saarenpää; Hannu Korhonen; Janne Paavilainen

2009-01-01

134

IEEE conference record -- Abstracts  

SciTech Connect

This conference covers the following areas: computational plasma physics; vacuum electronic; basic phenomena in fully ionized plasmas; plasma, electron, and ion sources; environmental/energy issues in plasma science; space plasmas; plasma processing; ball lightning/spherical plasma configurations; plasma processing; fast wave devices; magnetic fusion; basic phenomena in partially ionized plasma; dense plasma focus; plasma diagnostics; basic phenomena in weakly ionized gases; fast opening switches; MHD; fast z-pinches and x-ray lasers; intense ion and electron beams; laser-produced plasmas; microwave plasma interactions; EM and ETH launchers; solid state plasmas and switches; intense beam microwaves; and plasmas for lighting. Separate abstracts were prepared for 416 papers in this conference.

Not Available

1994-01-01

135

A Grid-based Framework for Pervasive Cross-Media Retrieval  

Microsoft Academic Search

Cross-media retrieval is an emerging and interesting research problem, which aims to breakthrough the restriction of modality during retrieval process. One basic challenge for cross-media retrieval is the efficient management and pervasive computing of multimedia content in heterogeneous, dynamic and distributed environment. In this paper, grid technology is introduced for its strongpoint in wide area information sharing and cooperation. Multimedia

Hong Zhang; Yueting Zhuang; Fei Wu

2006-01-01

136

Multi-criteria routing in wireless sensor-based pervasive environments  

Microsoft Academic Search

Wireless sensor networks are expected to be an integral part of any pervasive computing environment. This implies an ever-increasing need for efficient energy and resource management of both the sensor nodes, as well as the overall sensor network, in order to meet the expected quality of data and service requirements. There have been numerous studies that have looked at the

Qinglan Li; Jonathan Beaver; Ahmed Amer; Panos K. Chrysanthis; Alexandros Labrinidis; Ganesh Santhanakrishnan

2005-01-01

137

Body Sensor Network - A Wireless Sensor Platform for Pervasive Healthcare Monitoring  

Microsoft Academic Search

With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In addition to providing continuous monitoring and analysis of physiological parameters, the recently proposed Body Sensor Networks (BSN) incorporate context aware sensing for increased sensitivity and specificity. To facilitate research and development in BSN and multi-sensor data fusion, a BSN

Benny P. L. Lo; Surapa Thiemjarus; Rachel King; Guang-Zhong Yang

138

Utilization of pervasive IT compromised?: understanding the adoption and use of a cross media system  

Microsoft Academic Search

Systems that are extended across multiple media, e.g., a mobile device and a desktop computer, are becoming increasingly popular. One reason for this is their ability to provide pervasive support for human activities across a range of contextual settings. Despite the value that these cross media systems offer, there are aspects that detract from their efficient utilization. This article reports

Katarina Segerståhl

2008-01-01

139

Applying Dynamic Buffer Tuning to Help Pervasive Medical Consultation Succeed  

Microsoft Academic Search

In this paper we propose to apply dynamic buffer tuning to make pervasive medical consultation successful. In pervasive consultation the physician can answer patient requests anytime, anywhere. The physician carries a SFF (small form factor) mobile device such as a mobile phone, which provides the interface to interact with the rest of the distributed Pervasive Digital HealthCare System (PDHD) on

Wilfred W. K. Lin; Jackei H. K. Wong; Allan K. Y. Wong

2008-01-01

140

Bibliography of switchgear literature IEEE committee report  

SciTech Connect

This bibliography was prepared by the IEEE Recognition and Planning Subcommittee of the IEEE Switchgear Committee to be used as a reference for switchgear education. The references generally cover the period of mid-1988 through mid-1992. The last complete switchgear bibliography was published in 1989 covering the period through June 1985. This reference is updated at five year intervals.

Veverka, E.F.; Schmunk, E.W.; McCall, L.V.

1995-04-01

141

IEEE 1725 and battery powered products  

Microsoft Academic Search

IEEE 1725 standard was developed for rechargeable lithium ion and lithium polymer batteries used in cellular devices. The standard establishes criteria for design analysis quality and reliability. The CTIA - the wireless association developed a battery certification program to verify the conformance of cellular devices to IEEE 1725. The CTIA program categorizes the cellular device as a host and its

S. Dalal; J. Swart; B. Pinnangudi

2009-01-01

142

Understanding IEEE 1584 arc flash calculations  

Microsoft Academic Search

This paper presents the IEEE 1584 guide for calculating arc-flash energies and arc flash protection. There are different methods included in this guide for calculating the arc flash associated with circuit breakers. The most accurate method included is to acquire specific device characteristics from the circuit breaker manufacturer. When this information is not available, the IEEE guide also includes a

KEVIN J. LIPPERT; D. M. Colaberardino; C. W. Kimblin

2005-01-01

143

24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2013 CFR

...2013-04-01 false Tests of pervasive poverty, unemployment and general distress...Requirements § 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be...

2013-04-01

144

24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2013 CFR

...2013-04-01 false Tests of pervasive poverty, unemployment and general distress...Requirements § 598.110 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty is...

2013-04-01

145

Pervasive Web Access via Public Communication Walls  

Microsoft Academic Search

Multi-user communication and interaction via public displays together the pervasive and seamless access to the WWW in public areas via mobile phones or handheld devices is enabled via the WebWall system. A software framework for the operation of WebWalls has been developed, strictly separating WebWall access technologies (like HTTP, email, SMS, WAP, EMS, MMS or even simple paging protocols found

Alois Ferscha; Simon Vogl

2002-01-01

146

The Youngest Case of Pervasive Refusal Syndrome?  

Microsoft Academic Search

To date, the youngest previously recorded case of pervasive refusal syndrome (PRS) was eight years old. A four-year-old Australian-born Chinese boy presented to a tertiary paediatric referral centre with a four-week history of food refusal and selective mutism; he was severely dehydrated and marasmic. During admission several behavioural problems were noted including: persistent refusal to eat or drink, obsessions with

Sharon Taylor; David R. Dossetor; Henry Kilham; Elizabeth Bernard

2000-01-01

147

A middleware service for pervasive social networking  

Microsoft Academic Search

Today's online social networking applications (e.g., Face-book, Twitter, Last.Fm) allow users that are socially close to each other (i.e., users with shared interests) to participate in the collective production and sharing of information (i.e., virtual interactions). Pervasive Social Networking (PSN) is a new vision that aims to complement virtual interactions with physical ones, by enabling users who are both socially

Sonia Ben Mokhtar; Liam McNamara; Licia Capra

2009-01-01

148

Pervasive Healthcare and Wireless Health Monitoring  

Microsoft Academic Search

Abstract With an increasingly mobile,society and,the worldwide deployment of mobile and wireless networks, the wireless infrastructure can support many,current and emerging,healthcare applications. This could fulfill the vision of “Pervasive Healthcare” or healthcare to anyone, anytime, and anywhere by removing locational, time and other restraints while increasing both the coverage and the quality. In this paper, we present applications and require-

Upkar Varshney

2007-01-01

149

Performance of the Sleep-Mode Mechanism of the New IEEE 802.16m Proposal for Correlated Downlink Traffic  

NASA Astrophysics Data System (ADS)

There is a considerable interest nowadays in making wireless telecommunication more energy-efficient. The sleep-mode mechanism in WiMAX (IEEE 802.16e) is one of such energy saving measures. Recently, Samsung proposed some modifications on the sleep-mode mechanism, scheduled to appear in the forthcoming IEEE 802.16m standard, aimed at minimizing the signaling overhead. In this work, we present a performance analysis of this proposal and clarify the differences with the standard mechanism included in IEEE 802.16e. We also propose some special algorithms aimed at reducing the computational complexity of the analysis.

de Turck, Koen; de Vuyst, Stijn; Fiems, Dieter; Wittevrongel, Sabine; Bruneel, Herwig

150

CRoSS: A Combined Routing and Surrogate Selection Algorithm for Pervasive Service Offloading in Mobile Ad Hoc Environments  

Microsoft Academic Search

With the advantage of mobile devices and wireless communication technologies, service offloading, as an important branch of pervasive computing, attracts much research. In service offloading, by offloading part of computation in the mobile device to a powerful surrogate, the total service execution time can be reduced and mobile devices' battery lifetime can be greatly prolonged. In this paper, we focus

Shumao Ou; Kun Yang; Liang Hu

2007-01-01

151

School refusal in pervasive developmental disorders.  

PubMed

Of 135 autistic and/or mentally retarded youngsters, 30 with pervasive developmental disorders and 2 with nonautistic mental retardation showed school refusal according to its modified definition. School refusal was significantly more frequent in other PDDs than in nonautistic mental retardation. The intellectual level was significantly higher in PDD children with school refusal than those without it. A certain level of mental development and obsessive tendency appear necessary for PDD children to develop school refusal. In order to treat school refusal in PDD, it is important to make school a pleasant place to go and to encourage the child to attend. PMID:2037546

Kurita, H

1991-03-01

152

Modelling granite migration by mesoscale pervasive flow  

NASA Astrophysics Data System (ADS)

Mesoscale pervasive magma migration leads to granite injection complexes, common in hot crustal terranes. Pervasive migration is limited by magma freezing when intruding cold country rock. Here, we explore numerically the feedback mechanism between magma intrusion and heating of the country rock, which allows younger intrusive batches to reach increasingly shallower/cooler levels. This process relies on the higher solidus temperature of a rock compared to that of its melt, once melt is segregated. We define the 'free-ride layer' as the region above the melt source, where magma may freely migrate because rock temperature is above melt solidus. The top of the free-ride layer, which corresponds to the melt solidus ( TS) isotherm, is at the 'limiting depth', zS. After magma passes through the free-ride layer, the magma 'front' is always at the limiting depth. We modeled the thickening and heating of the crust above the source as melt at its liquidus ( TL) intrudes it pervasively from below. We found that: (a) magma quickly warms crust below zS to about TL, forming a step in temperature at zS; (b) the front ( zS) moves up through the crust as more magma is intruded; (c) as magma is emplaced at the front, a mingled layer of about half magma half crust forms below it, so that the total rise of the front corresponds approximately to half of the thickness of magma added to the free-ride layer; (d) the rate of rise of the front depends on the temperature difference between crust and TL, and slows down as the magma front rises; (e) for most reasonable intrusion rates and volumes, the crust above zS feels little influence of the intrusion, because the diffusion time scale is much smaller than the rise rate of the front. In summary, pervasive migration is an efficient way of heating the lower to middle crust, and can result in an injection complex several kilometers thick, consisting of about half magma and half original crust.

Leitch, A. M.; Weinberg, R. F.

2002-06-01

153

Pharmacotherapy of irritability in pervasive developmental disorders.  

PubMed

Children and adolescents diagnosed with autism and related pervasive developmental disorders (PDDs) often sustain irritability, including aggression, self-injurious behavior, and tantrums. Research to date supports the use of the atypical antipsychotics as a first-line pharmacologic treatment for this target symptom domain in PDDs. Currently, the atypical antipsychotic risperidone is the only medication approved by the US Food and Drug Administration for irritability in youth with autism. Additional large-scale, placebo-controlled studies of other medications are needed to determine their efficacy for the treatment of irritability in this diagnostic group. PMID:18775367

Stigler, Kimberly A; McDougle, Christopher J

2008-10-01

154

Adaptive User Profiles in Pervasive Advertising Environments  

NASA Astrophysics Data System (ADS)

Nowadays modern advertising environments try to provide more efficient ads by targeting costumers based on their interests. Various approaches exist today as to how information about the users' interests can be gathered. Users can deliberately and explicitly provide this information or user's shopping behaviors can be analyzed implicitly. We implemented an advertising platform to simulate an advertising environment and present adaptive profiles, which let users setup profiles based on a self-assessment, and enhance those profiles with information about their real shopping behavior as well as about their activity intensity. Additionally, we explain how pervasive technologies such as Bluetooth can be used to create a profile anonymously and unobtrusively.

Alt, Florian; Balz, Moritz; Kristes, Stefanie; Shirazi, Alireza Sahami; Mennenöh, Julian; Schmidt, Albrecht; Schröder, Hendrik; Goedicke, Michael

155

Dynamic Privacy Management in Pervasive Sensor Networks  

NASA Astrophysics Data System (ADS)

This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a potentially invasive sensor network (with high resolution video, audio, and motion tracking capabilities) featuring different interactive applications that created incentive for accepting this network as an extension of people's daily social space. A user study was then conducted to evaluate several privacy management approaches - an active badge system for both online and on-site control, on/off power switches for physically disabling the hardware, and touch screen input control. Results from a user study indicated that an active badge for on-site privacy control is the most preferable method among all provided options. We present a set of results that yield insight into the privacy/benefit tradeoff from various sensing capabilities in pervasive sensor networks and how privacy settings and user behavior relate in these environments.

Gong, Nan-Wei; Laibowitz, Mathew; Paradiso, Joseph A.

156

IEEE Scalable Coherent Interface: An Approach for a Unified Avionics Network.  

National Technical Information Service (NTIS)

The U.S. Navy Next Generation Computer Resources (NGCR) High Speed Data Transfer Network (HSDTN) program has chosen the IEEE Scalable Coherent Interface (SCI) as one of its baseline standards. This paper proposes to use SCI as a unified avionics network a...

R. Lachenmaier T. Stretch

1994-01-01

157

Bidirectional promoters generate pervasive transcription in yeast.  

PubMed

Genome-wide pervasive transcription has been reported in many eukaryotic organisms, revealing a highly interleaved transcriptome organization that involves hundreds of previously unknown non-coding RNAs. These recently identified transcripts either exist stably in cells (stable unannotated transcripts, SUTs) or are rapidly degraded by the RNA surveillance pathway (cryptic unstable transcripts, CUTs). One characteristic of pervasive transcription is the extensive overlap of SUTs and CUTs with previously annotated features, which prompts questions regarding how these transcripts are generated, and whether they exert function. Single-gene studies have shown that transcription of SUTs and CUTs can be functional, through mechanisms involving the generated RNAs or their generation itself. So far, a complete transcriptome architecture including SUTs and CUTs has not been described in any organism. Knowledge about the position and genome-wide arrangement of these transcripts will be instrumental in understanding their function. Here we provide a comprehensive analysis of these transcripts in the context of multiple conditions, a mutant of the exosome machinery and different strain backgrounds of Saccharomyces cerevisiae. We show that both SUTs and CUTs display distinct patterns of distribution at specific locations. Most of the newly identified transcripts initiate from nucleosome-free regions (NFRs) associated with the promoters of other transcripts (mostly protein-coding genes), or from NFRs at the 3' ends of protein-coding genes. Likewise, about half of all coding transcripts initiate from NFRs associated with promoters of other transcripts. These data change our view of how a genome is transcribed, indicating that bidirectionality is an inherent feature of promoters. Such an arrangement of divergent and overlapping transcripts may provide a mechanism for local spreading of regulatory signals-that is, coupling the transcriptional regulation of neighbouring genes by means of transcriptional interference or histone modification. PMID:19169243

Xu, Zhenyu; Wei, Wu; Gagneur, Julien; Perocchi, Fabiana; Clauder-Münster, Sandra; Camblong, Jurgi; Guffanti, Elisa; Stutz, Françoise; Huber, Wolfgang; Steinmetz, Lars M

2009-01-25

158

Bidirectional promoters generate pervasive transcription in yeast  

PubMed Central

Genome-wide pervasive transcription has been reported in many eukaryotic organisms1-7, revealing a highly interleaved transcriptome organization that involves hundreds of novel non-coding RNAs8. These recently identified transcripts either exist stably in cells (Stable Unannotated Transcripts) or are rapidly degraded by the RNA surveillance pathway (Cryptic Unstable Transcripts). One characteristic of pervasive transcription is the extensive overlap of SUTs and CUTs with previously annotated features, which prompts the questions of how these transcripts are generated, and whether they exert function9. Single-gene studies have shown that transcription of SUTs and CUTs can be functional, through mechanisms involving the generated RNAs10,11 or their generation itself12-14. To date, a complete transcriptome architecture including SUTs and CUTs has not been described in any organism. Knowledge about the position and genome-wide arrangement of these transcripts will be instrumental in understanding their function8,15. We provide here a comprehensive analysis of these transcripts in the context of multiple conditions, a mutant of the exosome machinery and different strain backgrounds. We show that both SUTs and CUTs display distinct patterns of distribution at specific locations. Most of the newly identified transcripts initiate from nucleosome-free regions (NFRs) associated with the promoters of other transcripts (mostly protein-coding genes), or from NFRs at the 3’ ends of protein-coding genes. Likewise, about half of all coding transcripts initiate from NFRs associated with promoters of other transcripts. These data change our view of how a genome is transcribed, suggesting that bidirectionality is an inherent feature of promoters. Such an arrangement of divergent and overlapping transcripts may provide a mechanism for local spreading of regulatory signals – that is, coupling the transcriptional regulation of neighbouring genes via transcriptional interference or histone modification.

Xu, Zhenyu; Wei, Wu; Gagneur, Julien; Perocchi, Fabiana; Clauder-Munster, Sandra; Camblong, Jurgi; Guffanti, Elisa; Stutz, Francoise; Huber, Wolfgang; Steinmetz, Lars M.

2009-01-01

159

Ensuring Semantic Annotation and Retrieval within Pervasive E-Learning Systems  

Microsoft Academic Search

In the age of mobility, many times a certain teacher, a student or a document face difficulties to be integrated in different e-learning systems. Focusing on the computer science field, we present a service-oriented solution for annotating and retrieving the documents and persons involved in this domain, enhancing their mobility inside pervasive e-learning systems. The solution is based on the

Mihaela Brut; Dana Al Kukhun; Florence Sedes

2008-01-01

160

Towards a trustworthy privacy in pervasive video surveillance systems  

Microsoft Academic Search

The consideration of security and privacy is a linchpin of the social acceptance of pervasive technology. This paper paves the way to the development of trustworthy pervasive video surveillance systems, by emphasizing the need to properly combine different aspects that current systems do not manage. In particular, in this paper we propose the combination of the following issues into a

Antoni Martinez-Balleste; Hatem A. Rashwan; Domenec Puig; Antonia Paniza Fullana

2012-01-01

161

Minimizing the Pervasiveness of Women's Personal Experiences of Gender Discrimination  

ERIC Educational Resources Information Center

|Given the Rejection-Identification Model (Branscombe, Schmitt, & Harvey, 1999), which shows that perceiving discrimination to be pervasive is a negative experience, it was suggested that there would be conditions under which women would instead minimize the pervasiveness of discrimination. Study 1 (N= 91) showed that when women envisioned…

Foster, Mindi D.; Jackson, Lydia C.; Hartmann, Ryan; Woulfe, Shannon

2004-01-01

162

The design of flexible Pervasive Electronic Health Record (PEHR)  

Microsoft Academic Search

Pervasive Electronic Health Record provides private medical history record for an individual within a healthcare system. By using pervasive storage devices, patient's EHR can be accessed electronically by authorize healthcare providers and healthcare professionals in the right place at the right time. The storage device includes item such as PDA, mobile phone, smart card, laptop and USB flash memory which

Mohd Khanapi Abd Ghani; Lee Chew Wen

2011-01-01

163

An integrated multi-sensing framework for pervasive healthcare monitoring  

Microsoft Academic Search

Pervasive healthcare provides an effective solution for monitoring the wellbeing of elderly, quantifying post-operative patient recovery and monitoring the progression of neurodegenerative diseases such as Parkinson's. However, developing functional pervasive systems is a complex task that entails the creation of appropriate sensing platforms, integration of versatile technologies for data stream management and development of elaborate data analysis techniques. This paper

M. ElHelw; J. Pansiot; D. McIlwraith; R. Ali; B. Lo; L. Atallah

2009-01-01

164

HeartBeat: an outdoor pervasive game for children  

Microsoft Academic Search

This paper reports the design of a pervasive game for children to demonstrate the design vision of Head-Up games, a genre of pervasive games that puts outdoors play center stage, combining the benefits of traditional outdoor games with the opportunities for richer experiences and innovation offered by new media. The design of the game, called HeartBeat, explores the use of

Remco Magielse; Panos Markopoulos

2009-01-01

165

Atomic actions -- molecular experience: theory of pervasive gaming  

Microsoft Academic Search

In this article we attempt to describe and analyze the formalisms of pervasive games and pervasive gaming (PG). As the title indicates, PG consists of atomic entities that nevertheless merge into a molecular structure that exhibits emergent features during the actual game-play. The article introduces four axes of PG (mobility, distribution, persistence, and transmediality). Further, it describes and analyses three

Bo Kampmann Walther

2005-01-01

166

MyAds: A system for adaptive pervasive advertisements  

Microsoft Academic Search

In this paper we show how pervasive technologies can be employed on a public- display advertisement scenario to enable behavioral self-adaptation of content. We show this through MyAds, a system capable of exploiting pervasive technologies to autonomously adapt the advertisement process to the trends of interests detected among the audience in a venue. After describing the rationale, the architecture and

Antonio Di Ferdinando; Alberto Rosi; Ricardo Lent; Antonio Manzalini; Franco Zambonelli

2009-01-01

167

7 CFR 25.102 - Pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2013 CFR

...2013-01-01 2013-01-01 false Pervasive poverty, unemployment and general distress...Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be...

2013-01-01

168

Defining the IEEE-854 Floating-Point Standard in PVS.  

National Technical Information Service (NTIS)

A significant portion of the ANSI/IEEE-854 Standard for Radix-Independent Floating-Point Arithmetic is defined in PVS (Prototype Verification System). Since IEEE-854 is a generalization of the ANSI/IEEE-754 Standard for Binary Floating-Point Arithmetic, t...

P. S. Miner

1995-01-01

169

1997 IEEE Aerospace Conference. Proceedings.  

NASA Astrophysics Data System (ADS)

The following topics were dealt with: antennas for wireless communication; space based radar systems; computer vision and image processing; remote sensing; advanced sensors; autonomous systems; parallel computing; governmental space research policy; guidance, navigation and control.

170

Wellness assistant: a virtual wellness assistant using pervasive computing  

Microsoft Academic Search

The number of people over age 65 will almost double by 2030 and as they age, they generally prefer to remain in their home or go to a nursing home. There are a variety of reasons for their decision, such as convenience or a need for security or privacy. So, it is time to break through the physical boundaries of

Sheikh Iqbal Ahamed; Munirul M. Haque; Karl Stamm; Ahmed J. Khan

2007-01-01

171

Simulating the pervasive fracture and fragmentation of materials and structures using randomly close-packed Voronoi tessellations.  

SciTech Connect

Under extreme loading conditions most often the extent of material and structural fracture is pervasive in the sense that a multitude of cracks are nucleating, propagating in arbitrary directions, coalescing, and branching. Pervasive fracture is a highly nonlinear process involving complex material constitutive behavior, material softening, localization, surface generation, and ubiquitous contact. Two primary applications in which pervasive fracture is encountered are (1) weapons effects on structures and (2) geomechanics of highly jointed and faulted reservoirs. A pure Lagrangian computational method based on randomly close-packed Voronoi tessellations is proposed as a rational approach for simulating the pervasive fracture of materials and structures. Each Voronoi cell is formulated as a finite element using the reproducing kernel method. Fracture surfaces are allowed to nucleate only at the intercell faces. The randomly seeded Voronoi cells provide an unbiased network for representing cracks. In this initial study two approaches for allowing the new surfaces to initiate are studied: (1) dynamic mesh connectivity and the instantaneous insertion of a cohesive traction when localization is detected, and (2) a discontinuous Galerkin approach in which the interelement tractions are an integral part of the variational formulation, but only become active once localization is detected. Pervasive fracture problems are extremely sensitive to initial conditions and system parameters. Dynamic problems exhibit a form of transient chaos. The primary numerical challenge for this class of problems is the demonstration of model objectivity and, in particular, the identification and demonstration of a measure of convergence for engineering quantities of interest.

Bishop, Joseph E.

2008-09-01

172

The IEEE Software Engineering Standards Process  

PubMed Central

Software Engineering has emerged as a field in recent years, and those involved increasingly recognize the need for standards. As a result, members of the Institute of Electrical and Electronics Engineers (IEEE) formed a subcommittee to develop these standards. This paper discusses the ongoing standards development, and associated efforts.

Buckley, Fletcher J.

1984-01-01

173

unexceptional.net A Story about a Unique Pervasive Game  

Microsoft Academic Search

This paper describes the pervasive game unexceptional.net. Unexceptional.net is a unique pervasive game that is story-driven where the story evolves through multiple media channels interacting with the player. The game interacts with the user on a cellphone and a PC, and the game provides unique gaming experience by introducing gameplay elements through comics, web hacks, Blogs, a 3D-client, a database

Robert F. Nideffer; Alf Inge Wang

174

“What Are You Viewing?” Exploring the Pervasive Social TV Experience  

Microsoft Academic Search

\\u000a The vision of pervasive TV foresees users engaging with interactive video services across a variety of contexts and user interfaces.\\u000a Following this idea, this chapter extends traditional Social TV toward the notion of pervasive Social TV (PSTV) by including\\u000a mobile viewing scenarios. We discuss social interaction enablers that integrate TV content consumption and communication in\\u000a the context of two case

Raimund Schatz; Lynne Baillie; Peter Fröhlich; Sebastian Egger; Thomas Grechenig

175

Ethical Responsibility Key to Computer Security.  

ERIC Educational Resources Information Center

|The pervasiveness of powerful computers and computer networks has raised the specter of new forms of abuse and of concomitant ethical issues. Blurred boundaries, hackers, the Computer Worm, ethical issues, and implications for academic institutions are discussed. (MLW)|

Lynn, M. Stuart

1989-01-01

176

Ubiquitous computing in sports: A review and analysis  

Microsoft Academic Search

Ubiquitous (pervasive) computing is a term for a synergetic use of sensing, communication and computing. Pervasive use of computing has seen a rapid increase in the current decade. This development has propagated in applied sport science and everyday life.The work presents a survey of recent developments in sport and leisure with emphasis on technology and computational techniques. A detailed analysis

Arnold Baca; Peter Dabnichki; Mario Heller; Philipp Kornfeind

2009-01-01

177

1999 IEEE Aerospace Conference. Proceedings.  

NASA Astrophysics Data System (ADS)

The following topics are dealt with: 21st century space missions; aerospace technologies; small satellites; on-board digital processing; high-density interconnect boards manufacture; reconfigurable hardware; aircraft navigation; GPS applications; aircraft flight testing; space-based radar; antennas; opto-electronics; uncooled sensors; computer vision; space interferometry; infrared polarimetry; IR sensors; remote sensing; target tracking; aerospace computing; software engineering; aerospace simulation; aerospace testing; data communication; space multidisciplinary processes; and aerospace education.

178

[Gender dysphoria in pervasive developmental disorders].  

