These are representative sample records from Science.gov related to your search topic.
For comprehensive and current results, perform a real-time search at Science.gov.
1

28 PERVASIVE computing Published by the IEEE Computer Society 1536-1268/07/$25.00 2007 IEEE Pervasive Computing  

E-print Network

Pervasive Computing and Autism: Assisting Caregivers of Children with Special Needs C aring for children for children with autism often face numerous choices regarding types of therapies, doctors, and drug and diet result when caregivers don't see the effects of treatment immediately, perhaps because the changes

Hayes, Gillian R.

2

Published by the IEEE CS 1536-1268/12/$31.00 2012 IEEE PERVASIVE computing 7 Smartphones Editor: Roy Want Google roywant@acm.org  

E-print Network

Published by the IEEE CS 1536-1268/12/$31.00 © 2012 IEEE PERVASIVE computing 7 Smartphones Editor: Roy Want Google roywant@acm.org As smartphones get smarter by uti- lizing new intelligence-being, help us navi- gate through our day, and intervene on our behalf. Here, we present various smartphone

Campbell, Andrew T.

3

1536-1268/04/$20.00 2004 IEEE I Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 11 Editor: Thad E. Starner I Georgia Institute of Technology I thad@cc.gatech.edu  

E-print Network

1536-1268/04/$20.00 © 2004 IEEE I Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 11 Editor: Thad E. Starner I Georgia Institute of Technology I thad@cc.gatech.edu Wearable Computing ImagineCo's headquarters to discuss a possible cooperative venture. While there, BadCo's industrial espionage team uses

Starner, Thad E.

4

Electronic Textiles: A Platform for Pervasive DIANA MARCULESCU, MEMBER, IEEE, RADU MARCULESCU, MEMBER, IEEE,  

E-print Network

Electronic Textiles: A Platform for Pervasive Computing DIANA MARCULESCU, MEMBER, IEEE, RADU years later, the link between textiles and computing is more realistic than ever. In this paper, we look at the synergistic relationship between textiles and computing and identify the need for their "integration" using

5

Philosophy, privacy, and pervasive computing  

Microsoft Academic Search

Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the\\u000a development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons\\u000a in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked\\u000a computing, where everyday transactions

Diane P. Michelfelder

2010-01-01

6

Classifying Pervasive Games: On Pervasive Computing and Mixed Reality  

Microsoft Academic Search

Pervasive Games have become popular in recent years. Their ambitious goal is to bring the computer into the world in order to augment existing games or to even come up with hitherto impossible or unthought-of forms of entertainment. This paper reflects on the various approaches to define what Pervasive Games consist of, how they relate to playing and games, and

Steve Hinske; Matthias Lampe; Carsten Magerkurth; Carsten Rcker

7

Privacy in Pervasive Computing and Open Issues  

Microsoft Academic Search

Privacy appears as a major issue for pervasive computing applications. Several models have been proposed to address privacy challenges. Successful design requires awareness of the technology's users and that their desires and concerns are understood. This is difficult as few empirical researches exist about potential pervasive users that designers can use. Complicating design further is the fact that pervasive systems

Pankaj Bhaskar; Sheikh Iqbal Ahamed

2007-01-01

8

Dynamically reconfigurable middleware for pervasive computing DOMPC;.  

E-print Network

??Pervasive Computing is affected by resource constrained devices unreliable connection application diversity with different protocols and diverse standards This results in heterogeneous infrastructure among devices (more)

Nagaraja R

2014-01-01

9

Classifying Pervasive Games: On Pervasive Computing and Mixed Reality  

E-print Network

often playing (a game) is the common ground for the participants to come together in the real world the computer into the world in order to augment existing games or to even come up with hitherto impossible or unthought-of forms of entertainment. This paper reflects on the various approaches to define what Pervasive

10

Programming Secure and Robust Pervasive Computing Applications  

E-print Network

and demonstrate its utility for building context-aware, secure, fault-tolerant pervasive computing applications on the contextual information. A user's physical location has been one of the most prominent context information

Minnesota, University of

11

Emotions in Pervasive Computing Environments  

Microsoft Academic Search

The ability of an intelligent environment to connect and adapt to real internal sates, needs and behaviors' meaning of humans can be made possible by considering users' emotional states as contextual parameters. In this paper, we build on enactive psychology and investigate the incorporation of emotions in pervasive systems. We define emotions, and discuss the coding of emotional human markers

Nevin Vunka Jungum; Eric Laurent

2009-01-01

12

Self-healing for Autonomic Pervasive Computing  

NASA Astrophysics Data System (ADS)

To ensure smooth functioning of numerous handheld devices anywhere anytime, the importance of a self-healing mechanism cannot be overlooked. This is one of the main challenges to growing autonomic pervasive computing. Incorporation of efficient fault detection and recovery in the device itself is the ultimate quest but there is no existing selfhealing scheme for devices running in autonomic pervasive computing environments that can be claimed as the ultimate solution. Moreover, the highest degree of transparency, security and privacy should also be maintained. In this book chapter, an approach to develop a self-healing service for autonomic pervasive computing is presented. The self-healing service has been developed and integrated into the middleware named MARKS+ (Middleware Adaptability for Resource discovery, Knowledge usability, and Self-healing). The self-healing approach has been evaluated on a test bed of PDAs. An application has been developed by using the service. The evaluation results are also presented in this book chapter.

Ahmed, Shameem; Ahamed, Sheikh I.; Sharmin, Moushumi; Hasan, Chowdhury S.

13

Pervasive computing and wireless optical network technology  

NASA Astrophysics Data System (ADS)

For reaching the destination that user can operate simply to complete complicated work with high quality in time, elements for pervasive computing should be integrated into an active system. Embedded, nomandic, adaptive and broadband intelligent services will be necessary in the system. The novel Intelligent Pervasive Computing Technologies (IPCT) make those services including high speed services and low speed services etc be provided well. The crucial component parts are the Backbone Mobile Managing technologies (BMM), the Access Mobile Managing technologies (AMM), The Supplementary Independent Mobile Managing Technologies (SIMMT) and so forth. Wireless optical networks are necessities of implementing IPCT. Another key of running IPCT is to optimize the configuration, especially the logic. The pivot of operating is Wireless Optical Agent (WOA) and corresponding contributories. Experiments with simulation indicate IPCT bring high performances for pervasive computing.

Xue, Cai; Cai, Ran; Cai, Guishun; Zeng, Lang; Xue, Lin

2005-11-01

14

Pervasive Social Computing: Augmenting Five Facets of Human Intelligence  

Microsoft Academic Search

Pervasive Social Computing is a novel collective paradigm, derived from pervasive computing, social media, social networking, social signal processing, etc. This paper reviews Pervasive Social Computing as an integrated computing environment, which promises to augment five facets of human intelligence in physical environment awareness, behavior awareness, community awareness, interaction awareness, and content awareness. Reviews of related studies are given and

Jiehan Zhou; Junzhao Sun; Kumaripaba Athukorala; Dinesh Wijekoon

2010-01-01

15

Pervasive Computing Goes to School  

ERIC Educational Resources Information Center

In 1991 Mark Weiser introduced the idea of ubiquitous computing: a world in which computers and associated technologies become invisible, and thus indistinguishable from everyday life. This invisible computing is accomplished by means of "embodied virtuality," the process of drawing computers into the physical world. Weiser proposed that

Plymale, William O.

2005-01-01

16

Will Pervasive Computing be Manageable?  

E-print Network

View Computers everywhere ­ embedded into fridges, washing machines, door locks, cars, furnitureCoMo video phone http://nooper.co.jp/showcase #12;OV2001: M. Sloman 7 Current Technology 2 Matchbox computer

Sloman, Morris

17

Context-Aware Pervasive Computing at Large: Three Example Applications  

E-print Network

: the situation What is a context-aware pervasive computing system? A system that can respond intelligentlyContext-Aware Pervasive Computing at Large: Three Example Applications Seng W. Loke Department;Context-Awareness in Pervasive Computing Started in Schilit's PhD thesis on context-awareness for mobile

Loke, Seng W. - Loke, Seng W.

18

Analytical techniques for debugging pervasive computing environments  

E-print Network

User level debugging of pervasive environments is important as it provides the ability to observe changes that occur in a pervasive environment and fix problems that result from these changes, especially since pervasive ...

Nigam, Atish, 1981-

2004-01-01

19

Opening Pervasive Computing to the Masses Using the SEAP Middleware  

Microsoft Academic Search

The increasing availability of sensing devices has made the possibility of context-aware pervasive computing ap- plications real. However, constructing this software requires extensive knowledge about the devices and specialized program- ming languages for interacting with them. While the nature of pervasive computing lends users to demand individualized ap- plications, complexities render programming embedded devices unapproachable. In this paper we introduce

Seth Holloway; Drew Stovall; Jorge Lara-garduno; Christine Julien

2009-01-01

20

Privacy Enhanced Access Control in Pervasive Computing Environments  

E-print Network

Privacy Enhanced Access Control in Pervasive Computing Environments Kui Ren and Wenjing Lou Department of Electrical and Computer Engineering Worcester Polytechnic Institute, Worcester, MA 01609 Email: {kren, wjlou}@ece.wpi.edu Abstract-- Privacy and security are two important but seem- ingly contradict

Hou, Y. Thomas

21

Embedding expression: Pervasive computing architecture for art and entertainment  

Microsoft Academic Search

Pervasive computings historical driver applications include environmental monitoring, safety and security, home and office productivity and guided experience of cultural activities. It also suggests and offers the means to achieve new types of expression in art and entertainment, which has not been a significant area of research despite its cultural and socio-economic importance and unique requirements. This paper discusses motivations

Jeff Burke; Jonathan Friedman; Eitan Mendelowitz; Mani B. Srivastava

2006-01-01

22

The Age of Pervasive Computing? Everything Smart, Everything Connected?  

Microsoft Academic Search

\\u000a Given the continuing technical progress in computing and communication, it seems that we are heading towards an all-encompassing\\u000a use of networks and computing power, a new era commonly termed Pervasive Computing. Its vision is grounded in the firm belief\\u000a amongst the scientific community that Moores Law (i.e. the observation that the computer power available on a chip approximately\\u000a doubles every

Friedemann Mattern

2003-01-01

23

SOLAR: BUILDING A CONTEXT FUSION NETWORK FOR PERVASIVE COMPUTING  

E-print Network

SOLAR: BUILDING A CONTEXT FUSION NETWORK FOR PERVASIVE COMPUTING Dartmouth Technical Report TR2004 of Graduate Studies #12;c Copyright by Guanling Chen 2004 #12;Abstract of the Dissertation SOLAR: BUILDING- textual data. In this dissertation, we present a Context Fusion Network (CFN), called Solar, which

24

Impress: Towards Next-Generation Ubiquitous and Pervasive Computing Systems  

Microsoft Academic Search

Research in pervasive and ubiquitous computing has resulted in a number of prototype systems developed and implemented in isolation. If this research area is to have impact, the next generation of research prototypes must move beyond single laboratories and isolated, independent software frameworks. Future sys- tems must not only inter-work and inter-operate, but should enable more rapid prototyping and incorporation

James P. Black; Hao Chen

25

Delivering interactive multimedia services in dynamic pervasive computing environments  

Microsoft Academic Search

This paper introduces a distributed system for next generation multimedia support in dynamically changing pervasive computing environments. The overall goal is to enhance the experience of mobile users by intelligently adapting the way a service is presented, in particular by adapting the way the user receives multimedia content from the service and how he interacts with the service. The system

Cristian Hesselman; Ishan Vaishnavi; Mathieu Boussard; Ralf Kernchen; Stefan Meissner; Antonietta Spedalieri; Albert Sinfreu; Christian Rck

2008-01-01

26

End-of-life impacts of pervasive computing  

Microsoft Academic Search

RFID technology is one of the forerunners of pervasive computing, and as such is expected to play an important role in many applications of daily life, especially in the form of smart labels. However, market investigations and a material analysis of a smart label shows that the use of smart labels does not considerably affect the recycling or disposal of

P. Krauchi; P. A. Wager; M. Eugster; G. Grossmann; L. Hilty

2005-01-01

27

Pervasive Computing and Communication Technologies for U-Learning  

ERIC Educational Resources Information Center

The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or

Park, Young C.

2014-01-01

28

Reconfigurable context-sensitive middleware for pervasive computing  

Microsoft Academic Search

Context-sensitive applications need data from sensors, devices, and user actions, and might need ad hoc communication support to dynamically discover new devices and engage in spontaneous information exchange. Reconfigurable Context-Sensitive Middleware facilitates the development and runtime operations of context-sensitive pervasive computing software.

S. S. Yau; F. Karim; Yu Wang; Bin Wang; S. K. S. Gupta

2002-01-01

29

LASER POINTERS AS INTERACTION DEVICES FOR COLLABORATIVE PERVASIVE COMPUTING  

E-print Network

LASER POINTERS AS INTERACTION DEVICES FOR COLLABORATIVE PERVASIVE COMPUTING Andriy Pavlovych1 environments. The system uses laser pointers as interaction devices and employs a video camera to detect where each laser pointer is pointing. Time-division multiplexing together with a wireless link affords

Stürzlinger, Wolfgang

30

An Adaptive Sensor Mining Framework for Pervasive Computing Applications  

NASA Astrophysics Data System (ADS)

Analyzing sensor data in pervasive computing applications brings unique challenges to the KDD community. The challenge is heightened when the underlying data source is dynamic and the patterns change. We introduce a new adaptive mining framework that detects patterns in sensor data, and more importantly, adapts to the changes in the underlying model. In our framework, the frequent and periodic patterns of data are first discovered by the Frequent and Periodic Pattern Miner (FPPM) algorithm; and then any changes in the discovered patterns over the lifetime of the system are discovered by the Pattern Adaptation Miner (PAM) algorithm, in order to adapt to the changing environment. This framework also captures vital context information present in pervasive computing applications, such as the startup triggers and temporal information. In this paper, we present a description of our mining framework and validate the approach using data collected in the CASAS smart home testbed.

Rashidi, Parisa; Cook, Diane J.

31

Adaptive Offloading Inference for Delivering Applications in Pervasive Computing Environments  

Microsoft Academic Search

Pervasive computing allows a user to access an ap- plication on heterogeneous devices continuously and con- sistently. However, it is challenging to deliver complex applications on resource-constrained mobile devices, such as cell phones and PDAs. Different approaches, such as application-based or system-based adaptations, have been proposed to address the problem. However, existing solutions often require degrading application fidelity. We believe

Xiaohui Gu; Klara Nahrstedt; Alan Messer; Ira Greenberg; Dejan S. Milojicic

2003-01-01

32

Adaptive Offloading Inference for Delivering Applications in Pervasive Computing Environments  

Microsoft Academic Search

Pervasive computing allows a user to access an ap- plication on heterogeneous devices continuously and con- sistently. However, it is challenging to deliver complex applications on resource-constrained mobile devices, such as cell phones and PDAs. Different approaches, such as application-based or system-based adaptations, have been proposed to address the problem. However, existing solutions often require degrading application fidelity. We believe

Xiaohui Guy; Klara Nahrstedt; Alan Messer; Ira Greenberg; Dejan Milojicic

33

12 PERVASIVE computing Published by the IEEE CS n 1536-1268/11/$26.00 2011 IEEE G u e s t e d i t o r s ' i n t r o d u c t i o n  

E-print Network

on automotive pervasive computing. As you will see, the automotive telematics community has moved well beyond the problems of connecting vehicles to each other and the infrastructure, and now the focus is turning to interactions between the vehicle and its occupants. In many ways, this evolution mirrors the transi- tion from

34

SmartExhibition: Case Study of Integrating RFID with Wireless Sensor Network for Pervasive Computing  

Microsoft Academic Search

The RFID is considered to provide an efficient solution to merge physical world with virtual space for pervasive computing. The wireless sensor network (WSN) is also a feasible and cost-effective candidate for the context sensing in the pervasive computing. We propose a smart space named SmartExhibtion as an scenario where the RFID is integrated to the sensor network and describe

Ting Zhang; Yuanxin Ouyang; Yuheng Liu

2008-01-01

35

Energy Management for Mobile Devices through Computation Outsourcing within Pervasive Smart Spaces  

Microsoft Academic Search

In this work we explore the opportunity Pervasive Spaces could provide as supplemental energy sources. We utilize the nature of pervasive smart spaces to outsource computation that would normally be performed on a mobile device to a surrogate server within the smart space. The decision to outsource a computation depends on whether its energy cost on the device is larger

Ahmed A. ABUKMAIL

36

Data-Centric Middleware for Context-Aware Pervasive Computing Guanling Chen  

E-print Network

if not carefully managed. To minimize user distraction the applications must be aware of and adapt to the situationData-Centric Middleware for Context-Aware Pervasive Computing Guanling Chen , Ming Li , and David and deploying context-aware pervasive-computing applications calls for distributed software infrastructures

Kotz, David

37

Model-driven engineering of planning and optimisation algorithms for pervasive computing environments  

Microsoft Academic Search

This paper presents a model-driven approach to developing pervasive computing applications that exploits design- time information to support the engineering of planning and optimisation algorithms that reflect the presence of uncertainty, dynamism and complexity in the application domain. In par- ticular the task of generating code to implement planning and optimisation algorithms in pervasive computing domains is addressed. We present

Anthony Harrington; Vinny Cahill

2011-01-01

38

Collaborative editing within the pervasive collaborative computing environment  

SciTech Connect

Scientific collaborations are established for a wide variety of tasks for which several communication modes are necessary, including messaging, file-sharing, and collaborative editing. In this position paper, we describe our work on the Pervasive Collaborative Computing Environment (PCCE) which aims to facilitate scientific collaboration within widely distributed environments. The PCCE provides a persistent space in which collaborators can locate each other, exchange messages synchronously and asynchronously and archive conversations. Our current interest is in exploring research and development of shared editing systems with the goal of integrating this technology into the PCCE. We hope to inspire discussion of technology solutions for an integrated approach to synchronous and asynchronous communication and collaborative editing.

Perry, Marcia; Agarwal, Deb

2003-09-11

39

IEEE Internet Computing Online  

NSDL National Science Digital Library

The Institute of Electrical and Electronics Engineers offers this webzine as a companion to its new bimonthly print magazine IEEE Internet Computing. The purpose of IC Online is to "address the Internet's widening impact on engineering practice and society." The January/February 1997 debut issue contains the full text of the print magazine, including an interview with George Gilder, and articles on Internet-enabled computer-aided design and agents on the web, among others. It also contains the Arachnoid Tourist, reviews of selected engineering-related Internet sites. Future issues of IC Online will contain "magazine excerpts and web-unique content." Print magazine subscription information is available at the site.

1997-01-01

40

IEEE Internet Computing Online  

NSDL National Science Digital Library

The Institute of Electrical and Electronics Engineers offers this webzine as a companion to its new bimonthly print magazine IEEE Internet Computing. The purpose of IC Online is to "address the Internet's widening impact on engineering practice and society." The January/February 1997 debut issue contains the full text of the print magazine, including an interview with George Gilder, and articles on Internet-enabled computer-aided design and agents on the web, among others. It also contains the Arachnoid Tourist, reviews of selected engineering-related Internet sites. Future issues of IC Online will contain "magazine excerpts and web-unique content." Print magazine subscription information is available at the site.

2005-10-31

41

An Impregnable Lightweight Device Discovery (ILDD) Model for the Pervasive Computing Environment of Enterprise Applications  

Microsoft Academic Search

The worldwide use of handheld devices (personal digital assistants, cell phones, etc.) with wireless connectivity will reach 2.6 billion units this year and 4 billion by 2010. More specifically, these handheld devices have become an integral part of industrial applications. These devices form pervasive ad hoc wireless networks that aide in industry applications. However, pervasive computing is susceptible and vulnerable

Munirul M. Haque; Sheikh Iqbal Ahamed

2008-01-01

42

IEEE Computer Society: http://computer.org Computer: http://computer.org/computer  

E-print Network

IEEE Computer Society: http://computer.org Computer: http://computer.org/computer computer@computer.org IEEE Computer Society Publications Office: +1 714 821 8380 COVER FEATURES GUEST EDITOR'S INTRODUCTION 28 Computational Photography--The Next Big Step Oliver Bimber Computational photography extends

Stanford University

43

Smart Classroom: Bringing Pervasive Computing into Distance Learning  

NASA Astrophysics Data System (ADS)

In recent years, distance learning has increasingly become one of themost important applications on the internet and is being discussed and studied by various universities, institutes and companies. The Web/Internet provides relatively easy ways to publish hyper-linked multimedia content for more audiences. Yet, we find that most of the courseware are simply shifted from textbook to HTML files. However, in ost cases the teacher's live instruction is very important for catching the attention and interest of the students. That's why Real-Time Interactive Virtual Classroom (RTIVC) always plays an indispensable role in distance learning, where teachers nd students located in different places can take part in the class synchronously through certain multimedia communication systems and obtain real-time and mediarich interactions using Pervasive Computing technologies [1]. The Classroom 2000 project [2] at GIT has been devoted to the automated capturing of the classroom experience. Likewise, the Smart Classroom project [3] at our institute is focused on Tele-education. Most currently deployed real-time Tele-education systems are desktop-based, in which the teacher's experience is totally different from teaching in a real classroom.

Shi, Yuanchun; Qin, Weijun; Suo, Yue; Xiao, Xin

44

Wireless Adaptive Therapeutic TeleGaming in a Pervasive Computing Environment  

Microsoft Academic Search

\\u000a This chapter introduces a wireless, pervasive computing approach to adaptive therapeutic telegaming considered in the context\\u000a of near set theory. Near set theory provides a formal basis for observation, comparison and classification of perceptual granules.\\u000a A perceptual granule is defined by a collection of objects that are graspable by the senses or by the mind. In the proposed pervasive computing

James F. Peters; Tony Szturm; Maciej Borkowski; Dan Lockery; Sheela Ramanna; Barbara Shay

2009-01-01

45

Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions  

Microsoft Academic Search

Abstract Weexplore,the challenges and research directions in building models, protocols and architectures to support security in pervasive ,computing ,environments. We argue that to be successful, efforts to build these would have to recognize,from ,the onset ,that pervasive ,computing settings are complex ,socio-technical system and would thus,have ,to go ,beyond ,traditional system-centric approaches,to analyzing and designing security.

Roshan K. Thomas; Ravi S. Sandhu

2004-01-01

46

Model-driven engineering of planning and optimisation algorithms for pervasive computing environments  

Microsoft Academic Search

This paper presents a model-driven approach to developing pervasive computing applications that exploits design-time information to support the engineering of planning and optimisation algorithms that reflect the presence of uncertainty, dynamism and complexity in the application domain. In particular, the task of generating code to implement planning and optimisation algorithms in pervasive computing domains is addressed.We present a layered domain

Anthony Harrington; Vinny Cahill

47

Adaptive Offloading Inference for Delivering Applications in Pervasive Computing Environments  

E-print Network

Xiaohui Gu ¡ , Klara Nahrstedt, Alan Messer ¢ , Ira Greenberg £ , Dejan Milojicic ¤ Abstract Pervasive to adapt to both application execution patterns and resource fluctuations. Using the Fuzzy Control model-making problems during runtime offload- ing: (1) timely triggering of adaptive offloading, and (2) intelligent

Nahrstedt, Klara

48

Adaptive Offloading Inference for Delivering Applications in Pervasive Computing Environments  

E-print Network

Xiaohui Gu , Klara Nahrstedt, Alan Messer , Ira Greenberg§ , Dejan Milojicic¶ In Proceedings of IEEE to adapt to both application execution patterns and resource fluctuations. Using the Fuzzy Control model-making problems during runtime offload- ing: (1) timely triggering of adaptive offloading, and (2) intelligent

Nahrstedt, Klara

49

IEEE Computer Society Board of Governor Nominee  

E-print Network

IEEE Computer Society Board of Governor Nominee Prof. Hironori Kasahara Waseda University, Tokyo statement The importance of computer technology has been increasing in lives due to the influence. However, most IT-related societies, including our IEEE Computer Society, have been facing problems like

Kasahara, Hironori

50

Investigating the next generation mobile wireless technology to deliver a pervasive mobile pervasive computing environment  

E-print Network

of Computing Science University of Newcastle upon Tyne, NE1 7RU, UK Tel +44 191-222-8223 Fax +44-191-222-8232 alan.tully@ncl.ac.uk Professor P.T. Blythe Transport Operations Research Group University of Newcastle will be a major research issue of the next decade. The ability to monitor, sense, manage and communicate

Newcastle upon Tyne, University of

51

TRANSPARENT SHAPING OF EXISTING SOFTWARE TO SUPPORT PERVASIVE AND AUTONOMIC COMPUTING  

E-print Network

must balance several conflicting concerns, including quality-of-service, security, fault As the computing and communication infrastructure continues to expand and diversify, the need for adaptability in software is growing. Adaptability is especially important to pervasive computing, which promises anywhere

Sadjadi, S. Masoud

52

A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing  

E-print Network

. Ahamed1 , Moushumi Sharmin2 , and Shameem Ahmed2 1 Marquette University, Milwaukee, Wisconsin, USA 2 other directly or via another mobile device, and are responsible for performing computations infrastructure- less pervasive computing area, which leads to the dependency on other devices for resources

Madiraju, Praveen

53

Combining amorphous computing and reactive agent-based systems: a paradigm for pervasive intelligence?  

Microsoft Academic Search

This paper is intended to provide insight on the upheaval that the advent of computing systems based on pervasive computing will represent. We show, after an introduction to this concept, why the traditional rules of design, validation, control and deployment nowadays used in the industry are not adapted anymore to these new systems. We then show that the multi-agent systems

David Servat; Alexis Drogoul

2002-01-01

54

The SocioEconomic Impact of Pervasive Computing Intelligent Spaces and the Organisation of Business  

Microsoft Academic Search

\\u000a This chapter is based on work carriedout for the Eurescom project PI302 PROFIT (Potential Profit Opportunities in the Future\\u000a Ambient Intelligence World). The vision driving iSpaces is described in many different ways, e.g. ubiquitous computing [1], pervasive computing [2], ambient intelligence [3]. Based largely on expected developments in information and communications technology, it has three main aspects:\\u000a \\u000a \\u000a \\u000a \\u000a \\u000a \\u000a \\u000a pervasive

M H Lyons; R Ellis; J M M Potter; D A M Holm; R Venousiou

55

myGander: A Mobile Interface and Distributed Search Engine for Pervasive Computing  

E-print Network

@uncc.edu, gcroman@unm.edu Abstract--Motivated by the growing amount of digitally- accessible information in our search information with spatiotemporal underpinnings without a priori indexing. Human users scenario. I. INTRODUCTION The envisioned pervasive computing spaces of the near future (e.g., the Internet

Julien, Christine

56

Security in Distributed, Grid, and Pervasive Computing Yang Xiao,(Eds.) pp. -  

E-print Network

and energy reserves of wireless sensor nodes while also securing them against attackers. All aspectsSecurity in Distributed, Grid, and Pervasive Computing Yang Xiao,(Eds.) pp. ­ - ­ c 2006 Auerbach Publications, CRC Press Chapter 17 Wireless Sensor Network Security: A Survey John Paul Walters, Zhengqiang

Shi, Weisong

57

A Taxonomy-Driven Approach to Visually Prototyping Pervasive Computing Applications  

E-print Network

A Taxonomy-Driven Approach to Visually Prototyping Pervasive Computing Applications Zo´e Drey1 environment into a visual pro- gramming language. A taxonomy describes the relevant entities of a given to taxonomical information. We have implemented a visual environment to develop taxonomies and orchestration

Paris-Sud XI, Université de

58

Mobile fighting crime device based on information technology by police cloud computing toward pervasive investigations  

Microsoft Academic Search

In this paper, we present the pervasive investigation crime (PIC) system in which this cloud scenario integrates the emerging cloud computing and the radio identification (RFID) technology. This cloud device can give a wider cloud resource including 2G, 3G and 4G cell phone resource that it is suitable for investigator enables to detection a misdeed or suspected vehicle and associated

Ke-Ren Chen; Hung-Jen Tsai

2011-01-01

59

Physicalnet: A Generic Framework for Managing and Programming Across Pervasive Computing Networks  

E-print Network

pervasive computing environments. These environments consist of a wide spectrum of devices from very minimal in one house would result in the alarms raised in another nearby house. To achieve this potential of these solutions are heavyweight in memory and execution time and do not adequately address minimal capacity

Stankovic, John A.

60

Self-Routing in Pervasive Computing Environments using Smart Messages Cristian Borcea1  

E-print Network

Self-Routing in Pervasive Computing Environments using Smart Messages Cristian Borcea1 , Chalermek University of Maryland College Park, MD, 20742, USA iftode@cs.umd.edu Abstract Smart Messages (SMs This work is supportedin partby the NSF underthe ITR GrantNumber ANI-0121416 on a highway cooperating

Borcea, Cristian

61

Methods for Policy Conflict Detection and Resolution in Pervasive Computing Environments  

E-print Network

]:Software Management. General Terms Design, Performance and Management. Keywords Policy, Conflict Detection, ConflictMethods for Policy Conflict Detection and Resolution in Pervasive Computing Environments Evi Syukur is to investigate several techniques that can be used to statically or dynamically detect and resolve conflicts

Loke, Seng W. - Loke, Seng W.

62

48 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE C O N T E X T -A W A R E C O M P U T I N G  

E-print Network

O N T E X T - A W A R E C O M P U T I N G Context-Aware Artifacts: Two Development Approaches O ne of the most exciting and impor- tant recent developments in con- text-aware computing is to make everyday appliances, devices, and objects context aware. A context- aware artifact uses sensors to perceive

Loke, Seng W. - Loke, Seng W.

63

Design and implementation of a virtual assistant for healthcare professionals using pervasive computing technologies  

Microsoft Academic Search

With the advancement of hand-held devices, wireless and sensor network pervasive computing has achieved a perfect momentum.\\u000a Formerly, a requirement existed that was a serious impediment and threat to the mobility of users the necessary presence\\u000a of a fixed wired network. This has been resolved by the recent advances in wireless and mobile technologies, particularly\\u000a Bluetooth and WiFi. The

Sheikh Iqbal Ahamed; Moushumi Sharmin; Shameem Ahmed; Munirul M. Haque; Ahmed J. Khan

2006-01-01

64

A Clustering-based Location Privacy Protection Scheme for Pervasive Computing  

Microsoft Academic Search

In pervasive computing environments, Location- Based Services (LBSs) are\\u000abecoming increasingly important due to continuous advances in mobile networks\\u000aand positioning technologies. Nevertheless, the wide deployment of LBSs can\\u000ajeopardize the location privacy of mobile users. Consequently, providing\\u000asafeguards for location privacy of mobile users against being attacked is an\\u000aimportant research issue. In this paper a new scheme for

Lin Yao; Chi Lin; Xiangwei Kong; Feng Xia; Guowei Wu

2010-01-01

65

Delegation, Arbitration and High-Level Service Discovery as Key Elements of a Software Infrastructure for Pervasive Computing  

E-print Network

The dream of pervasive computing is slowly becoming a reality. A number of projects around the world are constantly contributing ideas and solutions that are bound to change the way we interact with our environments and ...

Gajos, Krzysztof

2003-06-01

66

Introduction to the IEEE Transactions on Cloud Computing  

E-print Network

Introduction to the IEEE Transactions on Cloud Computing Rajkumar Buyya Welcome to the IEEE Transactions on Cloud Computing (TCC). It is my privilege and honor to serve as the inaugural Editor-in-Chief of TCC. I would like to thank the IEEE and the world-wide Cloud Computing community for giving me

Buyya, Rajkumar

67

14 1541-1672/09/$25.00 2009 IEEE IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society  

E-print Network

14 1541-1672/09/$25.00 © 2009 IEEE IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society Vladimir Gorodetsky, St. Petersburg Institute for Informatics and Automation Pericles A. Mitkas, Aristotle University of Thessaloniki Agents and Data Mining #12;MaY/JuNE 2009 www.computer.org/intelligent 15

Cao, Longbing

68

OXYGENMIT LABORATORY FOR COMPUTER SCIENCE MIT ARTIFICIAL INTELLIGENCE LABORATORY PERVASIVE, HUMAN-CENTERED COMPUTING  

E-print Network

will be pervasive, like batteries, power sockets, and the oxygen in the air we breathe. Configurable generic devices. It must adapt to change, both in user requirements and in operating conditions. It must never shut down, offices, and cars sense and affect our immediate environment. Hand-held devices, called Handy21s (H21s

Goldwasser, Shafi

69

A Pervasive Computing Solution to Asset, Problem and Knowledge Management Suman K. Kalia, Charles C. Tappert, Allen Stix, and Fred Grossman  

E-print Network

the effects of pervasive computing on the management of a technology Help Desk environment. The researchA Pervasive Computing Solution to Asset, Problem and Knowledge Management Suman K. Kalia, Charles C. Tappert, Allen Stix, and Fred Grossman School of Computer Science and Information Systems Pace University

Tappert, Charles

70

Systems Directions for Pervasive Computing Robert Grimm, Janet Davis, Ben Hendrickson, Eric Lemar, Adam MacBeth,  

E-print Network

comput- ing space has been mapped as a combination of mobile and stationary devices that draw on powerful, Adam MacBeth, Steven Swanson, Tom Anderson, Brian Bershad, Gaetano Borriello, Steven Gribble, David applications in the pervasive computing space. In this paper, we argue that existing approaches to dis

Wetherall, David

71

10 Published by the IEEE Computer Society 1089-7801/10/$26.00 2010 IEEE IEEE INTERNET COMPUTING GuestEditors'Introduction  

E-print Network

and technical challenges inherent to this "Internet of Things," of which privacy is the most compelling10 Published by the IEEE Computer Society 1089-7801/10/$26.00 © 2010 IEEE IEEE INTERNET COMPUTING GuestEditors'Introduction Internet Predictions Vinton G. Cerf Google Munindar P. Singh North Carolina

72

Optimal Resource Allocation for Pervasive Health Monitoring Systems  

E-print Network

Optimal Resource Allocation for Pervasive Health Monitoring Systems with Body Sensor Networks Yifeng He, Member, IEEE, Wenwu Zhu, Fellow, IEEE, and Ling Guan, Fellow, IEEE Abstract--Pervasive health monitoring is an eHealth service, which plays an important role in prevention and early detection of diseases

Chen, Ing-Ray

73

Published by the IEEE CS n 1536-1268/08/$25.00 2008 IEEE PERVASIVE computing 13 G u e s t e d i t o r s ' i n t r o d u c t i o n  

E-print Network

or criminal intent. However, hacking's older definitions are quite different: interacting with a computer television. A source of inspiration Hacking is also a cultural phenomenon that inspired many of us to become

Heidemann, John

74

A Clustering-based Location Privacy Protection Scheme for Pervasive Computing  

E-print Network

In pervasive computing environments, Location- Based Services (LBSs) are becoming increasingly important due to continuous advances in mobile networks and positioning technologies. Nevertheless, the wide deployment of LBSs can jeopardize the location privacy of mobile users. Consequently, providing safeguards for location privacy of mobile users against being attacked is an important research issue. In this paper a new scheme for safeguarding location privacy is proposed. Our approach supports location K-anonymity for a wide range of mobile users with their own desired anonymity levels by clustering. The whole area of all users is divided into clusters recursively in order to get the Minimum Bounding Rectangle (MBR). The exact location information of a user is replaced by his MBR. Privacy analysis shows that our approach can achieve high resilience to location privacy threats and provide more privacy than users expect. Complexity analysis shows clusters can be adjusted in real time as mobile users join or lea...

Yao, Lin; Kong, Xiangwei; Xia, Feng; Wu, Guowei

2010-01-01

75

R&I Research Report R 36\\/2007 Title Value networks for universal pervasive computing using smart spaces  

Microsoft Academic Search

The majority of scenarios for pervasive computing emphasizes the seamless availability of services and resources in smart spaces. This seamless availability is in its current form limited to nomadic situations where users are in trusted pre-configured smart spaces. In order to support wider availability and universal usage of smart spaces we need to have clear business models, in particular clearly

Babak Farshchian; Arild Herstad; Reidar Martin Svendsen; Erik Berg; Geir Gylterud; Stein Tore Rekdal

76

Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile Phones  

Microsoft Academic Search

Passive RFID technology and unobtrusive Bluetooth- enabled active tags are means to augment products and everyday objects with information technology invisible to human users. This paper analyzes general interaction pat- terns in such pervasive computing settings where informa- tion about the user's context is derived by a combination of active and passive tags present in the user's environment. The concept

Frank Siegemund; Christian Fler

2003-01-01

77

30 Published by the IEEE Computer Society 1089-7801/09/$25.00 2009 IEEE IEEE INTERNET COMPUTING nternet technologies enable us to  

E-print Network

the Asynchronous Learning Networks Participatory Ex- amination approach (or APE) utiliz- ing Internet technologies Participatory Exams pus blended courses. We created and designed APE to facilitate deep learning for distanceE-Learning 30 Published by the IEEE Computer Society 1089-7801/09/$25.00 © 2009 IEEE IEEE INTERNET

Bieber, Michael

78

Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-based Services  

NASA Astrophysics Data System (ADS)

During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists and science fiction writers. Today this subject has become of interest to business, government, and society. Governmental authorities exercise their power through the networked environment. Credit card databases maintain our credit history and decide whether we are allowed to rent a house or obtain a loan. Mobile telephones can locate us in real time so that we do not miss calls. Within another 10 years, all sorts of devices will be connected through the network. Our fridge, our food, together with our health information, may all be networked for the purpose of maintaining diet and well-being. The Internet will move from being an infrastructure to connect computers, to being an infrastructure to connect everything [2, 3].

Soppera, A.; Burbridge, T.

79

Wireless Adaptive Therapeutic TeleGaming in a Pervasive Computing Environment  

NASA Astrophysics Data System (ADS)

This chapter introduces a wireless, pervasive computing approach to adaptive therapeutic telegaming considered in the context of near set theory. Near set theory provides a formal basis for observation, comparison and classification of perceptual granules. A perceptual granule is defined by a collection of objects that are graspable by the senses or by the mind. In the proposed pervasive computing approach to telegaming, a handicapped person (e.g., stroke patient with limited hand, finger, arm function) plays a video game by interacting with familiar instrumented objects such as cups, cutlery, soccer balls, nozzles, screw top-lids, spoons, so that the technology that makes therapeutic exercise game-playing possible is largely invisible (Archives of Physical Medicine and Rehabilitation 89:2213-2217, 2008). The basic approach to adaptive learning (AL) in the proposed telegaming environment is ethology-inspired and is quite different from the traditional approach to reinforcement learning. In biologically-inspired learning, organisms learn to achieve some goal by durable modification of behaviours in response to signals from the environment resulting from specific experiences (Animal Behavior, 1995). The term adaptive is used here in an ethological sense, where learning by an organism results from modifying behaviour in response to perceived changes in the environment. To instill adaptivity in a video game, it is assumed that learning by a video game is episodic. During an episode, the behaviour of a player is measured indirectly by tracking the occurrence of gaming events such as a hit or a miss of a target (e.g., hitting a moving ball with a game paddle). An ethogram provides a record of behaviour feature values that provide a basis a functional registry for handicapped players for gaming adaptivity. An important practical application of adaptive gaming is therapeutic rehabilitation exercise carried out in parallel with playing action video games. Enjoyable and engaging interactive gaming will motivate patients to complete the rehabilitation process. Adaptivity is seen as a way to make action games more accessible to those who have physical and cognitive impairments. The telegaming system connects to the internet and implements a feed-and-forward mechanism that transmits gaming session tables after each gaming session to a remote registry accessible to therapists and researchers. The contribution of this chapter is the introduction of a framework for wireless telegaming useful in therapeutic rehabilitation.

Peters, James F.; Szturm, Tony; Borkowski, Maciej; Lockery, Dan; Ramanna, Sheela; Shay, Barbara

80

Consumers and Pervasive Retail Panos Kourouthanasis  

E-print Network

, grocery shopping anywhere and anytime becomes possible. However, deploying pervasive computing systems concentrated towards consumer perceptions of pervasive commerce systems. In this article we present the front-generation pervasive retail system. Our initial motivation for the development of a retail system using pervasive

Roussos, George

81

Pervasive and standalone computing: the perceptual effects of variable multimedia quality  

Microsoft Academic Search

The introduction of multimedia on pervasive and mobile communication devices raises a number of perceptual quality issues, however, limited work has been done examining the 3- way interaction between use of equipment, quality of perception and quality of service. Our work measures levels of informational transfer (objective) and user satisfaction (subjective) when users are presented with multimedia video clips at

Stephen R. Gulliver; Tacha Serif; George Ghinea

2004-01-01

82

Editor: Charles Petrie petrie@stanford.edu 2 Published by the IEEE Computer Society 1089-7801/14/$31.00 2014 IEEE IEEE INTERNET COMPUTING  

E-print Network

-7801/14/$31.00 © 2014 IEEE IEEE INTERNET COMPUTING N o, I'm not trying to apply the term "Inter- net of Things function, and is carried out by the Internet Assigned Num- bers Authority (IANA). Ok, is this a thing for Internet protocols, some of which include things like MIME types and TCP port numbers. Most importantly

Petrie, Charles

83

SocialComputingintheBlogosphere 30 Published by the IEEE Computer Society 1089-7801/10/$26.00 2010 IEEE IEEE INTERNET COMPUTING  

E-print Network

states that "Nothing in this Act shall be construed as permitting the censorship of the Internet."1-7801/10/$26.00 © 2010 IEEE IEEE INTERNET COMPUTING T he value of any piece of informa- tion depends on its relevance the Malaysian press is tightly controlled, the government has officially encouraged Internet- based enterprises

Kokar, Mieczyslaw M.

84

A Sense of Security in Pervasive ComputingIs the Light on When the Refrigerator Door Is Closed?  

NASA Astrophysics Data System (ADS)

In this paper, we investigate how existing theoretical contributions on usable security can serve to guide the design of a specific system. We illustrate how going through this theoretically informed, concrete design process, also provides the basis for complementing existing theoretical contributions. The system we have designed is a system taking advantage of pervasive computing technology to offer hotel guests access to their personal, digital materials while in a hotel room. The design is based on two ideas novel to usable security, namely falsification and the singleton invariant..

Pagter, Jakob Illeborg; Petersen, Marianne Graves

85

A History of the IEEE Computational Intelligence Society  

Microsoft Academic Search

The IEEE Computational Intelligence Society (CIS) focuses on computational and theoretical aspects of mimicking nature for problem solving. CIS core technologies include neural, fuzzy, and evolutionary computation, as well as hybrid intelligent systems that contain these and other related paradigms. The Society has its own history of transformation from the Neural Network Council to the Neural Network Society to the

Gary B. Fogel

2009-01-01

86

Intelligent Pervasive Network Authentication: S\\/Key Based Device Authentication  

Microsoft Academic Search

The intelligent pervasive network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. As a number of pervasive network services are available and smart environment is expanding into ubiquitous computing environment, we need to protect intelligent pervasive environment system from illegal accesses and a variety

Deok Gyu Lee; Jong-Wook Han; Doo Soon Park; Im Yeong Lee

2009-01-01

87

Computational Intelligence and AI in Games: A New IEEE Transactions  

E-print Network

increase in the quality, diversity and pervasiveness of video games. The value of the worldwide computer and video games market is estimated to be $USD25bn annually1 , and is predicted to grow rapidly over to chess and checkers do not work well for Go, and are even less applicable to video games where the state

Lucas, Simon M.

88

IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014 369 Heterogeneity in Mobile Cloud Computing  

E-print Network

, IEEE, Abdullah Gani, Senior Member, IEEE and Rajkumar Buyya, Senior Member, IEEE Abstract--The unabated.C/HIR/MOHE/FCSIT/03. Z. Sanaei, S. Abolfazli, and A. Gani are with the Department of Computer System & Technology

Buyya, Rajkumar

89

64 PERVASIVE computing Published by the IEEE Computer Society 1536-1268/07/$25.00 2007 IEEE Privacy in Location-  

E-print Network

predict that by 2010 half of all cell phone users in the US will be using loca- tion-based services.1 with place and social context. These findings are useful for designing privacy policies and user interfaces,6 As a result, people often use new technolo- gies in unforeseen ways,7,8 which could compro- mise privacy

Kotz, David

90

10 PERVASIVE computing Published by the IEEE Computer Society 1536-1268/07/$25.00 2007 IEEE Data Management  

E-print Network

, through the CDC's PulseNet database). Medical patients, including those infected with zooanotic diseases these reports into a data warehouse that would serve to provide early warning and track and manage an outbreak's evolution. But to monitor and manage an outbreak such as avian flu, many domains must be able to gather

Deshpande, Amol

91

Studying the Elusive Experience in Pervasive Games  

ERIC Educational Resources Information Center

Studying pervasive games is inherently difficult and different from studying computer or board games. This article builds upon the experiences of staging and studying several playful pervasive technology prototypes. It discusses the challenges and pitfalls of evaluating pervasive game prototypes and charts methods that have proven useful in

Stenros, Jaakko; Waern, Annika; Montola, Markus

2012-01-01

92

Editor: Charles Petrie petrie@stanford.edu 2 Published by the IEEE Computer Society 1089-7801/13/$31.00 2013 IEEE IEEE INTERNET COMPUTING  

E-print Network

-7801/13/$31.00 © 2013 IEEE IEEE INTERNET COMPUTING R ecently, a friend asked me to write about Bitcoin. This has always. They are somewhat more subject to hacking and you can't insure them. Lose your hard drive, lose your stash. I don-it-yourself (DIY) money enabled by novel uses of the Internet -- that is, you can now use the Internet to turn data

Petrie, Charles

93

Computational Photography 32 March/April 2007 Published by the IEEE Computer Society 0272-1716/07/$25.00 2007 IEEE  

E-print Network

Computational Photography 32 March/April 2007 Published by the IEEE Computer Society 0272-1716/07/$25.00 © 2007 IEEE Many computational photography appli- cations require sets of images that are captured) filter reduces the amount of transmitted light, equally across all wavelengths. The plate mirror splits

Nayar, Shree K.

94

Authentication for Pervasive Computing Sadie Creese 1 , Michael Goldsmith 3;4 , Bill Roscoe 2;3 , and Irfan Zakiuddin 1  

E-print Network

be encountered. 1 Introduction 1.1 Ambient Intelligence and Security. The Ambient Intelligence World will be surrounded by intelligent, intuitive, interfaces capable of provid- ing information and communication intelligent computing environment. In the future pervasive networking technologies will become commonplace

Roscoe, Bill

95

SelfRouting in Pervasive Computing Environments using Smart Messages # Cristian Borcea 1 , Chalermek Intanagonwiwat 1 , Akhilesh Saxena 1 , and Liviu Iftode 2  

E-print Network

Self­Routing in Pervasive Computing Environments using Smart Messages # Cristian Borcea 1 Science University of Maryland College Park, MD, 20742, USA iftode@cs.umd.edu Abstract Smart Messages (SMs the ITR Grant Number ANI­0121416 on a highway cooperating to adapt to the traffic conditions. Sensor

Rutgers University

96

1 Mobile, Distributed, and Pervasive Michel Barbeau  

E-print Network

, and distributed computing are key technologies to support perva- sive computing. This chapter is about software technologies designed to address problems in mobile, distributed, and pervasive computing. Characteristics open communication technologies to support pervasive computing are presented in detail, namely, service

Barbeau, Michel

97

82 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 3, NO. 2, JULY 1999 Evolutionary Programming Made Faster  

E-print Network

82 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 3, NO. 2, JULY 1999 Evolutionary Programming Made Faster Xin Yao, Senior Member, IEEE, Yong Liu, Student Member, IEEE, and Guangming Lin Abstract step size and the probability of finding a global optimum and thus explains why FEP performs better

Yao, Xin

98

IEEE COMPUTATIONAL INTELLIGENCE SOCIETY RECOGNIZES JERRY MENDEL AND DONGRUI WU  

E-print Network

IEEE COMPUTATIONAL INTELLIGENCE SOCIETY RECOGNIZES JERRY MENDEL AND DONGRUI WU Dr. Jerry Mendel of Type-1 and Interval Type-2 Fuzzy Logic Systems". Dr. Mendel was presented the award by CT Lin, Dr. Mendel defined Fuzzy Logic and their breakthrough in this specific subject. Dr. Mendel likes

Shahabi, Cyrus

99

Nominee for IEEE Computer Society President-Elect (2016 President)  

E-print Network

and government. Also, I will try to give young people technological dreams. The Computer Society's core by Internet: August 4 - 12:00 noon EDT, October 6, 2014 You will receive an e-mail from IEEE-CS for the voting in creating modern products and services attractive to young and experienced members and potential members

Kasahara, Hironori

100

1070-986X/03/$17.00 2003 IEEE Published by the IEEE Computer Society 11 Media Impact  

E-print Network

1070-986X/03/$17.00 © 2003 IEEE Published by the IEEE Computer Society 11 Media Impact Editor- lem of automatic retrieval of syntactic and semantic data from audio­visual media as a way to overcome seems to solve new problems with old solu- tions and that only furthers the crisis. Let me explain why

Nack, Frank

101

Pervasive and Mobile Computing ( ) Contents lists available at SciVerse ScienceDirect  

E-print Network

persuasion systems [4,7,10­12] explore social effects in their feedback design. Studies [7,13] have shown from the design and evaluation of a social persuasion system Meng-Chieh Chiua, , Cheryl Chia-Hui Chenb Keywords: Persuasive technology Ubiquitous computing Social persuasion Mobile computing Activity

Huang, Polly

102

Elsevier Editorial System(tm) for Pervasive and Mobile Computing Manuscript Draft  

E-print Network

athletes is an important com- ponent of their training. In this paper we describe an application that per. Introduction Recently, motivated by ever increasing levels of interaction between humans and computing devices, context aware computing has received extensive re- 6The authors acknowledge the staff and athletes

Shamir, Ron

103

IEEE Pervasive Computing (Revised) Cardiovascular Monitoring Using Earphones and a Mobile Device  

E-print Network

catastrophes and treatment therapies of chronic disease. Resting heart rate, one of the simplest cardiovascular Frequent and non-invasive cardiovascular monitoring is important in surveillance for cardiovascular) for cardiovascular disease [1]. In particular, the association between accelerated resting heart rate and mortality

104

82 PERVASIVE computing 1536-1268/02/$17.00 2002 IEEE Today, mobile devices and gadgets  

E-print Network

. Refrigerators with Web pads, microwaves that download recipes, and stereo systems that mute when the phone ringsME has evolved according to the Java Commu- nity Process, a formalized process and an open

Helal, Abdelsalam

105

Pervasive and Mobile Computing 10 (2014) 203221 Contents lists available at ScienceDirect  

E-print Network

persuasion systems [4,7,10­12] explore social effects in their feedback design. Studies [7,13] have shown: Lessons learned from the design and evaluation of a social persuasion system Meng-Chieh Chiua, , Cheryl online 29 April 2013 Keywords: Persuasive technology Ubiquitous computing Social persuasion Mobile

Ouhyoung, Ming

106

"Making Use of Serendipity: A new Direction for Pervasive Computing from a  

E-print Network

-hua Chu ( ) Computer Science & Information Engineering Department National Taiwan University #12;A few words ... · This talk is an adventure for me in the psychology department. ­ Not sure why I said yes so as much as you do. ­ who are also planning to take an adventure trip to Africa. ­ who also saw the movie

Ouhyoung, Ming

107

PERPLEXUS: Pervasive Computing Framework for Modeling Complex Virtually-Unbounded Systems  

Microsoft Academic Search

This paper introduces Perplexus, a European project that aims to develop a scalable hardware platform made of custom reconfigurable devices endowed with bio-inspired capabilities. This platform will enable the simulation of large-scale complex systems and the study of emergent complex behaviors in a virtually unbounded wireless network of computing modules. The final infrastructure will be used as a simulation tool

Eduardo Sanchez; Andrs Prez-uribe; Andres Upegui; Yann Thoma; Juan Manuel Moreno; Alessandro E. P. Villa; Henri Volken; Andrzej Napieralski; Gilles Sassatelli; Erwan Lavarec

2007-01-01

108

Pervasive and Mobile Computing 1 (2005) 157189 www.elsevier.com/locate/pmc  

E-print Network

'Hallarona aSchool of Computer Science, Carnegie Mellon University, Pittsburgh PA, United States bIntel Research Pittsburgh, Pittsburgh PA, United States Received 1 March 2005; accepted 23 March 2005 Available, 5000 Forbes Avenue, 15213 Pittsburgh, PA, United States. Tel.: +1 412 268 3743; fax: +1 412 268 4136. E

Shewchuk, Jonathan

109

JANUARY/FEBRUARY 2003 1094-7167/03/$17.00 2003 IEEE 55 Published by the IEEE Computer Society  

E-print Network

JANUARY/FEBRUARY 2003 1094-7167/03/$17.00 © 2003 IEEE 55 Published by the IEEE Computer Society N a t u r a l L a n g u a g e P r o c e s s i n g P r o c e s s i n g Intelligent Indexing of Crime Scene of documentation in a domain of considerable social importance: crime investigation. The state in which

Saggion, Horacio

110

Recent Advances in AI for Computational Sustainability AI and Sustainability Department, IEEE Intelligent Systems  

E-print Network

Recent Advances in AI for Computational Sustainability AI and Sustainability., "Computing and AI for a Sustainable Future," IEEE Intelligent Systems, vol. 27, no. 4, July/Aug 2012. Though research at the intersection of AI

Fisher, Douglas H.