PubMed

Pervasive developmental disorders (PDD) are characterized by two essential symptoms: impairment in social interaction, and restricted, repetitive, and stereotyped patterns of behavior, interests, and activities. PDD include autistic disorder, Asperger's disorder, and PDD-Not Otherwise Specified (PDD-NOS). These three disorders are sometimes termed autism spectrum disorders. A recent epidemiological survey demonstrated that the rate of PDD may be almost 1% and that many PDD cases might not be diagnosed properly in childhood. Erik Erikson described eight stages of psychosocial development through which a normally developing human should pass from infancy to adulthood. In the theory, an adolescent shows 'Identity vs. Role Confusion'. It has been reported that individuals with PDD often have identity crises which sometimes include gender dysphoria. This phenomenon might be related to the so-called identity diffusion in youth. When they reach their young youth, it has been said that subjects with PDD realize their uniqueness and differences compared to others, and, as a result, they may develop confusion of identity which could be exhibited as gender identity disorder. A recent study demonstrated that, amongst 204 children and adolescents who visited a GID clinic in the Netherlands, 7.8% were diagnosed with autism spectrum disorders after a careful diagnostic procedure by a multi-disciplinary team. Taken together, PDD and GID seem closely related to each other. In this paper, we present four PDD cases with gender dysphoria and related symptoms: 1) a girl with PDD who repeatedly asserted gender identity disorder (GID) symptoms in response to social isolation at school, 2) a junior high school boy with PDD and transvestism, 3) a boy diagnosed with Asperger's disorder who developed a disturbance of sexual orientation, and 4) a boy with Asperger's disorder and comorbid childhood GID. Many of the clinical symptoms related to gender dysphoria might be explained by the cognitive characteristics and psychopathology of PDD. The Japanese Society of Psychiatry and Neurology published guidelines for the assessment and treatment of GID in 1997, and revised them in 2006. As a result, GID has become well known as a clinical entity in Japan, and there have been an increasing number of Japanese patients complaining of gender dysphoria. It is important to consider an underlying diagnosis of PDD when encountering patients with gender dysphoria. PMID:22352003

Tateno, Masaru; Ikeda, Hiroshi; Saito, Toshikazu

2011-01-01

179

Review of the IEEE Standard for Computerized Operating Procedure Systems  

SciTech Connect

Increasingly nuclear power plant procedures, such as emergency operating procedures, are being presented in computer form with functionality to support operator use and management of the procedures. The U.S. Nuclear Regulatory Commission (NRC) currently has guidance for the review of computer-based procedures (CBPs); however, there remain CBP functions and human performance issues for which up-to-date guidance is lacking. The Institute of Electrical and Electronics Engineers (IEEE) has initiated a standard development effort to address the human factors engineering (HFE) aspects of CBP systems. When completed, it may provide guidance to supplement the NRC staff's review criteria. The purpose of our study was to evaluate the suitability of the IEEE Standard for use in the NRC's HFE safety reviews of CBP systems and to ensure that the guidance meets the NRC's standard for scientific and engineering rigor used in its own guidance development efforts. We established the following criteria with which to evaluate the Standard: (1) it should meet an existing need of NRC reviewers, (2) it should be based in sound HFE principles, (3) it should be thoroughly peer-reviewed, and (4) it should address CBP-related human performance issues identified in the literature. This report describes the methodology we used to evaluate each criterion. Our evaluation concluded that the Standard generally does meet these criteria, however several areas were identified for which additional clarifications are needed. Thus consideration of the Standard's use by the NRC is supported. The standard evaluation methodology developed in this study can be generally applied to the review of other HFE standards being considered for possible use or endorsement by the NRC.

O'Hara, J.; Higgins, J.

2010-02-26

180

Reformulating Power Components Definitions Contained in the IEEE Standard 1459–2000 Using Discrete Wavelet Transform  

Microsoft Academic Search

In nonsinusoidal situations, power components definitions contained in the IEEE standard 1459-2000 are based on a frequency-domain approach using Fourier transform (FT). The frequency-domain approach can provide amplitude-frequency spectrum while loosing time-related information. Moreover, the FT carries a heavier computational burden. To overcome these limitations, definitions of power components are reformulated in the wavelet domain using the discrete wavelet transform

Walid G. Morsi; M. E. El-Hawary

2007-01-01

181

Perspectives on development of IEEE 1073: the Medical Information Bus (MIB) standard.  

PubMed

Automated data capture from bedside patient medical devices is now possible using a new Institute of Electrical and Electronic Engineering (IEEE) and American National Standards Institute (ANSI) Medical Information Bus (MIB) data communications standard (IEEE 1073). The first two standard documents, IEEE 1073.3.1 (Transportation Profile) and IEEE 1073.4.1 (Physical Layer), define the hardware protocol for bedside device communications. With the above noted IEEE MIB standards in place, hospitals can now start designing customized applications for acquiring data from bedside devices such as bedside monitors, i.v. pumps, ventilators, etc. for multiple purposes. The hardware 'plug and play' features of the MIB will enable nurses and physicians to establish communications with these devices simply and conveniently by plugging them into a bedside data connector. No other action will be necessary to establish identification of the device or communications with the device. Presently to connect bedside devices, technical help from hardware and software experts are required to establish such communications links. As a result of standardization of communications, it will be easy to establish a highly mobile network of bedside devices and more promptly and efficiently collect patient related data. Collection of data automatically should lead to the design of new medical computing applications that will tie in directly with the emerging mission and operations of hospitals. The MIB will permit acquisition of patient data more efficiently with greater accuracy, more completeness and more promptly. The above noted features are all essential to the development of computerized treatment protocols and should lead to improved quality of patient care. This manuscript provides the rational and historical overview of the development of the MIB standard. PMID:9387003

Kennelly, R J; Gardner, R M

1997-08-01

182

An Efficient Resource Allocation Scheme for VoIP Services in the IEEE 802.16e OFDMA System  

NASA Astrophysics Data System (ADS)

In this letter, we propose an efficient resource allocation scheme that improves the system performance by reducing the signaling overhead for voice over Internet protocol (VoIP) services in the IEEE 802.16e OFDMA system. We theoretically analyze the performance of the proposed allocation scheme and carry out a computer simulation to evaluate the FA scheme.

So, Jae-Woo

183

Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e wireless LANs  

Microsoft Academic Search

The IEEE 802.11 distributed coordination function (DCF) enables fast installation with minimal management and maintenance costs, and is a very robust protocol for the best effort service in wireless medium. However, the current DCF is unsuitable for real-time applications. This paper studies backoff-based priority schemes for IEEE 802.11 and the emerging IEEE 802.11e standard by differentiating the minimum backoff window

Yang Xiao

2005-01-01

184

IEEE conference record--Abstracts  

SciTech Connect

The following topics were covered in this meeting: basic plasma phenomena and plasma waves; plasma diagnostics; space plasma diagnostics; magnetic fusion; electron, ion and plasma sources; intense electron and ion beams; intense beam microwaves; fast wave M/W devices; microwave plasma interactions; plasma focus; ultrafast Z-pinches; plasma processing; electrical gas discharges; fast opening switches; magnetohydrodynamics; electromagnetic and electrothermal launchers; x-ray lasers; computational plasma science; solid state plasmas and switches; environmental/energy issues in plasma science; vacuum electronics; plasmas for lighting; gaseous electronics; and ball lightning and other spherical plasmas. Separate abstracts were prepared for 278 papers of this conference.

Not Available

1992-01-01

185

Open Urban Computing Testbed  

Microsoft Academic Search

We present a unique urban computing testbed for studying the utilization of ubiquitous computing technology in the public urban space of a city center. The testbed comprises of a wide range of pervasive computing infrastructure and different middleware resources. We demonstrate the applicability and benefits of the testbed in evaluating technology pilots and prototyping new ubiquitous services in real-world urban

Timo Ojala; Hannu Kukka; Tommi Heikkinen; Tomas Lindén; Marko Jurmu; Fabio Kruger; Szymon Sasin; Simo Hosio; Pauli Närhi

2010-01-01

186

Sine-Fitting Software for IEEE Standard 1057  

SciTech Connect

Software application that performs the calculations related to the sine-fit tests of IEEE Standard 1057/94. Example outputs and explainations of these outputs to determine the important characteristics of the device under test. This application performs the calculations related to sine-fit tests and uses 4-parameter sine fit from IEEE Standard 1057-1994.

Blair, Jerome

1999-05-01

187

IEEE Fellows Survey: Bursting Tech Bubbles Before They Balloon  

Microsoft Academic Search

The Institute for the Future (IFTF) and IEEE Spectrum conducted an online survey between February and March 2006 among more than 700 IEEE Fellows from all over the globe to identify key breakthroughs in their areas of expertise and to forecast probabilities of specific developments. Called The Future of Science and Technology Survey, it identified several forecast domains that included

M. Gorbis; D. Pescovitz

2006-01-01

188

Proceedings: IEEE Workshop on Real-Time Operating Systems and Software (11th) Held in Seattle, Washington on 18-19 May 1994.  

National Technical Information Service (NTIS)

The IEEE Workshop on Real-Time Operating Systems and Software is a forum that covers recent advances in real-time computing -- a field that is becoming an essential part of computer science and engineering. It brings together practitioners and researchers...

1994-01-01

189

Co morbid Psychiatric Disorders in Pervasive Developmental Disorders  

Microsoft Academic Search

Background: From a theoretical point of view, the issue of diagnosing co-morbidity in Pervasive Developmental Disorder (PDD) is controversial, with some researchers favouring the practice and others questioning it. From the clinical point of view, however, it is perhaps a useful practice, as specific strategies can be directed towards alleviation of these disorders once they are identified. Some recent studies

S. R. Girimaji; S. T. Biju; S. Srinath; S. P. Seshadri

190

Extending and Augmenting Scientific Enquiry through Pervasive Learning Environments  

Microsoft Academic Search

We are interested in designing pervasive learning environments to enhance students' ability to practice scientific enquiry. Our focus is on supporting idea generation, hypothesis testing and reasoning more effectively in the field. Traditionally, students have undertaken physical activities like discovering, collecting and recording of environmental\\/ biological processes in the field while higher level processes, such as analyzing, reasoning and predicting,

Yvonne Rogers; Sara Price

2004-01-01

191

Pervasive Learning Games: Explorations of Hybrid Educational Gamescapes  

ERIC Educational Resources Information Center

|Pervasive gaming has tremendous potential as a learning tool and represents an interesting development in the field of video games and education. The literature surrounding video games and education is vast: For more than 20 years, educationalists have been discussing the potential that exists for the application of video games to learning.…

Thomas, Siobhan

2006-01-01

192

Diagnostic Utility of the Pervasive Developmental Disorder Behavior Inventory  

ERIC Educational Resources Information Center

|This study assessed the diagnostic utility of the Pervasive Developmental Disorder Behavior Inventory (PDDBI) in a sample of 84 children aged 3-12 years of age. Forty-two children with ASD were individually matched on age and non-verbal IQ to 42 children with other disabilities and groups were compared on PDDBI subscales and total score. Results…

Reel, Kristy H.; Lecavalier, Luc; Butter, Eric; Mulick, James A.

2012-01-01

193

Affect Comprehension in Children with Pervasive Developmental Disorders.  

ERIC Educational Resources Information Center

|The study of affect comprehension in 15 children with pervasive developmental disorders (ages 7-10) and normal children matched for mental age found that the disabled children were impaired on affect matching compared to the controls and were impaired on face and affect matching relative to their own performance on object matching. (Author/DB)|

Braverman, Mark; And Others

1989-01-01

194

Fragmented Visuospatial Processing in Children with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

|Children diagnosed with Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS) and Asperger Syndrome (AS) may be characterised by a similar perceptual focus on details as children with autistic disorder (AD). This was tested by analysing their performance in a visuoperceptual task [the Children's Embedded Figure Test (CEFT)] and a…

Schlooz, Wim A. J. M.; Hulstijn, Wouter; van den Broek, Pieter J. A.; van der Pijll, Angela C. A. M.; Gabreels, Fons; van der Gaag, Rutger J.; Rotteveel, Jan J.

2006-01-01

195

Categorical versus Spectrum Approaches to Classification in Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

|This article presents compelling evidence, both from the literature and from their study, that attempting to improve the DSM-IV criteria for pervasive developmental disorder-not otherwise specified (PDD-NOS) can be quite frustrating. DSM-IV is a categorical system. While the diagnosis of autism is quite robust, diagnostic agreement for PDD-NOS is…

Tanguay, Peter E.

2004-01-01

196

Pervasive Developmental Disorders in Individuals with Cerebral Palsy  

ERIC Educational Resources Information Center

|The aim of the present study was to describe the prevalence and associated factors of pervasive developmental disorders (PDD), including autistic disorder and PDD not otherwise specified (NOS), in a clinical sample of 126 children and adolescents (75 males, 51 females; age range 4-18y, mean 8y 8mo, SD 3y 8mo) with tetraplegic, hemiplegic,…

Kilincaslan, Ayse; Mukaddes, Nahit Motavalli

2009-01-01

197

Pervasive Technology in Distributed Healthcare: Simultaneous Assessment of Multiple Individuals  

Microsoft Academic Search

The current paradigm of clinic-focused healthcare is challenged by growing numbers of aging baby boomers and the concomitant cost of managing chronic health conditions. We have begun investigating an alternative to clinic-based health assessments, in which pervasive technologies are used to enable continuous monitoring and assessment of patients in a variety of settings outside of hospitals. There are many outstanding

Tamara L. Hayes; Misha Pavel; Andre Adami; Nicole Larimer; Ann Tsay

2006-01-01

198

Privacy-triggered communications in pervasive social networks  

Microsoft Academic Search

Pervasive social networks extend traditional social networking by enabling users to share information in a peer- to-peer fashion using their wireless mobile devices. Contrary to traditional online social networks, privacy protection in such networks depends heavily on users' context (time, location, activity, etc.) and their sensitivity to the shared data and context. Existing privacy-preserving mechanisms do not adapt well to

Murtuza Jadliwala; Julien Freudiger; Imad Aad; Jean-Pierre Hubaux; Valtteri Niemi

2011-01-01

199

Behavioral and Educational Approaches to The Pervasive Developmental Disorders  

Microsoft Academic Search

Our understanding of the pervasive developmental disorders (PDDs) has radically altered in the past 40 years. The initial recognition that these are biologically based conditions (Rimland, 1964), and rejection of the psychoanalytic concept of parental blame as an explanatory mechanism (Bettelheim, 1967), created an intellectual context in which behavioral and educational interventions could take root. Beginning with demonstrations by Ferster

Sandra L. Harris

200

Designing Pervasive Games to Support University Studies in Media Technology  

Microsoft Academic Search

New media technology students at university face many challenges from social to pedagogical when they start academic studies. One of the programs initial goals for these new students is to introduce them to some of the key social Web services that they will need to use for their schoolwork. The use of pervasive games to reach this specific purpose may

Daniel Spikol; Oskar Pettersson; Anders Gerestrand

2009-01-01

201

Injury Treatment among Children with Autism or Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

|This study examined the differences in the frequency and type of injury for children with autism and pervasive developmental disorder (PDD) compared with typically developing peers, when both groups are insured by Medicaid. The relative rate (RR) of emergency/hospital treatment of injury for children with autism or PDD compared to controls was…

McDermott, Suzanne; Zhou, Li; Mann, Joshua

2008-01-01

202

A Context-Driven Programming Model for Pervasive Spaces  

Microsoft Academic Search

This paper defines a new, context-driven programming model for pervasive spaces. Existing models are prone to conf lict, as it is hard to predict the outcome of interleaved actions from different s ervices, or even to detect that a particular device is receiving conflicting instru ctions. Nor is there an easy way to identify unsafe contexts and the emergency r

Hen-i Yang; Jeffrey King; Abdelsalam Helal; Erwin Jansen

2007-01-01

203

Health-Dev: Model Based Development Pervasive Health Monitoring Systems  

Microsoft Academic Search

Implementing requirements verified body worn medical sensors and smart phones, acting as base stations, in Body Sensor Networks (BSNs), is of extreme importance for development of reliable pervasive health monitoring systems (PHMS). Models of BSNs have been used to analyze designs with respect to requirements such as energy consumption, lifetime, and network reliability under dynamic context changes due to user

Ayan Banerjee; Sunit Verma; Priyanka Bagade; Sandeep K. S. Gupta

2012-01-01

204

Ayushman: a secure, usable pervasive health monitoring system  

Microsoft Academic Search

Ayushman is a pervasive health monitoring system which has the ability to collect, process, store and display health data in a secure and easy to use manner. Recent years have seen considerable activity in this field. Most of these systems tend to treat health monitoring as an extension to generic sensor networks. and depend on a network of wearable and

K. Venkatasubramanian; S. K. Gupta

2008-01-01

205

Is Rett syndrome a subtype of pervasive developmental disorders?  

Microsoft Academic Search

The author reviews the issue on whether Rett syndrome (RS) is a subtype of pervasive developmental disorders (PDDs). More than 200 articles of RS have been published in the last 10 years. Internal and external validities of RS have been established by several independent studies. There remains the question whether RS presents clinical features that meet the total criteria for

Luke Y. Tsai

1992-01-01

206

The game mechanics of pervasive applications: visiting the uncanny  

Microsoft Academic Search

“When I use a word”, Humpty Dumpty said, in a rather scornful tone, “it means just what I choose it to mean – neither more nor less.” “The question is”, said Alice, “whether you can make words mean so many different things”. “The question is”, said Humpty Dumpty, “which is to be master – that's all”. [Carroll 2007 (1865)]In pervasive

Annie Gentès; Camille Jutant

2011-01-01

207

The game mechanics of pervasive applications: visiting the uncanny  

Microsoft Academic Search

“When I use a word”, Humpty Dumpty said, in a rather scornful tone, “it means just what I choose it to mean – neither more nor less.” “The question is”, said Alice, “whether you can make words mean so many different things”. “The question is”, said Humpty Dumpty, “which is to be master – that's all”. [Carroll 2007 (1865)]In pervasive

Annie Gentès; Camille Jutant

2012-01-01

208

Interoperability between IEEE 802.11n and IEEE 802.11a\\/g devices: Analytical and simulation results  

Microsoft Academic Search

It is shown analytical and simulation results on the performance of legacy IEEE 802.11a time synchronization algorithms when the synchronization preamble is transmitted by IEEE 802.11n devices with multiple transmitting antennas using cyclic shift diversity. It is concluded that an auto-correlation synchronization scheme allows the legacy compatibility over AWGN and fading channels.

Roger Pierre Fabris Hoefel; Andre Michielin Camara

2011-01-01

209

Active Channel Reservation for Coexistence Mechanism (ACROS) for IEEE 802.15.4 and IEEE 802.11  

NASA Astrophysics Data System (ADS)

In this paper, a coexistence mechanism between IEEE 802.15.4 and IEEE 802.11b, Active Channel Reservation for cOexiStence (ACROS), is proposed. The key idea underlining ACROS is to reserve the channel for IEEE 802.15.4 transmission, where IEEE 802.11 transmissions are forbidden. The request-to-send (RTS)/clear-to send (CTS) mechanism within IEEE 802.11 is used to reserve a channel. The proposed ACROS mechanism is implemented into a PC based prototype. The embedded version of ACROS is also developed to mitigate the timing drift problem in the PC-based ACROS. The efficiency of ACROS is shown using the throughput and packet error rate achieved in actual experiments.

Shin, Soo Young; Woo, Dong Hyuk; Lee, Jong Wook; Park, Hong Seong; Kwon, Wook Hyun

210

Computer engineering curriculum in the new millennium  

Microsoft Academic Search

Currently there is a joint activity (referred to as Computing Curricula 2001, shortened to CC2001) involving the Association for Computing Machinery and the IEEE Computer Society, which is producing curriculum guidance for the broad area of computing. Within this activity, a volume on computer engineering is being developed. This volume addresses the important area of the design and development of

Andrew McGettrick; Mitchell D. Theys; David L. Soldan; Pradip K. Srimani

2003-01-01

211

Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components.  

PubMed

Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers. PMID:19132095

Fragopoulos, Anastasios; Gialelis, John; Serpanos, Dimitrios

2008-12-31

212

Discussion of power definitions contained in the IEEE Dictionary  

SciTech Connect

This tutorial paper discusses the drawbacks of the definitions of various types of powers found in the current IEEE Standard Dictionary of Electrical and Electronics Terms (IEEE Std. 100-88). With the exceptions of instantaneous power and active power, all remaining kinds of powers are nonphysical. The concept of power factor in polyphase circuits is ambiguous. Examples that illustrate the shortcomings of many power definitions are included. The impact of these definitions on current power/energy metering practices are discussed. It is recommended that some definitions be either changed or eliminated from the IEEE Dictionary.

Filipski, P.S. (National Research Council of Canada, Ottawa, Ontario (Canada)); Baghzouz, Y. (Univ. of Nevada, Las Vegas, NV (United States). Electrical and Computer Engineering Dept.); Cox, M.D. (Louisiana Tech Univ., Ruston, LA (United States). Electrical Engineering Dept.)

1994-07-01

213

Middleware for Pervasive Spaces: Balancing Privacy and Utility  

NASA Astrophysics Data System (ADS)

Middleware for pervasive spaces has to meet conflicting requirements. It has to both maximize the utility of the information exposed and ensure that this information does not violate users' privacy. In order to resolve these conflicts, we propose a framework grounded in utility theory where users dynamically control the level of disclosure about their information. We begin by providing appropriate definitions of privacy and utility for the type of applications that would support collaborative work in an office environment—current definitions of privacy and anonymity do not apply in this context. We propose a distributed solution that, given a user's background knowledge, maximizes the utility of the information being disclosed to information recipients while meeting the privacy requirements of users. We implement our solution in the context of a real pervasive space middleware and provide experiments that demonstrate its behaviour.

Massaguer, Daniel; Hore, Bijit; Diallo, Mamadou H.; Mehrotra, Sharad; Venkatasubramanian, Nalini

214

Familial pervasive development disorder, Tourette disorder and hyperlexia.  

PubMed

Four children and one adult have been found to have Pervasive Developmental Disorder, Tourette disorder and hyperlexia in North Dakota, a state with a population of 204,161 children ages 0-18. Assuming that these are independent disorders the probability of these three disorders occurring by chance in one child is 3.39 x 10(-12). Two of these individuals are from the same family. This suggests evidence for genetic linkage among these three disorders. PMID:3226648

Burd, L; Kerbeshian, J

215

Assessing Evidence for a Pervasive Alteration in Tropical Tree Communities  

Microsoft Academic Search

In Amazonian tropical forests, recent studies have reported increases in aboveground biomass and in primary productivity, as well as shifts in plant species composition favouring fast-growing species over slow-growing ones. This pervasive alteration of mature tropical forests was attributed to global environmental change, such as an increase in atmospheric CO2 concentration, nutrient deposition, temperature, drought frequency, and\\/or irradiance. We used

Jérôme Chave; Richard Condit; Helene C Muller-Landau; Sean C Thomas; Peter S Ashton; Sarayudh Bunyavejchewin; Leonardo L Co; Handanakere S Dattaraja; Stuart J Davies; Shameema Esufali; Corneille E. N Ewango; Kenneth J Feeley; Robin B Foster; Nimal Gunatilleke; Savitri Gunatilleke; Pamela Hall; Terese B Hart; Consuelo Hernández; Stephen P Hubbell; Akira Itoh; Somboon Kiratiprayoon; James V LaFrankie; Suzanne Loo de Lao; Jean-Rémy Makana; Abdul Rahman Kassim; Cristián Samper; Raman Sukumar; Hebbalalu S Suresh; Sylvester Tan; Jill Thompson; Ma. Dolores C Tongco; Renato Valencia; Martha Vallejo; Gorky Villa; Takuo Yamakura; Jess K Zimmerman; Elizabeth C Losos

2008-01-01

216

Mortality and Causes of Death in Pervasive Developmental Disorders  

Microsoft Academic Search

In the present study, we rediagnosed and followed a clinical sample of 341 children with related pervasive developmental disorders for an average of 24 years (current mean age of 31 years; range 14-48 years). Twelve patients had died. For the whole group crude mortality was 3.5 percent (95 percent Confidence Interval 1.8-6.1 percent). The standardized mortality ratio was 1.9 (95

Torben Isager; Svend E. Mouridsen; Bente Rich

1999-01-01

217

Injury Treatment among Children with Autism or Pervasive Developmental Disorder  

Microsoft Academic Search

This study examined the differences in the frequency and type of injury for children with autism and pervasive developmental\\u000a disorder (PDD) compared with typically developing peers, when both groups are insured by Medicaid. The relative rate (RR)\\u000a of emergency\\/hospital treatment of injury for children with autism or PDD compared to controls was 1.20 [95% Confidence Interval\\u000a (CI) 1.04–1.39] after controlling

Suzanne McDermott; Li Zhou; Joshua Mann

2008-01-01

218

Zero Common-Knowledge Authentication for Pervasive Networks  

Microsoft Academic Search

Ad-hoc networks and even more intrinsic pervasive networks face huge security lacks. In the most general case entities need to build up a well-defined security association without any pre-established se- cret or common security infrastructure. Under these circumstances it turns out that without unrealistic assumptions authentication of previ- ously unknown parties is not achievable. However, for a wide spectrum of

André Weimerskirch; Dirk Westhoff

2003-01-01

219

Pervasive Informatics and Persistent Actimetric Information in Health Smart Homes  

Microsoft Academic Search

This paper discuss the ability to obtain a reliable pervasive information at home from a network of localizing sensors allowing\\u000a to follow the different locations at which a dependent (elderly or handicapped) person can be detected. The data recorded\\u000a can be treated as the sequence of color coding numbers of balls (symbolizing activity-stations) taken in a Polya’s urn, in\\u000a which

Yannick Fouquet; Nicolas Vuillerme; Jacques Demongeot

2009-01-01

220

A Self-organizing Architecture for Pervasive Ecosystems  

Microsoft Academic Search

\\u000a It is getting increasingly recognized that the models and tools of standard service-oriented architectures are not adequate\\u000a to tackle the decentralized, pervasive, and very dynamic scenarios of modern ICT (Information and Communication Technologies)\\u000a systems, and that innovative and flexible software architectures have to be identified. This paper discusses how these architectures\\u000a could get inspiration from natural systems, so as to

Cynthia Villalba; Marco Mamei; Franco Zambonelli

2009-01-01

221

Life events and depression in children with pervasive developmental disorders  

Microsoft Academic Search

To determine the role of life events in the occurrence of depression in children with pervasive developmental disorders (PDD), we compared 11 patients (DSM-III-R; 9 male; 2 female; Mage: 11.0 years; Mfull-scale IQ: 75.3) with PDD and depression, with an age- and sex- matched control group of patients with PDD without depression (DSM-III-R; 9 male; 2 female; Mage: 9.8 years;

Mohammad Ghaziuddin; Norman Alessi; John F. Greden

1995-01-01

222

A Service-oriented Approach for Pervasive Learning Grid  

Microsoft Academic Search

This work proposes p-Learning grid, a service-oriented approach, based on a per-vasive learning grid, for solving difficulties associated with the sharing of learning re-sources distributed on different e-Learning platforms. The p-Learning grid not only en-ables collaboration and effective reuse of learning objects but also supports learning anytime, anywhere. Since the WSDL of web services remains poorly defined and has poor

Ching-jung Liao; Fan-chuan Yang

2004-01-01

223

IEEE 802.11 ECG monitoring system.  

PubMed

New wireless technologies make possible the implementation of high level integration wireless devices which allow the replacement of traditional large wired monitoring devices. This kind of devices favours at-home hospitalization, reducing the affluence to sanitary assistance centers to make routine controls. This fact causes a really favourable social impact, especially for elder people, rural-zone inhabitant, chronic patients and handicapped people. Furthermore, it offers new functionalities to physicians and will reduce the sanitary cost. Among these functionalities, biomedical signals can be sent to other devices (screen, PDA, PC...) or processing centers, without restricting the patients' mobility. The aim of this project is the development and implementation of a reduced size multi-channel electrocardiograph based on IEEE 802.11, which allows wireless monitoring of patients, and the insertion of the information into the TCP/IP Hospital network. PMID:17281922

Tejero-Calado, Juan; Lopez-Casado, Carmen; Bernal-Martin, Antonio; Lopez-Gomez, Miguel; Romero-Romero, Marco; Quesada, Guillermo; Lorca, Julio; Rivas, Ramon

2005-01-01

224

An implementation of the new IEEE standard routines for FASTBUS  

SciTech Connect

We have implemented a subset of the new 1987 IEEE standard routines for FASTBUS for the General Purpose Master (GPM), a FASTBUS master developed at CERN. Experiences in implementing and using the new standard routines for FASTBUS are reported.