111

A semantic approach for building pervasive spaces  

Microsoft Academic Search

Large and pervasive sensing, communications, and computing infrastructures are enabling the realization of pervasive spaces. Enabling such spaces, however, encompasses a set of challenges. First, programming each application such that it connects to each sensor and it interprets the data being sensed requires a concentration of expertise that is rarely available. Second, achieving a wise and fair usage of the

Daniel Massaguer; Sharad Mehrotra; Nalini Venkatasubramanian

2009-01-01

112

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Drawing-based Procedural Modeling of Chinese  

E-print Network

of Chinese Architectures Fei Hou, Yue Qi, Member, IEEE and Hong Qin, Member, IEEE Abstract--This paper,000 archives of Yang Shi Lei (the family in charge of the imperial architecture construction during the Qing, China. E-mail: qy@vrlab.buaa.edu.cn · H. Qin is with the Department of Computer Science, Stony Brook

Qin, Hong

113

ScaleMirror: A Pervasive Device to Aid Weight Analysis  

E-print Network

ScaleMirror: A Pervasive Device to Aid Weight Analysis Abstract As today's fast paced environment and control weight gain. With the advent of pervasive and ubiquitous computing, there are new opportunities and creation of ScaleMirror; a prototype pervasive device to help users monitor their weight. This awareness

Connelly, Kay

114

Proc. IEEE Int. Conference on Computational Photography (ICCP) 2011 Spaceborne Underwater Imaging  

E-print Network

Proc. IEEE Int. Conference on Computational Photography (ICCP) 2011 Spaceborne Underwater Imaging at multiple wavelengths indicate depth. The es- timated depth, however, changes with the albedo of the sub

Schechner, Yoav Yosef

115

IEEE COMPUTER ARCHITECTURE LETTERS, VOL. XXX, NO. XXX, XXXX 2013 1 Memristor-Based Multithreading  

E-print Network

IEEE COMPUTER ARCHITECTURE LETTERS, VOL. XXX, NO. XXX, XXXX 2013 1 Memristor-Based Multithreading in deep pipeline machines. CFMT is applicable to any execution event that can cause a pipe- line stall

Feitelson, Dror

116

Rectified Catadioptric Stereo Sensors Joshua Gluckman, Member, IEEE Computer Society, and Shree K. Nayar, Senior Member, IEEE  

E-print Network

Rectified Catadioptric Stereo Sensors Joshua Gluckman, Member, IEEE Computer Society, and Shree K novel catadioptric sensors that use mirrors to produce rectified stereo images. The scan- line be satisfied to obtain rectified stereo images with a single camera. Then, we discuss in detail the use of both

Nayar, Shree K.

117

The Science of Security 18 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES 1540-7993/11/$26.00 2011 IEEE MAY/JUNE 2011  

E-print Network

The Science of Security 18 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES 1540-7993/11/$26.00 © 2011 IEEE MAY/JUNE 2011 I n this article, we report a representative result in the science of security and energy (a relation- ship among physical concepts). It explains observed phenomena, such as the bending

Kaynar, Dilsun Kirli

118

Pervasive software development method  

Microsoft Academic Search

Software development methods aim at solving the software crisis. Many presented methods gain reputations under special application environments. There are so many kinds of methods that developers are troubled when choosing the most suitable one. This article presents a pervasive software development method aiming at helping developers deal with the trouble. The pervasive method advocates logicality, comprehensiveness, flexibility and self-improvement

Yu Wang; Xianguo Tuo

2010-01-01

119

10 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/07/$25.00 2007 IEEE Psychotherapy  

E-print Network

-Supported Psychology" sidebar). However, these approaches tend to be for particular disorders, without ther- apist, and associated disorders. Basedonaconstructivistmodel,CBT relies on the therapists' ability Cognition Outlines on Psychological Evaluation) project, we've developed a set of ubiquitous tools to sup

Antunes, Pedro

120

Sample Title 68 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE  

E-print Network

and information technologies as applied to intelligent transportation systems (see the "History of the ITSS and call for innova- tive solutions. TRAVELING IN INTELLIGENT SPACES Intelligent spaces are environments agents traveling in intelligent spaces. For example, traffic control at intersections could employ

Yang, Liuqing

121

38 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE Enhancing Security  

E-print Network

), and a tele- matics service provider (TSP)--perhaps a subsidiary of a vehicle manufacturer. Telematics Enhancing Security and Privacy in Traffic-Monitoring Systems I ntelligent transportation systems increas- ingly depend on probe vehicles to monitor traffic: they can automatically report posi- tion, travel time

Gruteser, Marco

122

1550 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 16, NO. 6, DECEMBER 2008 Perceptual Reasoning for Perceptual Computing  

E-print Network

for Perceptual Computing Jerry M. Mendel, Life Fellow, IEEE, and Dongrui Wu, Student Member, IEEE Abstract subjective judgments using CWW was proposed by Mendel in 2001. It is called a Perceptual Computer (Per Angeles, CA 90089-2564 USA (e-mail: Mendel@sipi.usc.edu; dongruiw@ usc.edu). Digital Object Identifier 10

Mendle, Jerry M.

123

2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any c  

E-print Network

.ieee.org/web/publications/rights/index.html. MOBILE AND UBIQUITOUS SYSTEMS www.computer.org/pervasive Hacking, Mashing, Gluing: Understanding T I O N Hacking, Mashing, Gluing: Understanding Opportunistic Design Björn Hartmann, Scott Doorley. Although many ubiquitous computing practitioners have engaged in these practices, design tools and software

Pratt, Vaughan

124

2012 IEEE 4th International Conference on Cloud Computing Technology and Science 978-1-4673-4510-1/12/$31.00 2012 IEEE  

E-print Network

2012 IEEE 4th International Conference on Cloud Computing Technology and Science 978Reduce applications that couples cloud computing with distributed embedded computing. Specifically, our system as Cloud services. These large- scale centers provide all sorts of computational services to a multiplicity

Hone, James

125

To Appear in IEEE Computer -February 2003 Simulating a $2M Commercial Server  

E-print Network

1 To Appear in IEEE Computer - February 2003 Simulating a $2M Commercial Server on a $2K PC Alaa R://www.cs.wisc.edu/multifacet/ Department of Electrical and Computer Engineering Duke University Abstract Commercial workloads and methods suitable for commercial workload simulation. The Wisconsin Commercial Workload Suite currently

Xu, Min

126

8th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS)  

Microsoft Academic Search

CONFERENCE AND WORKSHOP: ECBS 2001 will be the 8th formal IEEE sponsored meeting dedicated to formulating and advancing methods, techniques and tools for the engineering of computer-based systems. This emerging discipline is devoted to the design, development, deployment, and analysis of complex systems whose behavior is largely determined or controlled by computers. CBSs are characterized by functional, performance, and reliability

Taghi Khoshgoftaar

127

CIMSA 2005 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications  

E-print Network

CIMSA 2005 ­ IEEE International Conference on Computational Intelligence for Measurement Systems of Best Practices, with Application in the Petroleum Industry Shahab D. Mohaghegh1 , Razi Gaskari1 1 West of this methodology to a problem in the petroleum industry is presented. Keywords ­ Soft Computing, Best Practices

Mohaghegh, Shahab

128

Computer science curriculum 2013: reviewing the strawman report from the ACM\\/IEEE-CS task force  

Microsoft Academic Search

Beginning over 40 years ago with the publication of Curriculum 68, the major professional societies in computing--ACM and IEEE-Computer Society--have sponsored various efforts to establish international curricular guidelines for undergraduate programs in computing. As the field has grown and diversified, so too have the recommendations for curricula. There are now guidelines for Computer Engineering, Information Systems, Information Technology, and Software

Mehran Sahami; Steve Roach; Ernesto Cuadros-Vargas; David Reed

2012-01-01

129

Managing Standards Compliance Wolfgang Emmerich, Member, IEEE Computer Society,  

E-print Network

(SPI) initiatives, ISO 9000 [16] certifications and ISO 15504 [19] trials, and 3) as a consequence-established software and systems engineer- ing standards such as ISO 12207 [17], IEEE 1074 [14], and PSS-05 [23] set

Finkelstein, Anthony

130

Using Digital Computer Field Mapping of Outcrops to Examine the Preservation of High-P Rocks During Pervasive, Retrograde Greenschist Fluid Infiltration, Tinos, Cyclades Archipelago, Greece  

NASA Astrophysics Data System (ADS)

Digital field mapping of outcrops on the island of Tinos, Greece, was undertaken to investigate the nature of retrograde fluid infiltration during exhumation of high-P metamorphic rocks of the Attic-Cycladic blueschist belt. High-resolution digital photographs of outcrops were taken and loaded into graphics editing software on a portable, belt-mounted computer in the field. Geologic features from outcrops were drawn and labeled on the digital images using the software in real-time. The ability to simultaneously identify geologic features in outcrops and digitize those features onto digital photographs in the field allows the creation of detailed, field-verified, outcrop-scale maps that aid in geologic interpretation. During Cretaceous-Eocene subduction in the Cyclades, downgoing crustal material was metamorphosed to eclogite and blueschist facies. Subsequent Oligocene-Miocene exhumation of the high-P rocks was accompanied by pervasive, retrograde fluid infiltration resulting in nearly complete greenschist facies overprinting. On Tinos, most high-P rocks have undergone intense retrogression; however, adjacent to thick marble horizons with completely retrograded contact zones, small (sub km-scale) enclaves of high-P rocks (blueschist and minor eclogite facies) were preserved. Field observations suggest that the remnant high-P zones consist mostly of massive metabasic rocks and minor adjacent metasediments. Within the enclaves, detailed digital outcrop maps reveal that greenschist retrogression increases in intensity outward from the center, implying interaction with a fluid flowing along enclave perimeters. Permeability contrasts could not have been solely responsible for preservation of the high-P rocks, as similar rock suites distal to marble contacts were completely overprinted. We conclude that the retrograded contacts of the marble units served as high-permeability conduits for regional retrograde fluid flow. Pervasive, layer-parallel flow through metasediments would have been drawn into these more permeable flow channels. Deflections in fluid flow paths toward the high flux contacts likely caused retrograde fluids to flow around the enclaves, preserving the zones of "dry," unretrograded high-P rocks near marble horizons. Digital mapping of outcrops is a unique method for direct examination of the relationships between geologic structure, lithology, and mineral assemblage variation in the field. Outcrop mapping in the Attic-Cycladic blueschist belt has revealed that regional fluid flow along contacts can have important implications for the large-scale distribution of mineral assemblages in metamorphic terranes.

Breeding, C. M.; Ague, J. J.; Broecker, M.

2001-12-01

131

A Framework for Safe Composition of Heterogeneous SOA Services in a Pervasive Computing Environment with Resource Constraints  

ERIC Educational Resources Information Center

The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.

Reyes Alamo, Jose M.

2010-01-01

132

JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, VOL. 1, NO. 2, JUNE 2005 89 Blind Source Separation of Acoustic Signals  

E-print Network

, Fukushima 965-8580, Japan AND Brain Science Institute, RIKEN, Saitama 351-0198, Japan Email: sding@u-aizu.ac.jp ANDRZEJ CICHOCKI Brain Science Institute, RIKEN, Saitama 351-0198, Japan JIE HUANG AND DAMING WEI Department of Computer Software, The University of Aizu, Tsuruga, Ikki-machi, Aizu-Wakamatsu City, Fukushima

Vialatte, François

133

Performance evaluation of a decision-theoretic approach for quality of experience measurement in mobile and pervasive computing scenarios  

Microsoft Academic Search

Measuring and predicting users quality of experience (QoE) in dynamic network conditions is a challenging task. This paper presents results related to a decision-theoretic methodology incorporating Bayesian networks (BNs) and utility theory for quality of experience (QoE) measurement and prediction in mobile computing scenarios. In particular, we show how both generative and discriminative BNs can be used to measure and

Karan Mitra; Christer Ahlund; Arkady Zaslavsky

2012-01-01

134

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Blood Flow Clustering and Applications in  

E-print Network

Fluid Dynamics (CFD) simulations of blood flow based on patient-individual data are performed to betterIEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Blood Flow Clustering and Applications, Holger Theisel, Bernhard Preim Abstract--Understanding the hemodynamics of blood flow in vascular

135

IEEE TRANSACTIONS ON MOBILE COMPUTING 1 A Location-Privacy Threat Stemming from the  

E-print Network

--Location Privacy; Network Address Translation (NAT); IP-Geolocation ! 1 INTRODUCTION AS mobile users benefit from and extended version of a paper that appears in the Proceedings of the 13th Privacy Enhancing Technologies SymIEEE TRANSACTIONS ON MOBILE COMPUTING 1 A Location-Privacy Threat Stemming from the Use of Shared

Petitpierre, Claude

136

On Computing Farthest Dominated Locations Hua Lu, Member, IEEE, Man Lung Yiu  

E-print Network

1 On Computing Farthest Dominated Locations Hua Lu, Member, IEEE, Man Lung Yiu Abstract--In reality') spatial objects P, a set of (candidate) locations L, and a quality vector as design competence (for L), the farthest dominated location query (FDL) retrieves the location s L such that the distance to its nearest

Yiu, Man Lung

137

0018-9162/02/$17.00 2002 IEEE64 Computer Get Ready for  

E-print Network

0018-9162/02/$17.00 © 2002 IEEE64 Computer Get Ready for Agile Methods, with Care F aced reacted to the manifesto with scathing criticism. Real-world examples argue for and against agile methods plans. Compared to unplanned and undisciplined hack- ing, agile methods emphasize a fair amount of plan

Tappert, Charles

138

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION 1 Coevolving Game-Playing Agents: Measuring  

E-print Network

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION 1 Coevolving Game-Playing Agents: Measuring by evolving weighted piece counter value functions to play Othello, a classic two player perfect information if such an agent did exist, care would be needed to adapt its strength to be roughly equal to the current strength

Lucas, Simon M.

139

Algorithms for Storytelling Deept Kumar, Naren Ramakrishnan, Member, IEEE Computer Society,  

E-print Network

Algorithms for Storytelling Deept Kumar, Naren Ramakrishnan, Member, IEEE Computer Society, Richard F. Helm, and Malcolm Potts Abstract--We formulate a new data mining problem called storytelling and identify two expressions in this vocabulary that induce the same set of objects. Storytelling, on the other

Ramakrishnan, Naren

140

INTERNATIONAL IEEE CONFERENCE ON COMPUTER SCIENCES -RIVF'06 1 Analysis of Nasopharyngeal Carcinoma Data with a  

E-print Network

INTERNATIONAL IEEE CONFERENCE ON COMPUTER SCIENCES - RIVF'06 1 Analysis of Nasopharyngeal Carcinoma to recover the original structure from data. The algorithm is then applied on the Nasopharyngeal carcinoma learning method to a real world epidemiological problem, namely the Nasopharyngeal Carcinoma (NPC

Paris-Sud XI, Université de

141

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Image-Based Stained Glass  

E-print Network

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Image-Based Stained Glass Stephen Brooks of a work of stained glass. To this end, we develop a novel approach which involves image warping is first segmented. Each segment is subsequently transformed to match real segments of stained glass

Brooks, Stephen

142

Smart Grid Communication and Co-Simulation Vincenzo Liberatore, Member, IEEE Computer, Ahmad Al-Hammouri  

E-print Network

1 Smart Grid Communication and Co-Simulation Vincenzo Liberatore, Member, IEEE Computer, Ahmad Al in smart grid com- munication, and proposes PowerNet, a system of heterogeneous yet interoperable networks investments in software and hardware. Smart grid communication involves disparate designs and complex issues

Liberatore, Vincenzo

143

Interactive Narrative 30 May/June 2006 Published by the IEEE Computer Society 0272-1716/06/$20.00 2006 IEEE  

E-print Network

computer games have (or would like to have) rich, non- linear plotlines with multiple end- ings, complexInteractive Narrative 30 May/June 2006 Published by the IEEE Computer Society 0272 dramas, story-based experiences where a player interacts with and influences a story. Many modern

California at Santa Cruz, University of

144

Transforming Agriculture through Pervasive Wireless Sensor Networks  

Microsoft Academic Search

A large-scale, outdoor pervasive computing system uses static and animal-borne nodes to measure the state of a complex system comprising climate, soil, pasture, and animals. Agriculture faces many challenges, such as climate change, water shortages, labor shortages due to an aging urbanized population, and increased societal concern about issues such as animal welfare, food safety, and environmental impact. Humanity depends

Tim Wark; Peter I. Corke; Pavan Sikka; Lasse Klingbeil; Ying Guo; Christopher Crossman; Philip Valencia; Dave Swain; Greg Bishop-hurley

2007-01-01

145

Personal Pervasive Environments: Practice and Experience  

PubMed Central

In this paper we present our experience designing and developing two different systems to enable personal pervasive computing environments, Plan B and the Octopus. These systems were fully implemented and have been used on a daily basis for years. Both are based on synthetic (virtual) file system interfaces and provide mechanisms to adapt to changes in the context and reconfigure the system to support pervasive applications. We also present the main differences between them, focusing on architectural and reconfiguration aspects. Finally, we analyze the pitfalls and successes of both systems and review the lessons we learned while designing, developing, and using them. PMID:22969340

Ballesteros, Francisco J.; Guardiola, Gorka; Soriano, Enrique

2012-01-01

146

Your Way Your Missions: A Location-Aware Pervasive Game Exploiting the Routes of Players  

Microsoft Academic Search

With the development of pervasive computing, location-aware pervasive games have proliferated quickly. To counter the inefficiency of information adaptation based on a location and a radius, this paper presents the design and implementation of Your Way Your Missions (YWYM), which is a location-aware pervasive game exploiting the routes of players. YWYM provides a Google Maps based tool for players to

Ling Chen; Gencai Chen; Steve Benford

2012-01-01

147

74 Published by the IEEE Computer Society 1089-7801/09/$26.00 2009 IEEE IEEE INTERNET COMPUTING InternetofThingsTrack  

E-print Network

to the real world is the Internet of Things,2 which connects such resources with everyday objects's based on the Internet of Things and its technologies. Their framework for integrating Web services-Essen Heinrich Hu?mann University of Munich Perci: Pervasive Service Interaction with the Internet of Things #12

148

IEEE TRANSACTIONS ON COMPUTERS, VOL. C-26, NO. 12, DECEMBER 1977 further investigation into other technologies (I2L) and with  

E-print Network

IEEE TRANSACTIONS ON COMPUTERS, VOL. C-26, NO. 12, DECEMBER 1977 further investigation into other. Comput., vol. C-24, pp. 1101-1104, Nov. 1975. [61 D. Etiemble and M. Israel, "Noise margins circuits," IEEE Trans. Comput., vol. C-26, pp. 281-288, Mar. 1977. [8] The TTL Data Book for Design

Stanford University

149

Systems Directions for Pervasive Computing  

E-print Network

format ­ Rely on a common core API · But data and functionality depend on each other ­ Migrating ­ Are self-describing records ­ Define common data model, type system ­ Enable a common query language · Components implement functionality ­ Export and import event handlers ­ Are distributed in a common binary

Grimm, Robert

150

76 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 2014 IEEE Smartphones Editor: Roy Want n Google n roywant@acm.org  

E-print Network

. Improving Battery Technology Over the last 30 years, recharge- able battery energy capacities have increased are cre- ated--as long as a day's use is possible. However, the improvement of battery technology has been. The reality is that it's hard to make a better battery that's both high capacity and safe. In fact, even Li

Cortes, Corinna

151

52 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 2014 IEEE A Secure Supply-Chain  

E-print Network

of several meters--even with no line of sight between the tag and the reader. Although the increased data in multiple locations and searching for any RFID tags a person carries, such as RFID-tagged clothes increases with the potential dam- age to users and the potential gain to attack- ers.3 Encrypting

Wool, Avishai

152

IEEE TRANSACTIONS ON COMPUTERS, VOL. c-30, NO. 12, DECEMBER 1981 PASM: A Partitionable SIMD/MIMD System  

E-print Network

IEEE TRANSACTIONS ON COMPUTERS, VOL. c-30, NO. 12, DECEMBER 1981 PASM: A Partitionable SIMD/or MIMD machines. PASM consists of a parallel computation unit, which contains N processors, N memories systems, multiple-SIMD machines, parallel processing, partitionable computer systems, PASM, recon

153

Pervasive Developmental Disorders in Girls  

Microsoft Academic Search

Pervasive developmental disorders are a group of conditions sharing as their common features impairment in social reciprocity,\\u000a developmental disturbances affecting communication, and manifestation of restricted and repetitive behaviors. Autism is the\\u000a prototypical pervasive developmental disorder, and others include Asperger's Disorder, Rett's Disorder, Childhood Disintegrative\\u000a Disorder, and Pervasive Developmental Disorder-Not Otherwise Specified (PDD-NOS). Critical to understanding these conditions\\u000a is appreciation of

Kathleen Koenig; Katherine D. Tsatsanis

154

0018-9162/05/$20.00 2005 IEEE70 Computer C O V E R F E A T U R E  

E-print Network

and interpreting particular US gov- ernment regulations have become easier in recent years. For example, Business.gov0018-9162/05/$20.00 © 2005 IEEE70 Computer C O V E R F E A T U R E Published by the IEEE Computer and reconcile multiple authoritative sources. For example, US companies frequently must com- ply

Stanford University

155

[Pervasive developmental disorders].  

PubMed

Pervasive developmental disorders (PDD-ICD10), covering roughly the same entity as the autism spectrum disorders (ASD DSM-IVTR and DSM-V) include a heterogeneous clinical reality. PDD develop in childhood and are characterized by alterations in socialization, communication and behavior disorders with stereotypies and repetitive movements. Autism is included in PDD and has led to many debates in France and to the publication of recommendations and government plans, in recent years. We propose in this article to review the current knowledge of this topic. PMID:24855782

Ferreri, Mlanie

2014-04-01

156

Abstract--In this work we explore the opportunity Pervasive Spaces could provide as supplemental energy sources. We utilize the nature of pervasive smart spaces to outsource computation that would normally be performed on a mobile  

E-print Network

normally be performed on a mobile device to a surrogate server within the smart space. The decision to outsource a computation depends on whether its energy cost on the device is larger than the cost approach. Our experimental validation and benchmarks shows significant energy saving on the mobile device

Helal, Abdelsalam

157

Pervasive Advertising Jrg Mller1  

E-print Network

Pervasive Advertising Jörg Müller1 , Florian Alt2 , Daniel Michelis3 1 Deutsche Telekom technologies leave the labs, they are starting to be used for the purpose of advertising. Pervasive Advertising shaping this development in a meaningful way. In particular, many marketing and advertising professionals

158

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. XX, NO. Y, MONTH 1998 1 Modeling of Ship Trajectory in Collision  

E-print Network

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. XX, NO. Y, MONTH 1998 1 Modeling of Ship and other moving ships, the problem of avoiding collisions is reduced to a dynamic optimiza- tion task system. This new extension of EP/N computes a safe-optimum path of a ship in given static and dy- namic

Michalewicz, Zbigniew

159

IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, AUGUST 200X 1 A Policy-Oriented Architecture for Opportunistic  

E-print Network

, and Supratik Bhattacharya2 1School of Computer Science 2Sprint Advanced Technology Lab University of Waterloo-layer policies of past work. Session-layer policy definitions allow us to include a delay component (suchIEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, AUGUST 200X 1 A Policy-Oriented Architecture

Prasad, Sanjiva

160

IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. X, NO. X, XXXX 201X 1 Oruta: Privacy-Preserving Public Auditing  

E-print Network

IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. X, NO. X, XXXX 201X 1 Oruta: Privacy-Preserving Public--Public auditing, privacy-preserving, shared data, cloud computing. 1 INTRODUCTION CLOUD service providers offer verifiers. In this paper, we propose a novel privacy-preserving mechanism that supports public auditing

Li, Baochun

161

IEEE Transactions on Computational Intelligence and AI in Games (Special Issue on Brain/Neuronal-Computer Games Interfaces and Interaction), 2013, in press.  

E-print Network

, the broader use of the P300 BCI in BCI-controlled video games is recommended. Index Terms--Brain computer [4], [5]. BCI-controlled games (primarily video games) constitute an area that may meet the interestsIEEE Transactions on Computational Intelligence and AI in Games (Special Issue on Brain

Kaplan, Alexander

162

Pervasive media violence.  

PubMed

In this review, we focus our discussion on studies examining effects on children and young adults. We believe that the current epidemic of youth violence in the United States justifies a focus on this vulnerable segment of society. We consider media effects on individual children's behaviors, such as imitating aggressive acts. In addition, we examine how the media influence young people's perceptions of norms regarding interpersonal relationships. Next, we assess mass media effects on societal beliefs, or what children and adolescents think the "real world" is like. We suggest these media influences are cumulative and mutually reinforcing, and discuss the implications of repeated exposure to prominent and prevalent violent media messages. Finally, we catalog multiple intervention possibilities ranging from education to regulation. From a public health perspective, therefore, we evaluate the effects that pervasive media messages depicting violence have on young people and present multiple strategies to promote more healthful outcomes. PMID:8724228

Schooler, C; Flora, J A

1996-01-01

163

1541-1672/08/$25.00 2008 IEEE IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society  

E-print Network

n t h e Features Editor: Dennis Taylor dtaylor@computer.org "A lot of the early work in game AI has and utterances extracted N e w sALSo FEATurEd The Year The Power Grid GoT SmarTer Toward More Human Video Game University of Ap- plied Sciences, who wrote Programming Believable Characters for Computer Games (Charles

164

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 3, NO. 1, MARCH 2011 43 Reinforcement Learning in First Person  

E-print Network

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 3, NO. 1, MARCH 2011 43 Reinforcement Learning in First Person Shooter Games Michelle McPartland and Marcus Gallagher, Member, IEEE in learning how to play classic style games. Applying RL to first person shooter (FPS) games is an interesting

Gallagher, Marcus

165

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 4, NO. 1, MARCH 2012 1 A Survey of Monte Carlo Tree Search Methods  

E-print Network

, Computer Go. ! 1 INTRODUCTION MONTE Carlo Tree Search (MCTS) is a method for finding optimal decisions A Survey of Monte Carlo Tree Search Methods Cameron Browne, Member, IEEE, Edward Powley, Member, IEEE that the field is ripe for future work. Index Terms--Monte Carlo Tree Search (MCTS), Upper Confidence Bounds (UCB

Lucas, Simon M.