Kolowski, T.; Foreman, W.M.

1987-01-01

225

IEEE 802.16: History, status and future trends  

Microsoft Academic Search

Over the last few years, IEEE 802.16 has been established as one of the most promising solutions for broadband wireless metropolitan area networks. In 2007, the standard was included as one of the radio access technologies for IMT-2000. The forthcoming version of the standard, IEEE 802.16m, is currently under evaluation by ITU as a radio technology for IMT-Advanced. In this

Andrea Bacioccola; Claudio Cicconetti; C. Eklund; Luciano Lenzini; Z. Li; Enzo Mingozzi

2010-01-01

226

Drive-thru Internet: IEEE 802.11b for \\  

Microsoft Academic Search

This paper reports on measurement results for the use of IEEE 802.11 networks in drive-thru scenarios :w e have measured transmission characteristics for sending and receiving high data volumes using UDP and TCP in vehicles moving at different speeds that pass one or more IEEE 802.11 access points at the roadside. We discuss possibilities and limitations for the use of

Jörg Ott; Dirk Kutscher

2004-01-01

227

Summary of IEEE guide for the protection of network transformers  

Microsoft Academic Search

The Summary Paper for the IEEE Guide for the Protection of Network Transformers has been written to publicize the existence of C37.108-198X, an IEEE guide. It describes the equipment used in a typical network transformer system. The performance of this equipment is described during fault and non-fault system conditions. The limitations of the present protection are addressed, most importantly, for

T. E. Wiedman; M. T. Bishop; C. J. Cook; H. Disante; J. T. Emery; S. E. Grier; R. W. Haas; R. E. Hart; J. Kischefsky; P. C. Lyons

1990-01-01

228

An Evaluation of the NSGA-II and MOCell Genetic Algorithms for Self-Management Planning in a Pervasive Service Middleware  

Microsoft Academic Search

Planning (for example choosing most suitable services for self-configuration) is one important task in self-management for pervasive service computing, and can be reduced to the problem of multi-objective services selection with constraints. Genetic algorithms (GAs) are effective in solving such multi-objective optimization problems, and are one of the most successful computational intelligence approaches currently available. GAs are beginning to be

Weishan Zhang; Klaus Marius Hansen

2009-01-01

229

Conference record of the 1995 IEEE Industry Applications Society thirtieth IAS annual meeting. Volume 2  

SciTech Connect

This is volume 2 of the Conference Record of the 1995 IEEE Industry Applications Conference Thirtieth IAS Annual Meeting. The topics of the papers contained in this book include power modules and thermal considerations, IGBTs and MOS structures, components, model validation, power quality, power system protection, corona discharge and charged particles, electrostatic hazards and electrostatic discharge, electrostatic coating and applied electrostatics, computational electrostatics, plasma chemical processing, electrohydrodynamics, electrostatic separation and polymer processing, industrial automatic control applications, industrial adaptive control application, fuzzy logic controls, modeling of industrial processes, industrial neural network applications, and industrial process controls.

NONE

1995-12-31

230

Robust Operations of IEEE 802.11\\/WLAN and 802.15\\/WPAN Wireless Links in Industrial Informatic Networks  

Microsoft Academic Search

Presented in this paper are reliability aspects of short-range wireless (RF) communication links in factory environments supported by IEEE 802.11\\/WLAN and 802.15\\/WPAN. Corresponding factory applications involve establishing robust wireless links between end-entities like computer hosts, robots, sensor-mounted autonomous moving parts (of a machine), roaming workers as well as data-support systems (like servers storing inventory details etc.). Such RF transmissions on

P. S. Neelakanta; W. Preedalumpabut

2006-01-01

231

Reformulating Three-Phase Power Components Definitions Contained in the IEEE Standard 1459–2000 Using Discrete Wavelet Transform  

Microsoft Academic Search

Power components definitions contained in the IEEE Standard 1459-2000 for unbalanced three-phase systems with nonsinusoidal situations are represented in the frequency domain based on Fourier transform (FT). However, FT suffers from the high computational effort especially when the number of phases increases and it is unable to provide information concerning time content because it provides only an amplitude-frequency spectrum. On

Walid G. Morsi; M. E. El-Hawary

2007-01-01

232

IEEE Workshop on Real-Time Operating Systems and Software (11th) Held in Seattle, Washington on May 18 - 19, 1994.  

National Technical Information Service (NTIS)

This workshop, held May 18-19, 1994 at the Holiday Inn Crowne Plaza, Seattle, Washington, was the eleventh in a continuing series of annual workshops on realtime operating systems and software. This workshop, co-sponsored by the IEEE Computer Society Tech...

S. H. Son

1994-01-01

233

IEEE Conference on Software Engineering Education and Training (CSEE&T 2012) Proceedings (25th, Nanjing, Jiangsu, China, April 17-19, 2012)  

ERIC Educational Resources Information Center

|The Conference on Software Engineering Education and Training (CSEE&T) is the premier international peer-reviewed conference, sponsored by the Institute of Electrical and Electronics Engineers, Inc. (IEEE) Computer Society, which addresses all major areas related to software engineering education, training, and professionalism. This year, as in…

IEEE Conference on Software Engineering Education and Training, Proceedings (MS), 2012

2012-01-01

234

Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications  

PubMed Central

We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients.

Misic, Jelena; (Sherman) Shen, Xuemin

2009-01-01

235

Software engineering issues for ubiquitous computing  

Microsoft Academic Search

In the last decade, we have experienced the advent of the paradigm of ubiquitous computing, with the goal of making computational services so pervasive throughout an environment that they become transparent to the human user. Research in ubiquitous computing raises many challenging issues for computer science in gen- eral, but successful research in ubiquitous computing requires the deployment of applications

Gregory D. Abowd

1999-01-01

236

ADHD Symptom Subtypes in Children with Pervasive Developmental Disorder  

Microsoft Academic Search

Objective  Compares DSM-IV ADHD subtypes in large samples of 3-to-5 and 6-to-12 year old children with pervasive developmental disorder (PDD) vs. nonPDD clinic referrals.Method  Parents and teachers completed a DSM-IV-referenced rating scale.Results  ADHD subtypes were clearly differentiated from the nonADHD group and showed a differential pattern of co-occurring psychiatric symptoms (more pronounced for teacher- than parent-defined subtypes and older than younger children) that was

Kenneth D. Gadow; Carla J. DeVincent; John Pomeroy

2006-01-01

237

Correcting pervasive errors in RNA crystallography through enumerative structure prediction.  

PubMed

Three-dimensional RNA models fitted into crystallographic density maps exhibit pervasive conformational ambiguities, geometric errors and steric clashes. To address these problems, we present enumerative real-space refinement assisted by electron density under Rosetta (ERRASER), coupled to Python-based hierarchical environment for integrated 'xtallography' (PHENIX) diffraction-based refinement. On 24 data sets, ERRASER automatically corrects the majority of MolProbity-assessed errors, improves the average R(free) factor, resolves functionally important discrepancies in noncanonical structure and refines low-resolution models to better match higher-resolution models. PMID:23202432

Chou, Fang-Chieh; Sripakdeevong, Parin; Dibrov, Sergey M; Hermann, Thomas; Das, Rhiju

2012-12-02

238

Safer Science: Computer Safety in the Lab  

NSDL National Science Digital Library

Today, it is common to find desktops, laptops, netbooks, and specialized handheld devices in the science lab, and the internet is often used for research and collaboration between learners. The pervasive use of computer technology in high school labs toda

Roy, Ken

2010-11-01

239

77 FR 50726 - Software Requirement Specifications for Digital Computer Software and Complex Electronics Used in...  

Federal Register 2010, 2011, 2012, 2013

...Digital Computer Software and Complex Electronics Used in Safety Systems of Nuclear Power...Digital Computer Software and Complex Electronics used in Safety Systems of Nuclear Power...Institute and Institute of Electrical and Electronics Engineers (ANSI/IEEE) Standard...

2012-08-22

240

The Standards Department and Its Relationships to the IEEE Standards Process  

Microsoft Academic Search

THE PROCESS of developing voluntary electrical standards is one of the outstanding activities of the IEEE Industry Applications Society. The resulting IEEE standards give long-lasting and widespread benefits to Society members, and this is perhaps most evident in the Society's ``Color Book'' series. The Society standards activity also provides a significant service to other members of the IEEE. For instance,

Lloyd A. Morley

1986-01-01

241

Wearable computers: no longer science fiction  

Microsoft Academic Search

By using devices carried on the body, wearable computers allow the exploration of the principles of pervasive computing immediately instead of waiting for the deployment of the ubiquitous infrastructure often associated with the field. However, wearable computers are often misunderstood, both in their research and application. I've been wearing a computer as part of my daily life since 1993, and

T. E. Starner

2002-01-01

242

Markers for improvement in children with pervasive developmental disorders.  

PubMed

In a series of prevalence and follow-up studies on North Dakota's 59 children with pervasive developmental disorders, the patient characteristics of hyperlexia, Tourette disorder (TD), and the absence of seizures were found to be associated with improved outcome or higher IQ. We entered these and 17 other characteristics into a regression model using forward, step-wise inclusion to identify the smallest set of predictor variables which were significantly associated with the dependent variables of IQ, and receptive and expressive language. Of the 20 predictor variables used in the regression analysis, the same four variables met inclusion criteria for each of the dependent variables. These predictor variables were: hyperlexia, a known aetiology, TD and age. The relevance of these findings is discussed. PMID:3199430

Fisher, W; Burd, L; Kerbeshian, J

1988-10-01

243

Pervasive developmental disorders and criminal behaviour: a case control study.  

PubMed

The prevalence and pattern of criminal behaviour in a population of 313 former child psychiatric in-patients with pervasive developmental disorders were studied. The patients were divided into three subgroups and compared with 933 matched controls from the general population. Age at follow-up was between 25 years and 59 years. An account of convictions in the nationwide Danish Register of Criminality was used as a measure of criminal behaviour. Among 113 cases with childhood autism, .9% had been convicted. In atypical autism (n=86) and Asperger's syndrome (n=114) the percentages were 8.1% and 18.4%, respectively. The corresponding rate of convictions in the comparison groups was 18.9%, 14.7%, and 19.6% respectively. Particular attention is given to arson in Asperger's syndrome (p= .0009). PMID:17615427

Mouridsen, Svend Erik; Rich, Bente; Isager, Torben; Nedergaard, Niels Jørgen

2007-07-05

244

The molecular basis of cognitive deficits in pervasive developmental disorders  

PubMed Central

Persons with pervasive developmental disorders (PDD) exhibit a range of cognitive deficits that hamper their quality of life, including difficulties involving communication, sociability, and perspective-taking. In recent years, a variety of studies in mice that model genetic syndromes with a high risk of PDD have provided insights into the underlying molecular mechanisms associated with these disorders. What is less appreciated is how the molecular anomalies affect neuronal and circuit function to give rise to the cognitive deficits associated with PDD. In this review, we describe genetic mutations that cause PDD and discuss how they alter fundamental social and cognitive processes. We then describe efforts to correct cognitive impairments associated with these disorders and identify areas of further inquiry in the search for molecular targets for therapeutics for PDD.

Bhattacharya, Aditi; Klann, Eric

2012-01-01

245

The use of intonation to communicate in pervasive developmental disorders.  

PubMed

The objective of this paper was to employ a functional linguistic approach to explore pragmatic failure in the spontaneous speech of subjects with pervasive developmental disorders (PDD). Patterns of intonation use were compared among subjects with Asperger's syndrome (AS), high-functioning autism (HFA), and psychiatric out-patient controls (OPC) with a variety of non-specific social problems. Written transcripts and audio-recordings were used to measure rates of various intonation types relative to the amount of speech produced. The major finding of the study was that the HFA subjects less often tend to employ useful patterns of intonation for communication than the AS or OPC groups. This suggests that HFA either send random intonation signals to hearers or else demonstrate systematic misuse of the linguistic system. AS subjects differed little from the controls. The implications of these results for understanding the communicative failure of PDD subjects is discussed. PMID:1918227

Fine, J; Bartolucci, G; Ginsberg, G; Szatmari, P

1991-07-01

246

Injury treatment among children with autism or pervasive developmental disorder.  

PubMed

This study examined the differences in the frequency and type of injury for children with autism and pervasive developmental disorder (PDD) compared with typically developing peers, when both groups are insured by Medicaid. The relative rate (RR) of emergency/hospital treatment of injury for children with autism or PDD compared to controls was 1.20 [95% Confidence Interval (CI) 1.04-1.39] after controlling for age and gender. Children with autism or PDD had a higher rate for head, face, and neck injuries (RR 1.47, 95% CI 1.13-1.90) and lower rate for sprains and strains (RR 0.54, 95% CI 0.32-0.91). Treatment for poisoning was 7.6 times as frequent, and self-inflicted injury was also 7.6 times as frequent for children with autism or PDD. PMID:17690968

McDermott, Suzanne; Zhou, Li; Mann, Joshua

2007-08-10

247

Pervasive associations between Cybaeus spiders and the bacterial symbiont Cardinium.  

PubMed

Cardinium is a recently discovered maternally transmitted bacterial endosymbiont in the Bacteroidetes that has thus far been documented in five arthropod orders. While its effects on his hosts are largely unknown, a few strains have been shown to manipulate host reproduction in parasitic wasps and in mites, either by transforming males into females, or by causing mating incompatibilities between infected males and uninfected males. Cardinium has recently been reported to be widespread in spiders, and in this study, we document pervasive infections in Cybaeus spiders, which are some of the most abundant yet understudied spiders in the understory of moist Western North American forests. 12/20 species, as well as 96% of individuals in a local population of Cybaeus signifer were infected. Phylogenetic analysis revealed three closely related symbiont haplotypes within Cybaeus. Haplotypes clustered within geographically close species, suggesting that horizontal transmission might be quite high in this symbiont lineage. PMID:20035767

Perlman, Steve J; Magnus, Samantha A; Copley, Claudia R

2009-12-24

248

PerFallD: A pervasive fall detection system using mobile phones  

Microsoft Academic Search

Falls are a major health risk that diminish the quality of life among elderly people. With the elderly population surging, especially with aging ¿baby boomers¿, fall detection becomes increasingly important. However, existing commercial products and academic solutions struggle to achieve pervasive fall detection. In this paper, we propose utilizing mobile phones as a platform for pervasive fall detection system development.

Jiangpeng Dai; Xiaole Bai; Zhimin Yang; Zhaohui Shen; Dong Xuan

2010-01-01

249

SiMPE: 5th workshop on speech in mobile and pervasive environments  

Microsoft Academic Search

With the proliferation of pervasive devices and the increase in their processing capabilities, client-side speech processing has been emerging as a viable alternative. The SiMPE workshop series started in 2006 [5] with the goal of enabling speech processing on mobile and embedded devices to meet the challenges of pervasive environments (such as noise) and leveraging the context they offer (such

Amit Anil Nanavati; Nitendra Rajput; Alexandar I. Rudnicky; Markku Turunen; Andrew L. Kun; Tim Paek; Ivan Tashev

2010-01-01

250

SiMPE: 6 th Workshop on Speech in Mobile and Pervasive Environments  

Microsoft Academic Search

With the proliferation of pervasive devices and the increase in their processing capabilities, client-side speech processing has been emerging as a viable alternative. The SiMPE workshop series started in 2006 [5] with the goal of enabling speech processing on mobile and embedded devices to meet the challenges of pervasive environments (such as noise) and leveraging the context they offer (such

A. A. Nanavati; N. Rajput; A. I. Rudnicky; M. Turunen; A. I. Kun; T. Paek; I. Tashev

2011-01-01

251

Ambient and wearable sensing for gait classification in pervasive healthcare environments  

Microsoft Academic Search

Pervasive healthcare environments provide an effective solution for monitoring the wellbeing of the elderly where the general trend of an increasingly ageing population has placed significant burdens on current healthcare systems. An important pervasive healthcare system functionality is patient motion analysis where gait information can be used to detect walking behavior abnormalities that may indicate the onset of adverse health

M. ElSayed; A. Alsebai; A. Salaheldin; N. El Gayar; M. ElHelw

2010-01-01

252

Instruction Through The Ages: Building Pervasive Virtual Instructors for Life Long Learning  

Microsoft Academic Search

A pervasive virtual instructor is an artificially intelligent instructor that may appear transparent to the learner or appear in the form of a three-dimensional graphical character, digital toy, or robot with capabilities to inhabit mixed reality environments, and provide personalized instruction anytime, anywhere, and at an-pace. Similarly to pedagogical agents, or traditional virtual instructors, pervasive virtual instructors are expected to

Jayfus T. Doswell

2006-01-01

253

The Youth of Today  

Microsoft Academic Search

EIC Nigel Davies introduces the special issue on connected youth and notes that the way today's youth interact with new technology will determine the future of ubiquitous computing. He also introduces Albrecht Schmidt to IEEE Pervasive Computing's editorial board.

Nigel Davies

2010-01-01

254

Computer tutoring for programming education  

Microsoft Academic Search

Software is increasingly pervasive in the products we use. Consequently, more programmers are needed to develop the software, and consequently there is unmet demand on programming instructors. One possible solution to the increased demand is to complement human teaching with automated computer tutoring. Several examples of such computer tutors for programming already exist, however they have not found widespread success.

Susan M. Eitelman

2006-01-01

255

Usage Management in Cloud Computing  

Microsoft Academic Search

User concerns regarding data handling within the cloud will gain increasing importance as cloud computing becomes more pervasive. Existing service level agreement (SLA) frameworks are not designed for flexibly handling even relatively straightforward usage policies. This paper introduces the notion and importance of usage management in cloud computing. It provides an analysis of features and challenges involved in deploying a

Pramod A. Jamkhedkar; Christopher C. Lamb; Gregory L. Heileman

2011-01-01

256

A New version of the IEEE Flash program  

Microsoft Academic Search

For many years, an IEEE program called Flash was maintained to estimate flashover rates on transmission lines. With recent consolidation of two Working Groups, a new version of Flash has been developed to consistently treat both transmission and distribution lines. The new software includes line arresters, shield wires, tower and pole grounding, and insulation added by wood or fiberglass. It

T. E. McDermott

2010-01-01

257

Performance Simulation of the IEEE Token Bus Protocol Using SIMAN.  

National Technical Information Service (NTIS)

The SIMAN simulation language is used to simulate the performance of the physical and data link layers of a local area network suitable for manufacturing. The protocol standards specified by the IEEE project 802.4 has been chosen for the study. A detailed...

J. R. Pimentel

1985-01-01

258

A TPS Integrated Development Environment implementing IEEE1641 and ATML  

Microsoft Academic Search

With the publication of IEEE1641 and Automatic Test Markup Language (ATML), high level solutions to instrument interchange problem can be accomplished in the near future. This paper introduced a TPS (Test Program Set) Integrated Development Environment (IDE), including a Graphical Signal and Test definition application and an ATML Executive Environment. Experiment shows the TPS IDE can reduce development time and

Qiao Liyan; Zhaoqing Liu; Peng Yu; Peng Xiyuan

2009-01-01

259

A Bibliographic Analysis of IEEE Intelligent Systems Publications  

Microsoft Academic Search

To better understand the authors and studies in IEEE Intelligent Systems, the authors conducted a bibliographic study on its publications. Specifically, they focus on the most productive and highly cited authors and institutions in IS, the authors and institutions most cited in IS, and the journals and institutions that cited IS articles the most.

Zhuo Feng; Qingpeng Zhang; Xin Li; Guanyan Ke; Gang Xiong

2010-01-01

260

IEEE 802.11a Throughput Performance with Hidden Nodes  

Microsoft Academic Search

Analytic performance of IEEE 802.11 distributed coordination function that takes into account hidden node problem and unsaturated traffic condition is presented for symmetric networks. This enables us to estimate the performance of practical wireless local area networks more accurately. It is shown that the presence of hidden nodes barely affects the network performance in low traffic conditions, but it causes

Ozgur Ekici; Abbas Yongacoglu

2008-01-01

261

Report on the second IEEE metadata conference (Metadata '97)  

Microsoft Academic Search

On September 15th and 16th, 1997 the Second IEEE Metadata Conference was held at the National Oceanic and Atmospheric Administration (NOAA) complex in Silver Spring, Maryland. The main objectives of this conference series are to provide a forum to address metadata issues faced by various communities, promote the interchange of ideas on common technologies and standards related to metadata, and

Ron Musick; Christopher Miller

1998-01-01

262

Ida Rhodes and the dreams of a human computer  

Microsoft Academic Search

In the spring of 1952, Ida Rhodes outlined her vision of the digital future in a talk entitled “The human computer's dreams of the future”, which she gave in Los Angeles at a conference sponsored by the Institute of Radio Engineers, a precursor of the IEEE Computer Society. Rhodes described an electronic computer and a computing environment surprisingly similar to

J. E. Tomayko

2000-01-01

263

Model Curicula for Four-Year Computer Science and Engineering Programs: Bridging the Tar Pit  

Microsoft Academic Search

The Model Curricula Subcommittee of the IEEE Computer Society Education Committee was formed some 16 months ago to develop an IEEE Computer Society-sanctioned four-year curriculum in computer science and engineering to be used by colleges and universities beginning instruction in this discipline, and by many institutions with existing programs. To date, the subcommittee has concerned itself with the four-year BS

M. C. Mulder

1975-01-01

264

Rate of first recorded diagnosis of autism and other pervasive developmental disorders in United Kingdom general practice, 1988 to 2001  

Microsoft Academic Search

BACKGROUND: There has been concern that the incidence of autism and other pervasive developmental disorders (PDDs) is increasing. Previous studies have been smaller, restricted to autism (excluding other pervasive developmental disorders such as Asperger's syndrome), included boys only, or have not been based on a national sample. We investigated time trends in the rates of diagnosis of pervasive developmental disorders.

Liam Smeeth; Claire Cook; Eric Fombonne; Lisa Heavey; Laura C Rodrigues; Peter G Smith; Andrew J Hall

2004-01-01

265

Withdrawal Study of Memantine in Pediatric Patients With Autism, Asperger's Disorder, or Pervasive Developmental Disorder Not Otherwise Specified Previously Treated With Memantine  

ClinicalTrials.gov

Autism Spectrum Disorder (ASD); Autism; Autistic Disorder; Asperger's Disorder; Asperger's; Pediatric Autism; Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS); Pervasive Child Development Disorder

2013-09-20

266

GRIDs and Ambient Computing  

Microsoft Academic Search

GRIDs are both a new and an old concept. Many of the components have been the subject of R&D and some exist as commercial\\u000a products. The GRIDs concept represents many different things to different people: metacomputing, distributed computing, advanced\\u000a networking, distributed database, information retrieval, digital libraries, hypermedia, cooperative working, knowledge management,\\u000a advanced user interfaces, mobile and pervasive computing and many

Keith G. Jeffery; Oxfordshire OX

2002-01-01

267

Slovak High School Students' Attitudes toward Computers  

ERIC Educational Resources Information Center

|The pervasive involvement of information and communication technologies and computers in our daily lives influences changes of attitude toward computers. We focused on finding these ecological effects in the differences in computer attitudes as a function of gender and age. A questionnaire with 34 Likert-type items was used in our research. The…

Kubiatko, Milan; Halakova, Zuzana; Nagyova, Sona; Nagy, Tibor

2011-01-01

268

Life events and depression in children with pervasive developmental disorders.  

PubMed

To determine the role of life events in the occurrence of depression in children with pervasive developmental disorders (PDD), we compared 11 patients (DSM-III-R; 9 male; 2 female; M age: 11.0 years; M full-scale IQ: 75.3) with PDD and depression, with an age- and sex-matched control group of patients with PDD without depression (DSM-III-R; 9 male; 2 female; M age: 9.8 years; M full-scale IQ: 60.6). Information was collected about the occurrence of unpleasant life events in the 12 months prior to the onset of depression. Depressed children experienced significantly more life events in the 12 months prior to the onset of depression. Exit events such as bereavement were more common in the depressed group. Findings suggest that, as in the general population, significant life events, particularly those with a negative impact, may contribute to the occurrence of depression in children with PDD. Future studies should explore the role of both biologic factors and environmental stressors in the onset of depression in this population. PMID:8567595

Ghaziuddin, M; Alessi, N; Greden, J F

1995-10-01

269

Pervasive refusal syndrome. Three German cases provide further illustration.  

PubMed

Pervasive refusal syndrome (PRS) has been proposed as a new diagnostic entity among child and adolescent psychiatric disorders. It is characterized by a cluster of life-threatening symptoms including refusal of hood intake, decreased or complete lack of mobilization, and lack of communication as well as retreat from normal life activities. Active refusal to accept help as well as neglect of personal care have been core features of PRS in the limited number of cases reported in the last decade. There have, however; been cases with predominantly passive resistance, indicating the possibility that there may be a continuum from active refusal to passive resistance within PRS. Postulating this continuum allows for the integration of "depressive devitalization" -- a refusal syndrome mainly characterized by passive resistance -- into the concept of PRS. Here, three case vignettes of adolescent patients with PRS are presented. The patients' symptomatology can be allocated on this continuum of PRS. PRS and dissociative disorders are compared in greater detail and contrasted within this discussion of differential diagnoses at the poles of such a continuum. PRS is a useful diagnosis for cases involving symptoms of predominating refusal and retreat which cannot satisfactorily be classified by existing diagnostic categories, and which can mostly clearly be separated from dissociative disorder. PMID:21882157

Jans, Thomas; Ball, Juliane; Preiss, Maike; Haberhausen, Michael; Warnke, Andreas; Renner, Tobias J

2011-09-01

270

A pervasive visual-haptic framework for virtual delivery training.  

PubMed

Thanks to the advances of voltage regulator (VR) technologies and haptic systems, virtual simulators are increasingly becoming a viable alternative to physical simulators in medicine and surgery, though many challenges still remain. In this study, a pervasive visual-haptic framework aimed to the training of obstetricians and midwives to vaginal delivery is described. The haptic feedback is provided by means of two hand-based haptic devices able to reproduce force-feedbacks on fingers and arms, thus enabling a much more realistic manipulation respect to stylus-based solutions. The interactive simulation is not solely driven by an approximated model of complex forces and physical constraints but, instead, is approached by a formal modeling of the whole labor and of the assistance/intervention procedures performed by means of a timed automata network and applied to a parametrical 3-D model of the anatomy, able to mimic a wide range of configurations. This novel methodology is able to represent not only the sequence of the main events associated to either a spontaneous or to an operative childbirth process, but also to help in validating the manual intervention as the actions performed by the user during the simulation are evaluated according to established medical guidelines. A discussion on the first results as well as on the challenges still unaddressed is included. PMID:20659831

Abate, Andrea F; Acampora, Giovanni; Loia, Vincenzo; Ricciardi, Stefano; Vasilakos, Athanasios V

2010-03-01

271

Video summarization and personalization for pervasive mobile devices  

NASA Astrophysics Data System (ADS)

We have designed and implemented a video semantic summarization system, which includes an MPEG-7 compliant annotation interface, a semantic summarization middleware, a real-time MPEG-1/2 video transcoder on PCs, and an application interface on color/black-and-white Palm-OS PDAs. We designed a video annotation tool, VideoAnn, to annotate semantic labels associated with video shots. Videos are first segmentated into shots based on their visual-audio characteristics. They are played back using an interactive interface, which facilitate and fasten the annotation process. Users can annotate the video content with the units of temporal shots or spatial regions. The annotated results are stored in the MPEG-7 XML format. We also designed and implemented a video transmission system, Universal Tuner, for wireless video streaming. This system transcodes MPEG-1/2 videos or live TV broadcasting videos to the BW or indexed color Palm OS devices. In our system, the complexity of multimedia compression and decompression algorithms is adaptively partitioned between the encoder and decoder. In the client end, users can access the summarized video based on their preferences, time, keywords, as well as the transmission bandwidth and the remaining battery power on the pervasive devices.

Tseng, Belle L.; Lin, Ching-Yung; Smith, John R.

2001-12-01

272

Moral judgment in high-functioning pervasive developmental disorders.  

PubMed

Individuals with pervasive developmental disorder (PDD) are characterized by deficits in socialization. To date, moral judgment, which may have a considerable influence on socialization, has not been fully investigated in high-functioning PDD (HFPDD), particularly from a viewpoint of practical adjustment with peers. Human External Action and its internal Reasoning Type (HEART), a standardized test for evaluating moral judgment in school children developed in Japan, was used to compare various aspects of moral judgment between 23 students with HFPDD (6-14 years old) and 23 students with typical development matched for age, intelligence, and socioeconomic status. Students with HFPDD scored significantly lower on Internal Moral Reasoning than control students. As for the level of Internal Moral Reasoning, while both groups reached a conventional (third) level in almost all items, fewer students with HFPDD achieved an autonomous (fourth) level and more students with HFPDD remained at a heteronomous (second) level than did control students. In the HFPDD group there were significant positive correlations between some items of Internal Moral Reasoning and verbal ability-related items of Wechsler Intelligence Scale for Children-III. A comparatively lower score in students with HFPDD may relate to difficulty in socialization. PMID:17610666

Takeda, Toshinobu; Kasai, Kiyoto; Kato, Nobumasa

2007-08-01

273

Global Prevalence of Autism and Other Pervasive Developmental Disorders  

PubMed Central

We provide a systematic review of epidemiological surveys of autistic disorder and pervasive developmental disorders (PDDs) worldwide. A secondary aim was to consider the possible impact of geographic, cultural/ethnic, and socioeconomic factors on prevalence estimates and on clinical presentation of PDD. Based on the evidence reviewed, the median of prevalence estimates of autism spectrum disorders was 62/10 000. While existing estimates are variable, the evidence reviewed does not support differences in PDD prevalence by geographic region nor of a strong impact of ethnic/cultural or socioeconomic factors. However, power to detect such effects is seriously limited in existing data sets, particularly in low-income countries. While it is clear that prevalence estimates have increased over time and these vary in different neighboring and distant regions, these findings most likely represent broadening of the diagnostic concets, diagnostic switching from other developmental disabilities to PDD, service availability, and awareness of autistic spectrum disorders in both the lay and professional public. The lack of evidence from the majority of the world's population suggests a critical need for further research and capacity building in low- and middle-income countries. Autism Res 2012, 5: 160–179. © 2012 International Society for Autism Research, Wiley Periodicals, Inc.

Elsabbagh, Mayada; Divan, Gauri; Koh, Yun-Joo; Kim, Young Shin; Kauchali, Shuaib; Marcin, Carlos; Montiel-Nava, Cecilia; Patel, Vikram; Paula, Cristiane S; Wang, Chongying; Yasamy, Mohammad Taghi; Fombonne, Eric

2012-01-01

274

GPGPU: general purpose computation on graphics hardware  

Microsoft Academic Search

The graphics processor (GPU) on today's commodity video cards has evolved into an extremely powerful and flexible processor. The latest graphics architectures provide tremendous memory bandwidth and computational horsepower, with fully programmable vertex and pixel processing units that support vector operations up to full IEEE floating point precision. High level languages have emerged for graphics hardware, making this computational power

David Luebke; Mark Harris; Jens Krüger; Tim Purcell; Naga Govindaraju; Ian Buck; Cliff Woolley; Aaron Lefohn

2004-01-01

275

Simulation of Real Home Healthcare Sensor Networks Utilizing IEEE802.11g Biomedical Network-on-Chip  

Microsoft Academic Search

This paper presents a wireless biomedical Network-on-Chip (NoC) platform utilizing 54Mbps IEEE802.11g inter-NoC links for healthcare applications in home-care sensor-networks. NoC is a nano-technology microelectronic chip that consists of several processing-cores and sensors that are interconnected to form an ultra-fast on-chip network of distributed computing systems. BioNoC is a biomedical NoC designed to serve medical applications. A BioNoC is a

Iyad Al Khatib; Axel Jantsch; Mohammad Saleh

276

The New Economy, eValue and the Impact on User Acceptance of Pervasive IT  

Microsoft Academic Search

This paper explores the nature of eValue creation, assessment and distribution within communities joined through the Web, and the possible implications on end user acceptance of pervasive information technology (IT). Specifically, we draw on developments of the \\

Elitsa V. Shumarova; Paul A. Swatman

277

Extending Service Area of IEEE 802.11 Ad Hoc Networks  

NASA Astrophysics Data System (ADS)

According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.

Choi, Woo-Yong

2012-06-01

278

Curiosity, interest and engagement in technology-pervasive learning environments: a new research agenda  

Microsoft Academic Search

This paper identifies the need for developing new ways to study curiosity in the context of today’s pervasive technologies\\u000a and unprecedented information access. Curiosity is defined in this paper in a way which incorporates the concomitant constructs\\u000a of interest and engagement. A theoretical model for curiosity, interest and engagement in new media technology-pervasive learning\\u000a environments is advanced, taking into consideration

Marilyn P. ArnoneRuth; Ruth V. Small; Sarah A. Chauncey; H. Patricia McKenna

2011-01-01

279

Augmented Reality in Corporate Pervasive e-Education: Novel ways to support aviation maintenance training  

Microsoft Academic Search

In today's information driven society and economy new media and mobility are winning increasing importance. Developments in distributed, dynamic, ubiquitous (available everywhere) and pervasive (omnipresent) technologies and of mobile devices during the last years facilitated the research of augmented reality (AR) systems (Azuma, 1997, Azuma et al., 2001, Ludwig&Reimann, 2005) and pervasive e-education (Holzinger,Nischelwitzer&Kickmeier-Rust, 2006). AR is supposed to gain

Johannes CHRISTIAN

2006-01-01

280

Pharmacologic Treatment of Behavioral Symptoms Associated With Autism and Other Pervasive Developmental Disorders  

Microsoft Academic Search

Opinion statement  Pervasive developmental disorders (PDDs), including autistic disorder (autism), Asperger’s disorder, and pervasive developmental\\u000a disorder not otherwise specified (PDD NOS), are neurodevelopmental disorders of childhood onset. These disorders persist throughout\\u000a the lifespan of affected individuals and are characterized by impaired social behavior and communication, along with repetitive,\\u000a stereotypic behaviors. Early diagnosis and subsequent behavioral therapy have been shown to improve

Logan K. Wink; Craig A. Erickson; Christopher J. McDougle

2010-01-01

281

Assessing Evidence for a Pervasive Alteration in Tropical Tree Communities  

PubMed Central

In Amazonian tropical forests, recent studies have reported increases in aboveground biomass and in primary productivity, as well as shifts in plant species composition favouring fast-growing species over slow-growing ones. This pervasive alteration of mature tropical forests was attributed to global environmental change, such as an increase in atmospheric CO2 concentration, nutrient deposition, temperature, drought frequency, and/or irradiance. We used standardized, repeated measurements of over 2 million trees in ten large (16–52 ha each) forest plots on three continents to evaluate the generality of these findings across tropical forests. Aboveground biomass increased at seven of our ten plots, significantly so at four plots, and showed a large decrease at a single plot. Carbon accumulation pooled across sites was significant (+0.24 MgC ha?1 y?1, 95% confidence intervals [0.07, 0.39] MgC ha?1 y?1), but lower than reported previously for Amazonia. At three sites for which we had data for multiple census intervals, we found no concerted increase in biomass gain, in conflict with the increased productivity hypothesis. Over all ten plots, the fastest-growing quartile of species gained biomass (+0.33 [0.09, 0.55] % y?1) compared with the tree community as a whole (+0.15 % y?1); however, this significant trend was due to a single plot. Biomass of slow-growing species increased significantly when calculated over all plots (+0.21 [0.02, 0.37] % y?1), and in half of our plots when calculated individually. Our results do not support the hypothesis that fast-growing species are consistently increasing in dominance in tropical tree communities. Instead, they suggest that our plots may be simultaneously recovering from past disturbances and affected by changes in resource availability. More long-term studies are necessary to clarify the contribution of global change to the functioning of tropical forests.

Chave, Jerome; Condit, Richard; Muller-Landau, Helene C; Thomas, Sean C; Ashton, Peter S; Bunyavejchewin, Sarayudh; Co, Leonardo L; Dattaraja, Handanakere S; Davies, Stuart J; Esufali, Shameema; Ewango, Corneille E. N; Feeley, Kenneth J; Foster, Robin B; Gunatilleke, Nimal; Gunatilleke, Savitri; Hall, Pamela; Hart, Terese B; Hernandez, Consuelo; Hubbell, Stephen P; Itoh, Akira; Kiratiprayoon, Somboon; LaFrankie, James V; Loo de Lao, Suzanne; Makana, Jean-Remy; Noor, Md. Nur Supardi; Kassim, Abdul Rahman; Samper, Cristian; Sukumar, Raman; Suresh, Hebbalalu S; Tan, Sylvester; Thompson, Jill; Tongco, Ma. Dolores C; Valencia, Renato; Vallejo, Martha; Villa, Gorky; Yamakura, Takuo; Zimmerman, Jess K; Losos, Elizabeth C

2008-01-01

282

Reproductive toxins: pervasive theme of oxidative stress and electron transfer.  

PubMed

Reproductive toxicity has been a topic of increasing interest and concern in recent years, generating controversy in association with danger to humans and other living things. A veritable host of chemicals is known to be involved, encompassing a wide variety of classes, both organic and inorganic. Exposure is pervasive and virtually unavoidable due to contamination of air, water, ground, food, beverages, drugs, and household items. The corresponding adverse effects on reproduction are numerous. There is uncertainty regarding mode of action although various theories have been advanced, e.g., disruption of the CNS, DNA attack, enzyme inhibition, interference with hormonal action, and insult to membranes and proteins. This review provides extensive evidence for involvement of oxidative stress (OS) and electron transfer (ET) as a unifying theme. Successful application is made to all of the main classes of toxins, in addition to large numbers of miscellaneous types. We believe it is not coincidental that the vast majority of these substances incorporate ET functionalities (quinone, metal complex, ArNO2, or conjugated iminium) either per se or in metabolites, potentially giving rise to reactive oxygen species (ROS) by redox cycling. Some categories, e.g., peroxides and radiation, appear to generate ROS by non-ET routes. For completeness, other theories are also addressed; a multifaceted approach appears to be the most logical. Our framework should increase understanding and contribute to preventative measures, such as use of antioxidants (AOs). The ET-OS theory has recently been used as the central theme by us in reviews of biomechanisms involved with anti-infective drugs, anticancer agents, and carcinogens. PMID:11375756

Kovacic, P; Jacintho, J D

2001-06-01

283

Pervasive Growth Reduction in Norway Spruce Forests following Wind Disturbance  

PubMed Central

Background In recent decades the frequency and severity of natural disturbances by e.g., strong winds and insect outbreaks has increased considerably in many forest ecosystems around the world. Future climate change is expected to further intensify disturbance regimes, which makes addressing disturbances in ecosystem management a top priority. As a prerequisite a broader understanding of disturbance impacts and ecosystem responses is needed. With regard to the effects of strong winds – the most detrimental disturbance agent in Europe – monitoring and management has focused on structural damage, i.e., tree mortality from uprooting and stem breakage. Effects on the functioning of trees surviving the storm (e.g., their productivity and allocation) have been rarely accounted for to date. Methodology/Principal Findings Here we show that growth reduction was significant and pervasive in a 6.79·million hectare forest landscape in southern Sweden following the storm Gudrun (January 2005). Wind-related growth reduction in Norway spruce (Picea abies (L.) Karst.) forests surviving the storm exceeded 10% in the worst hit regions, and was closely related to maximum gust wind speed (R2?=?0.849) and structural wind damage (R2?=?0.782). At the landscape scale, wind-related growth reduction amounted to 3.0 million m3 in the three years following Gudrun. It thus exceeds secondary damage from bark beetles after Gudrun as well as the long-term average storm damage from uprooting and stem breakage in Sweden. Conclusions/Significance We conclude that the impact of strong winds on forest ecosystems is not limited to the immediately visible area of structural damage, and call for a broader consideration of disturbance effects on ecosystem structure and functioning in the context of forest management and climate change mitigation.

Seidl, Rupert; Blennow, Kristina

2012-01-01

284

IEEE Std 929-2000 - Background, implications and requirements  

SciTech Connect

The newly revised standard, IEEE Std 929-2000, has significant positive implications for those designing inverters for utility-interconnected PV systems and for designers and installers of such systems. A working group of roughly 20 people, including PV systems designers/installers, PV inverter manufacturers and utility engineers spent close to 3 years developing a standard that would be useful and beneficial to all.

STEVENS III,JOHN W.

2000-04-11

285

Efficient Polling MAC Scheduler for IEEE 802.11 WLAN  

Microsoft Academic Search

Although the Distributed Coordination Function is the fundamental access protocol of IEEE 802.11, it cannot meet the quality of service (QoS) requirements in general. So, the Point Coordinate Function is provided to support QoS related services. However, it has inherent problems. Access point (AP) has no knowledge of the queue status and instantaneous channel condition of stations in the system.

Jaeyeon Kimn; Youngmin Moon; Taekon Kim; Hyungkeun Lee

2008-01-01

286

An Architecture for IEEE 802.16 MAC Scheduler Design  

Microsoft Academic Search

The scheduling algorithm for IEEE 802.16 broadband wireless access system has been left open in the standard. In this paper, we consider three criteria that we have identified as important criteria for an 802.16 scheduler: Service Type differentiation, dynamic sub-frame partition and Subscriber Station differentiation. We investigate the scheduler design from a general perspective, based on these three criteria.

Tze Wei Tang; David Green; Michael P. Rumsewicz; Nigel Bean

2007-01-01

287

Overcurrent Protection for the IEEE 34Node Radial Test Feeder  

Microsoft Academic Search

The IEEE 34-node radial test feeder is a benchmark circuit for validating results from existing and novel load-flow algorithms. This paper discusses the addition of overcurrent protection (OCP) to the test feeder using off-the-shelf protective devices. The OCP scheme includes a recloser near the substation and fuses at the laterals. These OCP devices represent the conventional types present in most

Hamed B. Funmilayo; James A. Silva; Karen L. Butler-Purry

2012-01-01

288

Remarks on IEEE 802.11 DCF performance analysis  

Microsoft Academic Search

Abstract—This letter presents a new approach to evaluate the throughput\\/delay performance of the 802.11 Distributed Coor- dination Function (DCF). Our approach relies on elementary conditional probability arguments rather than bidimensional Markov chains (as proposed in previous models), and can be easily extended to account for backoff operation more general than DCF’s one. Index Terms—IEEE 802.11, Multiple Access Control, perfor-

Giuseppe Bianchi; Ilenia Tinnirello

2005-01-01

289

An efficient scheduling scheme for high speed IEEE 802.11 WLANs  

Microsoft Academic Search

The emergence of high speed WLANs, such as the IEEE 802.11a and IEEE 802.11g, has provided an alternative solution for mobile users to access a network in addition to the popular IEEE 802.11b solution. Although the channel data rate of those emerging high speed WLANs is five times higher than that of 802.11b, some recent studies have shown that the

Juki Wirawan Tantra; C. H. Fob; Bu Sung Lee

2003-01-01

290

Dynamic Proportional Delay Differentiation Scheduling over IEEE 802.1 Wireless Network  

Microsoft Academic Search

The deployment of wireless local area networks (WLANs) in corporate environments along with the increasing demand for quality of service (QoS) support create a need for controlled sharing of wireless link. To satisfy the QoS demand, an on-going standardization work of IEEE 802.11e defines modifications to IEEE 802.11 MAC (medium access control). However, existing MAC scheduling for IEEE 802.11 WLAN

Kyungae Yoon; Jong Won Kim

2003-01-01

291

Multiple Poll Scheme for Improved QoS Using IEEE 802.11 PCF  

Microsoft Academic Search

IEEE 802.11 contains a mechanism for transmission of data with real time constraints known as point coordination function (PCF). This supplementary medium access protocol uses a centralized polling approach. Due to predicted inefficiency of PCF, IEEE 802.11e medium access control (MAC) is proposed as an emerging supplement to the IEEE 802.11 standard to support quality-of-service (QoS) over wireless local area

Bushra Anjum; S. Mushtaq; A. Hussain

2005-01-01

292

QoS Study Based on IEEE802.16 Bandwidth Scheduling Strategy  

Microsoft Academic Search

Article proposes the existing problems of the QoS multimedia services in IEEE802.16, analyzes the disadvantage and advantage of current bandwidth scheduling strategy based on IEEE802.16. An improvement strategy of IEEE802.16 PMP network model is proposed based on existing strict priority scheduling strategy. Finally, through the simulation data, we proof the strategy can ensure the QoS performance and fairness of bandwidth

Tu Jun; Zhang Ying-jiang; Wei Xin-juan; Ye Zhi-wei; Wu An-qing

2010-01-01

293

Upsilon Pi Epsilon (UPE): the role of the computing science honor society in computer science programs  

Microsoft Academic Search

It is the role of the university and programs in computer science to provide a quality education in the computing sciences. These activities clearly imply the need to expose the students to the professional societies, such as ACM, IEEE-CS, and DPMA, as appropriate. But in addition, recognition for outstanding scholarship is a must. While other major areas, such as engineering,

Robert F. Roggio

1990-01-01

294

Novel Component Middleware for Building Dependable Sentient Computing Applications  

Microsoft Academic Search

With advances in sensor-based computing and mobile communication, people have started to explore ubiquitous or pervasive computing systems that aim to have computing devices literally available everywhere, making them disappear into the physical environ- ment. Novel ubiquitous computing applications such as intelligent vehicles, smart buildings, and traffic management have special properties that traditional computingapplications do not possess, such as context-awareness,

Maomao Wu; Adrian Friday; Gordon Blair; Thirunavukkarasu Sivaharan; Paul Okanda; Hector Duran; Carl-Fredrik Sørensen; Gregory Biegel; Rene Meier

2004-01-01

295

Introduction to This Special Issue on Context-Aware Computing.  

ERIC Educational Resources Information Center

Discusses pervasive, or ubiquitous, computing; explains the notion of context; and defines context-aware computing as the key to disperse and enmesh computation into our lives. Considers context awareness in human-computer interaction and describes the broad topic areas of the essays included in this special issue. (LRW)

Moran, Thomas P.; Dourish, Paul

2001-01-01

296

Weaving Electrical and Computational Grids: How Analogous Are They?  

Microsoft Academic Search

Inspired by the electrical power grid's ability to provide a pervasive access to power in a consistent and dependable manner, computer scientists began exploring the design and development of an analogous infrastructure called the computational power grid's for the 21st century network computing. At present, such computational grids enable sharing, selection, and aggregation of geographically distributed resources for solving large

Madhu Chetty; Rajkumar Buyya

297

Security, Safety and Privacy - Pervasive Themes for Engineering Education  

Microsoft Academic Search

Computer trustworthiness continues to increase in importance as a pressing scientific, economic, and so- cial problem. The last decade has seen a rapid increase in computer security attacks at all levels, as more in- dividuals connect to common networks and as motivations and means to conduct sophisticated attacks in- crease. A parallel and accelerating trend has been the rapidly growing

S. Meldal; K. Gates; R. Smith; X. Su

298

A Longitudinal Investigation of the Effects of Computer Anxiety on Performance in a Computing-Intensive Environment  

ERIC Educational Resources Information Center

Computers are pervasive in business and education, and it would be easy to assume that all individuals embrace technology. However, evidence shows that roughly 30 to 40 percent of individuals experience some level of computer anxiety. Many academic programs involve computing-intensive courses, but the actual effects of this exposure on computer

Buche, Mari W.; Davis, Larry R.; Vician, Chelley

2007-01-01

299

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation  

Microsoft Academic Search

In the area of wireless mobile communication, minimizing energy consumption as well as maximizing data throughput in medium access control (MAC) layer is a very important research issue. The Dis- tributed Coordination Function (DCF) of IEEE 802.11 provides the power saving mechanism (PSM) that allows nodes to remain silent in 'doze mode' for reducing energy consumption. However, IEEE 802.11 PSM

Changsu Suh; Young-bae Ko; Jai-hoon Kim

2005-01-01

300

Design platform for plug-and-play IEEE 1451 traffic signal  

Microsoft Academic Search

A new approach for integrating traffic controllers with signals and sensors is being investigated that involves the plug and play distributed sensor technologies that conform to the IEEE 1451 standard. The components and basic architecture of the IEEE 1451 standard are described in this paper. Preliminary work has resulted in an inexpensive hardware and software development platform. Using this platform

Richard W. Wall; Andrew Huska

2005-01-01

301

Link-level Simulation and Performance Estimation of WiMAX IEEE802.16e  

Microsoft Academic Search

This paper describes the IEEE 802.16e PHY simulation method and result. Firstly it gives an overview of specifications, and then presents the main modules of the simulation. Finally, the performance of IEEE 802.16e PHY is obtained via link level simulation by MATLAB.

Wen-an Zhou; Bing Xie; Jun-de Song

2007-01-01

302

Modeling and Analysis of Energy Consumption in IEEE802.11e Networks  

Microsoft Academic Search

Energy is a major concern in wireless networks, be it for the target mobile user, as is the case of IEEE 802.11 infrastructure mode, or for all the users as in IEEE 802.11 ad hoc mode where it dictates the lifetime of the whole network. We focus in this paper on the modeling of energy consumption at the MAC layer

Olfa Bouattay; Tijani Chahed; Mounir Frikha; S. Tabbane

2007-01-01

303

The New IEEE Standard 739: Energy Conservation and Cost Effective Planning in Industrial Facilities  

Microsoft Academic Search

The ``IEEE Recommended Practice for Energy Conservation and Cost Effective Planning in Industrial Facilities'' (IEEE 739-The Bronze Book) is reviewed. The book, published in 1984, was sponsored by the Industrial and Commercial Power Systems Department of the Industry Applications Society. The paper highlights the contents of the book. The topics include energy planning, auditing, economics, lighting design, efficiency in equipment,

Carl E. Becker

1985-01-01

304

IEEE 1202 flame testing of cables for use in cable tray  

Microsoft Academic Search

The new IEEE 1202, IEEE Standard for Flame Testing of Cables for Use in Cable Tray in Industrial and Commercial Occupancies, is described. This flame test standard will: (1) contribute to harmonization of Canadian and US standards, most likely becoming a North American standard and eventually replacing the current UL and CSA tray cable flame tests; (2) provide more flame

J. M. Daly

1991-01-01

305

IEEE PSS2B versus PSS4B: the limits of performance of modern power system stabilizers  

Microsoft Academic Search

IEEE Std 421.5 as revised by the IEEE excitation system subcommittee will introduce a new type of power system stabilizer model, the multiband power system stabilizers (PSSs). Although it requires two inputs, like the widely used IEEE PSS2B, an integral of accelerating power PSS introduced at the beginning of the nineties as the first practical implementation of a digital PSS,

I. Kamwa; R. Grondin; G. Trudel

2005-01-01

306

Identifying obstacles in the shift to electronic media by professional societies: a Delphi study of the IEEE  

Microsoft Academic Search

A Delphi panel of 30 experts and stakeholders of the Institute of Electrical and Electronics Engineers, Inc. (IEEE) was formed in order to assess the impact of IEEE's shift to electronic communication and information dissemination. The panel designed to reflect the organization's diverse areas of interests, included representatives from IEEE's leadership, staff, membership and customers, across a wide range of

J. R. Herkert; C. Nielsen

1996-01-01

307

Fabrication of wireless LAN low-pass-filters for IEEE 802.11 b\\/g and IEEE 802.11 a in printed-circuit-board  

Microsoft Academic Search

Normally, embedded low pass filters (LPFs) by using low temperature co-fired Ceramic (LTCC) technology are widely employed and developed. In this paper, two embedded filters for both IEEE 802.11 b\\/g (Low-band) and IEEE 802.11 a (High-band) are designed and fabricated in printed-circuit-board (PCB) as organic substrate. In order to discuss the performance of LPFs in PCB, two LPFs for low-band

Jong-In Ryu; Hyun-Wook Noh; Dong-Su Kim; Se-Hun Park; Jun-Chul Kim; Jong-Chul Park

2009-01-01

308

Status of the IEEE P896 Future Backplane Bus  

SciTech Connect

The IEEE P896 Future Backplane Bus project has been influenced by and has influenced FASTBUS and several other contemporary bus designs. This paper summarizes the current status of that project, which is directed toward the needs of modern 32-bit microprocessor systems with multiple processors. Some of the technology developed for P896 will be important for future non-ECL implementations of FASTBUS and other buses. In particular, new bus drivers and receivers should greatly improve the performance and reliability of backplane buses and cable buses. The current status of the P896 serial bus is also summarized.

Gustavson, D.B.

1983-10-01

309

Voltage Control Devices on the IEEE 8500 Node Test Feeder  

SciTech Connect

The IEEE Test Cases provide researchers with distribution system models that can be used to validate new analytic methods. The newest of these models is the 8500-node test feeder which contains multiple devices for voltage control. In addition to a substation regulator there are multiple inline regulators as well as capacitor banks. This paper will discuss the detail in which voltage control devises should be modeled when examining large distribution systems. This discussion will include issues associated with power flow analysis for a single time step as well as for time series analysis.

Schneider, Kevin P.; Fuller, Jason C.

2010-01-06

310

Leiter-R versus developmental quotient for estimating cognitive function in preschoolers with pervasive developmental disorders.  