166

Proceedings IEEE Visualization 2000, pages 441444. cIEEE Computer Society Press, 2000. A Computational Steering System for Studying  

E-print Network

. A Computational Steering System for Studying Microwave Interactions with Missile Bodies J. Edward Swan II½ Marco that supports computational steering, which is an effort to make the typical simulation workflow more efficient, Computational Steering, Inverse Steering, Virtual Reality 1 Introduction This paper describes computational

Swan II, J. Edward

167

Insectopia: exploring pervasive games through technology already pervasively available  

Microsoft Academic Search

We present the pervasive game Insectopia, which have been designed by the approach of utilizing commercially available mobile phones to provide context-dependent gameplay. The design and evaluation of the game is described together with a discussion on how this approach can speed up making pervasive games a viable game genre for the general public. Categories and Subject Descriptors H1.2 User\\/Machine

Johan Peitz; Hannamari Saarenp; Staffan Bjrk

2007-01-01

168

IEEE TRANSACTIONS ON COMPUTERS, AUGUST 1974 Property 8  

E-print Network

, "Dynamic storage allocation system,"Commun. Ass. Comput. Mach., yol. 11, pp. 297-305, May 1968. [3] P. J, and J. D. Ullman, "Principles of optimalgage replacement," J. Ass. Comput. Mach., vol. 18, pp. 80-93, [5] P. J. Denning, "The working set model for program behavior,"Commun. Ass. Comput. Mach., vol. 11, pp

Stanford University

169

Survey on attitude towards pervasive games  

Microsoft Academic Search

Pervasive gaming as a research field has been attracting more and more attentions from researchers and practitioners. However, there is no much work on player's general attitude to pervasive games even this is an important aspect of understanding player enjoyment of pervasive games. We created a survey where we wanted to investigate people's attitude towards pervasive games. The survey included

Alf Inge Wang; Hong Guo; Meng Zhu; Are Sterb Akselsen; Kenneth Kristiansen

2010-01-01

170

1414 IEEE TRANSACTIONS ON MAGNETICS, VOL. 47, NO. 5, MAY 2011 Ships Magnetic Anomaly Computation With Integral Equation and Fast  

E-print Network

1414 IEEE TRANSACTIONS ON MAGNETICS, VOL. 47, NO. 5, MAY 2011 Ships Magnetic Anomaly Computation) and a fast multipole algorithm (FMM) in order to model ships magnetic anomaly. complex geometries of real, magnetostatics, marine technology. I. INTRODUCTION ANAVAL vessel, magnetized in the earth's magnetic field

Paris-Sud XI, Université de

171

IEEE TRANSACTIONS ON COMPUTERS, VOL. c-24, NO. 5, MAY 1975 Fault Masking in Combinational Logic Circuits  

E-print Network

investigates the masking relations among faults in a combinational logic circuit. For this purpose a transform for the circuit is defined and a model for fault analysis is constructed. This transform and model reduceIEEE TRANSACTIONS ON COMPUTERS, VOL. c-24, NO. 5, MAY 1975 Fault Masking in Combinational Logic

Stanford University

172

IEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 55, NO. 1, FEBRUARY 2008 501 Neutron Stimulated Emission Computed Tomography  

E-print Network

and malignant samples, which were confirmed through neutron activation analysis (NAA). Statistically significantIEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 55, NO. 1, FEBRUARY 2008 501 Neutron Stimulated Emission. Pedroni, and Carey E. Floyd, Jr. Abstract--Neutron stimulated emission computed tomography (NSECT

173

13-th IEEE International Conference on Peer-to-Peer Computing Information Propagation in the Bitcoin Network  

E-print Network

13-th IEEE International Conference on Peer-to-Peer Computing Information Propagation in the Bitcoin Network Christian Decker, Roger Wattenhofer ETH Zurich, Switzerland cdecker currencies does not rely on a centralized authority. Instead Bit- coin relies on a network of volunteers

174

IEEE TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, TCBB-2014-03-0071 1 A Deep Learning Network Approach to ab  

E-print Network

IEEE TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, TCBB-2014-03-0071 1 A Deep Learning that have traditionally employed neural networks are experimenting with novel deep learning techniques prediction, we wanted to determine whether deep learning could contribute to the advancement of this field

Cheng, Jianlin Jack

175

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, VOL. XX, NO. X, XXXX 20XX 1 Big Data Opportunities and Challenges  

E-print Network

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, VOL. XX, NO. X, XXXX 20XX 1 Big Data Opportunities, and Graham J. Williams Abstract--"Big Data" as a term has been among the biggest trends of the last three and perspectives of the authors relating to the new opportunities and challenges brought forth by the big data

Jin, Yaochu

176

1050 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 17, NO. 4, JULY 2006 Real-Time Computing Platform for  

E-print Network

1050 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 17, NO. 4, JULY 2006 Real-Time Computing Platform where the synapses are modeled as input-driven conductances. The temporal dynamics of the synaptic, where the different stages of the neuron model are processed in parallel. Further improvements occur

Eduardo, Ros

177

IEEE/ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS 1 Network-Based Drug-Target Interaction  

E-print Network

IEEE/ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS 1 Network-Based Drug Getoor Abstract--Drug-target interaction studies are important because they can predict drugs' unexpected using a bipartite graph of drug-target interactions augmented with drug-drug and target

Getoor, Lise

178

Ubiquitous Monitoring and Human Behaviour in Intelligent Pervasive Spaces  

Microsoft Academic Search

we are soon approaching the pervasive-era of computing, where computers are embedded into objects and the environment in order to provide new services to users. Significant levels of data are required in order for these services to function as intended, and it is this collection of data which we refer to as ubiquitous monitoring. Existing monitoring techniques have often been

Stuart Moran; Keiichi Nakata

2009-01-01

179

The human element as the key enabler of pervasiveness  

Microsoft Academic Search

The recent proliferation of sensor-equipped smartphones has brought sensor networking to the general public in the form of mobile phone sensing. By reaching out to mainstream users, mobile phone sensing has the potential of achieving the pervasive computing vision by putting the human element in the foreground. Because mo- bile phone sensing may require computationally intensive applications, it is impractical

Silvia Giordano; Daniele Puccinelli

2011-01-01

180

Proc. Computer Vison and Pattern Recognition (CVPR'99), Fort Collins, CO, USA, 23-25 June 1999, IEEE Computer Society PR00149, pp. 402407  

E-print Network

. The applica- tion scenario we have in mind is the registration of local changes in medical images due, IEEE Computer Society PR00149, pp. 402­407 Elastic Registration of Medical Images Using Radial Basis for elastic registration of medical images. With these basis functions the influence of a landmark

Hamburg,.Universität

181

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 2, APRIL 2009 229 Multiobjective Groundwater Management  

E-print Network

Groundwater Management Using Evolutionary Algorithms Tobias Siegfried, Stefan Bleuler, Marco Laumanns, Member, IEEE, Eckart Zitzler, Member, IEEE, and Wolfgang Kinzelbach Abstract--Sustainable management of groundwater resources is of crucial importance for regions where freshwater supply is nat- urally limited

Zitzler, Eckart

182

Proceedings of the IEEE international conference on computers  

SciTech Connect

This book presents the papers given at a conference on array processors and supercomputers. Topics considered at the conference included fault-tolerant systolic arrays, computer architecture, systolic processing, algorithms, performance, sorting, monitoring, parallel processing, speech recognition, vector processing, VLSI, image processing, and data-flow processing.

Not Available

1985-01-01

183

PDP and GSDL: A New Service Discovery Middleware to Support Spontaneous Interactions in Pervasive Systems  

Microsoft Academic Search

In pervasive computing environments, mobile devices communicate via wireless links without requiring any fixed infrastructure. These devices must be able to discover and share services dynamically. In this paper, we propose a new service discovery middleware specifically designed for this kind of environments. This middleware is composed of a service discovery protocol, Pervasive Discovery Protocol (PDP), and a service description

Celeste Campo; Mario Muoz; Jose Carlos Perea; Andrs Marn Lpez; Carlos Garca-rubio

2005-01-01

184

The Multimedia Challenges Raised by Pervasive Games Mauricio Capra, Milena Radenkovic, Steve Benford, Leif Oppermann,  

E-print Network

The Multimedia Challenges Raised by Pervasive Games Mauricio Capra, Milena Radenkovic, Steve Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devices, positioning systems and other

Aickelin, Uwe

185

6 COMPUTER Published by the IEEE Computer Society 0018-9162/14/$31.00 2014 IEEE SPOTLIGHT ON TRANSACTIONS  

E-print Network

- ventional telematics solutions use a radar-type mechanism that detects an obstacle ahead of a vehicle. But if we flood the system with alarm messages, starting from the crash scene out to each vehicle, it could and is a promising ap- proach to implementing a warning system in vehicles. Song Guo is a professor of computer

Stojmenovic, Ivan

186

96 IEEE Annals of the History of Computing Published by the IEEE Computer Society 1058-6180/04/$20.00 2004 IEEE Think Piece  

E-print Network

, relevant explanations of how the computer shapes, and is shaped by, modern society. This being said scholarship in the history of technolo- gy has been the realization that technological change is as much" of the computer revolution's unprecedented sci- entific and technological accomplishments. If in practice, its

Ensmenger, Nathan

187

Promoting renewed domestic energy consumption patterns with pervasive learning games  

Microsoft Academic Search

Engaging computer games can have an impact on energy consumption patterns in the home. PowerAgent is a mobile pervasive game for Java-enabled mobile phones that has been designed to influence everyday activities and electricity usage patterns in the household. The game is connected to the household's automatic electricity meters reading equipment via the cell network and this setup enables us

Magnus Bng; Anton Gustafsson; Cecilia Katzeff

188

Building Consumer Trust in Pervasive Retail George Roussos  

E-print Network

of lifestyle to questions of social organization and its implications for everyday life: where and how we live of the vision of pervasive computing lies the ability to aug- ment physical artefacts with electronic properties and for this reason, it is frequently judged by its ability to sustain desired ways of life and meet perceived needs

Roussos, George

189

Tourette Syndrome and Comorbid Pervasive Developmental Disorders  

Microsoft Academic Search

We examined the rates of comorbid pervasive developmental disorders in participants with Tourette syndrome. We used 7288 participants from the Tourette Syndrome International Database Consortium Registry. We found 334 (4.6%; 1 of every 22 participants) with Tourette syndrome had a comorbid pervasive developmental disorder. In participants with Tourette syndrome and comorbid pervasive developmental disorders, 98.8% had one or more comorbidities

Larry Burd; Qing Li; Jacob Kerbeshian; Marilyn G. Klug; Roger D. Freeman

2009-01-01

190

GUEST EDITOR'S INTRODUCTION Published by the IEEE Computer Society 0018-9162/11/$26.00 2011 IEEE  

E-print Network

-9162/11/$26.00 © 2011 IEEE phones, cameras, and TVs into smart devices. Super- fast wired and wireless networks make), tablets (foot), and Web-enabled televisions (yard) dramatically changing the Internet landscape. Moreover while keeping your current job. CybErsECUrity DEFEAt CybEr CriMinAls. AnD yoUr Co

Tomkins, Andrew

191

FROM THE AREA EDITOR Published by the IEEE Computer Society 0018-9162/09/$26.00 2009 IEEE  

E-print Network

IEEE About three years ago, Netflix, the movie rental com- pany, announced a $1 million prize upon Netflix's proprietary system by at least 10 percent. Some have hailed the competition as a clever example of crowd- sourcing, but there is no denying that Netflix's release of a more than 100-million

Ramakrishnan, Naren

192

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS AND CONTROL INSTRUMENTATION, VOL. JECI-14, NO. 1, APRIL 1967 A Study of the Applications of Analog Computers  

E-print Network

1967 A Study of the Applications of Analog Computers V. P. KODALI, MEMBER, IEEE Abstract-An electronic analog computer is a tool for solving mathematical differential equations. The basis for the use of such a computer in the simulation of many scientific and engineering prob- lems is the possibility

Leach Jr.,W. Marshall

193

0018-9162/05/$20.00 2005 IEEE64 Computer C O V E R F E A T U R E  

E-print Network

-generation pervasive computing systems lack the ability to evolve as new technologies emerge or as an application the traditional programmer model. Our approach enables domain experts--for exam- ple, health professionals. In collaboration with the university's College of Public Health and Health Professions, and with fed- eral funding

Helal, Abdelsalam

194

0018-9162/05/$20.00 2005 IEEE50 Computer C O V E R F E A T U R E  

E-print Network

-generation pervasive computing systems lack the ability to evolve as new technologies emerge or as an application the traditional programmer model. Our approach enables domain experts--for exam- ple, health professionals. In collaboration with the university's College of Public Health and Health Professions, and with fed- eral funding

Chen, Yuanzhu Peter

195

2 Published by the IEEE Computer Society 1089-7801/12/$31.00 2012 IEEE IEEE INTERNET COMPUTING teve Jobs changed the world. He did amazing  

E-print Network

not only developed technology but also innovated business models, and to point-out one world-changing COMPUTING S teve Jobs changed the world. He did amazing work and produced amazing products that went from cult to mainstream. But what does that mean, that he "changed the world"? This is interesting

Petrie, Charles

196

Pervasive Data Management *C. Zhou, X. Meng: Out-of-Order Durable Event Processing in Integrated Wireless  

E-print Network

Processing,2010.5.6 2. Location Privacy Preserving, 2010.5.6 3. Storage and Indexing on Flash-based Database Wireless Networks. Accepted for publication in Journal of Pervasive and Mobile Computing (PMCJ). (2010). C. Zhou, X. Meng: IO3: Interval-based Out-of-Order Event Processing in Pervasive Computing. In Proceedings

197

Pervasive Home Environments  

NASA Astrophysics Data System (ADS)

An increasing number of computers and other equipment, such as games consoles and multimedia appliances for the home, have networking capability. The rapid growth of broadband in the home is also fuelling the demand for people to network their homes. In the near future we will see a number of market sectors trying to 'own' the home by providing gateways either from the traditional ISP or from games and other service providers. The consumer is bombarded with attractive advertising to acquire the latest technological advances, but is left with a plethora of different appliances, which have a bewildering range of requirements and features in terms of networking, user interface, and higher-level communications protocols. In many cases, these are proprietary, preventing interworking. Such technical and usability anarchy confuses the consumer and could ultimately suppress market adoption.

Bull, P.; Limb, R.; Payne, R.

198

62 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE R F I D T E C H N O L O G Y  

E-print Network

transmission.1 In 1935, Alexander Watson- Watt showed how his new invention, radar, could use radio waves F I D T E C H N O L O G Y The Evolution of RFID Security S ince its invention in the 1940s, RFID has was the advent of radio technology. Since Guglielmo Marconi first transmitted radio signals across the Atlantic

Tanenbaum, Andrew S.

199

1536-1268/06/$20.00 2006 IEEE Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 25 R F I D T E C H N O L O G Y  

E-print Network

is a LoJack device attached to a car, which incorpo- rates cellular technology and a GPS to locate the car chip attached to the antenna, and some form of encapsulation. The tag reader is responsible for pow's chip coordinates this process). The encap- sulation maintains the tag's integrity and protects

Han, Richard Y.

200

1536-1268/04/$20.00 2004 IEEE Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 15 S U C C E S S F U L A G I N G  

E-print Network

S U C C E S S F U L A G I N G Automated Analysis of Nursing Home Observations O ur society. Five percent of Americans over 65 currently reside in nursing homes, with 20 to 50 percent of those over 85 expecting to be placed in a nursing home at some point in their lives.1,2 At Carnegie Mellon

Wactlar, Howard D.

201

Using Digital Computer Field Mapping of Outcrops to Examine the Preservation of High-P Rocks During Pervasive, Retrograde Greenschist Fluid Infiltration, Tinos, Cyclades Archipelago, Greece  

Microsoft Academic Search

Digital field mapping of outcrops on the island of Tinos, Greece, was undertaken to investigate the nature of retrograde fluid infiltration during exhumation of high-P metamorphic rocks of the Attic-Cycladic blueschist belt. High-resolution digital photographs of outcrops were taken and loaded into graphics editing software on a portable, belt-mounted computer in the field. Geologic features from outcrops were drawn and

C. M. Breeding; J. J. Ague; M. Broecker

2001-01-01

202

8 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$25.00 2009 IEEE Wearable ComputingEditor: Paul Lukowicz n University of Passau n paul.lukowicz@uni-passau.de  

E-print Network

with a Linux-base Pentium-M 2.0-GHz, 2-Gbyte RAM, Nvidia GeForce 6600 graphics chip- set, 802.11 wireless to three hours. Headphones are fixed inside the hel- met for sound. A GPS antenna (for positioning) and an InterSense Iner- tiaCube3 inertial sensor (for orienta- tion) are mounted on the helmet. The GPS

Thomas, Bruce

203

2007 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology  

Microsoft Academic Search

This symposium will bring together top researchers, practitioners, and students from around the world to discuss the latest advances in the field of computational intelligence and their application to real-world problems in biology. Computational Intelligence includes artificial neural nets, fuzzy logic, evolutionary algorithms, and other emerging techniques. Topics of interest include but are not limited to: gene expression array analysis,

Gary B. Fogel; Scott Smith; Kay C. Wiese; Publicity Co-Chairs

204

Design and Validation of a Low-Power Network Node for Pervasive Applications  

Microsoft Academic Search

Pervasive computing refers to making many computing devices available throughout the physical environment, while making them effectively invisible to the user. To further increase the applicability of ubiquitous computing, minimizing energy consumption and hardware cost are mandatory in real world applications. In this paper we present our platform prototype for ubiquitous computing, which has been implemented based on commercial Bluetooth

Juan-carlos Cano; Carlos Miguel Tavares Calafate; Pietro Manzoni; Jos-manuel Cano; Eva Gonzlez

2007-01-01

205

IEEE Transactions on Evolutionary Computation Special Issue on Evolutionary Computation in Scheduling  

E-print Network

timetabling (educational timetabling, railway scheduling, sports scheduling and project scheduling, etc: Evolutionary computation in: - Production scheduling - Personnel scheduling - Sports scheduling - Educational and practice, having relevance across a wide range of disciplines including operations research, artificial

Qu, Rong

206

How Much Room before you Rely: Balancing Privacy Control and Fidelity in the Location-based Pervasive Applications  

Microsoft Academic Search

Rapid development of innovative location-centric applications promoted through widespread proliferation of wireless technology and availability of small handheld devices have brought about a new era in pervasive computing. Besides, they are constantly challenged by individual privacy protection necessities as the location information are stored and exchanged among entities and service providers. In this paper, we attempt to categorize location-centric pervasive

Nilothpal Talukder; Sheikh I Ahamed

2008-01-01

207

84 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 12, NO. 1, FEBRUARY 2004 Computing Derivatives in Interval  

E-print Network

in Interval Type-2 Fuzzy Logic Systems Jerry M. Mendel, Life Fellow, IEEE Abstract--This paper makes type-2 Engineering, University of Southern California, Los Angeles, CA 90089-2564 USA (e-mail: mendel

Mendle, Jerry M.

208

Kothe, C., Onton, J., Makeig, S. "Emotion Recognition from EEG During Self-Paced Emotional Imagery." In proceedings of: Affective Brain-Computer Interfaces (aBCI) Workshop, IEEE Affective Computing and Intelligent Interaction 2013, Geneva  

E-print Network

Kothe, C., Onton, J., Makeig, S. "Emotion Recognition from EEG During Self-Paced Emotional Imagery." In proceedings of: Affective Brain-Computer Interfaces (aBCI) Workshop, IEEE Affective Computing and Intelligent Interaction 2013, Geneva Switzerland, 2013 Emotion Recognition from EEG During Self-Paced Emotional Imagery

Makeig, Scott

209

On Designing a Pervasive Mobile Learning Platform  

ERIC Educational Resources Information Center

This article presents the features, design and architecture of the Myst pervasive game platform that has been applied in creating pervasive mobile learning games in various contexts such as science festivals and museums in Finland. Based on our experiences with the development, we draw a set of design principles for creating successfully a

Laine, Teemu H.; Vinni, Mikko; Sedano, Carolina Islas; Joy, Mike

2010-01-01

210

Semantic Pervasive Advertising Lorenzo Carrara1  

E-print Network

Semantic Pervasive Advertising Lorenzo Carrara1 , Giorgio Orsi2 , and Letizia Tanca3 1 Cubica S@elet.polimi.it Abstract. Pervasive advertising targets consumers on-the-move with ads dis- played on their mobile devices. As for web advertising, ads are distributed by embedding them into websites and apps, easily flooding

Orsi, Giorgio

211

Systems Architecture for Pervasive Retail George Roussos  

E-print Network

Systems Architecture for Pervasive Retail George Roussos Birkbeck College Malet Street WC1E 7HX manufacturing processes have made possible the construction of pervasive systems in specific application areas for the automated replenishment of home product supplies. The primary motivation for this work is the optimization

Roussos, George

212

IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. ?, NO. ?, SEPTEMBER 2011 1 Estimation of Task Persistence Parameter from  

E-print Network

Persistence Parameter from Pervasive Medical Systems with Censored Data Yannick Fouquet, C´eline Franco, Bruno Diot, Jacques Demongeot and Nicolas Vuillerme Abstract--This paper compares two statistical models. When data missed or errors occurred, an estimate of the joint probabilities of these random variables

Fouquet, Yannick

213

No Pervasive Computing Without Intelligent Systems  

Microsoft Academic Search

\\u000a It is interesting to think about the technologies that have become part of our everyday lives and compare their invention\\u000a and development with those that have fallen by the wayside. Examples of failed technologies such as electrical cars and satellite\\u000a mobile telephones are not uncommon, but more interestingly numerous other technologies such as instant messaging, text messaging,\\u000a and b2c eCommerce

S G Thompson; B. Azvine

2006-01-01

214

Electronic textiles: a platform for pervasive computing  

Microsoft Academic Search

Abstract: this paper, welook at the synergistic relationship between textiles and computingand identify the need for their "integration" using tools providedby an emerging new field of research that combines the strengthsand capabilities of electronics and textiles into one: electronictextiles, or e-textiles. E-textiles, also called smart fabrics, havenot only "wearable" capabilities like any other garment, butManuscript received March 1, 2003; revised

DIANA MARCULESCU; RADU MARCULESCU; NICHOLAS H. ZAMORA; PRADEEP K. KHOSLA; Jayaraman Jung; L. Weber; K. Cottet; Grzyb; Troster; Nakad

2003-01-01

215

Adaptive Self-triggered Control over IEEE 802.15.4 Networks U. Tiberi1, C. Fischione2, K.H. Johansson2 and M.D. Di Benedetto1  

E-print Network

]. The IEEE 802.15.4 communication protocol is the most popular standard for low power and low data rate WSNs.H. Johansson2 and M.D. Di Benedetto1 Abstract-- The communication protocol IEEE 802.15.4 is becoming pervasive by this protocol. In this paper, the stability of IEEE 802.15.4 networked control systems (NCSs) is addressed

Johansson, Karl Henrik

216

A Middleware Architecture for Mobile and Pervasive Large-Scale Augmented Reality Games  

Microsoft Academic Search

Ubiquitous or pervasive computing is a new kind of computing, where specialized elements of hardware and software will have such a high level of deployment that their use will be fully integrated with the environment. Augmented reality extends reality with virtual elements but tries to place the computer in a relatively unobtrusive, assistive role. Specialized network middleware solutions for large

Pedro Ferreira; Joo Orvalho; Fernando Boavida

2007-01-01

217

754 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 4, AUGUST 2009 From Fireflies to Fault-Tolerant Swarms of Robots  

E-print Network

754 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 4, AUGUST 2009 From Fireflies inspiration from the synchronized flashing behavior observed in some species of fireflies. We derive a completely decentralized algorithm to detect non-operational robots in a swarm robotic system. Each robot

Libre de Bruxelles, Université

218

IEEE TRANSACTIONS ON NANOBIOSCIENCE SPECIAL ISSUE/SPECIAL TOPIC SECTION ON "COMPUTATIONAL NANOBIOSCIENCE" 1 Informative SNP Selection Methods Based on SNP  

E-print Network

NANOBIOSCIENCE" 1 Informative SNP Selection Methods Based on SNP Prediction Jingwu He, Member, IEEE of the SNPs. Tag SNP selection can achieve (i) considerable budget savings by genotyping only a limited number of SNPs and computationally inferring all other SNPs or (ii)necessary reduction of the huge SNP sets

Zelikovsky, Alexander

219

Proceedings of 12th IEEE International Conference on Computer Communications and Networks (ICCCN), 2003 Effect of TCP on Self-Similarity of Network Traffic  

E-print Network

Proceedings of 12th IEEE International Conference on Computer Communications and Networks (ICCCN), 2003 1 Effect of TCP on Self-Similarity of Network Traffic Nawaporn Wisitpongphan, Jon M. Peha Carnegie Markovian models such as the Poisson process. In this work, we simulate a simple network with a full

Peha, Jon M.

220

Proceedings of the 10th International Conference on Computer Supported Cooperative Work in Design 1-4244-0165-8/06/$20.00 2006 IEEE.  

E-print Network

insights about workspace collaboration, not cov- ered by other evaluation methods [1]. The advantagesProceedings of the 10th International Conference on Computer Supported Cooperative Work in Design 1-4244-0165-8/06/$20.00 ©2006 IEEE. Quantitative Evaluation of Workspace Collaboration Antonio Ferreira, Pedro Antunes

Antunes, Pedro

221

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 9, SEPTEMBER 2008 1571 Model Order Reduction of Parameterized  

E-print Network

-Directional Arnoldi Process Yung-Ta Li, Zhaojun Bai, Yangfeng Su, and Xuan Zeng, Member, IEEE Abstract--This paper August 20, 2008 (projected). The work of Y.-T. Li and Z. Bai was supported in part by the National. Bai is with the Department of Computer Science and Department of Mathematics, University of California

Bai, Zhaojun

222

Metrics for Human Driving of Multiple Robots Dan R. Olsen Jr, Member IEEE Computer Society, Stephen Bart Wood, and Jonathan Turner  

E-print Network

Metrics for Human Driving of Multiple Robots Dan R. Olsen Jr, Member IEEE Computer Society, Stephen Bart Wood, and Jonathan Turner Abstract--A goal of human-robot interaction is to expand the capability of human beings so that they can control multiple robots simultaneously. This provides leverage for human

Olsen Jr., Dan R.

223

To appear in Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition 1996. What is the Set of Images of an Object  

E-print Network

To appear in Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition 1996. What is the Set of Images of an Object Under All Possible Lighting Conditions? Peter N. Belhumeur David J of images of an object un- der all lighting conditions and pose? In this paper, we consider only the set

Jaffe, Jules

224

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 1, NO. 2, JUNE 2009 1 Rapid and Reliable Adaptation of  

E-print Network

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 1, NO. 2, JUNE 2009 1 Rapid and Reliable Adaptation of Video Game AI Sander Bakkes, Pieter Spronck, and Jaap van den Herik Abstract--Current approaches to adaptive game AI typically require numerous trials to learn effective behaviour (i.e., game

Spronck, Pieter

225

64 IEEE ComputatIonal IntEllIgEnCE magazInE | august 2013 Kyung-Joong Kim Sejong University,  

E-print Network

64 IEEE ComputatIonal IntEllIgEnCE magazInE | august 2013 Kyung-Joong Kim Sejong University, So. CI educators have been used different types of tools to define course projects for stu- dents, making it difficult to share them. Furthermore, if the projects are dependent on special hardware or soft

Cho, Sung-Bae

226

Dynamic privacy management in pervasive sensor networks  

E-print Network

This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a ...