PubMed

The utility of the developmental quotient (DQ) obtained with the Psychoeducational Profile Revised (PEP-R) was assessed as a means of estimating cognitive ability in young children with pervasive developmental disorders. Data from the PEP-R were analysed in a sample of 44 children aged from 2.0 to 5.9 years (mean 3.46 ± 1), 13 with an autistic disorder and 31 with a pervasive developmental disorder not otherwise specified. DQ scores were compared with scores from the Leiter International Performance Scale Revised-Visualization and Reasoning Battery (Leiter-R) in the same 44 children. Overall and domain DQs on the PEP-R were significantly correlated with Leiter-R scores. This study suggests that DQ scores obtained from the PEP-R in preschool children with pervasive developmental disorders may be a viable alternative to the Leiter-R as an assessment tool. PMID:20856598

Portoghese, Claudia; Buttiglione, Maura; De Giacomo, Andrea; Lafortezza, Mariaelena; Lecce, Paola A; Martinelli, Domenico; Lozito, Vito; Margari, Lucia

2010-09-07

311

A Dynamic Connection Capability for Pervasive Adaptive Environments Using JCSP  

Microsoft Academic Search

The house, office or warehouse environment is full of devices that make users' life and work easier. People nowadays use personal computers, laptops, Personal Digital Assistants, mobile phones and many more devices with ease. The mechanism to connect, enable co!operation and excha nge data between devices will help to use devices' full capabilities. This paper investigates the usability of Communicating

Anna Kosek; Aly Syed; Jon Kerridge; Alistair Armitage

312

OPEN: open pervasive environments for migratory interactive services  

Microsoft Academic Search

One important aspect of ubiquitous environments is to provide users with the possibility to freely move about and continue to interact with the available applications through a variety of interactive devices such as cell phones, PDAs, desktop computers, intelligent watches or digital television sets. Migratory applications are able to follow the user by sensing changes in the user's context and

Anders Nickelsen; Fabio Paternó; Agnese Grasselli; Kay-Uwe Schmidt; Miquel Martin; Björn Schindler; Francesca Mureddu

2010-01-01

313

HOLSR: A Novel Routing Scheme of Ad Hoc Wireless Networks for Pervasive Computing  

Microsoft Academic Search

Optimized Link State Routing (OLSR) protocol is a typical proactive protocol for MANET. This paper proposes a novel improved routing protocol based on OLSR, and we call this scheme as the Hierarchical OLSR (HOLSR) protocol, which can be used in large and heavy traffic wireless environment, such as intelligent battlefield, tactical internet, etc. HOLSR uses a hierarchical structure to reduce

Liang Ming; Gang Zhao; Guihai Xie; Xiaohui Kuang

2007-01-01

314

VeryIDX - A Digital Identity Management System for Pervasive Computing Environments  

Microsoft Academic Search

The problem of identity theft, that is, the act of impersonating others’ identities by presenting stolen identifiers or proofs\\u000a of identities, has been receiving increasing attention because of its high financial and social costs. In this paper we address\\u000a such problem by proposing an approach to manage user identity attributes by assuring their privacy-preserving usage. The approach\\u000a is based on

Federica Paci; Elisa Bertino; Sam Kerr; Aaron Lint; Anna Cinzia Squicciarini; Jungha Woo

2008-01-01

315

The Augmented Knight's Castle - Integrating Mobile and Pervasive Computing Technologies into Traditional Toy Environments  

Microsoft Academic Search

The Augmented Knight's Castle is an augmented toy environment that enriches the children's pretend play by using background music, sound effects, verbal commentary of toys, and different forms of tactile and visual feedback in reaction to the children's play. Moreover, interactive learning experiences can be integrated into the play (e.g. to teach songs and poems or to provide the child

Matthias Lampe; Steve Hinske

316

iCricket: A Programmable Brick for Kids' Pervasive Computing Applications  

Microsoft Academic Search

The iCricket is a new internet-enabled embedded control board with built-in motor and sensor interface circuits. It is designed for use by pre-college students and other programming novices. It includes a Logo virtual machine with extensions that allow networked iCrickets communicate with one another, retriev- ing sensor values and remotely running each other's Logo procedures. The un- derlying implementation uses

Fred Martin; Kallol Par; Kareem Abu-zahra; Vasiliy Dulsky; Andrew Chanler

2005-01-01

317

A Nature Inspired Multi-Agent Framework for Autonomic Service Management in Pervasive Computing Environments  

Microsoft Academic Search

This paper describes the design of a scalable biomimetic framework in the management domain of complex ubiquitous service-oriented networks. An autonomous network service management platform - SwarmingNet is proposed. In this SwarmingNet architecture, the required network service processes are implemented by a group of highly diverse and autonomic objects. These objects are called TeleService Solons as elements of TeleService Holons,

Frank Chiang; Robin Braun

2006-01-01

318

Teaching Ethics and the Internet 2.0: pervasive computing, consumer electronics and progressive embodiment  

Microsoft Academic Search

An instructional technology grant to use hand-held devices to augment Ethics and the Internet, which the author has taught for seven years in the Department of Religion at Duke University, enabled the course to address the broader societal implications of digital technology. Using hand-held devices to experience the course on the go, in and beyond the classroom, students were encouraged

Wendy Robinson

2002-01-01

319

Polytopol computing for multi-core and distributed systems  

Microsoft Academic Search

Multi-core computing provides new challenges to software engineering. The paper addresses such issues in the general setting of polytopol computing, that takes multi-core problems in such widely differing areas as ambient intelligence sensor networks and cloud computing into account. It argues that the essence lies in a suitable allocation of free moving tasks. Where hardware is ubiquitous and pervasive, the

Henk Spaanenburg; Lambert Spaanenburg; Johan Ranefors

2009-01-01

320

Weaving computational grids: how analogous are they with electrical grids?  

Microsoft Academic Search

Can computational grids make as great an impact in the 21st century as electrical grids did in the 20th? A comparison of the two technologies could provide clues about how to make computational grids pervasive, dependable, and convenient. In this article, we describe how computational grids developed, their layered structure, and their emerging operational model, which we envisage as providing

MADHU CHETTY; RAJKUMAR BUYYA

2002-01-01

321

Reading SCORM compliant multimedia courses using heterogeneous pervasive devices  

Microsoft Academic Search

The Sharable Content Object Reference Model (SCORM) provides some important representation for distance learning content and the learning behavior. In general, SCORM-Compliant learning content can be viewed via the Web browsers. In this paper, we built an environment which allows people to read SCORM-Compliant course materials on hardcopy papers with a pen-like OCR device. A computer, a PDA, or a

Te-Hua Wang; Hsuan-Pu Chang; Yun-Long Sie; Kun-Han Chan; Mon-Ting Tzou; Timothy K. Shih

2005-01-01

322

S07 - GPGPU: general-purpose computation on graphics hardware  

Microsoft Academic Search

The graphics processor (GPU) on today's commodity video cards has evolved into an extremely powerful and flexible processor. Modern graphics architectures provide tremendous memory bandwidth and computational horsepower, with dozens of fully programmable shading units that support vector operations and IEEE floating point precision. High-level languages have emerged for graphics hardware, making this computational power accessible. GPGPU stands for \\

David P. Luebke; Mark Harris; Naga K. Govindaraju; Aaron E. Lefohn; Mike Houston; John D. Owens; Mark Segal; Matthew Papakipos; Ian Buck

2006-01-01

323

Exploratory and Confirmatory Factor Analyses of the Pervasive Developmental Disorders Rating Scale for Young Children with Autistic Disorder  

ERIC Educational Resources Information Center

|In this study, the authors examined the construct validity of the Pervasive Developmental Disorder Rating Scale (PDDRS; R. C. Eaves, 1993), which is a screening instrument used to identify individuals with autistic disorder and other pervasive developmental disorders. The PDDRS is purported to measure 3 factors--arousal, affect, and…

Eaves, Ronald C.; Williams, Thomas O., Jr.

2006-01-01

324

Preserve Your Privacy with PCO: A Privacy Sensitive Architecture for Context Obfuscation for Pervasive E-Community Based Applications  

Microsoft Academic Search

Context awareness is just beginning to revolutionize the ways we interact with networked devices. In order for context awareness to flourish, especially in a pervasive environment, users must be certain that their privacy is respected. Privacy in pervasive online community depends on the level of granularity of the provided information, user's relation to possible recipients, and the possible usage of

Farzana Rahman; Ferdaus Ahmed Kawsar; Sheikh Iqbal Ahamed

2010-01-01

325

On modeling, collecting and utilizing context information for disaster responses in pervasive environments  

Microsoft Academic Search

To support collaborative work in disaster responses, various types of context information must be gathered and shared not only within teams at disaster sites, but also among various teams and services in pervasive environments. We propose a representation for describing context information required for disaster responses. This representation is extensible and interoperable enough to include various concepts describing entities existing

Hong-Linh Truong; Atif Manzoor; Schahram Dustdar

2009-01-01

326

Development of a parent training program for children with pervasive developmental disorders  

Microsoft Academic Search

Parent delivered interventions based on applied behavior analysis (ABA) for children with Pervasive Developmental Disorders (PDDs) have been evaluated using primarily single-subject design methodology or small case series. While the results of these evaluations are encouraging, an important next step is to standardize the interventions to allow for replication across sites, in studies with large samples and measures of long-term,

Cynthia R. Johnson; Benjamin L. Handen; Eric Butter; Ann Wagner; James Mulick; Denis G. Sukhodolsky; Susan Williams; Naomi A. Swiezy; L. Eugene Arnold; Michael G. Aman; Lawrence Scahill; Kimberly A. Stigler; Christopher J. McDougle; Benedetto Vitiello; Tristram Smith

2007-01-01

327

Preschool Boys with Pervasive Hyperactivity: Early Peer Functioning and Mother-Child Relationship Influences  

Microsoft Academic Search

This study compared the peer functioning of a community sample of preschool boys with pervasive hyperactivity (N = 33) and comparison boys (N = 34), and examined the extent to which any differences in peer functioning between these groups could be explained by comorbid child conduct problems and parenting factors. The quality of boys' peer relations was assessed on the

Louise J. Keown; Lianne J. Woodward

2006-01-01

328

Abnormalities on the Neurological Examination and EEG in Young Children with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

|This study examined the nature and frequency of neurological and EEG abnormalities in 60 young children (ages 2-6 years) with pervasive developmental disorders. A number of standard neurological functions could not be adequately assessed due to the young age of the children and/or limited comprehension and cooperation. The most common…

Akshoomoff, Natacha; Farid, Nikdokht; Courchesne, Eric; Haas, Richard

2007-01-01

329

Prevalence of pervasive developmental disorder in juvenile court cases in Japan  

Microsoft Academic Search

The aim of the study is to survey the prevalence of pervasive developmental disorder (PDD) in juvenile cases encountered in the family courts of Japan by examining the characteristics of juvenile cases with PDD. We investigated family court juvenile cases (N = 428) in terms of sex, age (14–19 years), type of crime, background, and environmental factors such as adverse childhood experiences

Takashi Kumagami; Naomi Matsuura

2009-01-01

330

A Preliminary Study on Screening Prevalence of Pervasive Developmental Disorder in Schoolchildren in Iran  

ERIC Educational Resources Information Center

|To study prevalence rates of pervasive developmental disorder (PDD) symptoms and differences between subtypes in school age Iranian children. A random sample of 2,000 school age children from both genders was selected. A parent-completed, DSM-IV-referenced rating scale of PDD symptoms was used. About 1.9% of the sample obtained screening cutoff…

Ghanizadeh, Ahmad

2008-01-01

331

Predictors and Moderators of Psychological Distress in Mothers of Children with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

|This study explored potential predictors of psychological distress and moderators of the relation between parenting stress and psychological distress in mothers of children with pervasive developmental disorders (PDDs). Ninety-seven mothers of children diagnosed with autism spectrum disorders completed measures assessing children's functional…

Tobing, Lauren E.; Glenwick, David S.

2006-01-01

332

Pervasive Developmental Disorder: Client-Centered Approach. A Guide for Parents and Teachers.  

ERIC Educational Resources Information Center

|This guide to pervasive developmental disorder (PDD) or autistic spectrum disorder (ASD) first provides a review of the literature on defining characteristics of PDD/ASD, causes of PDD, and diagnosis of PDD. Review of intervention and treatment comprises the major portion of the paper. After briefly considering parent education, this section…

Stewart, Bonnie C.

333

Teaching toilet skills in a public school setting to a child with pervasive developmental disorder  

Microsoft Academic Search

An 8-year old boy with Pervasive Developmental Disorder (PDD) was taught toileting skills within a public elementary school. During baseline, he never urinated successfully in the toilet and wore a disposable diaper throughout the day. The training program included scheduling a toileting opportunity at a time that increased the likelihood of urination and providing positive reinforcement when voiding in the

James K. Luiselli

1997-01-01

334

Children's Yale-Brown Obsessive Compulsive Scale Modified for Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

Objective: To examine the psychometric properties of the Children's Yale-Brown Obsessive Compulsive Scales (CYBOCS) modified for pervasive developmental disorders (PDDs). Method: Raters from five Research Units on Pediatric Psychopharmacology (RUPP) Autism Network were trained to reliability. The modified scale (CYBOCS-PDD), which contains only…

Scahill, Lawrence; McDougle, Christopher J.; Williams, Susan K.; Dimitropoulos, Anastasia; Aman, Michael G.; McCracken, James T.; Tierney, Elaine; Arnold, L. Eugene; Cronin, Pegeen; Grados, Marco; Ghuman, Jaswinder; Koenig, Kathleen; Lam, Kristen S. L.; McGough, James; Posey, David J.; Ritz, Louise; Swiezy, Naomi B.; Vitiello, Benedetto

2006-01-01

335

Audiovisual Speech Integration in Pervasive Developmental Disorder: Evidence from Event-Related Potentials  

ERIC Educational Resources Information Center

Background: Integration of information from multiple sensory sources is an important prerequisite for successful social behavior, especially during face-to-face conversation. It has been suggested that communicative impairments among individuals with pervasive developmental disorders (PDD) might be caused by an inability to integrate synchronously…

Magnee, Maurice J. C. M.; de Gelder, Beatrice; van Engeland, Herman; Kemner, Chantal

2008-01-01

336

WISC-III Index Score Profiles of 520 Swedish Children with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

|WISC-III (Wechsler, 1991) index score profiles and their characteristics were examined with traditional statistics in a large Swedish sample consisting of children with autistic disorder (n = 85), Asperger's disorder (n = 341), or pervasive developmental disorders not otherwise specified (PDD-NOS; n = 94). There was a clear and significant…

Zander, Eric; Dahlgren, Sven Olof

2010-01-01

337

Acceptance of pervasive healthcare systems: A comparison of different implementation concepts  

Microsoft Academic Search

While pervasive healthcare systems bear the potential to provide patients with a new quality of medical homecare, the complexity of such systems raises fundamental questions of behavior, communication and technology acceptance. This is especially important, as users of future healthcare systems will be increasingly characterized by diversity. Relying only on highly experienced and technology-prone user groups, which might have been

Martina Ziefle; Carsten Röcker

2010-01-01

338

Targeting Social Skills Deficits in an Adolescent with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

|Social skills deficits are a defining feature of individuals diagnosed with autism and other pervasive developmental disorders (PDD), which can impair functioning and put the individual at higher risk for developing problem behavior (e.g., self-injury, aggression). In the current study, an adolescent with PDD displayed inappropriate social…

Hagopian, Louis P.; Kuhn, David E.; Strother, Geri E.

2009-01-01

339

Facial electromyographicresponses to emotional information from faces and voices in individuals with Pervasive Developmental Disorder  

Microsoft Academic Search

Background: Despite extensive research, it is still debated whether impairments in social skills of individuals with pervasive developmental disorder (PDD) are related to specific deficits in the early processing of emotional information. We aimed to test both automatic processing of facial affect as well as the integration of auditory and visual emotion cues in individuals with PDD. Methods: In a

Maurice J. C. M. Magnée; Beatrice de Gelder; Herman van Engeland; Chantal Kemner

2007-01-01

340

Affective e-Learning: Using "Emotional" Data to Improve Learning in Pervasive Learning Environment  

ERIC Educational Resources Information Center

Using emotion detection technologies from biophysical signals, this study explored how emotion evolves during learning process and how emotion feedback could be used to improve learning experiences. This article also described a cutting-edge pervasive e-Learning platform used in a Shanghai online college and proposed an affective e-Learning model,…

Shen, Liping; Wang, Minjuan; Shen, Ruimin

2009-01-01

341

"Crack Kids" in School: What To Do, How To Do It. Pervasively Developmentally Delayed (PDD).  

ERIC Educational Resources Information Center

|This book addresses the educational needs of children who are pervasively developmentally delayed (PDD), especially those exposed to drugs prenatally and those with Fetal Alcohol Syndrome, autism, hyperactivity, Aspberger Syndrome, other heath impairments, attention deficit disorder, and childhood aphasia. The first chapter recommends the use of…

Odom-Winn, Danni; Dunagan, Dianne E.

342

The Pervasiveness and Impact of Corporate Quality Circles: A Survey of Major American Corporations.  

ERIC Educational Resources Information Center

To assess the pervasiveness of quality circles in American corporations, as well as to ascertain perceptions of their impact in terms of various organizational outcomes, a 45-item questionnaire was mailed to personnel directors of the Fortune 500 corporations. Some time after the initial mailing, a follow-up mailing was executed to maximize the…

Hellweg, Susan A.; And Others

343

Preschool Boys with Pervasive Hyperactivity: Early Peer Functioning and Mother-Child Relationship Influences  

ERIC Educational Resources Information Center

|This study compared the peer functioning of a community sample of preschool boys with pervasive hyperactivity (N=33) and comparison boys (N=34), and examined the extent to which any differences in peer functioning between these groups could be explained by comorbid child conduct problems and parenting factors. The quality of boys' peer relations…

Keown, Louise J.; Woodward, Lianne J.

2006-01-01

344

Formal Specification of a Safety Critical Pervasive Application for a Nuclear Medicine Department  

Microsoft Academic Search

In case of safety critical pervasive applications classic designing tools can not be applied as they are. As a matter of fact, the behavior of such a kind of applications relies on the location of resources and users and, eventually, on their movements. Unfortunately, classic formal methods take into account neither the concept of location, nor the possibility of movements.

Antonio Coronato; Giuseppe De Pietro

2009-01-01

345

Sleep Correlates of Pervasive Developmental Disorders: A Review of the Literature  

ERIC Educational Resources Information Center

|Sleep disturbance is a significant problem in the general pediatric population, and it occurs even more frequently in children with pervasive developmental disorders (PDDs). Much time and energy have been spent examining the characteristics that predispose children to insomnia and it is likely that equivalent factors influence sleep in PDDs.…

Hollway, Jill A.; Aman, Michael G.

2011-01-01

346

Is Pervasive Developmental Disorder Not Otherwise Specified Less Stable than Autistic Disorder? A Meta-Analysis  

ERIC Educational Resources Information Center

|We reviewed the stability of the diagnosis of pervasive developmental disorder not otherwise specified (PDD-NOS). A Medline search found eight studies reiterating a diagnostic assessment for PDD-NOS. The pooled group included 322 autistic disorder (AD) and 122 PDD-NOS cases. We used percentage of individuals with same diagnose at Times 1 and 2 as…

Rondeau, Emelie; Klein, Leslie S.; Masse, Andre; Bodeau, Nicolas; Cohen, David; Guile, Jean-Marc

2011-01-01

347

Mental Development and Autistic Behavior in Children with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

|The aim of this study was to clarify the features of mental development and autistic behavior in children with pervasive developmental disorders (PDD) from the viewpoint of remedial therapy. The Tokyo Child Development Schedule (TCDS) and the Tokyo Autistic Behavior Scale (TABS), designed to be completed by children's caregivers, were used. A…

Suzuki, Mayo

2011-01-01

348

Eight case reports of learning recovery in children with pervasive developmental disorders after early intervention  

Microsoft Academic Search

Early intensive behavioral intervention (EIBI) is often recommended for children with Pervasive Developmental Disorders (PDD). It is an empirically supported treatment designed to address the core symptoms of autism including language delays, social and play skills, and restricted and repetitive behaviors as well as other related deficits in cognition and adaptive behavior. Though there are a growing number of research

Eric M. Butter; James A. Mulick; Bernard Metz

2006-01-01

349

Impairment of quality of life in parents of children and adolescents with pervasive developmental disorder  

Microsoft Academic Search

BACKGROUND: Little is known about the Quality of Life (QOL) in parents of children with developmental diseases as compared to other severe neurological or psychiatric disorders. Aims of the present study were: to evaluate QOL in parents of children affected by Pervasive Development Disorder (PDDs), Cerebral Palsy (CP) or Mental Retardation (MR) as compared to a control group (CG); to

Diego Mugno; Liliana Ruta; Valentina Genitori D'Arrigo; Luigi Mazzone

2007-01-01

350

Using Virtual Reality Environment to Improve Joint Attention Associated with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

|The focus of this study is using data glove to practice Joint attention skill in virtual reality environment for people with pervasive developmental disorder (PDD). The virtual reality environment provides a safe environment for PDD people. Especially, when they made errors during practice in virtual reality environment, there is no suffering or…

Cheng, Yufang; Huang, Ruowen

2012-01-01

351

An Open-Label Trial of Escitalopram in Pervasive Developmental Disorders.  

ERIC Educational Resources Information Center

|Objective: To assess the effect of escitalopram in the treatment of pervasive developmental disorders (PDDs). Method: This 10-week study had a forced titration, open-label design. Twenty-eight subjects (mean age 125.1 [+ or -] 33.5 months) with a PDD received escitalopram at a dose that increased weekly to a maximum dose of 20 mg as tolerated.…

Owley, Thomas; Walton, Laura; Salt, Jeff; Guter, Stephen J., Jr.; Winnega, Marrea; Leventhal, Bennett L.; Cook, Edwin H., Jr.

2005-01-01

352

SiMPE: Fourth Workshop on Speech in Mobile and Pervasive Environments  

Microsoft Academic Search

With the proliferation of pervasive devices and the increase in their processing capabilities, client-side speech processing has been emerging as a viable alternative. SiMPE 2009, the fourth in the series, will continue to ex- plore issues, possibilities, and approaches for enabling speech processing as well as convenient and eectiv e speech and multimodal user interfaces. One of our major goals

Amit Anil Nanavati; Nitendra Rajput; Alexander I. Rudnicky; M. Turunen; Andrew L. Kun; Tim Paek; I. Tashev

2009-01-01

353

Ad-hoc composition of pervasive services in the PalCom architecture  

Microsoft Academic Search

We present an architecture supporting ad-hoc composition of pervasive services, an open-source framework that implements it, and the key design principles behind it. The architecture focuses on direct human interaction, supporting combination of devices and services that are not explicitly designed to work together. The focus is on local networks, but extension is possible to wide area networks, interconnecting several

David Svensson Fors; Boris Magnusson; Sven Gestegård Robertz; Görel Hedin; Emma Nilsson-Nyman

2009-01-01

354

Regression of Language and Non-Language Skills in Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

|Background: As part of the pervasive developmental disorders (PDD), there is a subgroup of individuals reported to have a different onset of symptom appearance consisting of an apparently normal early development, followed by a loss of verbal and/or non-verbal skills prior to 2 years of age. This study aims at comparing the symptomatology of…

Meilleur, A. -A. S.; Fombonne, E.

2009-01-01

355

Neutral versus Emotional Human Stimuli Processing in Children with Pervasive Developmental Disorders not Otherwise Specified  

ERIC Educational Resources Information Center

|Pervasive developmental disorder not otherwise specified (PDD-NOS) represents up to two-thirds of autism spectrum disorders; however, it is usually described in terms of the symptoms not shared by autism. The study explores processing of neutral and emotional human stimuli (by auditory, visual and multimodal channels) in children with PDD-NOS (n…

Vannetzel, Leonard; Chaby, Laurence; Cautru, Fabienne; Cohen, David; Plaza, Monique

2011-01-01

356

Face Recognition in Children with a Pervasive Developmental Disorder Not Otherwise Specified  

Microsoft Academic Search

This study investigates the accuracy and speed of face recognition in children with a Pervasive Developmental Disorder Not Otherwise Specified (PDDNOS; DSM-IV, American – Psychiatric Association [APA], 1994). The study includes a clinical group of 26 nonretarded 7- to 10-year-old children with PDDNOS and a control group of 65 normally developing children of the same age. Two computerized reaction time

M. Serra; M. Althaus; L. M. J. de Sonneville; A. D. Stant; A. E. Jackson; R. B. Minderaa

2003-01-01

357

Retrospective Evaluation of an Intensive Method of Treatment for Children with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

|The objective of this preliminary study was to evaluate a novel intensive therapy program in young children with pervasive developmental disorder (PDD). Twenty-three children treated at the Mifne Institute in Israel between 1997 and 1999 were assessed. Videos taken before coming to Mifne and after intensive treatment at the institute and before…

Vorgraft, Yitzchak; Farbstein, Ilana; Spiegel, Rene; Apter, Alan

2007-01-01

358

Validation of an Interview-Based Rating Scale Developed in Japan for Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

|The pervasive developmental disorders (PDDs) Autism Society Japan Rating Scale (PARS), an interview-based instrument for evaluating PDDs, has been developed in Japan with the aim of providing a method that (1) can be used to evaluate PDD symptoms and related support needs and (2) is simpler and easier than the currently used "gold standard"…

Ito, Hiroyuki; Tani, Iori; Yukihiro, Ryoji; Adachi, Jun; Hara, Koichi; Ogasawara, Megumi; Inoue, Masahiko; Kamio, Yoko; Nakamura, Kazuhiko; Uchiyama, Tokio; Ichikawa, Hironobu; Sugiyama, Toshiro; Hagiwara, Taku; Tsujii, Masatsugu

2012-01-01

359

Mobile iTV: new challenges for the design of pervasive multimedia systems  

Microsoft Academic Search

This SIG will stimulate informal debate around the futures of interfaces for pervasive multimedia systems such as mobile and ubiquitous iTV with special attention to the new contextual usage of this media in entertainment, work and government contexts.It aims to create a provocative framework to uncover future usage scenarios and generate debate about novel processes for creation, sharing, and consumption

Anxo Cereijo Roibás; David Geerts; Licia Calvi; Akseli Anttila; Owen Daly-jones

2006-01-01

360

Evaluating outdoor play for children: virtual vs. tangible game objects in pervasive games  

Microsoft Academic Search

In this paper we report a case study where two versions of the same outdoor pervasive game were compared: one featuring a virtual game object and the other with a tangible representation of it. Our aim was to explore the effect on social interaction and physical activity; two characteristics of Head-Up Games. Based on evaluation with 27 children we can

Iris Soute; Maurits Kaptein; Panos Markopoulos

2009-01-01

361

Retrospective Study of Quetiapine in Children and Adolescents with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

|A retrospective study was conducted in a clinic specialized in treating individuals with developmental disabilities to examine the effectiveness and tolerability of quetiapine in children and adolescents with pervasive developmental disorders. Ten consecutive outpatients (age = 12.0 [plus or minus] 5.1 years) treated with quetiapine (dose = 477…

Hardan, Antonio Y.; Jou, Roger J.; Handen, Benjamin L.

2005-01-01

362

Adaptive client side object replication for response time improvement in pervasive environments  

Microsoft Academic Search

Due to the high cost of replication, incurred mainly by consistency management, it may be infeasible to use uninformed object replication in collaborative applications in pervasive environments, since resources are constrained, nodes are heterogeneous, and application behaviour is highly dynamic. Consequently, this paper proposes an adaptive replication scheme that dynamically creates and releases replicas on client nodes during runtime, with

Norizam Katmon; Caspar Ryan

2011-01-01

363

Facial Electromyographic Responses to Emotional Information from Faces and Voices in Individuals with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

|Background: Despite extensive research, it is still debated whether impairments in social skills of individuals with pervasive developmental disorder (PDD) are related to specific deficits in the early processing of emotional information. We aimed to test both automatic processing of facial affect as well as the integration of auditory and visual…

Magnee, Maurice J. C. M.; de Gelder, Beatrice; van Engeland, Herman; Kemner, Chantal

2007-01-01

364

The influence of nonhandicapped peers on the social interactions of children with a pervasive developmental disorder  

Microsoft Academic Search

This study investigated whether or not children with autism or a related pervasive developmental disorder (PDD) can benefit from regular opportunities to interact with a normally developing peer, matched as to sex and age. An experimental design with random assignment of subjects to treatment and control groups was used to demonstrate the impact of this peer-mediated intervention. In the treatment

Herbert Roeyers

1996-01-01

365

Epidemiological Surveys of Autism and Other Pervasive Developmental Disorders: An Update  

Microsoft Academic Search

This paper was commissioned by the committee on the Effectiveness of Early Education in Autism of the National Research Council (NRC). It provides a review of epidemiological studies of pervasive developmental disorders (PDD) which updates a previously published article (The epidemiology of autism: a review. Psychological Medicine 1999; 29: 769–786). The design, sample characteristics of 32 surveys published between 1966

Eric Fombonne

2003-01-01

366

Pervasive Vulnerabilities: Sexual Harassment in School. Adolescent Cultures, School, and Society. Volume 54  

ERIC Educational Resources Information Center

|"Pervasive Vulnerabilities" explores the beliefs, attitudes, and behaviors of adolescent girls and boys and female teachers in order to expose the continuing persistence of sexual harassment in the United States. The book addresses the sexual double standard that continues to hold girls and women accountable for male sexual aggression, and…

Rahimi, Regina; Liston, Delores D.

2012-01-01

367

The Co-Occurrence of Nonaffective Psychosis and the Pervasive Developmental Disorders: A Systematic Review  

ERIC Educational Resources Information Center

|Background: Pervasive developmental disorders (PDDs) were originally conceptualised as a form of ("infantile") psychosis. Recently, the disorders have been viewed as separate constructs. However, there is evidence of overlapping psychopathology, pathophysiology, and occurrence of the two syndromes. Methods: A historical overview is provided. A…

Padgett, Fiona E.; Miltsiou, Eleni; Tiffin, Paul A.

2010-01-01

368

Using Virtual Reality Environment to Improve Joint Attention Associated with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

The focus of this study is using data glove to practice Joint attention skill in virtual reality environment for people with pervasive developmental disorder (PDD). The virtual reality environment provides a safe environment for PDD people. Especially, when they made errors during practice in virtual reality environment, there is no suffering or…

Cheng, Yufang; Huang, Ruowen

2012-01-01

369

Brief Report: Prevalence of Pervasive Developmental Disorder in Brazil--A Pilot Study  

ERIC Educational Resources Information Center

|This pilot study presents preliminary results concerning the prevalence of Pervasive Developmental Disorder (PDD) in South America. It was a three-phase study conducted in a typical town in Southeast Brazil. Case definition was based in a combination of standardized instruments and clinical evaluations by experts. The prevalence of PDD was…

Paula, Cristiane S.; Ribeiro, Sabrina H.; Fombonne, Eric; Mercadante, Marcos T.

2011-01-01

370

Pervasive Vulnerabilities: Sexual Harassment in School. Adolescent Cultures, School, and Society. Volume 54  

ERIC Educational Resources Information Center

"Pervasive Vulnerabilities" explores the beliefs, attitudes, and behaviors of adolescent girls and boys and female teachers in order to expose the continuing persistence of sexual harassment in the United States. The book addresses the sexual double standard that continues to hold girls and women accountable for male sexual aggression, and…

Rahimi, Regina; Liston, Delores D.

2012-01-01

371

'All That Glitters Is Not Gold': Misdiagnosis of Psychosis in Pervasive Developmental Disorders - A Case Series  

Microsoft Academic Search

The early literature established the validity of the distinction between early onset schizophrenia and autism. In the modern context of increasing recognition of pervasive developmental disorders (PDD) and a growing interest in very early onset schizophrenia and other childhood onset psychoses, this clinical distinction is often difficult to make. This article looks at problems arising from overdiagnos- ing psychosis in

DAVID R. D OSSETOR

372

Early Parent–Child Relations and Family Functioning of Preschool Boys with Pervasive Hyperactivity  

Microsoft Academic Search

This study examined the quality of parent–child relationships and family functioning of preschool children with early onset hyperactivity by comparing a community sample of 33 pervasively hyperactive preschool boys with a comparison sample of 34 boys. Mothers and children were assessed at home on a range of interview, parent questionnaire, and observational measures of parenting and family functioning. Results of

Louise J. Keown; Lianne J. Woodward

2002-01-01

373

Abnormalities on the Neurological Examination and EEG in Young Children with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

This study examined the nature and frequency of neurological and EEG abnormalities in 60 young children (ages 2-6 years) with pervasive developmental disorders. A number of standard neurological functions could not be adequately assessed due to the young age of the children and/or limited comprehension and cooperation. The most common neurological…

Akshoomoff, Natacha; Farid, Nikdokht; Courchesne, Eric; Haas, Richard

2007-01-01

374

Effects of Object Complexity and Type on the Gaze Behavior of Children with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

|The looking behavior of children with pervasive developmental disorder (PDD) and age- and IQ-matched normal control children was studied using infrared oculography. Stimuli varying in complexity and topic were presented to test whether children with PDD have specific abnormalities in looking behavior to complex stimuli and/or to faces. All…

Kemner, C.; van der Geest, J. N.; Verbaten, M. N.; van Engeland, H.

2007-01-01

375

Pharmacotherapy for Hyperactivity in Children with Autism and Other Pervasive Developmental Disorders.  

ERIC Educational Resources Information Center

|A review of 41 studies on pharmacological treatments for children with autism and pervasive personality disorder not otherwise specified, found empirical evidence for significant reductions in hyperactive symptoms was strongest for the antipsychotics, psychostimulants, and naltrexone. A theoretical model is proposed for using attentional…

Aman, Michael G.; Langworthy, Kristen S.

2000-01-01

376

Exploring the Usability of Video Game Heuristics for Pervasive Game Development in Smart Home Environments  

Microsoft Academic Search

Over the last years, a variety of pervasive games was developed. Al- though some of these applications were quite successful in bringing digital games back to the real world, very little is known about their successful integration into smart environments. When developing video games, developers can make use of a broad variety of heuristics. Using these heuristics to guide the

Carsten Röcker; Maral Haar

2006-01-01

377

Retrospective Study of Quetiapine in Children and Adolescents with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

A retrospective study was conducted in a clinic specialized in treating individuals with developmental disabilities to examine the effectiveness and tolerability of quetiapine in children and adolescents with pervasive developmental disorders. Ten consecutive outpatients (age = 12.0 [plus or minus] 5.1 years) treated with quetiapine (dose = 477…

Hardan, Antonio Y.; Jou, Roger J.; Handen, Benjamin L.

2005-01-01

378

Curiosity, Interest and Engagement in Technology-Pervasive Learning Environments: A New Research Agenda  

ERIC Educational Resources Information Center

This paper identifies the need for developing new ways to study curiosity in the context of today's pervasive technologies and unprecedented information access. Curiosity is defined in this paper in a way which incorporates the concomitant constructs of interest and engagement. A theoretical model for curiosity, interest and engagement in new…

Arnone, Marilyn P.; Small, Ruth V.; Chauncey, Sarah A.; McKenna, H. Patricia

2011-01-01

379

IEEE conference record -- Abstracts: 1996 IEEE international conference on plasma science  

SciTech Connect

This meeting covered the following topics: space plasmas; non-equilibrium plasma processing; computer simulation of vacuum power tubes; vacuum microelectronics; microwave systems; basic phenomena in partially ionized gases -- gaseous electronics, electrical discharges; ball lightning/spherical plasma configuration; plasma diagnostics; plasmas for lighting; dense plasma focus; intense ion and electron beams; plasma, ion, and electron sources; flat panel displays; fast z-pinches and x-ray lasers; environmental/energy issues in plasma science; thermal plasma processing; computational plasma physics; magnetic confinement fusion; microwave-plasma interactions; space plasma engineering; EM and ETH launchers; fast wave devices; intense beam microwaves; slow wave devices; space plasma measurements; basic phenomena in fully ionized plasma -- waves, instabilities, plasma theory, etc; plasma closing switches; fast opening switches; and laser-produced plasma. Separate abstracts were prepared for most papers in this conference.

NONE

1996-12-31

380

AGILE Rate Control for IEEE 802.11 Networks  

NASA Astrophysics Data System (ADS)

We present a transmission rate adaptation algorithm called AGILE (ACK-Guided Immediate Link rate Estimation) for IEEE 802.11 networks. The key idea of AGILE is that the transmitter adjusts the transmission rate by means of measuring the SNR (Signal-to-Noise Ratio) during any frame reception including the ACK (Acknowledgment) frame, and estimating the corresponding maximum achievable throughput using a profile, which is materialized by extensive off-line measurement. AGILE is equipped with an advanced RTS (Request-To-Send)/CTS (Clear-To-Send) activation algorithm, eRTS filter that intelligently switches on/off RTS frame transmission to enhance the achievable throughput depending upon the existence of multiple contending (or even hidden) stations. The effectiveness of AGILE is evaluated in our MadWifi-based testbed implementation and we compare its performance with different rate adaptation schemes in various scenarios.

Verma, Lochan; Kim, Seongkwan; Choi, Sunghyun; Lee, Sung-Ju

381

IEEE conference record -- abstracts: 1995 IEEE international conference on plasma science  

SciTech Connect

Topics covered at this meeting are: computational plasma physics; slow wave devices; basic phenomena in fully ionized plasmas; microwave-plasma interactions; space plasmas; fast wave devices; plasma processing; plasma, ion, and electron sources; vacuum microelectronics; basic phenomena in partially ionized gases; microwave systems; plasma diagnostics; magnetic fusion theory/experiment; fast opening switches; laser-produced plasmas; dense plasma focus; intense ion and electron beams; plasmas for lighting; fast z-pinches and x-ray lasers; intense beam microwaves; ball lightning/spherical plasma configuration; environmental plasma science; EM and ETH launchers; and environmental/energy issues in plasma science. Separate abstracts were prepared for most of the individual papers.

NONE

1995-12-31

382

Sensor Networking Testbed with IEEE 1451 Compatibility and Network Performance Monitoring.  

National Technical Information Service (NTIS)

Design and implementation of a testbed for testing and verifying IEEE 1451-compatible sensor systems with network performance monitoring is of significant importance. The performance parameters measurement as well as decision support systems implementatio...

D. Benhaddou D. Gurkan F. Figueroa J. Morris X. Yuan

2007-01-01

383

Synchronization Analysis and Simulation of a Standard IEEE 802.11G OFDM Signal.  

National Technical Information Service (NTIS)

Synchronization of orthogonal frequency-division multiplexed (OFDM) signals is significantly more difficult than synchronization of a single-carrier system. The recently approved IEEE Standard 802,1 ig specifies a packet-based OFDM system that provides a ...

K. D. Lowham

2004-01-01

384

Developing IEEE medical device standards: a case study, wearable cuffless blood pressure measuring devices.  

PubMed

The Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA) is a leading standards developing organization of global industry standards in a wide-range of industries, including biomedical and healthcare. PMID:21097060

Carey, Carole C; Zhang, Yuang-Ting

2010-01-01

385

IEC 61883 and AV/C CTS-based IEEE 1394 digital home appliances control  

NASA Astrophysics Data System (ADS)

There are a lot of home network technologies. One of them is IEEE 1394 technology that supports automatic configuration, QoS guaranteed real-time A/V transmission and high bandwidth. In the near future, IEEE 1394 home network will be deployed and IEEE 1394 digital home appliances will be universally available at a reasonable price for customers. Then, one needs an integrated control technology. This kind of control technology is based on IEC 61883-1 FCP and AV/C CTS. This paper issues the IEEE 1394-based technology to control digital home appliances and the test results from its implementation show the possibility to be used in a home gateway as a simple but effective control technology.

Kim, Il-Jung; Yang, Soo-Kyung; Rhee, Seung Hak; Choy, Ik Soo; Park, Jong-An

2001-12-01

386

An SNMP-based solution to enable remote ISO/IEEE 11073 technical management.  

PubMed

This paper presents the design and implementation of an architecture based on the integration of simple network management protocol version 3 (SNMPv3) and the standard ISO/IEEE 11073 (X73) to manage technical information in home-based telemonitoring scenarios. This architecture includes the development of an SNMPv3-proxyX73 agent which comprises a management information base (MIB) module adapted to X73. In the proposed scenario, medical devices (MDs) send information to a concentrator device [designated as compute engine (CE)] using the X73 standard. This information together with extra information collected in the CE is stored in the developed MIB. Finally, the information collected is available for remote access via SNMP connection. Moreover, alarms and events can be configured by an external manager in order to provide warnings of irregularities in the MDs' technical performance evaluation. This proposed SNMPv3 agent provides a solution to integrate and unify technical device management in home-based telemonitoring scenarios fully adapted to X73. PMID:22491096

Lasierra, Nelia; Alesanco, Alvaro; García, José

2012-04-04

387

A Novel Interference Avoidance Technique on Mobile Wireless Routers Using IEEE802.11n PSMP  

NASA Astrophysics Data System (ADS)

This paper proposes an interference avoidance technique that allows wireless device with similar frequency bands to be operated adjacent to each other for compact mobile wireless routers (MWRs). This MWR implements two devices of Wireless LAN (WLAN) and Worldwide Interoperability for Microwave Access (WiMAX). The MWR connects WLAN terminals to the backbone network by using WiMAX-WLAN relay. Generally, different frequency channels are assigned for the wireless systems assign in order not to interfere among multiple systems. However, mutual system interference is generated if the space between each device is very close and if the frequency using each system is adjacent. To suppress this interference, this paper proposes a novel interference avoidance technique that leverages IEEE802.11n Power Save Multi-Poll (PSMP). First, we clarify the conditions that raise the issues of mutual interference by experiment. Simulations are conducted to show that the proposed scheme outperforms the conventional schemes. Finally, the effectiveness of the proposed scheme is shown by the computer simulation.

Kishida, Akira; Hiraguri, Takefumi; Ogawa, Masakatsu; Nishimori, Kentaro; Honma, Naoki; Sakata, Tetsu

388

O brother, where art thou located?: raising awareness of variability in location tracking for users of location-based pervasive applications  

Microsoft Academic Search

There is a diversity of ways to determine a user's location in a pervasive environment today. On a large scale, this diversity often results in variability of location tracking conditions throughout the environment. For an important class of pervasive applications, which often rely on the ubiquitous availability of location tracking – location-based pervasive applications, the consistency of their behaviour under

Petr Aksenov; Kris Luyten; Karin Coninx

2012-01-01

389

Performance investigation and optimization of IEEE802.15.4 for industrial wireless sensor networks  

Microsoft Academic Search

This paper evaluates the performance of IEEE 802.15.4 for industrial wireless sensor networks. The IEEE 802.15.4 protocol has got the ability to provide real time data transmission in wireless sensor networks using guaranteed time slots (GTS) as medium access control mechanism. According to the standard, a maximum of 7 GTSs can be allocated in one superframe. All GTSs are exclusively

Mohsin Hameed; Henning Trsek; Olaf Graeser; Juergen Jasperneite

2008-01-01

390

A Markovian Framework for Performance Evaluation of IEEE 802.11  

Microsoft Academic Search

A new approach for modeling and performance analysis of the IEEE 802.11 medium access control (MAC) protocol is presented. The approach is based on the so-called system approximation technique, where the protocol service time distribution of the IEEE 802.11 MAC protocol is studied and approximated by an appropriate phase-type distribution, leading to the construction of a versatile queueing model which

Chuan Heng Foh; Moshe Zukerman; Juki Wirawan Tantra

2007-01-01

391

The realization of a real-time distributed control systems using IEEE1394 for humanoid robot  

Microsoft Academic Search

In this paper, we introduce the realization of a IEEE-1394 real-time distributed control system and a motor controller for a humanoid robot. The realization of the real-time distributed control system is executed in the humanoid robot MAHRU, developed by Korea Institute of Science and Technology. Also, we point out that bus reset problem of IEEE-1394 can result in a control

Young-Su Cha; Eun-Ho Seo; Doik Kim; Bum-Jae You

2010-01-01

392

Cumulative-TIM Method for the Sleep Mode in IEEE 802.16e Wireless MAN  

Microsoft Academic Search

\\u000a The IEEE 802.16e WMAN (Wireless Metropolitan Area Networks), which has been designed for fixed or mobile broadband wireless\\u000a access, is getting into the spotlight as the base technology for the mobile Internet. As most mobile stations are battery-powered\\u000a in wireless environment, energy efficient protocols are essential for their practical use. Although many systems, including\\u000a the IEEE 802.16e, adopt the sleep

Byungjoo Lee; Hyukjoon Lee; Seung Hyong Rhee; Jae Kyun Kwon; Jae Young Ahn

2006-01-01

393

Ultra wideband signal impact on IEEE802.11b and Bluetooth performances  

Microsoft Academic Search

This paper presents the results of a co-existence study investigating the impact of ultra wideband (UWB) interference on IEEE802.11b and Bluetooth networks. Results are based on the experimental test measurements made at the University of Oulu, Finland using simple high power UWB transmitter prototypes as interference sources. Preliminary results showed that, under the extreme conditions of this experiment, both IEEE802.11b

Matti Hämäläinen; Jani Saloranta; Juha-Pekka Mäkelä; Ian Oppermann; Tero Patana

2003-01-01

394

Ultra wideband signal impact on IEEE802.1 lb and Bluetooth performances  

Microsoft Academic Search

This paper presents the results of a co-existence study investigating the impact of ultra wideband (UWB) interference on IEEE802.11b and Bluetooth networks. Results are based on the experimental test measurements made at the University of Oulu, Finland using simple high power UWB transmitter prototypes as interference sources. Preliminary results showed that, under the extreme conditions of this experiment, both IEEE802.11b

M. Hamalainen; J. Saloranta; J.-P. Makela; I. Oppermann; T. Patana

2003-01-01

395

Performance Analysis of Video Transmission Over IEEE 802.11a\\/e WLANs  

Microsoft Academic Search

This paper presents efficient mechanisms for delay- sensitive transmission of video over IEEE 802.11a\\/e wireless local area networks (WLANs). Transmitting video over WLANs in real time is very challenging due to the time-varying wireless channel and video content characteristics. This paper provides a comprehensive view of how to adapt the quality of service signaling, IEEE 802.11e parameters and cross-layer design

Sai Shankar N; Mihaela van der Schaar

2007-01-01

396

The IEEE Oceanic Engineering Society at Forty: The Challenges of an Evolving Society  

Microsoft Academic Search

The IEEE oceanic engineering society (OES) has completed forty years of active engagement: the initial eight years in the form of the oceanography coordinating committee (OCC), followed by seven years as the council of oceanic engineering (COE), then the past twenty-five years in the form of an IEEE society. During those forty years, the OCC\\/COE\\/OES has existed to serve society,

Stanley G. Chamberlain; Joseph Czika; Norman D. Miller; Glen N. Williams

2008-01-01

397

Analysis of IEEE 802.11e for QoS support in wireless LANs  

Microsoft Academic Search

The IEEE 802.11e medium access control protocol is an emerging standard for wireless local area networks providing quality of service. An overview of this standard based on the current draft is presented on this article. We analyze the enhancements in 802.11 standard. The new hybrid coordination function of the IEEE 802.11e with its contention-based and contention-free (controlled) medium access control

S. Mangold; Sunghyun Choi; G. R. Hiertz; O. Klein; B. Walke

2003-01-01

398

IEEE 802.11 e contention-based channel access (EDCF) performance evaluation  

Microsoft Academic Search

IEEE 802.11 e medium access control (MAC) is an emerging supplement to the IEEE 802.11 wireless local area network (WLAN) standard to support quality-of-service (QoS). The 802.11e MAC is based on both centrally-controlled and contention-based channel accesses. In this paper, we evaluate the contention-based channel access mechanism, called enhanced distributed coordination function (EDCF), in comparison with the 802.11 legacy MAC.

Sunghyun Choi; Javier del Prado; Sai Shankar N; Stefan Mangold

2003-01-01

399

Improving throughput for heterogeneous traffic in IEEE802.11e EDCA  

Microsoft Academic Search

An analytical model is proposed to describe the priority schemes of the enhanced distributed channel access (EDCA) mechanism of the IEEE 802.11e standard. EDCA provides class-based differentiated quality of service (QoS) to IEEE 802.11 wireless local area networks (WLANs). However, One of the main challenges with 802.11e EDCA is the configuration of the open parameters of this mechanism, namely arbitration

Tu Jun; Xia Xing; Chen Zhi-lan; Ye Zhi-wei; Zhang Zhi

2009-01-01

400

Properties of the IEEE-STD-1057 four-parameter sine wave fit algorithm  

Microsoft Academic Search

The IEEE Standard 1057 (IEEE-STD-1057) provides algorithms for fitting the parameters of a sine wave to noisy discrete time observations. The fit is obtained as an approximate minimizer of the sum of squared errors, i.e., the difference between observations and model output. The contributions of this paper include a comparison of the performance of the four-parameter algorithm in the standard

Peter Händel

2000-01-01

401

Novel ISO\\/IEEE 11073 Standards for Personal Telehealth Systems Interoperability  

Microsoft Academic Search

The formation of an ISO\\/IEEE 11073 personal health device data work group has been announced. The group aims at enabling plug-and-play interoperability for personal health devices by developing new standards within the family of existing ISO\\/IEEE 11073 standards for medical device communications. These new standards address transport-independent application and information profiles between personal telehealth devices and monitors. In this work

L. Schmitt; T. Falck; F. Wartena; D. Simons

2007-01-01

402

Performance Evaluation, System Design and Network Deployment of IEEE 802.11  

Microsoft Academic Search

This paper presents a system design technique for the IEEE 802.11 Wireless Local Area Network (WLAN) considering the significant parameters namely coverage, cell\\/frequency planning, interference, power management and data rate. The effect of the parameters on the performance of IEEE 802.11 in terms of throughput has been discussed using measurement and numerical results.These results and concepts are extremely important not

Anand R. Prasad; Neeli R. Prasad; Ad Kamerman; Henri Moelard; Albert Eikelenboom

2001-01-01

403

Performance analysis of IEEE 802.11e contention-based channel access  

Microsoft Academic Search

The new standard IEEE 802.11e is specified to support quality-of-service in wireless local area networks. A comprehensive study of the performance of enhanced distributed channel access (EDCA), the fundamental medium access con- trol mechanism in IEEE 802.11e, is reported in this paper. We present our development of an analytical model, in which most new features of the EDCA such as

Zhen-ning Kong; Danny H. K. Tsang; Brahim Bensaou; Deyun Gao

2004-01-01

404

Analysis of IEEE 802.11 in Radio over Fiber Home Networks  

Microsoft Academic Search

Radio over fiber (RoF) techniques have been developed to combine the mobility of wireless technologies and the huge bandwidth offered by optical fibers. In this paper, we present the concept of a hybrid radio-fiber system using IEEE 802.11 specifications as a solution for future broadband in-house networks. An analysis on the feasibility of applying RoF techniques to the IEEE 802.11's

Bao Linh Dang; Ignas G. Niemegeers

2005-01-01

405

IEEE 802.16m energy-efficient sleep mode operation analysis with mean delay restriction  

Microsoft Academic Search

IEEE 802.16e standard currently supports mobile subscriber stations, which substantiates the need for energy-efficient communication. In this paper we analyze a novel sleep mode mechanism to be considered for the future IEEE 802.16m standard. We study the overall message delay in the downlink channel and explicitly account for the sleep mode power consumption. Simple expressions are given based on M\\/D\\/1

Alexey Anisimov; Sergey D. Andreev; Andrey M. Turlikov

2009-01-01

406

On power and energy trends of IEEE 802.11n PHY  

Microsoft Academic Search

The main contribution of this work is to decipher the power and energy characteristics of IEEE 802.11 PHY. In this work, we implement an IEEE 802.11n receiver and transmitter benchmark and measure power using an HDL-based scalable clustered-processor called CLAW. Second, we show that such a scalable processor can help conserve power and energy without sacrificing performance. We were able

Balaji V. Iyer; Thomas M. Conte

2009-01-01

407

Determinating timing channels in compute clouds  

Microsoft Academic Search

Timing side-channels represent an insidious security challenge for cloud computing, because: (a) massive parallelism in the cloud makes timing channels pervasive and hard to control; (b) timing channels enable one customer to steal information from another without leaving a trail or raising alarms; (c) only the cloud provider can feasibly detect and report such attacks, but the provider's incentives are

Amittai Aviram; Sen Hu; Bryan Ford; Ramakrishna Gummadi

2010-01-01

408

Managing Wearable Sensor Data through Cloud Computing  

Microsoft Academic Search

Mobile pervasive healthcare technologies can support a wide range of applications and services including patient monitoring and emergency response. At the same time they introduce several challenges, like data storage and management, interoperability and availability of heterogeneous resources, unified and ubiquitous access issues. One potential solution for addressing all aforementioned issues is the introduction of the Cloud Computing concept. Within

Charalampos Doukas; Ilias Maglogiannis

2011-01-01

409

Fast handover scheme for real-time downlink services in IEEE 802.16e BWA system  

Microsoft Academic Search

IEEE 802.16 WirelessMAN aiming to broadband wireless access (BWA) is evolving to 4G mobile communication systems through the standardization of IEEE 802.16e supporting mobility on existing fixed WirelessMAN systems. Because IEEE 802.16e system is based on OFDM(A) technology, a mobile subscriber station (MSS) basically conducts hard handover operation when it moves to another base station (BS). Therefore, the MSS is

Sik Choi; Gyung-Ho Hwang; Taesoo Kwon; Ae-Ri Lim; Dong-Ho Cho

2005-01-01

410

Evolution, insights and challenges of the PHY layer for the emerging ieee 802.11n amendment  

Microsoft Academic Search

IEEE 802.11n is a newly emerged WLAN standard capable of providing dramatically increased throughput, as well as improved range, reduced signal fading, over the existing IEEE 802.11a\\/g WLAN standards. These benefits are achieved through use of MIMO (multiple-input,multiple-output). The latest draft for IEEE 802.11n describes rates up to 600 Mbps, exceeding the maximum rate with the 11a\\/g standards by more

Thomas K. Paul; Tokunbo Ogunfunmi

2009-01-01

411

Promoting Social Skill Development in Children With Pervasive Developmental Disorders: A Feasibility and Efficacy Study  

Microsoft Academic Search

A randomized controlled design was employed to evaluate a social skills intervention for children with pervasive developmental\\u000a disorders. Aims included evaluating the acceptability of the program and gathering preliminary evidence on efficacy. Forty-four\\u000a children, ages 8–11 years, were randomly assigned to treatment or wait list. Treatment consisted of a 16-week group intervention\\u000a designed to teach appropriate social behavior. Between group comparisons

Kathleen KoenigSusan; Susan Williams White; Maryellen Pachler; Monika Lau; Moira Lewis; Ami Klin; Lawrence Scahill

2010-01-01

412

Abnormalities on the Neurological Examination and EEG in Young Children with Pervasive Developmental Disorders  

Microsoft Academic Search

This study examined the nature and frequency of neurological and EEG abnormalities in 60 young children (ages 2–6 years) with\\u000a pervasive developmental disorders. A number of standard neurological functions could not be adequately assessed due to the\\u000a young age of the children and\\/or limited comprehension and cooperation. The most common neurological deficits were hyporeflexia,\\u000a stereotypies, and hypotonia. EEG abnormalities were identified

Natacha Akshoomoff; Nikdokht Farid; Eric Courchesne; Richard Haas

2007-01-01

413

Context-aware content filtering & presentation for pervasive & mobile information systems  

Microsoft Academic Search

What constitutes relevant information to an individual may vary widely under different contexts. However, previous work on pervasive information systems has mostly focused on context-aware delivery of application-specific information. Such systems are only able to operate within narrow application domains and cannot be generalized to handle other heterogeneous types of information. To fill this gap, we propose a context-aware system

Kaijian Xu; Manli Zhu; Daqing Zhang; Tao Gu

2008-01-01

414

The Underwhelming Effects of Location Awareness of Others on Collaboration in a Pervasive Game  

Microsoft Academic Search

In this paper we seek to empirically study the use of location-awareness of others in the context of mobile collaboration. We report on a field experiment carried out using a pervasive game we developed called CatchBob!. Using both quantitative and qualitative data, we show the underwhelming effects of automating location-awareness. Our results indeed shows that automating this process does not

Nicolas NOVA; Fabien GIRARDIN; Gaëlle MOLINARI

415

Timing of Social Gaze Behavior in Children with a Pervasive Developmental Disorder  

Microsoft Academic Search

The aim of the study was to compare social initiatives and gaze behavior in low-functioning children with a pervasive developmental disorder (PDD), high-functioning children with a PDD, children with a language disorder, and normally developing children. Behavior of the children was observed while they watched television and performed a playful task with a parent. Compared to the high-functioning children, the

Sophie H. N. Willemsen-Swinkels; Jan K. Buitelaar; Florence G. Weijnen; Herman van Engeland

1998-01-01

416

Cognitive Biases in Childhood Anxiety, Depression, and Aggression: Are They Pervasive or Specific?  