Gong, Nan-wei

227

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, MANUSCRIPT ID 1 The Five W's for Information Visualization  

E-print Network

's for Information Visualization with Application to Healthcare Informatics Zhiyuan Zhang, Student Member, IEEE, Bing significantly lower the time and effort needed to access the medical patient information required to arrive these views via cross-filtering [32] and brushing [6] is the key to successful information (and data

Mueller, Klaus

228

2 PERVASIVE computing Published by the IEEE CS n 1536-1268/11/$26.00 2011 IEEE P e r v a s i v e r e ta i l  

E-print Network

opportunities for spending money. This study proposes a phone-based system to sense physical shopping activities r e ta i l Using Mobile Phones to Monitor shopping time at Physical stores A ccording to retail management theory, the shopping experience typically aims to maximize either efficiency or entertainment.1

Ouhyoung, Ming

229

66 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$25.00 2009 IEEE O c c u pa t i O n a l t h e r a p y  

E-print Network

be chal- lenging even for experienced parents and teachers. Such persuasion is usually verbal, but verbal ther- apy refers to the use of a child occupation--that is, play--to cultivate the general skills and abilities needed to perform daily functional activities.1 Play-based occupational therapy has proven

Ouhyoung, Ming

230

2 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$26.00 2009 IEEE V I R T U A L M A C H I N E S  

E-print Network

that millions of users world- wide experience through BlackBerries, iPhones, Windows Mobile, and other mobile empowering mobile users, we could transform many areas of human activity (see the sidebar for an example as a mobile device moves with its user through the physical world is called cloudlet-based, resource

Satyanarayanan, Mahadev "Satya"

231

80 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 2014 IEEE ConferencesEditor: Elizabeth Belding n UC Santa Barbara n ebelding@cs.ucsb.edu  

E-print Network

ImAtIon to GooGlE GlASS UbiComp 2013 featured keynotes by Markus Gross, of ETH Zurich and Disney Research reminded the audience that Disney had its first revolutionary pat- ent on synchronizing sound and mov- ing't satisfied by simple cartoon movies anymore but demand customized digital and physi- cal experiences

232

Published by the IEEE CS n 1536-1268/10/$26.00 2010 IEEE PERVASIVE computing 37 C O N N E C T E D Y O U T H  

E-print Network

that de- fine the climate of mobile phone and social media use in classrooms. Understanding these policies Y O U T H M obile technologies and social applications are nearly ubiquitous in the lives of many of America's youth. Mobile device own- ership and social media use have been increas- ing over the past few

Hayes, Gillian R.

233

Published by the IEEE CS n 1536-1268/11/$26.00 2011 IEEE PERVASIVE computing 13 S M A R T E N E R G Y S Y S T E M S  

E-print Network

prices fell in the 1980s, but an increased focus on urban smog and acid rain raised awareness of energy to Stern, whereas environ- mental policy and research funding waned in the 1980s, energy and envi

Hazas, Mike

234

F E A T U R E 1089-7801/97/$10.00 1997 IEEE IEEE INTERNET COMPUTING  

E-print Network

on the Web is to launch a Web robot (also called a wanderer, worm, walker, spider, or knowbot).These software index built and updated periodically by Web robots. The index is a search- able archive that gives- municate, it is possible for a robot executing on a single computer to traverse the entire Web

Raghavan, Vijay

235

New tricks with old sensors: Pervasive Technologies for Novel Applications  

NASA Astrophysics Data System (ADS)

Sensors are interleaved into society, instrumenting considerable aspects of our lives without our comprehension. Sensors such as the MEMS accelerometer have transitioned from their original domains to applications that they were never conceived for: from games controllers to contextually rotating the screen on your smartphone. Further advances in technologies such as pervasive computing and networked embedded sensing are enabling new applications and smart devices which utilise sensors in new ways. In this presentation I will highlight new trends, applications and research in these fields, and show how "simple" sensors are being used in larger connected systems - from assistive technologies to distributed monitoring.

Merrett, Geoff

2013-06-01

236

From Operating-System Correctness to Pervasively Verified Applications  

NASA Astrophysics Data System (ADS)

Though program verification is known and has been used for decades, the verification of a complete computer system still remains a grand challenge. Part of this challenge is the interaction of application programs with the operating system, which is usually entrusted with retrieving input data from and transferring output data to peripheral devices. In this scenario, the correct operation of the applications inherently relies on operating-system correctness. Based on the formal correctness of our real-time operating system Olos, this paper describes an approach to pervasively verify applications running on top of the operating system.

Daum, Matthias; Schirmer, Norbert W.; Schmidt, Mareike

237

0018-9162/07/$25.00 2007 IEEE36 Computer Published by the IEEE Computer Society C O V E R F E A T U R E  

E-print Network

for this foundation will require enriching computer science paradigms to encompass models and methods traditionally that is impossible to foresee. Many current research challenges--the semantic Web, nanotechnologies, computational, and policy makers. THE DESIGN PROBLEM An embedded system is an engineering arti- fact involving computation

Henzinger, Thomas A.

238

0018-9162/07/$25.00 2007 IEEE32 Computer Published by the IEEE Computer Society C O V E R F E A T U R E  

E-print Network

for this foundation will require enriching computer science paradigms to encompass models and methods traditionally that is impossible to foresee. Many current research challenges--the Semantic Web, nanotechnologies, computational, and policy makers. THE DESIGN PROBLEM An embedded system is an engineering arti- fact involving computation

Sifakis, Joseph

239

IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014 337 Cloud-Based Augmentation for Mobile Devices  

E-print Network

, Zohreh Sanaei, Member, IEEE, Ejaz Ahmed, Member, IEEE, Abdullah Gani, Senior Member, IEEE, and Rajkumar. Sanaei, E. Ahmed, and A. Gani are with the Department of Computer System & Technology, The University

Buyya, Rajkumar

240

C O V E R F E A T U R E 0018-9162/06/$20.00 2006 IEEE40 Computer Published by the IEEE Computer Society  

E-print Network

and the technology push. Bridging the gaps Closing the computational gap in systems biology requires constructing the language needed to study and understand complex multiscale,multiscience systems.ViroLab,a grid, integrating, and managing a plethora of models. A bottom-up, data-driven approach Computer science provides

Amsterdam, Universiteit van

241

Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security  

US Patent & Trademark Office Database

Real time security, integrity, and reliability postures of operational (OT), information (IT), and security (ST) systems, as well as slower changing security and operational blueprint, policies, processes, and rules governing the enterprise security and business risk management process, dynamically evolve and adapt to domain, context, and situational awareness, as well as the controls implemented across the operational and information systems that are controlled. Embodiments of the invention are systematized and pervasively applied across interconnected, interdependent, and diverse operational, information, and security systems to mitigate system-wide business risk, to improve efficiency and effectiveness of business processes and to enhance security control which conventional perimeter, network, or host based control and protection schemes cannot successfully perform.

2014-10-07

242

Application requirements for middleware for mobile and pervasive systems  

Microsoft Academic Search

In this paper, we examine the requirements for future middleware to support mobile and pervasive applications and identify key research areas. We illustrate the research areas with requirements identified in two specific research projects concerning pervasive healthcare and home entertainment.

Kimmo E. E. Raatikainen; Henrik Brbak Christensen; Tatsuo Nakajima

2002-01-01

243

Automated Selection of Remote Control User Interfaces in Pervasive Smart Spaces  

Microsoft Academic Search

Pervasive computing offers a vision in which every room in the home and at work will become an interactive smart space filled with wireless and wired devices whose behavior can be remotely controlled by a user, including monitors, speakers, printers, kiosks, soda machines, appliances, toys, sensors, and networked software services. The goal of this paper is to address what we

Nirali Desai; Khomkrit Kaowthumrong; John Lebsack; Nishant Shah; Richard Han

2002-01-01

244

Healthcare Aide: Towards a Virtual Assistant for Doctors Using Pervasive Middleware  

Microsoft Academic Search

The advancement of available, portable, low cost handheld devices (PDAs, cell phones, etc.), bluetooth, and WiFi has resulted in the users' mobility at unprecedented levels. As these devices can communicate with one another, the combined capabilities can be leveraged to form a useful new set of tools. Presently, pervasive computing is being extended into the sophisticated healthcare sector with the

Moushumi Sharmin; Shameem Ahmed; Ahmed J. Khan; Munirul M. Haque

2006-01-01

245

SVM based context awareness using body area sensor network for pervasive healthcare monitoring  

Microsoft Academic Search

In the present growing era advancement of computer processing power, data communication capabilities, low power micro electronics devices and micro sensors increases the popularity of wireless sensor network in real life. Body area sensor network is a group of sensor nodes inside and outside the human body for continuous monitoring of health conditions, behavior and activities. Context awareness in pervasive

Sonali Agarwal; Divya; G. N. Pandey

2010-01-01

246

This site and all contents (unless otherwise noted) are Copyright 2010 IEEE. All rights reserved. IEEE Transactions on Mobile  

E-print Network

framework represents a means to compromise the tradeoff between different performance metrics including, IEEE Robotics and Automation Society, and IEEE Systems, Man and Cybernetics Society TMC is indexed TMC Order Reprints Search Advanced The world's leading membership organization for computing

Sreenan, Cormac J.

247

Preprint: Clip Art Rendering of Smooth Isosurfaces Accepted pending revision for IEEE Transactions on Visualization and Computer Graphics  

E-print Network

of authoring tools for articles, books and presentations. Clip art libraries are generated by designers1 Preprint: Clip Art Rendering of Smooth Isosurfaces Accepted pending revision for IEEE Eisemann and John C. Hart, Member, IEEE Abstract-- Clip art is a simplified illustration form consisting

Paris-Sud XI, Université de

248

Evolving Content in the Galactic Arms Race Video Game In: Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG09). Piscataway, NJ:IEEE  

E-print Network

Evolving Content in the Galactic Arms Race Video Game In: Proceedings of the IEEE Symposium Erin J. Hastings, Ratan K. Guha, and Kenneth O. Stanley Abstract-- Video game content includes. In most modern video games, the set of content shipped with the game is static and unchanging, or at best

Stanley, Kenneth O.

249

Setting the stage for computing curricula 2013: computer science -- report from the ACM\\/IEEE-CS joint task force  

Microsoft Academic Search

Following a roughly 10 year cycle, the Computing Curricula volumes have helped to set international curricular guidelines for undergraduate programs in computing. In the summer of 2010, planning for the next volume in the series, Computer Science 2013, began. This panel seeks to update and engage the SIGCSE community on the Computer Science 2013 effort. The development of curricular guidelines

Mehran Sahami; Mark Guzdial; Andrew McGettrick; Steve Roach

2011-01-01

250

C O V E R F E A T U R E 0018-9162/06/$20.00 2006 IEEE52 Computer Published by the IEEE Computer Society  

E-print Network

students' abilities in both analytical and creative thinking. We believe that many students have both types to the computer/videogames development field. · Fostering "whole brain education." By this we mean developing understanding and intuition than is possible with only one type of thinking. · Increasing enrollments

Leutenegger, Scott T.

251

ReseaRch FeatuRe 76 computer Published by the IEEE Computer Society 0018-9162/13/$31.00 2013 IEEE  

E-print Network

performance and power consumption data for three mainstream smart- phones--the Motorola Droid, HTC EVO-store-metrics). Although 3D entertainment is gaining a market foothold in other media, including desktop computing, 3D consumption of desktop 3D games,2 but undertaking the same task for smartphones is much more challenging

Azevedo, Ricardo

252

C O V E R F E A T U R E 0018-9162/07/$25.00 2007 IEEE62 Computer Published by the IEEE Computer Society  

E-print Network

-level sensor events and high-level situational awareness. Database technologies, including extensions to data for extracting situational awareness from sensed data is therefore needed. During the past three years, we have," formally known as situational awareness. In the context of computer security, situational awareness

Cybenko, George

253

2 IEEE TRANSACTIONS ON EDUCATION, VOL. 46, NO. 1, FEBRUARY 2003 Review of Computer Vision Education  

E-print Network

--Computer vision is becoming a mainstream subject of study in computer science and engineering. With the rapid. Index Terms--Computer vision, education, image processing, re- search, teaching. I. INTRODUCTION VISION, medical imaging, image databases, pattern recognition, computer graphics, and virtual reality. During

Bebis, George

254

Pervasive Healthcare and Wireless Health Monitoring  

Microsoft Academic Search

Abstract With an increasingly mobile,society and,the worldwide deployment of mobile and wireless networks, the wireless infrastructure can support many,current and emerging,healthcare applications. This could fulfill the vision of Pervasive Healthcare or healthcare to anyone, anytime, and anywhere by removing locational, time and other restraints while increasing both the coverage and the quality. In this paper, we present applications and require-

Upkar Varshney

2007-01-01

255

Dynamic Privacy Management in Pervasive Sensor Networks  

Microsoft Academic Search

\\u000a This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy\\u000a control and feedback in a pervasive sensor network. Our work began with the development of a potentially invasive sensor network\\u000a (with high resolution video, audio, and motion tracking capabilities) featuring different interactive applications that created\\u000a incentive for accepting this network as an

Nan-Wei Gong; Mathew Laibowitz; Joseph A. Paradiso

2010-01-01

256

Corruption in Asia: Pervasiveness and arbitrariness  

Microsoft Academic Search

How does one understand the differences and similarities of corruption among various Asian countries? We use a recent framework\\u000a developed by Rodriguez, Uhlenbruck, and Eden (2005) to suggest that corruption has to be examined from two different dimensions: pervasiveness and arbitrariness. Using this\\u000a framework, we ask why some Asian countries are able to achieve high levels of economic growth in

Seung-Hyun Lee; Kyeungrae Kenny Oh

2007-01-01

257

Joint Computer Science Department and Electrical and Computer Engineering Department Special Seminar Sponsored by ISTeC  

E-print Network

Joint Computer Science Department and Electrical and Computer Engineering Security Professor of Computer Science (College of Science) Tue., Sept. 16 IEEE, ACM, NSA and NIST such as the IEEE Computer Society's Technical

258

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 9, NO. 3, MARCH 1998 283 Parallel Computation  

E-print Network

performance demonstrates that parallel computational methods can significantly reduce the computational time developed parallel methods to reduce the time required to perform two com- putationally intensive analyses: homologous sequence searching and multiple sequence alignment. Our parallel searching method reduces

259

IEEE TRANSACTIONS ON COMPUTERS, TC-2011-04-0261 1 A Parallel Neuromorphic Text Recognition  

E-print Network

by the modern HPC clusters and convert it to useful computations that assist or even replace the human cognition progress in the evolution of high performance computing (HPC) technologies, the research in computational. The algorithm learns from what has been read and, based on the obtained knowledge, it forms anticipations

Qiu, Qinru

260

OCTOBERDECEMBER 1998 0740-7475/98/$10.00 1998 IEEE 17 EMBEDDED SYSTEMS are computers in-  

E-print Network

measures to ensure safety and relia- bility throughout the lifetime of products in- corporating the systems redundancy, and time redundancy. Embedded-system test issues Cost constraints in consumer products typ with computer systems--perhaps a few hours per month. People are much less patient with computer downtime

Al-Asaad, Hussain

261

M.I.T. Media Laboratory Perceptual Computing Technical Report No. 283, June 1994 Short Version Appeared: IEEE Multimedia Magazine, Vol. 1, No. 2, pp. 73-75, 1994  

E-print Network

M.I.T. Media Laboratory Perceptual Computing Technical Report No. 283, June 1994 Short Version Appeared: IEEE Multimedia Magazine, Vol. 1, No. 2, pp. 73-75, 1994 Video And Image Semantics: Advanced-387, The Media Laboratory Massachusetts Institute of Technology 20 Ames St., Cambridge MA 02139 Email: fsandy

262

Session F1G 0-7803-7961-6/03/$17.00 2003 IEEE November 5-8, 2003, Boulder, CO  

E-print Network

books for IEEE CS Press, thayer@csus.edu 6 Ted Lewis, author of professional books for IEEE CS Press, t.lewis@computer/IEEE Frontiers in Education Conference F1G-1 PANEL: AUTHORING A PROFESSIONAL BOOK James M. Conrad1 , Deborah of North Carolina-Charlotte, jmconrad@uncc.edu 2 Deborah Plummer, Editor, IEEE CS Press, dplummer@computer

Conrad, James M.

263

ACCEPTED FOR PUBLICATION IN IEEE TRANSACTION ON VISUALIZATION AND COMPUTER GRAPHICS 1 Filtering and Rendering of  

E-print Network

AND COMPUTER GRAPHICS 3 Fig. 1. The changing reflectance characteristics of a desert scene at different is defined as the ratio of the reflected radiance in the direction towards the viewer to the irradiance

Tan, Ping

264

0018-9162/01/$10.00 2001 IEEE48 Computer Copy Protection  

E-print Network

][+ to pirate games in our school's computer lab or kids today swapping MP3 files on Internet chat systems for as long as the media for making copies have existed. Some early musicians refused to record their work

Wallach, Dan

265

0018-9162/00/$10.00 2000 IEEE50 Computer Video Image  

E-print Network

urrent industrial videoprocessing systems use a mixture of high-performance work- stations easily transfer them directly to the configurable computing platform. The frequency of hardware, a statically configured device simply performs an ASIC's function, wasting the flexibility that configurable

Cheung, Peter Y. K.

266

420 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 6, NO. 4, AUGUST 2002 Design of Evolvable Computer Languages  

E-print Network

design decisions for constructing a computational genetic language in an autoadaptive system experiments in genetic programming [8] and evolutionary programming [5] focused on the evolution of tree, genetic algorithms [6] can be viewed as a tool to evolve specialized problem-solving code. In both

267

Pervasive Sensing to Model Political Opinions in Face-to-Face Networks  

Microsoft Academic Search

Exposure and adoption of opinions in social networks are important questions in education, business, and government. We de- scribe a novel application of pervasive computing based on using mobile phone sensors to measure and model the face-to-face interactions and subsequent opinion changes amongst undergraduates, during the 2008 US presidential election campaign. We nd that self-reported political discussants have characteristic interaction

Anmol Madan; Katayoun Farrahi; Daniel Gatica-Perez

2011-01-01

268

7 CFR 25.102 - Pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2011 CFR

...2011-01-01 2011-01-01 false Pervasive poverty, unemployment and general distress...Requirements 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be...

2011-01-01

269

7 CFR 25.102 - Pervasive poverty, unemployment and general distress.  

...2014-01-01 2014-01-01 false Pervasive poverty, unemployment and general distress...Requirements 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be...

2014-01-01

270

7 CFR 25.102 - Pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2012 CFR

...2012-01-01 2012-01-01 false Pervasive poverty, unemployment and general distress...Requirements 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be...

2012-01-01

271

7 CFR 25.102 - Pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2013 CFR

...2013-01-01 2013-01-01 false Pervasive poverty, unemployment and general distress...Requirements 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be...

2013-01-01

272

Pervasive sensor system for evidence-based nursing care support  

Microsoft Academic Search

This paper introduces a pervasive sensor system for nursing homes, where daily activities of elderly persons are monitored by pervasive sensors all the time. Deterioration in the quality of nursing care for the elderly has become one of the biggest problems in the aging society and the authors have been challenging the problem by sensors embedded in a nursing room.

Toshio Hori; Yoshifumi Nishida; S. Murakami

2006-01-01

273

Meeting technology challenges of pervasive augmented reality games  

Microsoft Academic Search

Pervasive games provide a new type of game combining new technologies with the real environment of the players. While this already poses new challenges to the game developer, requirements are even higher for pervasive Augmented Reality games, where the real environment is additionally enhanced by virtual game items. In this paper we will review the technological challenges to be met

Wolfgang Broll; Jan Ohlenburg; Irma Lindt; Iris Herbst; Anne-kathrin Braun

2006-01-01

274

A Conceptual Architecture for Pervasive Advertising in Public Display Networks  

E-print Network

A Conceptual Architecture for Pervasive Advertising in Public Display Networks Florian Alt, Stefan for pervasive advertising on public displays. It can help researchers and practitioners to inform the design with displays and it is not only large out- door advertisers anymore operating them. However, pub- lic displays

275

Pervasive informatics and persistent actimetric information in health smart homes  

E-print Network

Pervasive informatics and persistent actimetric information in health smart homes: different-cameras). · Context ­ pervasive watching systems for Health Smart Homes ­ detection of neuro-degenerative diseases (e ­ model of elderly persons activity in Health Smart Homes ­ evaluation of actimetric perseveration

Fouquet, Yannick

276

IEEE TRANSACTIONS ON MOBILE COMPUTING 1 Verifying Delivered QoS in Multi-hop Wireless  

E-print Network

of statistical QoS for groups of packets. The protocols are proved to be cheat-proof. We also provide expressions for the minimum verifiable delay. Index Terms-- C.2.8.a Mobile computing algorithm/protocol design and analysis, C], [13]. Other work has addressed the issue of cheating and payment in such schemes [17]. All

Singh, Suresh

277

IEEE Network July/August 20114 loud computing is a recent trend in information  

E-print Network

, and delivered. The key driving forces behind the emergence of cloud computing include the overcapacity of today articles focus on virtual networking aspects in the cloud. The next article covers security issues in cloud hardware, requiring minimal modifications to virtual machine servers irrespec- tive of the platform

Pallis, George

278

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Directing Crowd Simulations  

E-print Network

or by importing motion flow fields extracted from crowd video footage. We propose a novel formulation to blend decades, advances in agent-based sys- tems, cognitive modeling and AI have found widespread use in simulating autonomous agents and virtual crowds in computer games, training systems and animated fea- ture

North Carolina at Chapel Hill, University of

279

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1 A Parallel Computing Framework for Large-scale  

E-print Network

-scale Air Traffic Flow Optimization Yi Cao and Dengfeng Sun Abstract--Optimizing the nationwide air traffic), air traffic flow optimization, large-scale optimization, parallel computing. I. INTRODUCTION THE National Airspace System (NAS) is monitored and controlled by the Air Traffic Control System Command Center

Sun, Dengfeng

280

IEEE TRANSACTIONS ON COMPUTERS, TC-2013-12-0869 1 Proximity-Aware Local-Recoding  

E-print Network

with MapReduce for Scalable Big Data Privacy Preservation in Cloud Xuyun Zhang, Wanchun Dou, Jian Pei Abstract--Cloud computing provides promising scalable IT infrastructure to support various processing privacy concerns potentially if the information is released or shared to third-parties in cloud

Pei, Jian

281

PROCEEDINGS OF IEEE, MARCH 2009 1 Sparse Representation For Computer Vision and  

E-print Network

semantic information. The choice of dictionary plays a key role in bridging this gap: unconven- tional-of-the- art results and to attaching semantic meaning to sparse signal representations. Understanding the good representation and computer vision can enrich both fields, and raises a number of open questions for further

Ma, Yi

282

IEEE TRANSACTIONS ON COMPUTERS, VOL. C-25, NO. 12, DECEMBER 1976 On Communications and Networks  

E-print Network

possible due to the wedding oftwo large and dissimilar industries, namely, the communication and computing industries. (Perhaps we should think oftheirs as a "shotgun" wedding, with at least one of the marriage greatly reduced communications costs as has the introduction of the satellite technology. In 1972 the FCC

Kleinrock, Leonard

283

Abstract--Ubiquitous and pervasive networks and applications include a growing number of research themes. In most use cases,  

E-print Network

, localization algorithms, AOA, TDOA, OTDOA, UTDOA, RSS, GPS, A-GPS, location-aware, pervasive computing and services. Although GPS-based positioning is reliable and accurate for outdoor situations, it does is organized as follows. In section III, localization algorithms are presented. In section IV, positioning

Boyer, Edmond

284

Enabling Applications in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt, Vincent Matossian and Manish Parashar  

E-print Network

as a result of context and content based local behaviors. In this paper we also present the design, prototype application where computational models use stream- ing information from video broadband sensors embeddedEnabling Applications in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt

Parashar, Manish

285

1306 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 57, NO. 6, JUNE 2010 Electronic Cleansing for Computed Tomography  

E-print Network

1306 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 57, NO. 6, JUNE 2010 Electronic Cleansing-invariant method to determine material fractions in voxels near such T-junctions. The proposed electronic cleansing the width of the PSF. (b) Electronic cleansing replaces H with L. (c) Transfer function based on thresholds

van Vliet, Lucas J.

286

934 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 47, NO. 7, JULY 2000 Staging of Cervical Cancer with Soft Computing  

E-print Network

paradigm for detecting the different stages of cervical cancer. Hybridization includes the evolution cases diagnosed. Cervical cancer has a more or less well-defined treat- ment modality. Treatment934 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 47, NO. 7, JULY 2000 Staging of Cervical

Mitra, Pabitra

287

182 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 6, NO. 2, APRIL 2002 A Fast and Elitist Multiobjective Genetic Algorithm  

E-print Network

and Development Scheme. The authors are with the Kanpur Genetic Algorithms Laboratory, Indian In- stitute Multiobjective Genetic Algorithm: NSGA-II Kalyanmoy Deb, Associate Member, IEEE, Amrit Pratap, Sameer Agarwal nondominated sorting genetic algorithm II (NSGA-II), which alleviates all the above three difficulties

Jagannatham, Aditya K.

288

Simulating the pervasive fracture and fragmentation of materials and structures using randomly close-packed Voronoi tessellations.  

SciTech Connect

Under extreme loading conditions most often the extent of material and structural fracture is pervasive in the sense that a multitude of cracks are nucleating, propagating in arbitrary directions, coalescing, and branching. Pervasive fracture is a highly nonlinear process involving complex material constitutive behavior, material softening, localization, surface generation, and ubiquitous contact. Two primary applications in which pervasive fracture is encountered are (1) weapons effects on structures and (2) geomechanics of highly jointed and faulted reservoirs. A pure Lagrangian computational method based on randomly close-packed Voronoi tessellations is proposed as a rational approach for simulating the pervasive fracture of materials and structures. Each Voronoi cell is formulated as a finite element using the reproducing kernel method. Fracture surfaces are allowed to nucleate only at the intercell faces. The randomly seeded Voronoi cells provide an unbiased network for representing cracks. In this initial study two approaches for allowing the new surfaces to initiate are studied: (1) dynamic mesh connectivity and the instantaneous insertion of a cohesive traction when localization is detected, and (2) a discontinuous Galerkin approach in which the interelement tractions are an integral part of the variational formulation, but only become active once localization is detected. Pervasive fracture problems are extremely sensitive to initial conditions and system parameters. Dynamic problems exhibit a form of transient chaos. The primary numerical challenge for this class of problems is the demonstration of model objectivity and, in particular, the identification and demonstration of a measure of convergence for engineering quantities of interest.

Bishop, Joseph E.

2008-09-01

289

80 PERVASIVE computing 1536-1268/02/$17.00 2002 IEEE I N T E G R A T E D E N V I R O N M E N T S  

E-print Network

on discussions with medical professionals, patients, educators, and homeowners, we believe that the home of most technologies. Envisioning homes of the future If we are to believe most movies, television, and pop- ular press every- day tasks at all. We will spend nearly all our time in the home engaged in leisure activities

290

Exploring the Edge of the Magic Circle: Defining Pervasive Games  

E-print Network

Pervasive gaming is a genre of gaming systematically blurring and breaking the traditional boundaries of game. The limits of the magic circle are explored in spatial, temporal and social dimensions. These ways of expanding the game are not new, since many intentional and unintentional examples of similar expansions can be found from earlier games, but the recently emerged fashion of pervasive gaming is differentiated with the use of these expansions in new, efficient ways to produce new kinds of gameplay experiences. These new game genres include alternate reality games, reality games, trans-reality games and crossmedia games. Keywords magic circle, pervasive game, social expansion, spatial expansion,

Markus Montola

2005-01-01

291

Multiscale Density Estimation R. M. Willett, Student Member, IEEE, and R. D. Nowak, Member, IEEE  

E-print Network

1 Multiscale Density Estimation R. M. Willett, Student Member, IEEE, and R. D. Nowak, Member, IEEE July 4, 2003 Abstract The nonparametric density estimation method proposed in this paper is computationally fast, capable of detect- ing density discontinuities and singularities at a very high resolution

Nowak, Robert

292

LIGHTWEIGHT CRYPTOGRAPHY Cryptographic Engineering for a Pervasive World  

E-print Network

applications), not to mention possible privacy issues. Even worse, pervasive devices are deployed in a hostile the asymmetric identification scheme crypto-GPS. Its design trade-offs are discussed and the implementation

293

Present Scenarios and Future Challenges in Pervasive Middleware Amitava Mukherjee  

E-print Network

applications need to adapt to variations of context of execution (such as network bandwidth, battery power and screen size), physical change of locations, change of technological artifacts (devices), change, smartness and adaptation, heterogeneity and integration, and intelligent interfacing. Keywords: Pervasive

New South Wales, University of

294

Clinical knowledge management at scale: fulfilling the promise of pervasive  

E-print Network

Clinical knowledge management at scale: fulfilling the promise of pervasive computerized clinical. Corporate Manager Clinical Knowledge Management and Decision Support, Clinical Informatics Research and application results 2. Clinical Knowledge Management System Typical knowledge engineering processes

Gabrieli, John

295

Virtual Walls: Protecting Digital Privacy in Pervasive Environments  

Microsoft Academic Search

As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users' contextual information, leading to users unwit- tingly leaving \\

Apu Kapadia; Tristan Henderson; Jeffrey J. Fielding; David Kotz

2007-01-01

296

Pervasive domestication of defective prophages by bacteria.  

PubMed

Integrated phages (prophages) are major contributors to the diversity of bacterial gene repertoires. Domestication of their components is thought to have endowed bacteria with molecular systems involved in secretion, defense, warfare, and gene transfer. However, the rates and mechanisms of domestication remain unknown. We used comparative genomics to study the evolution of prophages within the bacterial genome. We identified over 300 vertically inherited prophages within enterobacterial genomes. Some of these elements are very old and might predate the split between Escherichia coli and Salmonella enterica. The size distribution of prophage elements is bimodal, suggestive of rapid prophage inactivation followed by much slower genetic degradation. Accordingly, we observed a pervasive pattern of systematic counterselection of nonsynonymous mutations in prophage genes. Importantly, such patterns of purifying selection are observed not only on accessory regions but also in core phage genes, such as those encoding structural and lysis components. This suggests that bacterial hosts select for phage-associated functions. Several of these conserved prophages have gene repertoires compatible with described functions of adaptive prophage-derived elements such as bacteriocins, killer particles, gene transfer agents, or satellite prophages. We suggest that bacteria frequently domesticate their prophages. Most such domesticated elements end up deleted from the bacterial genome because they are replaced by analogous functions carried by new prophages. This puts the bacterial genome in a state of continuous flux of acquisition and loss of phage-derived adaptive genes. PMID:25092302

Bobay, Louis-Marie; Touchon, Marie; Rocha, Eduardo P C

2014-08-19

297

Converging, pervasive technologies: chronic and emerging issues and policy adequacy.  

PubMed

This article is a thought piece with the expansive goal of identifying policy facilitators and barriers to the development of usable and accessible advanced information and communications technology for people with disabilities across the age span at the research and development and marketing stages. The working hypothesis is as follows: The lack of participation in and representation of the interests of people with disabilities in the technology resource system is a barrier to availability of affordable consumer goods that enable independence and community integration. Converging, pervasive computing technology, especially in housing applications, is used as a case example, drawing especially from research and development conducted by the National Science Foundation Quality of Life Technology Engineering Research Center. A critical theory approach is used to identify problems and seek solutions to the apparent lack of balance between the demand and needs of disabled users and the supply and availability of usable, affordable consumer goods produced by the technology resource system in which allocation decisions are made. The approach uses policy analysis tools such as a technology assessment framework; the participation and environment components of the World Health Organization's International Classification of Functioning, Disability and Health; and participatory action research. PMID:18939653

Seelman, Katherine D

2008-01-01

298

Fuzzy reasoning of accident provenance in pervasive healthcare monitoring systems.  

PubMed

In pervasive healthcare monitoring environments, data provenance, as one metadata, can help people analyze the reasons for medical accidents that are generated by complex events. This reasoning processing often encounters inaccurate time and irreversible reasoning problems. How to solve the uncertain process and fuzzy transformation time presents many challenges to the study of data provenance. In this paper, we propose a backward derivation model with the provenance semantic, backward fuzzy time reasoning net (BFTRN), to solve these two problems. We design a backward reasoning algorithm motivated by time automation theory based on this model. With regard to given life-critical alarms and some constraints, it cannot only derive all evolution paths and the possibility distribution of paths from historical information, but also efficiently compute the value of fuzzy time function for each transition of lift-critical complex alarms in the healthcare monitoring system. We also analyze the properties of BFTRN model in this paper. Experiments on real dataset show that the proposed model is efficient. PMID:24240719

Wang, Yongli; Hu, Xiaohua

2013-11-01

299

What Are You Viewing? Exploring the Pervasive Social TV Experience  

Microsoft Academic Search

\\u000a The vision of pervasive TV foresees users engaging with interactive video services across a variety of contexts and user interfaces.\\u000a Following this idea, this chapter extends traditional Social TV toward the notion of pervasive Social TV (PSTV) by including\\u000a mobile viewing scenarios. We discuss social interaction enablers that integrate TV content consumption and communication in\\u000a the context of two case

Raimund Schatz; Lynne Baillie; Peter Frhlich; Sebastian Egger; Thomas Grechenig

300

Ubiquitous computing in sports: A review and analysis  

Microsoft Academic Search

Ubiquitous (pervasive) computing is a term for a synergetic use of sensing, communication and computing. Pervasive use of computing has seen a rapid increase in the current decade. This development has propagated in applied sport science and everyday life.The work presents a survey of recent developments in sport and leisure with emphasis on technology and computational techniques. A detailed analysis

Arnold Baca; Peter Dabnichki; Mario Heller; Philipp Kornfeind

2009-01-01

301

14 May/June 2011 Published by the IEEE Computer Society 0272-1716/11/$26.00 2011 IEEE Visualization Viewpoints  

E-print Network

Visualization Viewpoints Editor: Theresa-Marie Rhyne Can Computers Master the Art of Communication? A Focus for the computer to master the art of interpersonal communica- tion--that is, communication between aren't always under the sender's direct control and are usually recognized subconsciously

McDonnell, Kevin

302

A comparison of three rounding algorithms for IEEE oating-point multiplication.  

E-print Network

1 A comparison of three rounding algorithms for IEEE oating-point multiplication. Guy Even and Peter-M. Seidel Abstract| A new IEEE compliant oating-point round- ing algorithm for computing., and 16 logic levels in the algorithm of Yu and Zyner. Keywords| oating-point arithmetic, IEEE 754

Seidel, Peter-Michael

303

748 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 19, NO. 3, MAY 2004 A Design Method for Paralleling Current Mode  

E-print Network

for Paralleling Current Mode Controlled DC­DC Converters Peng Li, Member, IEEE and Brad Lehman, Member, IEEE@ece.neu.edu). B. Lehman is with the Department of Electrical and Computer Engineering, Northeastern University

Lehman, Brad

304

1556-603X/08/$25.002008IEEE FEBRUARY 2008 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE 31 Edward P.K. Tsang and Serafin Martinez-Jaramillo  

E-print Network

.K. Tsang and Serafin Martinez-Jaramillo Centre for Computational Finance and Economic Agents (CCFEA.1109/MCI.2007.913386 Xin Yao The University of Birmingham, UK Md. Monirul Islam Bangladesh University

Yao, Xin

305

18 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/05/$20.00 2005 IEEE E N E R G Y H A R V E S T I N G & C O N S E R V A T I O N  

E-print Network

scat- tered throughout today's urban land- scape, we might consider background radio signals and microengines, potentially pose issues with exhaust, heat, noise, thrust, or safety. Ongoing power management power from human activity or derive limited energy from ambient heat, light, radio, or vibrations

Starner, Thad E.

306

Location Privacy in Pervasive Computing Claudio A. Ardagna, Marco Cremonini,  

E-print Network

by legal disputes involving rental companies tracking their cars by means of Global Positioning System (GPS are collecting a huge amount of location information. Particularly relevant are privacy concerns and recent an experimental case study that analyzes the concerns of users about location privacy and shows how such concerns

Samarati, Pierangela

307

Improving the Effectiveness of Medical Treatment with Pervasive Computing  

E-print Network

and the patient's mobile phone has a lot of potential in the healthcare domain because the smart objects user interface the mobile phone provides. 2 Current work We currently work on the design of smart the compliance data to the patient's mobile phone. unobtrusively, transmits the sensed data continuously

308

A distributed object framework for pervasive computing applications  

E-print Network

This thesis presents a new architectural abstraction for developing dynamic and adaptive software. Separating application logic from implementation mechanism provides developers with a simple API for constructing new ...

Pham, Hubert

2005-01-01

309

Indoor Location Systems for Pervasive Computing Joshua A. Tauber  

E-print Network

particularly on the Ad Hoc Lo- cation System (AHLoS), RADAR, Cricket, Cricket Compass, and Active Bats. Finally of existing sys- tems including the ad hoc location system (AHLoS), RADAR, Cricket, Cricket Compass

310

Indoor Location Systems for Pervasive Computing Joshua A. Tauber  

E-print Network

particularly on the Ad Hoc Lo- cation System (AHLoS), RADAR, Cricket, Cricket Compass, and Active Bats. Finally- tems including the ad hoc location system (AHLoS), RADAR, Cricket, Cricket Compass, and Active Bats. We

311

The Augmented Knight's Castle Integrating Mobile and Pervasive Computing  

E-print Network

is an essential part of the childhood. Besides being a recreational amusement and pure fun, playing also serves experience, virtual content, storytelling and the imagination of the user [3]. By adding audio components

312

Opening Pervasive Computing to the Masses Using the SEAP Middleware  

E-print Network

inexpensive, single-purpose solutions (e.g., a motion- sensitive light switch) or expensive, complex, multi interdependencies; for example, George cannot reuse the motion sensor from his aware home after it is tied introduce the SEAP (Sensor Enablement for the Average Programmer) middleware which applies existing

Julien, Christine

313

Pervasive computing in play-based occupational therapy for children  

E-print Network

Embedding digital technology into playful activity can make play-based occupational therapy more effective. This study proposes two play-based activities to improve children's eating and tooth-brushing behavior.

Chi, Pei-Yu

314

[Gender dysphoria in pervasive developmental disorders].  

PubMed

Pervasive developmental disorders (PDD) are characterized by two essential symptoms: impairment in social interaction, and restricted, repetitive, and stereotyped patterns of behavior, interests, and activities. PDD include autistic disorder, Asperger's disorder, and PDD-Not Otherwise Specified (PDD-NOS). These three disorders are sometimes termed autism spectrum disorders. A recent epidemiological survey demonstrated that the rate of PDD may be almost 1% and that many PDD cases might not be diagnosed properly in childhood. Erik Erikson described eight stages of psychosocial development through which a normally developing human should pass from infancy to adulthood. In the theory, an adolescent shows 'Identity vs. Role Confusion'. It has been reported that individuals with PDD often have identity crises which sometimes include gender dysphoria. This phenomenon might be related to the so-called identity diffusion in youth. When they reach their young youth, it has been said that subjects with PDD realize their uniqueness and differences compared to others, and, as a result, they may develop confusion of identity which could be exhibited as gender identity disorder. A recent study demonstrated that, amongst 204 children and adolescents who visited a GID clinic in the Netherlands, 7.8% were diagnosed with autism spectrum disorders after a careful diagnostic procedure by a multi-disciplinary team. Taken together, PDD and GID seem closely related to each other. In this paper, we present four PDD cases with gender dysphoria and related symptoms: 1) a girl with PDD who repeatedly asserted gender identity disorder (GID) symptoms in response to social isolation at school, 2) a junior high school boy with PDD and transvestism, 3) a boy diagnosed with Asperger's disorder who developed a disturbance of sexual orientation, and 4) a boy with Asperger's disorder and comorbid childhood GID. Many of the clinical symptoms related to gender dysphoria might be explained by the cognitive characteristics and psychopathology of PDD. The Japanese Society of Psychiatry and Neurology published guidelines for the assessment and treatment of GID in 1997, and revised them in 2006. As a result, GID has become well known as a clinical entity in Japan, and there have been an increasing number of Japanese patients complaining of gender dysphoria. It is important to consider an underlying diagnosis of PDD when encountering patients with gender dysphoria. PMID:22352003

Tateno, Masaru; Ikeda, Hiroshi; Saito, Toshikazu

2011-01-01

315

14 January/February 2014 Published by the IEEE Computer Society 0272-1716/14/$31.00 2014 IEEE Feature Article  

E-print Network

2b). Such dynamic risk maps can significantly fa- cilitate decision making. When selecting a path's scalp and assessment of their suitabil- ity, to determine an appropriate insertion path. To avoid errors involved in estimating the risk for paths. It implements computation on GPUs, which ex- ploits the problem

Deng, Zhigang

316

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 31, NO. 12, DECEMBER 2012 1831 Efficient SRAM Failure Rate Prediction  

E-print Network

, DECEMBER 2012 1831 Efficient SRAM Failure Rate Prediction via Gibbs Sampling Shupeng Sun, Student Member, IEEE, Yamei Feng, Changdao Dong, and Xin Li, Senior Member, IEEE Abstract--Statistical analysis of SRAM has emerged as a chal- lenging issue because the failure rate of SRAM cells is extremely small

Li, Xin

317

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 29, NO. 11, NOVEMBER 2010 1709 Technology Mapping and Clustering for FPGA  

E-print Network

Member, IEEE, Fei Li, Member, IEEE, and Chi-Chen Peng Abstract--This paper presents a technology mapping that our dual-Vdd mapping algorithm, named DVmap-2, can further improve total power savings by 12.8% over be dictated by battery life, chip pack- aging, and/or cooling costs. It is important to minimize power

Chen, Deming

318

2502 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 11, NOVEMBER 2006 Thermal-Safe Test Scheduling for Core-Based  

E-print Network

, Bashir M. Al-Hashimi, Senior Member, IEEE, and Krishnendu Chakrabarty, Senior Member, IEEE Abstract--Overheating study involving the Motorola Version 3 ColdFire proces- sor [14] reported a minimum of 3X increase exponentially with temperature. An undesirable consequence of overheating is thermal stress. At high tem

Chakrabarty, Krishnendu

319

Developing quantum nanocomputing for pervasive health environments  

Microsoft Academic Search

A model of quantum information processing is proposed for applications in health-care and assistive environments. It uses implanted nano-chips which could incorporate quantum computing technology and make use of the advantages of high computing and large memory capacity of a quantum system to the data storage procedure of a medical sensor. Quantum information and its storage has not yet been

K. Prousalis; E. Konstantinou; N. Konofaos; A. A. Iliadis

2009-01-01

320

"What Are You Viewing?" Exploring the Pervasive Social TV Experience  

NASA Astrophysics Data System (ADS)

The vision of pervasive TV foresees users engaging with interactive video services across a variety of contexts and user interfaces. Following this idea, this chapter extends traditional Social TV toward the notion of pervasive Social TV (PSTV) by including mobile viewing scenarios. We discuss social interaction enablers that integrate TV content consumption and communication in the context of two case studies that evaluate Social TV on mobile smartphones as well as the traditional set-top-box-based setup. We report on the impact of social features such as text-chat, audio-chat, and synchronized channel-choice on the end-user's media experience. By analyzing the commonalities and the differences between mobile and living-room Social TV that we found, we provide guidance on the design of pervasive Social TV systems as well as on future research issues.

Schatz, Raimund; Baillie, Lynne; Frhlich, Peter; Egger, Sebastian; Grechenig, Thomas

321

Pervasive transcription: illuminating the dark matter of bacterial transcriptomes.  

PubMed

The conventional view of transcription posits that mRNAs are generated from the coding DNA strand and are delineated by gene boundaries; however, recent reports have mapped transcription start sites to unexpected locations in bacterial genomes, including the non-coding strand. The resultant RNAs were previously dismissed as artefacts, but models that describe such events as 'pervasive transcription' are now gaining support. In this Opinion article, we discuss our current understanding of pervasive transcription, its genetic origin and its regulation. On the basis of existing observations, we propose that RNAs that result from pervasive transcription are more than 'transcriptional noise' and have important functions in gene regulation and genome evolution. PMID:25069631

Wade, Joseph T; Grainger, David C

2014-09-01

322

IEEE: Power Electronics Society (PELS)  

NSDL National Science Digital Library

IEEE's Power Electronics Society (PELS) "helps in the development and effective application of power electronics technology." Power electronics is definted as "the application of electronic circuits to energy conversion," which is used "everywhere you look," including in computers automobiles, telecommunications, space systems and satellites motors, lighting, and alternative energy. The PELS newsletter is available free online, but the bimonthly series of peer-reviewed papers (the IEEE Transactions on Power Electronics) is for members only. The website also provide some background information on the main areas of power electronics research and states that volunteers will respond to questions about power electronics. Information on PESL conferences and workshops is also provided.

323

48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.  

Code of Federal Regulations, 2013 CFR

...the Environmental Assessment of Personal Computer Products. 52.223-16 Section...the Environmental Assessment of Personal Computer Products. As prescribed in 23.705...the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

2013-10-01

324

48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.  

Code of Federal Regulations, 2012 CFR

...the Environmental Assessment of Personal Computer Products. 52.223-16 Section...the Environmental Assessment of Personal Computer Products. As prescribed in 23.705...the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

2012-10-01

325

Configurable dynamic privacy for pervasive sensor networks  

E-print Network

Ubiquitous computing sensor networks have greatly augmented the functionality of interactive media systems by adding the ability to capture and store activity-related information. Analyzing the information recorded from ...

Gong, Nan-Wei

2009-01-01

326

Using Cluster Ensemble and Validation to Identify Subtypes of Pervasive Developmental Disorders  

E-print Network

-IV (Diagnostic and Statistical Manual of Mental Disorders - 4th Edition)2 , attempt to provide diagnosticUsing Cluster Ensemble and Validation to Identify Subtypes of Pervasive Developmental Disorders Centre, Kingston, Ontario Abstract Pervasive Developmental Disorders (PDD) are neurodevelopmental

Shatkay, Hagit

327

IEEE Communications Magazine October 2006104 0163-6804/06/$20.00 2006 IEEE TOPICS IN INTERNET TECHNOLOGY  

E-print Network

be invoked either online (on demand) or offline (precomputed) depending on the instant when this computation is applied. In the online routing algorithms path requests are attended to one by one, while offline routingIEEE Communications Magazine · October 2006104 0163-6804/06/$20.00 © 2006 IEEE TOPICS IN INTERNET

Ortega, Eusebi Calle

328

IEEE Robotics & Automation Magazine42 1070-9932/08/$25.002008 IEEE SEPTEMBER 2008 Series Compliance for  

E-print Network

computer numeric control (CNC) machining, robotic weld- ing, painting, and pick-and-place circuit boardIEEE Robotics & Automation Magazine42 1070-9932/08/$25.00ª2008 IEEE SEPTEMBER 2008 Series Compliance for an Efficient Running Gait M any robots excel at precise position- ing and trajectory tracking

Hurst, Jonathan

329

0018-9162/07/$25.00 2007 IEEE70 Computer Published by the IEEE Computer Society R E S E A R C H F E A T U R E  

E-print Network

, operates on it, and then scatters it back to memory. Stream computing can also be mapped onto general, and postponing writes of the live data to memory after the computation.1 Caravela: A Novel Stream for GPUs, to facilitate stream-processor programming. This work has gener- ally been limited to computing

Sousa, Leonel

330

Pervasive Learning Games: Explorations of Hybrid Educational Gamescapes  

ERIC Educational Resources Information Center

Pervasive gaming has tremendous potential as a learning tool and represents an interesting development in the field of video games and education. The literature surrounding video games and education is vast: For more than 20 years, educationalists have been discussing the potential that exists for the application of video games to learning.

Thomas, Siobhan

2006-01-01

331

Middleware for Pervasive Spaces: Balancing Privacy and Utility  

Microsoft Academic Search

Middleware for pervasive spaces has to meet conflicting re- quirements. It has to both maximize the utility of the information ex- posed and ensure that this information does not violate users' privacy. In order to resolve these conflicts, we propose a framework grounded in utility theory where users dynamically control the level of disclosure about their information. We begin by

Daniel Massaguer; Bijit Hore; Mamadou H. Diallo; Sharad Mehrotra; Nalini Venkatasubramanian

2009-01-01

332

Player Perception of Context Information Utilization in Pervasive Mobile Games  

Microsoft Academic Search

Pervasive games combine real world and virtual game elements in game design. A player might need to find WiFi hot spots, move to different locations based on mobile network cell IDs, or to do certain tasks at different times of the day. These are just few examples how the real world elements can be utilized in game design. The possibilities

Janne Paavilainen; Hannu Korhonen; Hannamari Saarenp; Jussi Holopainen

2009-01-01

333

Designing Pervasive Games to Support University Studies in Media Technology  

Microsoft Academic Search

New media technology students at university face many challenges from social to pedagogical when they start academic studies. One of the programs initial goals for these new students is to introduce them to some of the key social Web services that they will need to use for their schoolwork. The use of pervasive games to reach this specific purpose may

Daniel Spikol; Oskar Pettersson; Anders Gerestrand

2009-01-01

334

Pervasive integrated material handling in 300 mm semiconductor manufacturing  

Microsoft Academic Search

The semiconductor industry's transition to 300 mm manufacturing has created many new challenges for factory automation. The increased wafer size has introduced ergonomic concerns and operational challenges leading companies to pursue a pervasive automated lot delivery infrastructure capable of supporting lot movement and processing scenarios in both technology development and high volume manufacturing. This paper will trace the evolution in

Ross A. Giddings; Jeffrey C. Hunter

2004-01-01

335

From Operating-System Correctness to Pervasively Verified Applications  

E-print Network

correctness. Based on the formal correctness of our real-time operating system Olos, this paper describes of hardware, a real-time operating system, and application programs. We have implemented the operating system of its automotive subproject is a pervasively verified distributed real-time system, consisting

Paris-Sud XI, Université de

336

Early Symptoms and Recognition of Pervasive Developmental Disorders in Germany  

ERIC Educational Resources Information Center

Pervasive developmental disorders are characterised by the presence of abnormalities in social interaction and communication as well as repetitive patterns of behaviours. Although early symptoms of the disorder often appear during the first two years of life, its diagnosis is often delayed. The purpose of this study is to analyse the delay between

Noterdaeme, Michele; Hutzelmeyer-Nickels, Anna

2010-01-01

337

Pervasive Diagnosis: Integration of Active Diagnosis into Production Plans  

E-print Network

Pervasive Diagnosis: Integration of Active Diagnosis into Production Plans Lukas Kuhn, Bob Price goals. The same model can be used by model-based diagnosis to indirectly infer the condition of components in a sys- tem from partially informative sensors. Existing work has demonstrated that diagnosis

de Kleer, Johan

338

Pervasive Technology in Distributed Healthcare: Simultaneous Assessment of Multiple Individuals  

Microsoft Academic Search

The current paradigm of clinic-focused healthcare is challenged by growing numbers of aging baby boomers and the concomitant cost of managing chronic health conditions. We have begun investigating an alternative to clinic-based health assessments, in which pervasive technologies are used to enable continuous monitoring and assessment of patients in a variety of settings outside of hospitals. There are many outstanding

Tamara L. Hayes; Misha Pavel; Andre Adami; Nicole Larimer; Ann Tsay

2006-01-01

339

Pervasive informatics and persistent actimetric information in health smart homes  

E-print Network

Pervasive informatics and persistent actimetric information in health smart homes Yannick Fouquet (arrows) for localizing dependent people in a health smart home (left) & pressure sensors (right: FSA Seat integrated smart home (HsH). In general, the underlying principle of the HsH consists in continuously

Fouquet, Yannick

340

Pervasive Surveillance Networks: Design, Implementation and Performance Analysis  

Microsoft Academic Search

Pervasive surveillance implies the continuous tracking of multiple targets as they move about the monitored region. The tasks to be performed by a surveillance system have the following requirements: (1) track the identified targets automatically over the region being monitored; (2) allow tele-control of active sensors to follow operator commands; (3) provide concise feedback and video data of a tracked

Amit Goradia; Zhiwei Cen; Clayton Haffner; Yang Liu; Boo Heon Song; Matt Mutka; Ning Xi

341

Sound aided interface of a pervasive pain monitoring system  

Microsoft Academic Search

We have developed a new version of a pervasive system for monitoring and recording subjective pain experiences. The most important service the system offers to its users is real-time delivery of reported pain values from patients to nurses. Pain experiences are expressed on a six-value scale from \\

Ismo Alakarppa; Sofia Larsson; Jukka Riekki; Elisa Jaakkola

2011-01-01

342

Distributed video game streaming system for pervasive gaming  

E-print Network

Distributed video game streaming system for pervasive gaming A. Jurgelionis1 , F. Bellotti2 , A. De video game streaming system. Newly developed streaming protocols and system architectures enable that the Games@Large system is capable of running video games of different genres, also including First Person

Eisert, Peter

343

Fragmented Visuospatial Processing in Children with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

Children diagnosed with Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS) and Asperger Syndrome (AS) may be characterised by a similar perceptual focus on details as children with autistic disorder (AD). This was tested by analysing their performance in a visuoperceptual task [the Children's Embedded Figure Test (CEFT)] and a

Schlooz, Wim A. J. M.; Hulstijn, Wouter; van den Broek, Pieter J. A.; van der Pijll, Angela C. A. M.; Gabreels, Fons; van der Gaag, Rutger J.; Rotteveel, Jan J.

2006-01-01

344

Affect comprehension in children with pervasive developmental disorders  

Microsoft Academic Search

Affect comprehension was studied in children with pervasive developmental disorders (PDD) and normal children matched for mental age. Three matching tasks were used: matching objects (a nonsocial control task), matching faces, and matching affects. The three tasks were developed to be of equal difficulty for normal children. Children were also tested for comprehension and expression of affect terms. The PDD

Mark Braverman; Deborah Fein; Dorothy Lucci; Lynn Waterhouse

1989-01-01

345

Chapter XX: Pervasive Sensing and Monitoring for Situational Awareness  

E-print Network

and processes which can then be used to gain situational awareness of the activities in the instrumented spaceChapter XX: Pervasive Sensing and Monitoring for Situational Awareness. Situational awareness, in a broad sense, refers to a continuum of knowledge that captures the current state

346

Policy Based Control of Context Aware Pervasive Services  

E-print Network

Policy Based Control of Context Aware Pervasive Services Evi Syukur1 and Seng Wai Loke2 1 School awareness is important if we want to give a mobile user autonomous, responsive and attentive services issues regarding location modeling, system design and implementation of simple awareness scenarios

Loke, Seng W. - Loke, Seng W.

347

IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 17, NO. 4, AUGUST 2009 923 Enhanced KarnikMendel Algorithms  

E-print Network

IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 17, NO. 4, AUGUST 2009 923 Enhanced Karnik­Mendel Algorithms Dongrui Wu, Student Member, IEEE, and Jerry M. Mendel, Life Fellow, IEEE Abstract--The Karnik­Mendel% computational cost can be saved if no sorting of the inputs is needed. Index Terms--Enhanced Karnik­Mendel (EKM

Mendle, Jerry M.