Microsoft Academic Search

This study investigated the extent to which children’s negative information processing biases are pervasive across the cognitive modalities of attention, judgment, and memory and, further, whether such biases are specifically associated with anxiety, depression, and\\/or aggression. 133 children between the ages of 8 and 14 years were assessed on an attention allocation task, a vignette interpretation measure, and a memory recall

Sophie C. Reid; Karen Salmon; Peter F. Lovibond

2006-01-01

417

Parent-directed, intensive early intervention for children with pervasive developmental disorder  

Microsoft Academic Search

We examined parent-directed, intensive early intervention for children with Pervasive Developmental Disorder. Children’s parents recruited paraprofessional therapists and requested consultations on how to implement the UCLA treatment model in their homes (Smith & Lovaas, 1998). Parents and therapists then received six one-day workshops over a five-month period, with additional consultations for the next 2–3 years. Six boys participated (intake age

Tristram Smith; Gregory A. Buch; Tanya Evslin Gamby

2000-01-01

418

A Framework for Managing the Solution Life Cycle of Event-Driven Pervasive Applications  

Microsoft Academic Search

Event-driven, embedded applications that embody the composition of many disparate components are emerging as an important\\u000a class of pervasive applications. For such applications, realizing solutions often requires a breadth of expertise. Consequently,\\u000a managing the solution life cycle can be a very complex, time-intensive process. In this paper, we present a framework that\\u000a eases the complexity of managing the life cycle

Johnathan M. Reason; Han Chen; Changwoo Jung; Sunwoo Lee; Danny Wong; Andrew Kim; Sooyeon Kim; Jihye Rhim; Paul B. Chou; Kangyoon Lee

2006-01-01

419

Blowtooth: a provocative pervasive game for smuggling virtual drugs through real airport security  

Microsoft Academic Search

In this paper, we describe a pervasive game, Blowtooth, in which players use their mobile phones to hide virtual drugs on\\u000a nearby airline passengers in real airport check-in queues. After passing through airport security, the player must find and\\u000a recover their drugs from the innocent bystanders, without them ever realising they were involved in the game. The game explores\\u000a the

Ben Kirman; Conor Linehan; Shaun Lawson

420

Real-Time Interactive Medical Consultation Using a Pervasive Healthcare Architecture  

Microsoft Academic Search

\\u000a The phenomenon of an aging society has derived problems such as shortage of medical resources, rising healthcare costs and\\u000a reduction of quality in healthcare services. Pervasive healthcare aims to alleviate these problems, but many issues remain\\u000a to be resolved. This paper presents a system called CARA (Context Aware Real-time Assistant) whose design goals are to address\\u000a these issues in a

Bingchuan Yuan; John Herbert

421

Regression of language and non-language skills in pervasive developmental disorders  

Microsoft Academic Search

Background As part of the pervasive developmen- tal disorders (PDD), there is a subgroup of indi- viduals reported to have a different onset of symptom appearance consisting of an apparently normal early development, followed by a loss of verbal and\\/or non-verbal skills prior to 2 years of age.This study aims at comparing the symptoma- tology of children who displayed a

A.-A. S. Meilleur; E. Fombonne

2008-01-01

422

Does pervasive developmental disorder protect children and adolescents against drug and alcohol use?  

Microsoft Academic Search

Aim  The aim of this paper is (1) to compare the rates of reported drug and\\/or alcohol use (DAU) in treatment seeking adolescents\\u000a with Pervasive Developmental Disorders (PDD), and those with other psychiatric diagnoses (psychiatric controls) seen in tertiary\\u000a child and adolescent mental health services and (2) to explore the relationship of psychopathology, environmental stressors,\\u000a and social communication difficulties to DAU.

Paramala J Santosh; Angela Mijovic

2006-01-01

423

Atypical antipsychotics in children and adolescents with autistic and other pervasive developmental disorders.  

PubMed

Atypical antipsychotics are emerging as the first-line pharmacologic treatment for irritability (i.e., aggression, self-injurious behavior, and severe tantrums) in children and adolescents with autistic and other pervasive developmental disorders. Results from placebo-controlled and open-label studies of clozapine, risperidone, olanzapine, quetiapine, ziprasidone, and aripiprazole in this subject population are reviewed. Additional placebo-controlled trials and studies of longer-term safety and tolerability are needed. PMID:18533764

McDougle, Christopher J; Stigler, Kimberly A; Erickson, Craig A; Posey, David J

2008-01-01

424

A Behavior-Based Approach to Food Refusal in Children with Autism and Pervasive Developmental Disorder  

Microsoft Academic Search

Four children (ages 4-5 years) with autism or pervasive developmental disorder (PDD) participated in a four week, single-case design intervention study. Each child had a behavior-based feeding problem that included food refusal and selectivity. Individual interventions were carried out in the classroom during lunchtime over four weeks. Small positive changes were observed in each child's feeding behavior without any negative

B Ogata; C Trahms; B Lucas; I Schwartz

1999-01-01

425

Computer-Based Discovery in Federal Civil Litigation.  

National Technical Information Service (NTIS)

Discovery is changing in response to the pervasive use of computers. More and more cases involve e-mail, word-processed documents, spreadsheets, and records of Internet activity. In some cases, computer-based discovery can be routine and uneventful. The p...

K. J. Withers

2011-01-01

426

Multi-processor Computer System Having Low Power Consumption  

Microsoft Academic Search

We propose to improve battery life in pervasive devices by using multiple processors that trade off computing capacity for improved energy-per-cycle (EPC) efficiency. A separate scheduler circuit intercepts interrupts and schedules execution to minimize overall energy consumption. To facilitate this operation, software tasks are compiled and profiled for execution on multiple processors so that task requirements to computing capacities may

C. Michael Olsen; L. Alex Morrow

2002-01-01

427

[Review of assessment methods used to evaluate feeding for children with pervasive developmental disorder].  

PubMed

Current evaluations used by occupational therapists to assess and treat feeding problems derive mainly from the domain of dysphagia. The purpose of this article is to familiarize the reader with tools used, in research, for children with pervasive developmental disorders (PDD) and to determine if any of these meet the needs of occupational therapists. The following data bases were searched: Medline, CINAHL, HAPI and PsyINFO, using the terms pervasive developmental disorder, autism, Asperger syndrome, pervasive developmental disorder not otherwise specified, eating behavior, eating disorder, food preference, food selectivity, feeding disorders, picky eater and child. All articles published between 1980 and 2006 (n=27) were reviewed. A total of 20 studies met our selection criteria. Assessment methods are compared using the Disability Creation Model (DCP). The DCP is the Quebec alternative to the International Classification of Functioning, Disability and Health (ICF). None of the evaluation tools reviewed met all factors that may influence eating in children with PDD. Implications for research and practice in occupational therapy are discussed. PMID:18562184

Nadon, G; Ehrmann Feldman, D; Gisel, E

2008-06-17

428

IEEE issues high-impedance fault detection report  

SciTech Connect

High-impedance faults (HIF) on distribution circuits create unique challenges for the protection engineer. In response to this problem, Working Group D15 of the Institute of Electrical and Electronics Engineers (IEEE) Power System Relaying Committee had issued a report on HIF detection technology. A ground HIF occurs when a primary conductor makes unwanted electrical contact with a road surface, sidewalk, sod, tree limb, or with some other surface or object which restricts the flow of fault current to a level below that which can be reliably detected by conventional overcurrent devices. Often this situation leaves a conductor energized on the ground and poses a danger to the public. No all unsafe conditions involve an HIF. For example, a conductor may sag to a point near the ground or may break but still not touch a grounded element or another conductor. An HIF does not have to involve a path to ground. In fact, whether a ground is involved does not matter to an HIF detector. For example, a tree limb may bridge two-phase conductors.

Beaty, W. [ed.

1996-10-01

429

Characteristic features of research article titles in computer science  

Microsoft Academic Search

Previous researchers have given conflicting views as to what makes a “good” research article (RA) title. In this paper, characteristic features of research article titles, including length, punctuation usage, word frequency, and preposition usage are investigated using a corpus of 600 research articles from the six journals of the IEEE Computer Society. Results show, while some of the intuitive observations

LAURENCE ANTHONY

2001-01-01

430

An introductory course on Human-Computer Interaction: Programme, bibliography, practical classes and assignments  

Microsoft Academic Search

As computing curricula have evolved, human–computer interaction has gradually become part of many of them, and the recent ACM\\/IEEE report on the core of computing science and engineering includes human–computer interaction as one of the fundamental sub-areas that should be addressed. However, both technology and human–computer interaction are developing rapidly, thus a continuous effort is needed to maintain a programme,

Beatriz Sousa Santos

2006-01-01

431

Shifting from a Computer Game to a Physical Game: A Case Study of ePet  

Microsoft Academic Search

This paper presents the patterns about shifting a computer game to a physical game which is usually the pervasive and social computing based on wireless sensor networks (WSN), RFID, GPS and other mobile devices. These shift patterns, focused on the aspects that most computer games highlight and guidelines for transforming these aspects into physical forms, help people design and implement

Wei-hua TAN; Wen-jun LI; Xiao-cong ZHOU; Xiao-bin Zhang

2008-01-01

432

Work in progress-adaptation of a computer networks curriculum for nontechnical audience  

Microsoft Academic Search

A variety of computer networks related courses are being offered as part of mainstream curricula at the undergraduate as well as graduate level in many engineering and computer science programs. The pervasiveness of computer networks in all aspects of industry and education make a basic understanding of networking as important to nonscience majors as other scientific disciplines such as physics

Jay Pfaffman; Itamar Elhanany

2004-01-01

433

Comparison of QoS guarantee techniques for VoIP over IEEE802.11 wireless LAN  

NASA Astrophysics Data System (ADS)

An emerging killer application for enterprise wireless LANs (WLANs) is voice over IP (VoIP) telephony, which promises to greatly improve the reachability and mobility of enterprise telephony service at low cost. None of the commercial IEEE 802.11 WLAN-based VoIP products can support more than ten G.729-quality voice conversations over a single IEEE 802.11b channel on real-world WLANs, even though the physical transmission rate is more than two orders of magnitude higher than an individual VoIP connection's bandwidth requirement. There are two main reasons why these VoIP systems' effective throughput is significantly lower than expected: VoIP's stringent latency requirement and substantial per-WLAN-packet overhead. Time-Division Multiple Access (TDMA) is a well-known technique that provides per-connection QoS guarantee as well as improves the radio channel utilization efficiency. This paper compares the effective throughput of IEEE 802.11, IEEE 802.11e and a software-based TDMA (STDMA) protocol that is specifically designed to support WLAN-based VoIP applications, on the same commodity IEEE 802.11 WLAN hardware. Empirical measurements from a VOIP over WLAN testbed show that the numbers of G.729-quality voice conversations that IEEE 802.11, IEEE 802.11e and STDMA can support over a single IEEE 802.11b channel are 18, 22 and 50, respectively.

Guo, Fanglu; Chiueh, Tzi-cker

2008-01-01

434

Implementation of an IEEE 1451 Smart Quartz Tuning fork Temperature Transducer for Real-time Distributed Measurement and Control System  

Microsoft Academic Search

The IEEE 1451 smart transducer interface standards was created to provide the common interface and enabling technology for the connectivity of transducers to realtime distributed measurement and control system. The standardized TEDS specified by IEEE 1451.2 allow the self-description of sensors and the interfaces provide a standardized mechanism to facilitate the 'plug and play' of sensors to networks. A smart

Jun Xu; Bo You; Quanli Li

2006-01-01

435

IEEE Std 730 Software Quality Assurance: Supporting CMMI-DEV v1.3, Product and Process Quality Assurance.  

National Technical Information Service (NTIS)

The latest CMMI-DEV version 1.3 shows over 50 instances of Quality Assurance (QA). It is clear that CMMI-DEV and IEEE 730 SQA need to align. The P730 IEEE standards working group has expanded the scope of the SQA process standard to align with IS 12207 so...

J. Walz S. Caroll

2011-01-01

436

Power plant performance indices in new market environment: IEEE standard 762 working group activities and GADS database  

Microsoft Academic Search

As the electric power industry moves towards a new market environment, it became necessary to review and modify existing indicators of power plant performance. Thus, the IEEE created a review team of power plant experts to review and update IEEE standard 762, \\

G. M. Curley

2006-01-01

437

From computers to ubiquitous computing by 2010: health care.  

PubMed

Over the past decade, miniaturization and cost reduction in semiconductors have led to computers smaller in size than a pinhead with powerful processing abilities that are affordable enough to be disposable. Similar advances in wireless communication, sensor design and energy storage have meant that the concept of a truly pervasive 'wireless sensor network', used to monitor environments and objects within them, has become a reality. The need for a wireless sensor network designed specifically for human body monitoring has led to the development of wireless 'body sensor network' (BSN) platforms composed of tiny integrated microsensors with on-board processing and wireless data transfer capability. The ubiquitous computing abilities of BSNs offer the prospect of continuous monitoring of human health in any environment, be it home, hospital, outdoors or the workplace. This pervasive technology comes at a time when Western world health care costs have sharply risen, reflected by increasing expenditure on health care as a proportion of gross domestic product over the last 20 years. Drivers of this rise include an ageing post 'baby boom' population, higher incidence of chronic disease and the need for earlier diagnosis. This paper outlines the role of pervasive health care technologies in providing more efficient health care. PMID:18672456

Aziz, Omer; Lo, Benny; Pansiot, Julien; Atallah, Louis; Yang, Guang-Zhong; Darzi, Ara

2008-10-28

438

Enhanced PHY symbol structure based on the IEEE 802.15.4a standardization and orthogonal pulses for 3D positioning  

NASA Astrophysics Data System (ADS)

According to IEEE 802.15.4a standardization, an ultra wideband PHY symbol is capable of carrying two bits of information and only one pulse shall be transmitted in each symbol. To prevent inter symbol interference caused by multipath effect, the guard interval is present between the possible burst positions. In order to make full use of the symbol for estimating the azimuth and the elevation of target, we can add additional information at the guard interval position, if the pulse used at the possible burst position is different from the pulse used at the guard interval position. Using the orthonormality between the multiple pulses, furthermore, inter symbol interference can be avoided at the correlation receiver. In this paper, as the first step for estimating the azimuth and the elevation information, we propose a novel PHY symbol structure for IR-UWB system based on IEEE 802.15.4a standardization and orthogonal pulses to enhance the data rates without the bit-error-rate (BER) performance degradation. In the proposed scheme, the pulse used at the possible burst position is the modified hermite polynomial (MHP) pulse of order n equal to 3 and the pulse used at guard interval position is the MHP pulse of order n equal to 4. The performance of the proposed structure is evaluated by computer simulations over the IEEE 802.15.4a channel model. Simulation results show that the proposed symbol structure with orthogonal pulses can double the data rates of the systems without BER performance degradation. [Figure not available: see fulltext.

Jing, Changqiang; Jeon, Inho; Kim, Youngok

2011-12-01

439

A PERVASIVE BROAD COMPONENT IN H I EMISSION LINE PROFILES: TEMPERATURE, TURBULENCE, OR A HELIUM SIGNATURE?  

SciTech Connect

Gaussian analysis of interstellar neutral hydrogen emission profiles has revealed a pervasive broad component with a width on the order of 34 km s{sup -1}. When present, this component can most readily be identified in high galactic latitude directions where the H I profiles are either intrinsically weak or simple. Examination of published data reveals that this characteristic line width has been found in a variety of other H I features including compact high-velocity clouds, very-high-velocity clouds, and the Magellanic Stream. When its presence is accounted for in the analysis of H I profiles, other families of line widths at 14 and 6 km s{sup -1} are clearly revealed. Possible mechanisms for producing this broad background component are discussed, including temperature, turbulence, and the critical ionization velocity effect. A line width on the order of 34 km s{sup -1} would imply a kinetic temperature of 24,000 K, too high to keep the gas neutral; hence it should not be observed in H I emission spectra. Turbulent motions could explain a pervasive broad component, but not why it always has the same numerical value in various classes of H I emission line features. The critical ionization velocity effect hypothesis is intriguing because 34 km s{sup -1} is the value for helium. Clearly, this could be a coincidence but the other prominent distribution peaks correspond to two families of critical ionization velocities of abundant interstellar elements including C, N, and O (about 14 km s{sup -1}) and metals (about 6 km s{sup -1}). Unfortunately, the mechanism by which this effect operates, even in laboratory situations, is not clearly understood. It is suggested that further investigation of the distribution of H I component line widths by allowing for the existence of a pervasive broad underlying component may cast a clearer light on this intriguing phenomenon.

Verschuur, G. L.; Schmelz, J. T., E-mail: gverschr@memphis.ed, E-mail: jschmelz@memphis.ed [Physics Department, University of Memphis, Memphis, TN 38152 (United States)

2010-06-15

440

Performance Analysis of Sleep Mode Operation in IEEE 802.16m Mobile WiMAX  

NASA Astrophysics Data System (ADS)

We mathematically analyze the sleep mode operation of IEEE 802.16m. The sleep mode operation for downlink traffic is modeled as a 3-dimensional discrete time Markov chain. We obtain the average power consumption of a mobile station and the average delay of a message. Numerical results match simulations very well. Numerical results show that there is a tradeoff between power consumption and message delay. We find the optimal lengths of sleep cycle and close-down time that minimize the power consumption while satisfying the quality of service (QoS) constraint on message delay. The power consumption of the sleep mode in IEEE 802.16m is better than that of sleep modes in legacy IEEE 802.16e standard under the same delay bound.

Baek, Sangkyu; Son, Jung Je; Choi, Bong Dae

441

Throughput and delay analysis of IEEE 802.15.6-based CSMA/CA protocol.  

PubMed

The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) that focuses on a variety of medical, Consumer Electronics (CE) and entertainment applications. In this paper, the throughput and delay performance of the IEEE 802.15.6 is presented. Numerical formulas are derived to determine the maximum throughput and minimum delay limits of the IEEE 802.15.6 for an ideal channel with no transmission errors. These limits are derived for different frequency bands and data rates. Our analysis is validated by extensive simulations using a custom C+?+ simulator. Based on analytical and simulation results, useful conclusions are derived for network provisioning and packet size optimization for different applications. PMID:22777183

Ullah, Sana; Chen, Min; Kwak, Kyung Sup

2012-07-10

442

Automatically augmenting lifelog events using pervasively generated content from millions of people.  

PubMed

In sensor research we take advantage of additional contextual sensor information to disambiguate potentially erroneous sensor readings or to make better informed decisions on a single sensor's output. This use of additional information reinforces, validates, semantically enriches, and augments sensed data. Lifelog data is challenging to augment, as it tracks one's life with many images including the places they go, making it non-trivial to find associated sources of information. We investigate realising the goal of pervasive user-generated content based on sensors, by augmenting passive visual lifelogs with "Web 2.0" content collected by millions of other individuals. PMID:22294880

Doherty, Aiden R; Smeaton, Alan F

2010-02-26

443

Teaching toilet skills in a public school setting to a child with pervasive developmental disorder.  

PubMed

An 8-year old boy with Pervasive Developmental Disorder (PDD) was taught toileting skills within a public elementary school. During baseline, he never urinated successfully in the toilet and wore a disposable diaper throughout the day. The training program included scheduling a toileting opportunity at a time that increased the likelihood of urination and providing positive reinforcement when voiding in the toilet occurred. Toileting skills were established rapidly and were maintained when another bathroom visit was added to the toileting schedule, primary reinforcement was eliminated, and the boy no longer wore a disposable diaper. Issues related to behavioral support programming within inclusive educational settings are discussed. PMID:9194013

Luiselli, J K

1997-06-01

444

Symbolization levels in communicative behaviors of children showing pervasive developmental disorders.  

PubMed

A total of 48 children with severe pervasive developmental disturbance were observed in their communicative behaviors across modalities of language, gesture, play, and drawing. As predicted, levels of symbolization in gesture, play, and drawing were significantly intercorrelated and most strongly correlated with the criterion variable of expressive language. Children who were echolalic showed levels of symbolization intermediate between those of mute children and those with nonecholalic language. The correlation between the expressive language measure and a standardized measure of receptive language for 22 testable children also was significant. The results are discussed in the context of earlier studies of symbol production in verbal samples of disturbed and nonhandicapped children. PMID:2449468

Atlas, J A; Lapidus, L B

1988-02-01

445

Automatically Augmenting Lifelog Events Using Pervasively Generated Content from Millions of People  

PubMed Central

In sensor research we take advantage of additional contextual sensor information to disambiguate potentially erroneous sensor readings or to make better informed decisions on a single sensor’s output. This use of additional information reinforces, validates, semantically enriches, and augments sensed data. Lifelog data is challenging to augment, as it tracks one’s life with many images including the places they go, making it non-trivial to find associated sources of information. We investigate realising the goal of pervasive user-generated content based on sensors, by augmenting passive visual lifelogs with “Web 2.0” content collected by millions of other individuals.

Doherty, Aiden R.; Smeaton, Alan F.

2010-01-01

446

Sex Differences in WISC-III Profiles of Children with High-functioning Pervasive Developmental Disorders  

Microsoft Academic Search

Using the Japanese version of the Wechsler Intelligence Scale for Children-Third Edition (WISC-III), 26 girls with high-functioning\\u000a (IQ ? 70) pervasive developmental disorders (HFPDD) (mean age, 8.2 years) were compared with 116 boys with HFPDD (mean age,\\u000a 9.0 years). Compared with the boys, the girls scored significantly higher on the Processing Speed index, Coding, and Symbol\\u000a Search, but scored significantly lower on Block Design.

Tomonori Koyama; Yoko Kamio; Naoko Inada; Hiroshi Kurita

2009-01-01

447

Applying IEEE storage system management standards at the National Storage Laboratory  

SciTech Connect

Since its inception in 1990, the IEEE Storage System Standards Working Group has identified storage-system management as an area in need of further development The pressing need for standards in storage-system management arises from the requirement to exchange management information and to provide control in a consistent predictable manner between the components of a storage system. An appropriate set of management standards will allow multiple vendors to supply storage management subsystems or applications that are integral to or compatible with new storage systems conforming to future IEEE standards. An early, practical application of IEEE storage-system-management work is being pursued at the National Storage Laboratory (NSL), a recently-formed industrial collaboration at Lawrence Livermore National Laboratory. The NSL`s purpose is to develop advanced hardware and software technologies for high-performance, distributed storage systems. Since storage system management is of critical concern, it is being explored in depth at the NSL. Work was initiated to define basic management requirements and develop generalized graphical-user-interface tools using remote-procedure-call mechanisms to implement the NSL`s conceptual management framework. Several constraints were imposed on the development of early versions of this work to maintain compatibility with the NSL`s underlying UniTree-based software architecture and to provide timely prototypes and proof of concept. The project leverages the on-going standards work of the IEEE Storage System Standards Working Group (SSSWG) and also explores some of the relationships and interactions between IEEE storage-system management and more well known management methods for distributed systems and networks. It will have long term benefits by providing ``real-life`` storage-system-management requirements to the IEEE SSSWG for validation of evolving standards.

Louis, S.; Hyer, S.W.

1992-12-04

448

Physical layer simulation results for IEEE 802.15.3c with different channel models  

NASA Astrophysics Data System (ADS)

This paper investigates the performance of the 60 GHz IEEE 802.15.3c physical layer (PHY) specification in terms of bit error rate (BER) against signal to noise ratio. Two PHY modes of the standard have been implemented and simulated, i.e., Single Carrier and High Speed Interface. The first mode uses single carrier (SC) block transmission and the second mode uses orthogonal frequency division multiplexing (OFDM). One of the main issues in the new 60 GHz standards is multipath propagation, which plays an important role in the link quality. Thus, we have tested the PHY with the IEEE standard channel model, ray tracing simulations and real 60 GHz measurements.

Liso Nicolás, M.; Jacob, M.; Kürner, T.

2011-08-01

449

Abnormal Brain Protein Synthesis in Language Areas of Children With Pervasive Developmental Disorder: A L-[1-11C]Leucine PET Study  

Microsoft Academic Search

This study was performed to evaluate the cerebral protein synthesis rate of language brain regions in children with developmental delay with and without pervasive developmental disorder. The authors performed L-[1-11C]-leucine positron emission tomography (PET) on 8 developmental delay children with pervasive developmental disorder (mean age, 76.25 months) and 8 developmental delay children without pervasive developmental disorder (mean age, 77.63 months).

Varun Shandal; Senthil K. Sundaram; Diane C. Chugani; Ajay Kumar; Michael E. Behen; Harry T. Chugani

2011-01-01

450

Supporting collaborative computing and interaction  

SciTech Connect

To enable collaboration on the daily tasks involved in scientific research, collaborative frameworks should provide lightweight and ubiquitous components that support a wide variety of interaction modes. We envision a collaborative environment as one that provides a persistent space within which participants can locate each other, exchange synchronous and asynchronous messages, share documents and applications, share workflow, and hold videoconferences. We are developing the Pervasive Collaborative Computing Environment (PCCE) as such an environment. The PCCE will provide integrated tools to support shared computing and task control and monitoring. This paper describes the PCCE and the rationale for its design.

Agarwal, Deborah; McParland, Charles; Perry, Marcia

2002-05-22

451

Human computer confluence applied in healthcare and rehabilitation.  