348

Challenges in Data Quality Assurance in Pervasive  

E-print Network

and in this manner, we need a holistic system view that inspects contributions to risk and error in medical data displayed on the bedside monitor. nurse's station computer to enter Jane's identity, associating the data stream with Jane. Data entering mobile tablet associates with Jane's bedside monitor and sensor

Kotz, David

349

Autonomic Pervasive Applications Driven by Abstract Specifications  

E-print Network

.g. service and data providers and consumers). The current trend to build applications out of remote services technologies. Computing and communication power of these devices continuously increase, allowing them to run and maintain; most existing solutions are proprietary, limited in terms of provided services and executed

Paris-Sud XI, Université de

350

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2006 211 Microfluidics-Based Biochips: Technology  

E-print Network

, FEBRUARY 2006 211 Microfluidics-Based Biochips: Technology Issues, Implementation Platforms, and Design, Fellow, IEEE Abstract--Microfluidics-based biochips are soon expected to revolutionize clinical diagnosis microfluidics offers a scalable system architecture and dynamic reconfigurability; groups of unit cells

Chakrabarty, Krishnendu

351

Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components  

PubMed Central

Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers. PMID:19132095

Fragopoulos, Anastasios; Gialelis, John; Serpanos, Dimitrios

2009-01-01

352

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 9, NO. 1, FEBRUARY 2001 205 ACKNOWLEDGMENT  

E-print Network

. Soc. Optical Engineering (SPIE). Field Programmable Gate Arrays (FPGAs) Fast Board Development. Rytting, "A cad suite for high-performance fpga design," in Proc. IEEE Workshop FPGAs Custom Computing Terms--Adaptive computing, Boolean satisfiability, computer arithmetic, configurable computing. I

Hellebrand, Sybille

353

Supporting People with Dementia Using Pervasive Healthcare Technologies  

NASA Astrophysics Data System (ADS)

In this chapter, an introduction is provided into pervasive healthcare technology, specifically as the use of information and communications technology in support of European policies, primarily inclusion. The focus of the chapter, and indeed the book, is on how such technologies can support people suffering from debilitating diseases including Alzheimer's. The work describes a research project called COGKNOW, comprising a multidisciplinary research consortium of scientists from across Europe, and relates some of the early achievements of the group from some very different perspectives, including technical, clinical, ethical, and of course how the needs of people with dementia and their carers can be harnessed in the development process to produce pervasive healthcare technology and services that are valued by all the stakeholders in the process.

Mulvenna, Maurice D.; Nugent, Chris D.; Moelaert, Ferial; Craig, David; Dres, Rose-Marie; Bengtsson, Johan E.

354

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 5, OCTOBER 2009 1151 Memetic Algorithm with Extended Neighborhood  

E-print Network

Foundation of China under Grants 60533020 and U0835002, and by the Fund for Foreign Scholars in University is with the Center of Excellence for Research in Computational Intelligence and Applications, School of Computer for the edges and arcs that do not require service. A solution to the problem is a routing plan that consists

Yao, Xin

355

3188 IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, VOL. 57, NO. 12, DECEMBER 2009 An Analytical Approach to Computer-  

E-print Network

the plated silver of tuning screws and degrade the unloaded of the filter. Computer-aided tuning (CAT An Analytical Approach to Computer- Aided Diagnosis and Tuning of Lossy Microwave Coupled Resonator Filters Meng- tracting of the coupling matrix of a narrow band general Cheby- shev bandpass filter with losses

Wu, Ke-Li

356

Pervasive Web News Recommendation for Visually Impaired People  

Microsoft Academic Search

It is very difficult for blind and visually-impaired people getting information from the outside world. In this paper, we propose an adaptive Web news recommendation system named EagleRadio, designed for blind man and supports pervasive access using terminals. EagleRadio offers natural and user-friendly interface. News stories from different topics are read via a speech synthesizer to users and they can

Wei Chen; Li-jun Zhang; Can Wang; Chun Chen; Jia-jun Bu

2008-01-01

357

P2P M-commerce in pervasive environments  

Microsoft Academic Search

Pervasive environments are characterized by the presence of wireless devices ranging from sensors to mobile PDA-phones to laptops. Peer-to-Peer (P2P) information sharing in such environments presents a tremendous opportunity for people and devices to exchange information such as music, pictures, documents and stock tickers with peers. Information that has a monetary value introduces a whole new set of problems for

Sasikanth Avancha; Peter D'Souza; Filip Perich; Anupam Joshi; Yelena Yesha

2002-01-01

358

TEDIS, Pervasive Developmental Disorder' patients information system, preliminary results.  

PubMed

TEDIS, an information system dedicated to patients with Pervasive Developmental Disorder (PDD) was tested. Results focused on the process of behavioural changes among physicians and health professionals with regard to structured organized patient information.The experiment encouraged changes in professionals' habits for further documenting and systematizing patient information collection. TEDIS' project federated professionals for developing methods for a systematic and exhaustive patient data management, in a longitudinal and cross-domain perspective, for improving knowledge and health care management. PMID:22874197

Ben Said, Mohamed; Robel, Laurence; Pellegrin-Touati, Marie; Rousselot-Pailly, Berangere; Golse, Bernard; Jais, Jean Philippe; Landais, Paul

2012-01-01

359

Context-aware middleware for pervasive elderly homecare  

Microsoft Academic Search

The growing aging population faces a number of challenges, including rising medical cost, inadequate number of medical doctors and healthcare professionals, as well as higher incidence of misdiagnosis. There is an increasing demand for a better healthcare support for the elderly and one promising solution is the development of a context-aware middleware infrastructure for pervasive health\\/wellness-care. This allows the accurate

Hung Keng Pung; Tao Gu; Wenwei Xue; Paulito P. Palmes; Jian Zhu; Wen Long Ng; Chee Weng Tang; Nguyen Hoang Chung

2009-01-01

360

Familial pervasive development disorder, Tourette disorder and hyperlexia.  

PubMed

Four children and one adult have been found to have Pervasive Developmental Disorder, Tourette disorder and hyperlexia in North Dakota, a state with a population of 204,161 children ages 0-18. Assuming that these are independent disorders the probability of these three disorders occurring by chance in one child is 3.39 x 10(-12). Two of these individuals are from the same family. This suggests evidence for genetic linkage among these three disorders. PMID:3226648

Burd, L; Kerbeshian, J

1988-01-01

361

IEEE Copyright Statement: Copyright IEEE.  

E-print Network

* Conference or Journal Yr/Mo Citation J 2013.00 Distributed Energy Resources Integration Challenges in Low, L.A.F.M. ; Ilic, M.D. IEEE Transactions on Sustainable Energy, Volume: 4 , Issue: 1, 2013, Page , Page(s): 214 - 232 J 2011.00 Dynamic Monitoring and Decision Systems for Enabling Sustainable Energy

Ilic, Marija D.

362

Generalization of Results on Vector Sampling A. Feuer Fellow, IEEE, G. C. Goodwin Fellow, IEEE and M. Cohen  

E-print Network

1 Generalization of Results on Vector Sampling Expansion A. Feuer Fellow, IEEE, G. C. Goodwin://www.ee.technion.ac.il G.C. Goodwin is with the School of Electrical Engineering & Computer Science, University

Feuer, Arie

363

Eventcasting with a Wearable Computer  

Microsoft Academic Search

Traditionally, interaction methods for wearable comput- ers have focused on input to the computer itself, yet little has been done when it comes to allowing interaction with the surrounding environment. Pervasive computing, on the other hand, offers access to computational power from any place all the time, yet most interaction techniques utilizeei- ther physical hardware or monitoring of the user

Mikael Drugge; Marcus Nilsson; Kre Synnes; Peter Parnes

2004-01-01

364

Pervasive and Non-Pervasive Conduct Problems in a Clinic Sample Aged 4-8 Years: Child, Family and Day-Care/School Factors  

ERIC Educational Resources Information Center

Differences between pervasive (home and day-care/school) versus non-pervasive (home only) conduct problems were examined in regard to various child, parent/family, and day-care/school characteristics in an outpatient clinic sample of 120 children aged 4-8 years. All children scored above the 90th percentile on the Eyberg Child Behavior Inventory

Drugli, May Britt; Larsson, Bo; Clifford, Graham; Fossum, Sturla

2007-01-01

365

On the use of IEEE 802.15.4 to enable wireless sensor networks in pulp and paper industry  

Microsoft Academic Search

IEEE 802.15.4 is a new standard that addresses the need of low-rate wireless personal area networks (LR-WPAN) with a focus on enabling pervasive wireless sensor networks for residential, commercial and industrial applications. The standard is characterized by maintaining a high level of simplicity, allowing for low cost and low power implementations. This paper presents a brief technical introduction of the

Josk A. Gutierrez; David B. Durocher

2005-01-01

366

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS--I: REGULAR PAPERS, VOL. 51, NO. 11, NOVEMBER 2004 2133 Radix-Based Digital Calibration Techniques for  

E-print Network

, Member, IEEE, Jipeng Li, Member, IEEE, and Un-Ku Moon, Senior Member, IEEE Abstract--This paper describes phases to do the job. These methods imply slower conversion speed and increased Manuscript received (e-mail: jipeng.li@nsc.com). U. Moon is with the School of Electrical Engineering and Computer

Moon, Un-Ku

367

2 PERVASIVE computing Published by the IEEE CS n 1536-1268/13/$31.00 2013 IEEE U n d e r s ta n d i n g a n d C h a n g i n g B e h av i o r  

E-print Network

, while interventions related to mood disorders are inherently related to monitoring participants' mental. Recent work has shown that we can make inferences about user contexts, physical activities,4,5 and mental physical and mental well-being. Doc- tors, therapists, teachers, and coaches deliver BCIs to patients

Mascolo, Cecilia

368

CS 61C: Great Ideas in Computer Architecture (Machine Structures)  

E-print Network

provisioning a medium-sized (1000 servers) facility � More pervasive broadband Internet so can access remote computers efficiently � CommodiKzaKon of HW & SW, ... build $200M Warehouse Scale Computers with 100,000 servers for Internet

California at Irvine, University of

369

Appearing in IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), May 1113, 2014 Energy Reduction through  

E-print Network

scaling is required to contain power density. However, this also increases the rate of transient upsets--potentially preventing us from scaling down voltage and possibly even requiring voltage increases to maintain reliability, but spending 2­3? the energy for redundant computation can diminish or reverse the benefits of voltage scaling

DeHon, André

370

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 1, NO. 1, MARCH 2009 1 CADIAPLAYER  

E-print Network

different games at an expert level without any human intervention. The traditional design model for GGP- based reasoning, heuristic search, computational intelligence, and machine learning. The two core components of any game-playing program are search and evaluation. The former provides the ability to think

Björnsson, Yngvi

371

IEEE TRANSACTIONS ON COMPUTERS, VOL. XX, NO. XX, XX XXXX 1 Supplemental Material for the Paper "Deploying Wireless Sensor  

E-print Network

. A cyber-physical system (CPS) approach has recently been suggested in [11], considering both "Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring" Md Zakirul Alam is an interesting interdisciplinary topic, which is rarely combined by engineering and computer science (CS

Wu, Jie

372

IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 59, NO. 1, JANUARY 2012 35 A Multiscale Parallel Computing Architecture for  

E-print Network

Computing Architecture for Automated Segmentation of the Brain Connectome Sylvain Jaume , Kathleen Knobe such as Alzheimer's disease. Although consid- erably smaller than a human brain, a mouse brain already exhibits one billion connections and manually tracing the connectome of a mouse brain can only be achieved partially

Sylvain Jaume

373

IEEE International Workshop on Soft Computing in Industrial Applications Binghamton University, Binghamton, New York, June 23-25, 2003  

E-print Network

and Their Data Files Ira Rudowsky1 , Olga Kulyba1 , Mikhail Kunin1 , Dmitri Ogarodnikov2 and Theodore Raphan1,2 1 Institute of Neural & Intelligent Systems Department of Computer and Information Science Brooklyn College and specialized programs are used to analyze the data. In this study we developed a prototype system for indexing

Rudowsky, Ira

374

IEEE TRANSACTIONS ON EDUCATION, VOL. 43, NO. 3, AUGUST 2000 273 Recursive Algorithms in Computer Science Courses  

E-print Network

be covered in the first year introductory computer science courses, in the second year data structure course a very simple form of a chain, where each vertex has only one child. This child corresponds to the single in any data structure course. Their time complexity is proportional to the size of a traversed tree

Stojmenovic, Ivan

375

Proceedings of the IEEE International Conference on Computer Vision (ICCV), Kyoto, Japan, Oct 2009 Spatio-Temporal Relationship Match  

E-print Network

-computer interfaces, and monitoring systems for children and elderly persons. For instance, a methodology of sparse local descriptors directly extracted from a 3-D XYT volume (i.e. a concatenation of image frames along time axis). They do not rely on background subtraction or human body-part segmentation, and thus

Ryoo, Michael S.

376

Appears in IEEE Conference Computer Vision and Pattern Recognition, Santa Barbara, California, 1998. A Spatiotemporal Motion Model for Video Summarization  

E-print Network

. A Spatiotemporal Motion Model for Video Summarization Nuno Vasconcelos Andrew Lippman MIT Media Laboratory - fnuno,lipg@media.mit.edu Abstract The compact description of a video sequence through a single image map and a dominant motion has body of research has been devoted to this topic in the recent past. The fundamental idea is to compute

Vasconcelos, Nuno M.

377

2012 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops The Estrellita System  

E-print Network

. Using mobile phone as a health informatics tools can lead to early identification of potential-preterm infants, prematurity, health informatics, capture and access, clinicians, pediatric informatics, mobile-person HRIF visits through sharing of infant health data via mobile devices and an online web portal

Hayes, Gillian R.

378

162 IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 2, NO. 3, SEPTEMBER 2010 Game Bot Detection via Avatar Trajectory Analysis  

E-print Network

Game Bot Detection via Avatar Trajectory Analysis Hsing-Kuo Pao, Kuan-Ta Chen, Member, IEEE, and Hong Internet activities in recent years, but cheating activity, such as the use of game bots, has increased accuracy on a short trace of several hundred seconds. Index Terms--Behavior analysis, bot detection

Chen, Sheng-Wei

379

1536 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 31, NO. 10, OCTOBER 2012 Analytical Eye-Diagram Determination for the  

E-print Network

Verification of Single Interconnect Lines Dongchul Kim, Hyewon Kim, and Yungseon Eo, Senior Member, IEEE--Eye diagram, intersymbol interference (ISI), jitter, signal integrity, transmission line. I. Introduction OVER, OCTOBER 2012 Analytical Eye-Diagram Determination for the Efficient and Accurate Signal Integrity

380

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 12, DECEMBER 2006 2965 Statistical Timing Analysis With Coupling  

E-print Network

technologies, shrinking geometries have led to a reduction in the self- capacitance of wires. Meanwhile of coupling-capacitances will be even more dominant in the future as feature-sizes shrink [3]. Simultaneous, Senior Member, IEEE Abstract--As technology scales to smaller dimensions, increas- ing process variations

Zhou, Hai

381

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 3, NO. 3, SEPTEMBER 2011 201 Tanagra: Reactive Planning and Constraint Solving  

E-print Network

planning with nu- merical constraint solving, and an evaluation of the expressivity of the system by examining the range of content it can create. The mixed-initiative approach to design, where content is cre or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object

California at Santa Cruz, University of

382

IEEE Power Engineering Society Conference Proceedings, SF, CA, June 12-16, 2005, to appear. An Agent-Based Computational Laboratory  

E-print Network

IEEE Power Engineering Society Conference Proceedings, SF, CA, June 12-16, 2005, to appear. These characteristics provide generators with a poten- tially large scope for the exercise of strategic behavior in part from strategic generator behaviors encouraged by inappropriate market design features ([1], [19

Tesfatsion, Leigh

383

Correcting pervasive errors in RNA crystallography through enumerative structure prediction  

PubMed Central

Three-dimensional RNA models fitted into crystallographic density maps exhibit pervasive conformational ambiguities, geometric errors, and steric clashes. To address these problems, we present Enumerative Real-space Refinement ASsisted by Electron density under Rosetta (ERRASER), coupled to PHENIX (Python-based Hierarchical Environment for Integrated Xtallography) diffraction-based refinement. On 24 datasets, ERRASER automatically corrects the majority of MolProbity-assessed errors, improves average Rfree factor, resolves functionally important discrepancies in non-canonical structure, and refines low-resolution models to better match higher resolution models. PMID:23202432

Chou, Fang-Chieh; Sripakdeevong, Parin; Dibrov, Sergey M.; Hermann, Thomas; Das, Rhiju

2012-01-01

384

Appears in: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 697-703, June 1997. Real-Time Closed-World Tracking  

E-print Network

the method are discussed. The algorithm has been used to track children in an inter- active, narrative and observed by the room. We have constructed such an imagination space, called the KIDSROOM, where a computer the experimental setup of the KidsRoom viewed from the stationary color camera used for tracking objects. Here four

385

The Institute of Electrical and Electronics Engineers, Inc. (IEEE)  

NSDL National Science Digital Library

"The IEEE (Eye-triple-E) is a non-profit, technical professional association of more than 365,000 individual members in approximately 150countries. The full name is the "Institute of Electrical and Electronics Engineers, Inc., although the organization is most popularly known and referredto by the letters I-E-E-E.Through its members, the IEEE is a leading authority in technical areas ranging from computer engineering, biomedical technology and telecommunications, to electric power, aerospace engineering and consumer electronics, among others."Description courtesy of http://www.ieee.org/

2005-10-31

386

Measured Performance of an IEEE 802.11  

Microsoft Academic Search

In this study, the capabilities of an IEEE 802.11 wireless LAN are measured. For the test phases, three wireless laptop computers, a wireless and wired desktop computers and an access point (AP) are used. In addition to these computers, products of Lucent Technologies have been used as the wireless communication adapters. Our metric that is the criteria used to evaluate

Tamer Demir; Cem Ersoy

387

Adding GPU Computing to Computer Organization Courses David Bunde  

E-print Network

techniques to teach CUDA in elective courses. The emerging ACM/IEEE Computer Science Curricula 2013 undergraduate computer organization course. One practical reason to teach GPU computing is the availabilityAdding GPU Computing to Computer Organization Courses David Bunde Knox College Galesburg, Illinois

Bunde, David

388

Urbiflock: An experiment in dynamic group management in Pervasive social applications  

Microsoft Academic Search

Pervasive social applications are applications that enable end users to interact and share information on the move. In these applications, the concept of a user group plays a central role as it models the user's social networks. Most pervasive social applications today model these user groups as simple lists of users that have to be manually managed by the user

Andoni Lombide Carreton; Dries Harnie; Elisa Gonzalez Boix; Christophe Scholliers; Tom Van Cutsem; Wolfgang De Meuter

2010-01-01

389

Pervasive informatics and persistent actimetric information in health smart homes : From Language Model to Location Model  

E-print Network

Pervasive informatics and persistent actimetric information in health smart homes : From Language. Pervasive informatics and persistent actimetric information in health smart homes : From Language Model, this approach seems to be a good way of location modelling. Index Terms--smart flats for elderly people

Fouquet, Yannick

390

Empirical Validation of the Involvement Component of the Pervasive GameFlow Model  

E-print Network

into the virtual world of the game; in- stead, in these types of games the virtual world of the digital applicationEmpirical Validation of the Involvement Component of the Pervasive GameFlow Model Eduardo Calvillo presents an empirical investigation into the ques- tion of involvement in pervasive games. The study

Romero, Pablo

391

Task-involved versus Ego-Involved: Motivating children to exercise in a pervasive exergame  

Microsoft Academic Search

This paper presents current work on a pervasive health and fitness game (exergame), designed to motivate children to reach their recommended daily exercise goals and facilitate long term behavioural change. I discuss briefly the current work in the area of pervasive exergames and highlight a common theme in the approach they take. Through my study of the relevant psychology literature,

Andrew Peter Macvean

2011-01-01

392

IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 16, NO. 1, FEBRUARY 2008 1 Aggregation Using the Fuzzy Weighted Average as  

E-print Network

Weighted Average as Computed by the Karnik­Mendel Algorithms Feilong Liu, Student Member, IEEE, and Jerry M. Mendel, Life Fellow, IEEE Abstract--By connecting work from two different problems-- the fuzzy weighted. This new algorithm uses the Karnik­Mendel (KM) algorithms to compute the FWA -cut end- points. It appears

Mendle, Jerry M.

393

IEEE TRANSACTIONS ON MEDICAL IMAGING 1 Four-Chamber Heart Modeling and Automatic  

E-print Network

-chamber heart seg- mentation system for the quantitative functional analysis of the heart from cardiac computed about the heart chambers, large vessels, and coronary arter- ies [1]. Therefore, CT is an important must be obtained from the IEEE by sending a request to pubs-permissions@ieee.org. quantitative

Barbu, Adrian

394

IEEE TRANSACTION ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 1 Visual Tracking: an Experimental Survey  

E-print Network

Survey Arnold W. M. Smeulders*, Senior Member, IEEE, Dung M. Chu*, Student Member, IEEE, Rita Cucchiara Emilia, Italy. Afshin Dehghan and Mubarak Shah are with School of Electric Engineering and Computer to impressive, even amazing, individual results like tracking of the motor bicycle in the dirt or the car chase

Smeulders, Arnold

395

IEEE TRANSACTION ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 1 Visual Tracking: an Experimental Survey  

E-print Network

Survey Arnold W. M. Smeulders*, Senior Member, IEEE, Dung M. Chu*, Student Member, IEEE, Rita Cucchiara Emilia, Italy. Afshin Dehghan and Mubarak Shah are with School of Electric Engineering and Computer like tracking of the motor bicycle in the dirt or the car chase [1]. But as long as most tracking

396

IEEE Transactions on Consumer Electronics, Vol. 50, No. 4, NOVEMBER 2004 Contributed Paper  

E-print Network

issue in modern society. In consumer applications as diverse as financial transactions, remote computerIEEE Transactions on Consumer Electronics, Vol. 50, No. 4, NOVEMBER 2004 Contributed Paper Verbauwhede, Senior Member, IEEE Abstract -- Biometrics have become a popular means for access control

Verbauwhede, Ingrid

397

Modelling and Stability Analysis of Hybrid Multiple Access in the IEEE 802.15.4 Protocol  

E-print Network

.2 [Computer-Communication Networks]: Network Protocols General Terms: Performance, Standardization, Theory. INTRODUCTION The IEEE 802.15.4 communication standard is arguably becoming the most popular protocol for low framework for modelling the behavior of the hybrid MAC protocol of the IEEE 802.15.4 standard is proposed

Johansson, Karl Henrik

398

The molecular basis of cognitive deficits in pervasive developmental disorders  

PubMed Central

Persons with pervasive developmental disorders (PDD) exhibit a range of cognitive deficits that hamper their quality of life, including difficulties involving communication, sociability, and perspective-taking. In recent years, a variety of studies in mice that model genetic syndromes with a high risk of PDD have provided insights into the underlying molecular mechanisms associated with these disorders. What is less appreciated is how the molecular anomalies affect neuronal and circuit function to give rise to the cognitive deficits associated with PDD. In this review, we describe genetic mutations that cause PDD and discuss how they alter fundamental social and cognitive processes. We then describe efforts to correct cognitive impairments associated with these disorders and identify areas of further inquiry in the search for molecular targets for therapeutics for PDD. PMID:22904374

Bhattacharya, Aditi; Klann, Eric

2012-01-01

399

Markers for improvement in children with pervasive developmental disorders.  

PubMed

In a series of prevalence and follow-up studies on North Dakota's 59 children with pervasive developmental disorders, the patient characteristics of hyperlexia, Tourette disorder (TD), and the absence of seizures were found to be associated with improved outcome or higher IQ. We entered these and 17 other characteristics into a regression model using forward, step-wise inclusion to identify the smallest set of predictor variables which were significantly associated with the dependent variables of IQ, and receptive and expressive language. Of the 20 predictor variables used in the regression analysis, the same four variables met inclusion criteria for each of the dependent variables. These predictor variables were: hyperlexia, a known aetiology, TD and age. The relevance of these findings is discussed. PMID:3199430

Fisher, W; Burd, L; Kerbeshian, J

1988-10-01

400

Pervasive developmental disorders and criminal behaviour: a case control study.  

PubMed

The prevalence and pattern of criminal behaviour in a population of 313 former child psychiatric in-patients with pervasive developmental disorders were studied. The patients were divided into three subgroups and compared with 933 matched controls from the general population. Age at follow-up was between 25 years and 59 years. An account of convictions in the nationwide Danish Register of Criminality was used as a measure of criminal behaviour. Among 113 cases with childhood autism, .9% had been convicted. In atypical autism (n=86) and Asperger's syndrome (n=114) the percentages were 8.1% and 18.4%, respectively. The corresponding rate of convictions in the comparison groups was 18.9%, 14.7%, and 19.6% respectively. Particular attention is given to arson in Asperger's syndrome (p= .0009). PMID:17615427

Mouridsen, Svend Erik; Rich, Bente; Isager, Torben; Nedergaard, Niels Jrgen

2008-04-01

401

Rate of first recorded diagnosis of autism and other pervasive developmental disorders in United Kingdom general practice, 1988 to 2001  

Microsoft Academic Search

BACKGROUND: There has been concern that the incidence of autism and other pervasive developmental disorders (PDDs) is increasing. Previous studies have been smaller, restricted to autism (excluding other pervasive developmental disorders such as Asperger's syndrome), included boys only, or have not been based on a national sample. We investigated time trends in the rates of diagnosis of pervasive developmental disorders.

Liam Smeeth; Claire Cook; Eric Fombonne; Lisa Heavey; Laura C Rodrigues; Peter G Smith; Andrew J Hall

2004-01-01

402

Utilizing Embedded Semantics for User-Driven Design of Pervasive Environments  

NASA Astrophysics Data System (ADS)

The Web does not only offer an almost infinitive number of services and resources but can be also seen as a technology to combine different technological devices, like mobile phones, digital media solutions, intelligent household appliances, tablet PCs, and any other kind of computers, in order to create environments satisfying the need of users. However, due to the large amount of web resources and services as well as the variety and range of user needs, it is impossible to realize software solutions for all possible scenarios. In this paper, we present a user-driven approach towards designing and assembling pervasive environments, taking into consideration resources and services available on the Web and provided through computing devices. Based on semantics embedded in the web content, we explain the concept as well as important components of this user-driven environment design methodology and show a first prototype. Finally, the overall approach is critically discussed from the perspectives of programmers and web users on the basis of related work.