PubMed

Human computer confluence (HCC) is an ambitious research program studying how the emerging symbiotic relation between humans and computing devices can enable radically new forms of sensing, perception, interaction, and understanding. It is an interdisciplinary field, bringing together researches from horizons as various as pervasive computing, bio-signals processing, neuroscience, electronics, robotics, virtual & augmented reality, and provides an amazing potential for applications in medicine and rehabilitation. PMID:22954825

Viaud-Delmon, Isabelle; Gaggioli, Andrea; Ferscha, Alois; Dunne, Stephen

2012-01-01

452

Evaluation of Timing Characteristics of Industrial Ethernet Networks Synchronized by means of IEEE 1588  

Microsoft Academic Search

This paper deals with time synchronization of distributed systems over Industrial Ethernet network. A new simulation model of IEEE1588 PTP is presented and discussed. The development platform used for simulation is OPNETtrade. Architecture of the proposed model is explained in details, highlighting some special features introduced by authors: modelization of drift and rate variations in the local oscillator and packet

A. Depari; P. Ferrari; A. Flammini; D. Marioli; A. Taroni

2007-01-01

453

Achieving near maximum throughput in IEEE 802.11 WLANs with contention tone  

Microsoft Academic Search

Future wireless local area networks (WLANs) promise bit rates higher than 100 Mbps. Previous research by Xiao et al reported that the current IEEE 802.11 medium access control (MAC) protocol does not scale well to high bit rate channels. In this letter, we propose an enhancement that uses contention-tone transmitted on a separate narrow band signaling channel. The proposed contention

Juki Wirawan Tantra; Chuan Heng Foh

2006-01-01

454

Comments on IEEE 802.11 saturation throughput analysis with freezing of backoff counters  

Microsoft Academic Search

This letter presents an accurate model for the performance analysis of the IEEE 802.11 saturation throughput with freezing of the backoff counter. The model corrects the existing model presented by Ziouva and Antonakopoulos which assumes that the channel access probability and station collision probability are independent of channel status. Simulation results show the accuracy of the new model.

Chuan Heng Foh; Juki Wirawan Tantra

2005-01-01

455

Throughput analysis of IEEE 802.11 DCF under finite load traffic  

Microsoft Academic Search

Despite the widespread deployment of IEEE 802.11 wireless local area network (WLAN) protocol, not much analysis has been done on modeling its performance. In this paper, we modify a previously introduced station model along with a channel model to deduce the channel throughput under finite load traffic. Our approach allows modeling of all system parameters like the channel state and

Ahmed Nader Zaki; Mahmoud T. El-Hadidi

2004-01-01

456

Extending IEEE 802.11b Wireless Local Area Networks to the Metropolitan Area.  

National Technical Information Service (NTIS)

The IEEE 802.11b wireless local area networking (WLAN) protocol does not specify a maximum permissible range limitation. Rather, the protocol permits network data rates to vary based on the instantaneous link conditions present. This thesis analyzes the i...

P. L. Mallory

2001-01-01

457

Using IEEE 1588 and boundary clocks for clock synchronization in telecom networks  

Microsoft Academic Search

This article describes the use of IEEE 1588 and boundary clocks for clock distribution (phase\\/time transfer) in telecom networks. The technology is primarily used to serve the radio interface synchronization requirements of mobile systems such as WiMAX and LTE, and to reduce the deployment and dependence of GPS systems in base stations. We discuss the most important functions that are

Michel Ouellette; Kuiwen Ji; Song Liu; Han Li

2011-01-01

458

Software model for inverse time overcurrent relays incorporating IEC and IEEE standard curves  

Microsoft Academic Search

This paper describes a software model for the time domain simulation of inverse time overcurrent relays. The software model incorporates the IEC and IEEE standard curves, and was developed using Fortran language under the PSCAD platform. The software model simulates the effect of current on an inverse time overcurrent relay, and can be configured to represent various custom-designed overcurrent relays.

J. C. Tan; P. G. McLaren; R. P. Jayasinghe; P. L. Wilson

2002-01-01

459

Optimal Association of Stations and APs in an IEEE 802.11 WLAN  

Microsoft Academic Search

Abstractó We propose a maximum utility based formulation for the problem of optimal association of wireless stations (STAs) with access points (APs) in an IEEE 802.11 wireless local area net- work. Each STA can associate with one or more APs at differ- ent physical bit rates. Each such association yields certain STA throughputs, depending on the MAC scheduling used. We

Anurag Kumar; Vinod Kumar

460

Throughput Upper Limit for IEEE 802.11 Networks with Block Acknowledge and Frame Aggregation  

NASA Astrophysics Data System (ADS)

The paper presents new transmission procedures present in IEEE 802.11 standard and compares them to the "traditional" frame exchange method. On the basis of their operating rules, analytical equations are derived that allow calculate network efficiency or effective throughput. The throughput upper limit is also calculated and compared for all considered frame exchange procedures.

Zieli?ski, Bart?omiej

461

Voltage-sag indices - recent developments in IEEE PI564 task force  

Microsoft Academic Search

The project for developing recommended practice for the establishment of voltage sag indices was approved by the IEEE in January 2000. Since then, the task force P 1564 met twice a year and developed a draft document. This paper presents the current state of discussions and a summary of the latest draft D2. Next to retained voltage and duration, as

M. H. J. Bollen; D. D. Sabin; R. S. Thallam

2003-01-01

462

Comparative Analysis of Intel Pentium 4 and IEEE\\/EMC TC9\\/ACEM CPU Heat Sinks  

Microsoft Academic Search

This paper presents finite element frequency domain results for electromagnetic radiation emitted from high power microelectronic circuits connected to a heat sink. The heat sink model associated with one of the IEEE EMC TC-9 challenging problems, 2000-4 CPU heat sink, has been used to investigate different grounding configurations. A new simulation model for the Intel P4 CPU heat sink is

Junwei Lu; Xiao Duan

2007-01-01

463

Virtual Instrumentation Applied to the Implementation of IEEE-STD 1459-2000 Power Definitions  

Microsoft Academic Search

This paper discusses the utilization of virtual instrumentation to the implementation and evaluation of different power definitions, so that classical formulations and new definitions can be compared without the necessity of acquiring different power meters or analyzers. Accordingly, the definitions of IEEE Standard 1459-2000 for the measurement of power quantities under distorted and unbalanced situations, have been digitally implemented. Thus,

A. C. Moreira; S. M. Deckmann; F. P. Marafao; E. G. De Lima; M. A. Bini

2005-01-01

464

Meeting USB and IEEE1394 overcurrent protection requirements using PolySwitch devices  

Microsoft Academic Search

Universal Serial Bus (USB) and the high performance serial bus IEEE1394, also known as Firewire (trademark), will allow PCs to be built in a more modular fashion and sold like home entertainment systems where people buy the specific components they want rather than a preconfigured system. The USB technology allows peripherals from printers to joysticks to seamlessly plug into a

P. Wiener; J. Witham

1997-01-01

465

Impact of Distributed Generation on the IEEE 34 Node Radial Test Feeder with Overcurrent Protection  

Microsoft Academic Search

The use of distributed generation (DG) in power systems has many possible benefits, but also presents many challenges. Notable among these challenges is the effect DG can have on overcurrent protection. This paper contains results pertinent to the addition of DG to the IEEE 34 node test feeder. After an overcurrent protection scheme was implemented for the benchmark system, DG

J. A. Silva; H. B. Funmilayo; K. L. Butler-Purry

2007-01-01

466

GTS Attack: An IEEE 802.15.4 MAC Layer Attack in Wireless Sensor Networks  

Microsoft Academic Search

In the last several years IEEE 802.15.4 has been ac- cepted as the major MAC layer protocol for wireless sensor networks (WSNs). It has attracted the interest of the re- search community involved in security issues because the increased range of application scenarios brings out new possibilities for misuse and taking improper advantage of sensor nodes and their operation. As

Radosveta Sokullu; Ilker Korkmaz; Orhan Dagdeviren

467

On the IEEE 802.15.4 MAC Layer Attacks: GTS Attack  

Microsoft Academic Search

In the last several years IEEE 802.15.4 has been accepted as a major MAC layer protocol for wireless sensor networks (WSNs) and has attracted the interest of there search community involved in security issues as the increased range of application scenarios bring out new possibilities for misuse and taking improper advantage of sensor nodes and their operation. As these nodes

Radosveta Sokullu; Orhan Dagdeviren; Ilker Korkmaz

2008-01-01

468

A simple and effective priority scheme for IEEE 802.11  

Microsoft Academic Search

In this letter, we propose an analytical model for a simple priority scheme for real-time applications in IEEE 802.11 by differentiating the initial window size, the window-increasing factor and the maximum backoff stage. Saturation throughputs and saturation delays of different priority classes are derived analytically.

Yang Xiao

2003-01-01

469

Power management in IEEE 802.11 WLAN using proxy-assisted WLAN controller  

Microsoft Academic Search

Hand-held devices consume significant amount of energy while downloading large files or while streaming multimedia over a WLAN. IEEE 802.11 for WLANs provides PSM mechanism to reduce the energy consumption of a wireless device by allowing the wireless interface to go into sleep mode whenever possible. It is found that as stations (STAs) share the wireless channel at the packet

Sumankumar D. Panchal; S. V. R. Anand; Malati Hegde

2012-01-01

470

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard IEEE 802.11  

Microsoft Academic Search

This paper describes simulations of the power saving mechanism of the upcoming standard for wireless Local Area Networks IEEE 802.11[1]. They were performed in order to see how typical parameters influence the performance. Simulations were made for a ad-hoc-network with 8 stations. Figures for optimum Beacon intervals and ATIM window sizes were obtained.

Christian Röhl; Hagen Woesner; Adam Wolisz

471

Maxi Program at IEEE EMBS Student Club of Beijing University of Posts and Telecommunications  

Microsoft Academic Search

This paper presents the recently launched Maxi Program at IEEE EMBS Student Club of Beijing University of Posts and Telecommunications. The program initiates a variety of seminar series covering biomedical expertise and professional communication skills, forms a cooperative partnership between students, university and industry through guest speakers events and industry tours, and sets in motion personal consultative services (PCS) to

Yunfeng Wu; Ningning Tao; Luxian Tang; Xu Ma; Gonzalo A. Garcia; Mie Mitsui

2004-01-01

472

Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation  

Microsoft Academic Search

The IEEE 802.11 Wireless LAN standard has been designed with very limited key management capabilities, using up to 4 static, long term, keys, shared by all the stations on the LAN. This design makes it quite difficult to fully revoke access from previously-authorized hosts. A host is fully revoked when it can no longer eavesdrop and decrypt traffic generated by

Avishai Wool

2005-01-01

473

Is Channel Fragmentation\\/bonding in IEEE 802.22 Networks Secure?  

Microsoft Academic Search

We address a unique security threat that arises due to channel fragmentation (or aggregation or bonding) in dynamic spectrum access (DSA) based IEEE 802.22 networks. Typically, channel fragmentation, aggregation and bonding have been studied in the literature as a means to enhance the spectrum utilization. However, the loss of orthogonality between the spectrum bands due to channel fragmentation, aggregation or

S. Anand; K. Hong; S. Sengupta; R. Chandramouli

2011-01-01

474

Link adaptation strategy for IEEE 802.11 WLAN via received signal strength measurement  

Microsoft Academic Search

IEEE 802.11 wireless local area network (WLAN) physical layers (PHYs) support multiple transmission rates. The PHY rate to be used for a particular frame transmission is solely determined by the transmitting station. The transmitting rate should be chosen in an adaptive manner since the wireless channel condition varies over time due to such factors as station mobility, time-varying interference, and

Javier del Prado Pavon; Sunghyun Choi

2003-01-01

475

Performance evaluation of IEEE 802.11 fast BSS transition algorithms  

Microsoft Academic Search

Multimedia services are becoming increasingly available over the wireless devices. Handover performance has a direct impact on user satisfaction from such services. The high transition delay can be unaccepted for the multimedia application or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features,

P. Machan?; J. Wozniak

2010-01-01

476

Tiny and autonomous IEEE1451 Sonic Anemometer to deploy in environmental Wireless Sensor Network  

Microsoft Academic Search

Wind speed and direction are important parameters in the study of applied meteorology, for example, in weather prediction, air pollution, transport safety and structural safety. In this paper, we propose the design and deployment of an interoperable Smart Ultrasonic Anemometer that uses the IEEE 1451 standard and operates in a Wireless Sensor Network (WSN). This standard permits interoperability and introduces

Jorge Higuera; Jose Polo

2010-01-01

477

IEEE-1394 Based Outlet for Home Automation and Health Care Networks.  

National Technical Information Service (NTIS)

This paper describes a new outlet intended for a future home and/or office network based on the IEEE-1394 serial bus. The new outlet has been built and tested. Several units can be distributed throughout the home to provide high-speed inter connection amo...

S. Martel I. Hunter

2001-01-01

478

WINDOWS STREAMING MEDIA PERFORMANCE ANALYSIS ON A IEEE 802.11g RESIDENTIAL NETWORK  

Microsoft Academic Search

This paper presents a performance evaluation of Microsoft Windows Media Streaming (WMS) on an IEEE 802.11g home network. Empirical measurements are used to determine the viability of streaming High Definition (HD) and high quality video over a wireless residential network using currently available multimedia streaming software. User experience is evaluated using visual testbed observations and performance criteria that include playback

Travis Grant; Saurabh Gupta; Harshal Pandya; Robert Kinicki

479

Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs  

Microsoft Academic Search

Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven that the WEP protocol fails to provide data confidentiality and authentication. This paper first introduces the WEP as well as all kinds of attacks. Then, two approaches to enhance the WEP are proposed to

Yang Xiao; Chaitanya Bandela; Yi Pan; Edilbert Kamal Dass

2006-01-01

480

IEEE802.15.6 -based multi-accelerometer WBAN system for monitoring Parkinson's disease.  

PubMed

In this paper we present a detailed example of a wireless body area network (WBAN) scenario utilizing the recent IEEE802.15.6 standard as applied to a multi-accelerometer system for monitoring Parkinson's disease and fall detection. Ultra wideband physical layer and standard security protocols are applied to meet application requirements for data rate and security. PMID:24110022

Keranen, Niina; Sarestoniemi, Mariella; Partala, Juha; Hamalainen, Matti; Reponen, Jarmo; Seppanen, Tapio; Iinatti, Jari; Jamsa, Timo

2013-07-01

481

A novel solution to interconnect FieldBus systems using IEEE wireless LAN technology  

Microsoft Academic Search

In various process control environments in which FieldBus communication systems are widely used it is often necessary to interconnect them. Unfortunately this interconnection raises several issues and the solutions found so far are not very satisfactory. In this paper, we propose a new solution which uses a wireless LAN based on the IEEE 802.11 draft standard as a backbone system.

S. Cavalieri; D. Panno

1998-01-01

482

Sensor network and information interoperability integrating IEEE 1451 with MIMOSA and OSA-CBM  

Microsoft Academic Search

The IEEE 1451 smart transducer interface for sensors and actuators standard was developed to facilitate sensor to network interoperability. It has defined a set of common communication interfaces for connecting transducers (sensors or actuators) to control networks and instruments in a network-independent environment. Concurrently, the Machinery Information Management Open Systems Alliance (MIMOSA) has established an open architecture and a set

Kang Lee; Robert X. Gao; Rick Schneeman

2002-01-01

483

10th IEEE Signal Processing Workshop on Statistical Signal and Array Processing.  

National Technical Information Service (NTIS)

This is the Proceedings of the 10th IEEE Workshop on Statistical Signal and Array Processing (SSAP), which was held at the Pocono Manor Inn, Pocono Manor, Pa during the period of August 14th-16th, 2000. The Workshop featured four keynote speakers whose ta...

M. G. Amin

2000-01-01

484

Call admission control for IEEE 802.11 contention access mechanism  

Microsoft Academic Search

This paper proposes an admission control algorithm that enables the upcoming IEEE 802.11e contention based enhanced distributed channel access (EDCA) to provide quantitative bandwidth guarantees for wireless local area networks (WLANs), rather than a relative prioritized service. The algorithm estimates the throughput that flows would achieve if a new flow with certain parameters was admitted, and so indicates whether such

Dennis Pong; Tim Moors

2003-01-01

485

A Novel Adaptive Scheme to Improve the Performance of the IEEE 802.11n WLANs  

Microsoft Academic Search

With the advent of the IEEE 802.11n standard , that uses multiple input multiple output (MIMO) technology at the physical layer, there has been awareness about harnessing the physical layer techniques to improve the performance of a wireless local area network (WLAN) system. Our proposed scheme adoptively changes the number of antennas and the modulation scheme based on the channel

Sangheetha Salai Parthasarathy; Qing-an Zeng

2007-01-01

486

Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks?  

Microsoft Academic Search

The IEEE 802.11 MAC protocol is the standard for wireless LANs; it is widely used in testbeds and simulations for wireless multihop ad hoc networks. However, this protocol was not designed for multihop networks. Although it can support some ad hoc network architecture, it is not intended to support the wireless mobile ad hoc network, in which multihop connectivity is

S. Xu; T. Saadawi

2001-01-01

487

IEEE 802.11 Wireless LAN Security Overview  

Microsoft Academic Search

Summary Wireless Local Area Networks (WLANs) are cost effective and desirable gateways to mobile computing. They allow computers to be mobile, cable less and communicate with speeds close to the speeds of wired LANs. These features came with expensive price to pay in areas of security of the network. This paper identifies and summarizes these security concerns and their solutions.

Ahmed M. Al Naamany; Ali Al Shidhani; Hadj Bourdoucen

2006-01-01

488

Student culture vs group work in computer science  

Microsoft Academic Search

Our industrial advisory boards tell us that our students are well prepared technically, but they lack important group work skills. Simply adding project courses and requiring that assignments be done in groups has not improved the situation. A careful study of student culture in Computer Science has uncovered barriers to collaboration, which can be overcome only by pervasive changes in

William M. Waite; Michele H. Jackson; Amer Diwan; Paul M. Leonardi

2004-01-01

489

Destruction of extracellular matrix proteoglycans is pervasive in simian retroviral neuroinfection.  

PubMed

Disruption of the perineuronal matrix has been reported in human immunodeficiency virus (HIV) encephalitis. To better understand the extent of matrix disruption during lentiviral encephalitis, we characterized the extracellular matrix (ECM) damage in brains of 12 macaques infected with simian immunodeficiency virus (SIV). Matrix integrity was assessed by Wisteria floribunda lectin histochemistry. Confocal microscopy was used to quantify matrix loss, macrophage infiltration, and synaptic damage. Disruption of brain ECM was present shortly after retroviral infection, preceding parenchymal macrophage infiltration. In agreement with previous observations, reduced staining of presynaptic and postsynaptic proteins in SIV encephalitis occurred concurrently with matrix abnormalities. Lentiviral infection induced microglial and macrophage expression of two disintegrins and metalloproteinases with thrombospondin motifs (ADAMTS-1 and ADAMTS-4), with high substrate specificity for matrix proteoglycans. Matrix damage is pervasive during SIV neuroinfection, which suggests interventions to conserve brain matrix proteoglycans might avert or delay retroviral-induced neurodegeneration. PMID:15262273

Medina-Flores, Rafael; Wang, Guoji; Bissel, Stephanie J; Murphey-Corb, Michael; Wiley, Clayton A

2004-08-01

490

Methicillin-Resistant Staphylococcus Aureus: A Pervasive Pathogen Highlights the Need for New Antimicrobial Development  

PubMed Central

Staphylococcus aureus (S. aureus) has entered the spotlight as a globally pervasive drug-resistant pathogen. While historically associated exclusively with hospital-acquired infections in immunocompromised hosts, the methicillin-resistant form of S. aureus has been spreading throughout communities since the 1990s. Indeed, it has now become a common household term: MRSA. S. aureus has developed numerous mechanisms of virulence and strategies to evade the human immune system, including a host of surface proteins, secreted enzymes, and toxins. In hospital intensive care units, the proportion of MRSA-related S. aureus infections has increased strikingly from just 2 percent in 1974 to 64 percent in 2004. Its presence in the community has been rising similarly, posing a significant public health burden. The growing incidence of MRSA unfortunately has been met with dwindling efforts to develop new, more effective antibiotics. The continued emergence of resistant strains of bacteria such as MRSA demands an urgent revival of the search for new antibiotics.

Morell, Emily A.; Balkin, Daniel M.

2010-01-01

491

Imitation and communication skills development in children with pervasive developmental disorders.  

PubMed

This study evaluates the correlation between failure to develop spontaneous imitation and language skills in pervasive developmental disorders. Sixty-four children between the age of 3 and 8 years were assessed using the Autism Diagnostic Interview-Revised (ADI-R), the Childhood Autism Rating Scale (CARS), and the Autism Diagnostic Observation Schedule (ADOS), as well as direct observation of imitation. The sample was subdivided into a verbal and a nonverbal group. Analysis of mean scores on the CARS "imitation" items and of ADI-R "spontaneous imitation" and "pointing to express interest" revealed a statistically significant difference between verbal and nonverbal groups, with more severe impairment/higher scores in the nonverbal than the verbal group. These results suggest that nonverbal children have specifically impaired imitation and pointing skills. PMID:19590730

De Giacomo, Andrea; Portoghese, Claudia; Martinelli, Domenico; Fanizza, Isabella; L'abate, Luciano; Margari, Lucia

2009-07-02

492

Atypical antipsychotics in the treatment of children and adolescents with pervasive developmental disorders.  

PubMed

RATIONALE: Autism and related pervasive developmental disorders (PDD) are characterized by impairments in social interaction and communication, restricted interests, and repetitive and stereotyped patterns of behavior. Individuals with PDD frequently display irritability and disruptive behaviors including tantrums, self-injurious behavior, and aggression. Atypical antipsychotics are currently the most efficacious pharmacological interventions available for treatment of irritability associated with PDD. OBJECTIVES: This article aims to review the body of literature pertaining to the use of atypical antipsychotics in the treatment of patients with PDD. METHODS: A PubMed literature search was conducted using the following key words: autism, pervasive developmental disorders, atypical antipsychotics, risperidone, aripiprazole, quetiapine, ziprasidone, olanzapine, clozapine, paliperidone, iloperidone, asenapine, and lurasidone. Search terms were limited to English language, human subjects, and publication from 1999 to present. Relevant references from identified articles were also reviewed. RESULTS: The efficacy and tolerability of risperidone and aripiprazole for the treatment of irritability in autism have been established with multi-site, randomized, controlled trials. Studies supporting the use of other atypical antipsychotics are either limited in scope or less robust in their findings, though newer agents such as ziprasidone and paliperidone show promise. CONCLUSIONS: Atypical antipsychotics are currently first-line pharmacological agents for the treatment of irritability and associated behaviors in children with PDD. Further placebo-controlled studies are warranted to characterize the efficacy and tolerability of the majority of these medications. There is also a need for the development of novel, targeted drugs with more favorable long-term side effect profiles. PMID:23552907

Politte, Laura C; McDougle, Christopher J

2013-04-01

493

Review of the IEEE Standard for Computerized Operating Procedure Systems  

Microsoft Academic Search

Increasingly nuclear power plant procedures, such as emergency operating procedures, are being presented in computer form with functionality to support operator use and management of the procedures. The U.S. Nuclear Regulatory Commission (NRC) currently has guidance for the review of computer-based procedures (CBPs); however, there remain CBP functions and human performance issues for which up-to-date guidance is lacking. The Institute

J. OHara; J. Higgins

2010-01-01

494

Cloud@Home: A New Enhanced Computing Paradigm  

NASA Astrophysics Data System (ADS)

Cloud computing is a distributed computing paradigm that mixes aspects of Grid computing, ("… hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities" (Foster, 2002)) Internet Computing ("…a computing platform geographically distributed across the Internet" (Milenkovic et al., 2003)), Utility computing ("a collection of technologies and business practices that enables computing to be delivered seamlessly and reliably across multiple computers, ... available as needed and billed according to usage, much like water and electricity are today" (Ross & Westerman, 2004)) Autonomic computing ("computing systems that can manage themselves given high-level objectives from administrators" (Kephart & Chess, 2003)), Edge computing ("… provides a generic template facility for any type of application to spread its execution across a dedicated grid, balancing the load …" Davis, Parikh, & Weihl, 2004) and Green computing (a new frontier of Ethical computing1 starting from the assumption that in next future energy costs will be related to the environment pollution).

Distefano, Salvatore; Cunsolo, Vincenzo D.; Puliafito, Antonio; Scarpa, Marco

495

Above-Campus Services: Shaping the Promise of Cloud Computing for Higher Education  

ERIC Educational Resources Information Center

|The concept of today's cloud computing may date back to 1961, when John McCarthy, retired Stanford professor and Turing Award winner, delivered a speech at MIT's Centennial. In that speech, he predicted that in the future, computing would become a "public utility." Yet for colleges and universities, the recent growth of pervasive, very high speed…

Wheeler, Brad; Waggener, Shelton

2009-01-01

496

Effects of a weighted vest on problem behaviors during functional analyses in children with Pervasive Developmental Disorders  

Microsoft Academic Search

Weighted vests are a specific form of Sensory Integration Therapy (SIT) (Honaker, 2005a) that are intended to help individuals resolve sensory related issues thereby decreasing the symptoms (e.g., hyperness, lack of attention, etc.) of the sensory issue and are also often recommended as an intervention for problem behaviors exhibited by children with Pervasive Developmental Disorders (PDD). The effects of 5%

Shawn P. Quigley; Lloyd Peterson; Jessica E. Frieder; Stephanie Peterson

2011-01-01

497

Long-Term Safety and Adverse Events of Risperidone in Children, Adolescents, and Adults with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

|The objective of this study was to examine long-term adverse events of risperidone in 19 children, adolescents, and adults with Pervasive Developmental Disorders and intellectual disability, continuing risperidone for a mean of 186.5 weeks, following a 46-week risperidone study. Nineteen individuals continued long-term follow-up after our…

Hellings, Jessica A.; Cardona, Alicia M.; Schroeder, Stephen R.

2010-01-01

498

Long-Term Safety and Adverse Events of Risperidone in Children, Adolescents, and Adults with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

The objective of this study was to examine long-term adverse events of risperidone in 19 children, adolescents, and adults with Pervasive Developmental Disorders and intellectual disability, continuing risperidone for a mean of 186.5 weeks, following a 46-week risperidone study. Nineteen individuals continued long-term follow-up after our…

Hellings, Jessica A.; Cardona, Alicia M.; Schroeder, Stephen R.

2010-01-01

499

Effects of Risperidone and Parent Training on Adaptive Functioning in Children with Pervasive Developmental Disorders and Serious Behavioral Problems  

ERIC Educational Resources Information Center

Objective: Children with Pervasive Developmental Disorders (PDDs) have social interaction deficits, delayed communication, and repetitive behaviors as well as impairments in adaptive functioning. Many children actually show a decline in adaptive skills compared with age mates over time. Method: This 24-week, three-site, controlled clinical trial…

Scahill, Lawrence; McDougle, Christopher J.; Aman, Michael G.; Johnson, Cynthia; Handen, Benjamin; Bearss, Karen; Dziura, James; Butter, Eric; Swiezy, Naomi G.; Arnold, L. Eugene; Stigler, Kimberly A.; Sukhodolsky, Denis D.; Lecavalier, Luc; Pozdol, Stacie L.; Nikolov, Roumen; Hollway, Jill A.; Korzekwa, Patricia; Gavaletz, Allison; Kohn, Arlene E.; Koenig, Kathleen; Grinnon, Stacie; Mulick, James A.; Yu, Sunkyung; Vitiello, Benedetto

2012-01-01

500

Differential Language Markers of Pathology in Autism, Pervasive Developmental Disorder Not Otherwise Specified and Specific Language Impairment  

ERIC Educational Resources Information Center

|Language impairment is a common core feature in Pervasive Developmental Disorders (PDD) and Specific Language Impairment (SLI). Many studies have tried to define the specific language profiles of these disorders, some claiming the existence of overlaps, and others conceiving of them as separate categories. Fewer have sought to determine whether…

Demouy, Julie; Plaza, Monique; Xavier, Jean; Ringeval, Fabien; Chetouani, Mohamed; Perisse, Didier; Chauvin, Dominique; Viaux, Sylvie; Golse, Bernard; Cohen, David; Robel, Laurence

2011-01-01