Soylu, Ahmet; Mdritscher, Felix; de Causmaecker, Patrick

403

Arithmetic Correlations and Walsh Andrew Klapper Senior Member, IEEE, Mark Goresky Member, IEEE,  

E-print Network

1 Arithmetic Correlations and Walsh Transforms Andrew Klapper Senior Member, IEEE, Mark Goresky branches of digital computation and communications. They construct arithmetic analogs of the Walsh of hypersurfaces; (2) show that the arithmetic Walsh spectrum characterizes a Boolean function; (3) study

Klapper, Andy

404

Lifelike Talking Faces for Interactive Services ERIC COSATTO, MEMBER, IEEE, JRN OSTERMANN, SENIOR MEMBER, IEEE,  

E-print Network

Lifelike Talking Faces for Interactive Services ERIC COSATTO, MEMBER, IEEE, J?RN OSTERMANN, SENIOR talking faces for interactive services are an exciting new modality for man­machine interactions. Recent developments in speech synthesis and computer animation enable the real-time synthesis of faces that look

405

IEEE Copyright Statement: Copyright 2007 IEEE. Reprinted from IEEE Special Issue on "Modeling, Identification, and  

E-print Network

of the IEEE does not in any way imply IEEE endorsement of any of Carnegie Mellon University's products or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view to qualitatively different paradigms than those for which it was designed. As a matter of fact, major challenges

Ilic, Marija D.

406

SoPC based Smart Home Embedded Computer Capable of Caring for the Home Occupants  

E-print Network

. Toronto, Ontario Canada M5B 2K3 Abstract--We present a Smart-Home Embedded Computer (SHEC) system. INTRODUCTION Ubiquitous and pervasive computing is changing the lifestyle. Our living and working environments

Khan, Gul N.

407

Pervasive Recombination and Sympatric Genome Diversification Driven by Frequency-Dependent Selection in Borrelia burgdorferi, the Lyme Disease Bacterium  

PubMed Central

How genomic diversity within bacterial populations originates and is maintained in the presence of frequent recombination is a central problem in understanding bacterial evolution. Natural populations of Borrelia burgdorferi, the bacterial agent of Lyme disease, consist of diverse genomic groups co-infecting single individual vertebrate hosts and tick vectors. To understand mechanisms of sympatric genome differentiation in B. burgdorferi, we sequenced and compared 23 genomes representing major genomic groups in North America and Europe. Linkage analysis of >13,500 single-nucleotide polymorphisms revealed pervasive horizontal DNA exchanges. Although three times more frequent than point mutation, recombination is localized and weakly affects genome-wide linkage disequilibrium. We show by computer simulations that, while enhancing population fitness, recombination constrains neutral and adaptive divergence among sympatric genomes through periodic selective sweeps. In contrast, simulations of frequency-dependent selection with recombination produced the observed pattern of a large number of sympatric genomic groups associated with major sequence variations at the selected locus. We conclude that negative frequency-dependent selection targeting a small number of surface-antigen loci (ospC in particular) sufficiently explains the maintenance of sympatric genome diversity in B. burgdorferi without adaptive divergence. We suggest that pervasive recombination makes it less likely for local B. burgdorferi genomic groups to achieve host specialization. B. burgdorferi genomic groups in the northeastern United States are thus best viewed as constituting a single bacterial species, whose generalist nature is a key to its rapid spread and human virulence. PMID:21890743

Haven, James; Vargas, Levy C.; Mongodin, Emmanuel F.; Xue, Vincent; Hernandez, Yozen; Pagan, Pedro; Fraser-Liggett, Claire M.; Schutzer, Steven E.; Luft, Benjamin J.; Casjens, Sherwood R.; Qiu, Wei-Gang

2011-01-01

408

FOCS 2005 Program The 46th Annual IEEE Symposium on  

E-print Network

Tutorials held at CMU University Center Reception at Omni William Penn Hotel, Monongahela Room, 17th floor-25, 2005 Omni William Penn Hotel, Pittsburgh, PA Sponsored by the IEEE Computer Society Technical Committee-Peled Bernard Chazelle Algorithmic Techniques and Tools from Computational Geometry WELCOME RECEPTION 7:00pm � 9

Guestrin, Carlos

409

IEEE Computer Society 1986 , 1988  

E-print Network

Executable Condition Analysis for coarse grain tasks (Macro-tasks) BPA BPA 1 BPA 3 BPA2 BPA 4 BPA 5 BPA 6 RB 7 RB15 BPA 8 BPA 9 BPA 10 RB 11 BPA 12 BPA 13 RB 14 RB END RB RB BPA RB Data Dependency Control flow Conditional branch Repetition Block RB BPA Block of Psuedo Assignment Statements 7 11 14 1 2 3 4 5 6 15 7 8 9

Kasahara, Hironori

410

IEEE Computer Society 1986 , 1988  

E-print Network

-20 ExaFLOPS E T G Kei,2011.6&11, 11PFLOPS, 11.3MW Tianhe-2, 2013.06, 55PFLOPS, 17.8MW Titan,2012;Tianhe2, (MilkyWay2) China's National University of Defense Technology, Linpack Performance (Rmax)33 this planet. ·Developed in Mar. 2002 by STA (MEXT) and NEC with 400 M$ investment under Dr. Miyoshi

Kasahara, Hironori

411

Simulation of Computer Architectures: Simulators, Benchmarks, Methodologies,  

E-print Network

Simulation of Computer Architectures: Simulators, Benchmarks, Methodologies, and Recommendations Joshua J. Yi, Member, IEEE, and David J. Lilja, Fellow, IEEE Abstract--Simulators have become an integral the efficacy of an enhancement. However, long simulation times and poor accuracy limit their effectiveness

Minnesota, University of

412

24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.  

...persons listed as being in poverty in the 1990 Decennial Census...nominated area; or (2) Poverty, as described above, has...other than those of pervasive poverty and unemployment. Below...of crime, narcotics use, homelessness, high incidence of...

2014-04-01

413

24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2010 CFR

...providing evidence that: (1) Poverty is widespread throughout the nominated area; or (2) Poverty has become entrenched or...other than those of pervasive poverty and unemployment. A high...of crime, narcotics use, homelessness, abandoned housing,...

2010-04-01

414

24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.  

...providing evidence that: (1) Poverty is widespread throughout the nominated area; or (2) Poverty has become entrenched or...other than those of pervasive poverty and unemployment. A high...of crime, narcotics use, homelessness, abandoned housing,...

2014-04-01

415

24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2013 CFR

...providing evidence that: (1) Poverty is widespread throughout the nominated area; or (2) Poverty has become entrenched or...other than those of pervasive poverty and unemployment. A high...of crime, narcotics use, homelessness, abandoned housing,...

2013-04-01

416

24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2013 CFR

...persons listed as being in poverty in the 1990 Decennial Census...nominated area; or (2) Poverty, as described above, has...other than those of pervasive poverty and unemployment. Below...of crime, narcotics use, homelessness, high incidence of...

2013-04-01

417

24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2010 CFR

...persons listed as being in poverty in the 1990 Decennial Census...nominated area; or (2) Poverty, as described above, has...other than those of pervasive poverty and unemployment. Below...of crime, narcotics use, homelessness, high incidence of...

2010-04-01

418

24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2012 CFR

...providing evidence that: (1) Poverty is widespread throughout the nominated area; or (2) Poverty has become entrenched or...other than those of pervasive poverty and unemployment. A high...of crime, narcotics use, homelessness, abandoned housing,...

2012-04-01

419

24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2012 CFR

...persons listed as being in poverty in the 1990 Decennial Census...nominated area; or (2) Poverty, as described above, has...other than those of pervasive poverty and unemployment. Below...of crime, narcotics use, homelessness, high incidence of...

2012-04-01

420

24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2011 CFR

...providing evidence that: (1) Poverty is widespread throughout the nominated area; or (2) Poverty has become entrenched or...other than those of pervasive poverty and unemployment. A high...of crime, narcotics use, homelessness, abandoned housing,...

2011-04-01

421

24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2011 CFR

...persons listed as being in poverty in the 1990 Decennial Census...nominated area; or (2) Poverty, as described above, has...other than those of pervasive poverty and unemployment. Below...of crime, narcotics use, homelessness, high incidence of...

2011-04-01

422

Prevalence of Pervasive Developmental Disorders in the British Nationwide Survey of Child Mental Health  

Microsoft Academic Search

ObjectiveThe prevalence of pervasive developmental disorders (PDD) is not well established and needs monitoring. The prevalence of PDD in the 1999 nationwide British survey of child and adolescent mental health was investigated.

ERIC FOMBONNE; HELEN SIMMONS; TAMSIN FORD; HOWARD MELTZER; ROBERT GOODMAN

2001-01-01

423

[Characteristics of juvenile court cases with pervasive developmental disorder].  

PubMed

Forty-eight juvenile delinquency cases, who were sent to a family court between April, 2002 and March, 2005, and diagnosed with Pervasive Developmental Disorder (PDD), were examined regarding the following characteristics: (1) demographic, cognitive and social profiles (sex, age, intellectual development, school register), (2) diagnostic subclasses of PDD, and (3) types (classification), causes, and backgrounds of delinquency. While the PDD group revealed no noticeable differences in the distributions of sex, age, school register status, and intellectual abilities, compared with a general delinquent juvenile population, the PDD group showed a much higher rate of sexual offences and antisocial behaviors based on the confusion due to limited interpersonal abilities. Forty-two (87.5%) were diagnosed with Asperger's disorder, with an IQ within the normal range. In more than half of the cases, offensive conducts occurred in their inappropriate a Hemprs to approach others, caused by the underdevelopment of social abilities. In other cases, the primary handicap and associated symptoms of PDD, as well as the obsessive pursuit of a scientific/experimental interest, played some role in the development of delinquency. In dealing with delinquent cases of juveniles with PDD, it seems very important to keep in mind the characteristics of PDD, and cooperate with professionals and organizations of other fields related to juvenile mental health, such as child psychiatrists, social welfare facilities, and institutions of the Ministry of Justice (juvenile detention home, juvenile training school, and probationary office). PMID:16761693

Kumagami, Takashi

2006-01-01

424

Global Prevalence of Autism and Other Pervasive Developmental Disorders  

PubMed Central

We provide a systematic review of epidemiological surveys of autistic disorder and pervasive developmental disorders (PDDs) worldwide. A secondary aim was to consider the possible impact of geographic, cultural/ethnic, and socioeconomic factors on prevalence estimates and on clinical presentation of PDD. Based on the evidence reviewed, the median of prevalence estimates of autism spectrum disorders was 62/10 000. While existing estimates are variable, the evidence reviewed does not support differences in PDD prevalence by geographic region nor of a strong impact of ethnic/cultural or socioeconomic factors. However, power to detect such effects is seriously limited in existing data sets, particularly in low-income countries. While it is clear that prevalence estimates have increased over time and these vary in different neighboring and distant regions, these findings most likely represent broadening of the diagnostic concets, diagnostic switching from other developmental disabilities to PDD, service availability, and awareness of autistic spectrum disorders in both the lay and professional public. The lack of evidence from the majority of the world's population suggests a critical need for further research and capacity building in low- and middle-income countries. Autism Res 2012, 5: 160179. 2012 International Society for Autism Research, Wiley Periodicals, Inc. PMID:22495912

Elsabbagh, Mayada; Divan, Gauri; Koh, Yun-Joo; Kim, Young Shin; Kauchali, Shuaib; Marcin, Carlos; Montiel-Nava, Cecilia; Patel, Vikram; Paula, Cristiane S; Wang, Chongying; Yasamy, Mohammad Taghi; Fombonne, Eric

2012-01-01

425

Global prevalence of autism and other pervasive developmental disorders.  

PubMed

We provide a systematic review of epidemiological surveys of autistic disorder and pervasive developmental disorders (PDDs) worldwide. A secondary aim was to consider the possible impact of geographic, cultural/ethnic, and socioeconomic factors on prevalence estimates and on clinical presentation of PDD. Based on the evidence reviewed, the median of prevalence estimates of autism spectrum disorders was 62/10 000. While existing estimates are variable, the evidence reviewed does not support differences in PDD prevalence by geographic region nor of a strong impact of ethnic/cultural or socioeconomic factors. However, power to detect such effects is seriously limited in existing data sets, particularly in low-income countries. While it is clear that prevalence estimates have increased over time and these vary in different neighboring and distant regions, these findings most likely represent broadening of the diagnostic concets, diagnostic switching from other developmental disabilities to PDD, service availability, and awareness of autistic spectrum disorders in both the lay and professional public. The lack of evidence from the majority of the world's population suggests a critical need for further research and capacity building in low- and middle-income countries. PMID:22495912

Elsabbagh, Mayada; Divan, Gauri; Koh, Yun-Joo; Kim, Young Shin; Kauchali, Shuaib; Marcn, Carlos; Montiel-Nava, Cecilia; Patel, Vikram; Paula, Cristiane S; Wang, Chongying; Yasamy, Mohammad Taghi; Fombonne, Eric

2012-06-01

426

Learning from failure in health care: frequent opportunities, pervasive barriers  

PubMed Central

The notion that hospitals and medical practices should learn from failures, both their own and others', has obvious appeal. Yet, healthcare organisations that systematically and effectively learn from the failures that occur in the care delivery process, especially from small mistakes and problems rather than from consequential adverse events, are rare. This article explores pervasive barriers embedded in healthcare's organisational systems that make shared or organisational learning from failure difficult and then recommends strategies for overcoming these barriers to learning from failure, emphasising the critical role of leadership. Firstly, leaders must create a compelling vision that motivates and communicates urgency for change; secondly, leaders must work to create an environment of psychological safety that fosters open reporting, active questioning, and frequent sharing of insights and concerns; and thirdly, case study research on one hospital's organisational learning initiative suggests that leaders can empower and support team learning throughout their organisations as a way of identifying, analysing, and removing hazards that threaten patient safety. PMID:15576689

Edmondson, A

2004-01-01

427

Augmented Reality in Corporate Pervasive e-Education: Novel ways to support aviation maintenance training  

Microsoft Academic Search

In today's information driven society and economy new media and mobility are winning increasing importance. Developments in distributed, dynamic, ubiquitous (available everywhere) and pervasive (omnipresent) technologies and of mobile devices during the last years facilitated the research of augmented reality (AR) systems (Azuma, 1997, Azuma et al., 2001, Ludwig&Reimann, 2005) and pervasive e-education (Holzinger,Nischelwitzer&Kickmeier-Rust, 2006). AR is supposed to gain

Johannes CHRISTIAN

2006-01-01

428

Pervasive Learning--Using Games to Tear down the Classroom Walls  

ERIC Educational Resources Information Center

Pervasive gaming is a new and emerging gaming genre where the physical and social aspects of the real world are integrated into the game and blends into the player's everyday life. Given the nature of pervasive games, it may be possible to use that type of game as a tool to support learning in a university course by providing a gameplay where

Plhn, Trygve

2014-01-01

429

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 20, NO. 12, DECEMBER 2008 1585 TKDE 20(12) (December 2008) EIC Editorial  

E-print Network

Associate Editors, reviewers, authors, and support staff from the IEEE Computer Society Publications Office time, and ranks #3 in all IEEE Computer Society transactions in the most recent 2007 journal impact factors. I would like to take this opportunity to review some of the major activities that have taken

Wu, Xindong

430

IEEE Std 1394bTM-2002 (Amendment to IEEE Std 1394TM-1995)  

E-print Network

IEEE Std 1394bTM-2002 (Amendment to IEEE Std 1394TM-1995) IEEEStandards 1394bTM IEEE Standard, in an electronic retrieval system or otherwise, without the prior written permission of the publisher. IEEE Std 1394bTM -2002 (Amendment to IEEE Std 1394TM -1995) IEEE Standard for a High-Performance Serial Bus

Borgonovo, Flaminio

431

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. X, MONTH YEAR 1 Adaptive Sensing of Congested Spectrum Bands  

E-print Network

Spectrum Bands Ali Tajer, Member, IEEE, Rui M. Castro, and Xiaodong Wang, Fellow, IEEE, Abstract spectrum bands licensed to the legacy (primary) users. For this purpose, secondary users monitor. M. Castro is with the Department of Mathematics & Computer Sci- ence, Eindhoven University

Castro, Rui

432

1428 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 23, NO. 3, MAY 2008 Digital Average Current-Mode Controller for DCDC  

E-print Network

1428 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 23, NO. 3, MAY 2008 Digital Average Current is with the Colorado Power Electronics Center, Electrical and Computer Engineering Department, University of Colorado, and Dragan Maksimovic, Senior Member, IEEE Abstract--A dc power supply in physical vapor deposition (PVD

433

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, SUBMITTED 2011, ACCEPTED 2013 1 Iterative Discovery of Multiple Alternative  

E-print Network

. Dy, Member, IEEE, and Michael I. Jordan, Fellow, IEEE Abstract--Complex data can be grouped, Boston, MA 02115. E-mail: dniu@ece.neu.edu, jdy@ece.neu.edu · M. I. Jordan is with the Computer Science Division and Department of Statistics, University of California, Berkeley, CA 94720. Email: jordan

Jordan, Michael I.

434

1472 IEEE TRANSACTIONS ON MAGNETICS, VOL. 36, NO. 4, JULY 2000 High Order Differential Form-Based Elements for the  

E-print Network

-Based Elements for the Computation of Electromagnetic Field Z. Ren, Senior Member, IEEE, and N. Ida, Senior Member, IEEE Abstract--The Whitney elements, discrete spaces based on differential forms, have proven gives a general description of high order -form (nodal, edge, facet and volume) elements. Their function

Ida, Nathan

435

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 1, JANUARY 2009 109 DiversityMultiplexing Tradeoff in ISI Channels  

E-print Network

­Multiplexing Tradeoff in ISI Channels Leonard H. Grokop, Member, IEEE, and David N. C. Tse, Senior Member, IEEE Abstract--The optimal diversity­multiplexing tradeoff curve for the intersymbol interference (ISI) channel is computed, intersymbol interference (ISI), max- imum-likelihood sequence estimation , minimum mean-square- error (MMSE

Tse, David

436

1470 IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 33, NO. 10, OCTOBER 1998 Analysis, Design, and Optimization of Spiral  

E-print Network

structures and coupled inductors. A custom computer-aided-design tool called ASITIC is described, which, and Optimization of Spiral Inductors and Transformers for Si RF IC's Ali M. Niknejad, Student Member, IEEE, and Robert G. Meyer, Fellow, IEEE Abstract--Silicon integrated circuit spiral inductors and trans- formers

California at Berkeley, University of

437

Copyright (c) 2013 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing pubs-permissions@ieee.org. This article has been accepted for publication in a future issue of this journal, but has not been  

E-print Network

are with the Research School of Engineering, College of Engineering and Computer Science, The Australian National, Salman Durrani, Senior Member, IEEE and Jing Guo, Student Member, IEEE Abstract--This paper presents multi-hop networks [10], [11]. The k-connectivity is a most general notion of connectivity

Durrani, Salman

438

IEEE Smart Grid Series of Standards IEEE 2030 (Interoperability) and IEEE 1547 (Interconnection) Status: Preprint  

SciTech Connect

The IEEE American National Standards smart grid publications and standards development projects IEEE 2030, which addresses smart grid interoperability, and IEEE 1547TM, which addresses distributed resources interconnection with the grid, have made substantial progress since 2009. The IEEE 2030TM and 1547 standards series focus on systems-level aspects and cover many of the technical integration issues involved in a mature smart grid. The status and highlights of these two IEEE series of standards, which are sponsored by IEEE Standards Coordinating Committee 21 (SCC21), are provided in this paper.

Basso, T.; DeBlasio, R.

2012-04-01

439

Computer engineering curriculum in the new millennium  

Microsoft Academic Search

Currently there is a joint activity (referred to as Computing Curricula 2001, shortened to CC2001) involving the Association for Computing Machinery and the IEEE Computer Society, which is producing curriculum guidance for the broad area of computing. Within this activity, a volume on computer engineering is being developed. This volume addresses the important area of the design and development of

Andrew McGettrick; Mitchell D. Theys; David L. Soldan; Pradip K. Srimani

2003-01-01

440

Bala KALYANASUNDARAM Department of Computer Science  

E-print Network

Infrastructure proposals Reviewer for: Information Processing Letters SIAM Journal on Computing IEEE Transactions on Computers Journal of Computer and System Sciences Information and Computation NSF proposals in Theoretical Computer Science ESA, FOCS, FST&TCS, STOC, SODA conferences 2 #12;Journal Publications indicates

Kalyanasundaram, Bala

441

SEPTEMBER/OCTOBER 2005 Copublished by the IEEE CS and the AIP 1521-9615/05/$20.00 2005 IEEE 3 voices, and we can train computers to recognize 85 per-  

E-print Network

@computer.org NEWSN E W S Figure 1. Elephants at Walt Disney World's Animal Kingdom. Using software running a hidden team at Marquette hooked up with Disney's Animal Kingdom to test this acoustic analy- sis technology

Johnson, Michael T.

442

Weaving Electrical and Computational Grids: How Analogous Are They?  

Microsoft Academic Search

Inspired by the electrical power grid's ability to provide a pervasive access to power in a consistent and dependable manner, computer scientists began exploring the design and development of an analogous infrastructure called the computational power grid's for the 21st century network computing. At present, such computational grids enable sharing, selection, and aggregation of geographically distributed resources for solving large

Madhu Chetty; Rajkumar Buyya

443

Introduction to This Special Issue on Context-Aware Computing.  

ERIC Educational Resources Information Center

Discusses pervasive, or ubiquitous, computing; explains the notion of context; and defines context-aware computing as the key to disperse and enmesh computation into our lives. Considers context awareness in human-computer interaction and describes the broad topic areas of the essays included in this special issue. (LRW)

Moran, Thomas P.; Dourish, Paul

2001-01-01

444

Measured Performance of an IEEE 802.11 Wireless LAN ? ?  

Microsoft Academic Search

Abstract. In this study, the capabilities of an IEEE 802.11 wireless LAN are measured. For the test phases, three wireless laptop computers, a wireless and wired desktop computers,and an access point (AP) are used. In addition to these computers, products of Lucent Technologies have been used as the wireless communication,adapters. Our metric that is the ,criteria used to evaluate ,the

Tamer Demir; Cem Ersoy

445

Granulite Migmatization and Retrogression: Result of Pervasive Melt Influx? (Invited)  

NASA Astrophysics Data System (ADS)

The Blansk les granulite massif (BLG) is large (ca. 270 km2) lower crust exposure in Bohemian Massif in Czech Republic. It consists of felsic granulites in various degrees of retrogression and small bodies of eclogites, mafic granulites and ultrabasites. Peak granulitic conditions were estimated at ca. 16-18 kbar and 850-1100C. This granulite massif was later, during exhumation, heterogeneously retrogressed in amphibolite facies conditions (ca. 5-7 kbar and 700-800C). The degree of granulite retrogression increases continuously from the core towards the margin of the BLG massif. The question raised in this work is the nature of the retrogression. In core of the massif retrogression is manifested only by plagioclase and spinel coronas around kyanite. Towards the margin granulite gets progressively hydrated, has gneissic look and stable mineral assemblage of Qtz + Kfs + Pl + Bt + Sill Grt. Retrograde granulite reveals higher amount of biotite, which forms at expanse of garnet and kyanite break down to sillimanite. Along the margin the transformation is accompanied by presence of melt, resulting into formation of migmatitic gneisses. The detailed field and microstructural observations revealed a gradual transition from mylonitic gneiss with only incipient amount of melt to migmatitic gneisses with no relict of gneissosity and high proportion of melt. This transition is accompanied by textural changes as well as changes in mineral chemistry (increase of XFe in biotite and garnet, increase of Na in plagioclase) and mineral proportions (decrease of garnet %, increase of biotite and feldspars %). During the exhumation, the granulite was dry, thus melt present in the granulite cannot be produced in-situ. We suggest that the hot dry granulite released and 'attracted' water from colder underlying metasedimentary sequence. This water flux caused extensive melting along the massif margins. This melt then further pervasively migrated towards the core of the massif causing heterogeneous migmatization and retrogression of the granulite. Moreover, we suggest that at an outcrop-scale leucosome distribution controls the extent of the retrogression. Distribution gradient created by the water-saturated melt in leucosomes is spatially limited. Thus granulite closer to the leucosome will reveal higher degree of retrogression than further from the leucosome. Importantly, melt presence in the granulite will play important role for the rheology at lower-middle crust interface.

Hasalova, P.; tpsk, P.; Weinberg, R. F.; Fran?k, J.; Schulmann, K.

2013-12-01

446

ENGINEERING AMORPHOUS COMPUTING Radhika Nagpal  

E-print Network

at al- most no cost: smart materials, self-assembling structures, vast sensor networks. On the other or buildings with smart paint that can sense and report on traffic and wind loads and monitor structural factories for the assembly of nanoscale structures [29]. Pervasive computing and sensor networks

Napp, Nils

447

ASSESSMENT OF (COMPUTER-SUPPORTED) COLLABORATIVE LEARNING This is a post-print of an article submitted for consideration in the IEEE Transactions on Learning  

E-print Network

ASSESSMENT OF (COMPUTER-SUPPORTED) COLLABORATIVE LEARNING This is a post-print of an article.37} Please refer this manuscript as: Strijbos, J. W. (2011). Assessment of (computer-supported) collaborative ON XXXXXXXXXXXXXXXXXXXX, VOL. #, NO. #, MMMMMMMM 1996 Assessment of (Computer-Supported) Collaborative Learning J

Boyer, Edmond

448

978-1-4673-4713-6/10/$26.00 2013 IEEE 354 2013 9th International Conference on Natural Computation (ICNC 2013)  

E-print Network

SMR 3 Phantom 3.0 In this paper, PBSN (Planning based Behavior Selection Network) and P300 based BCI, Korea Abstract--We propose planning behavior selection network (PBSN) based brain-computer interface-Planning based Behavior Selection Network; Brain computer interface; I. INTRODUCTION BCI controls computer

Cho, Sung-Bae

449

0018-9162/06/$20.00 2006 IEEE August 2006 57Published by the IEEE Computer Society C O V E R F E A T U R E  

E-print Network

A T U R E a range of wavelengths, . We can thus describe a color image as a 3D function, P into radiant light is an active topic in computational photography.Such techniques are making it possible, reveals a clear and amaz- ing truth: Through the technology of photography, a pattern of light crossing

O'Brien, James F.

450

0018-9162/07/$25.00 2007 IEEE December 2007 33Published by the IEEE Computer Society C O V E R F E A T U R E  

E-print Network

. DOLLARS & CO2 Recent reports1,2 highlight a growing concern with computer-energy consumption and show how E A T U R E trends could make energy a dominant factor in the total cost of ownership.3 Besides the server electricity bill, TCO includes other energy-dependent components such as the cost of energy

Tomkins, Andrew

451

Proceedings of the IEEE/ACM Workshop on Parallel and Distributed Simulation, pp. 89-96, IEEE Computer Society Press, May 16-19, Austria, 2004 (nominated for best paper award). To appear in the Transactions of the Society for  

E-print Network

to real world systems, the simulation model layer corresponds to different simulation event orderings that can be used to simulate a real world system, and the simulator layer corresponds to the simulator. Introduction As the size and complexity of simulations grow, the computational demand required is fast becoming

Teo, Yong-Meng

452

Memorias Conferencia Internacional IEEE Mexico 1971, Sobre Sistemas, Redes Y Computadoras. Volumen I and Volumen II. (Proceedings of International Conference of IEEE Concerning Systems, Networks, and Computers. Volume I and Volume II.  

ERIC Educational Resources Information Center

The following papers in English from this international conference may be of particular interest to those in the field of education. T. Nakahara, A. Tsukamota, and M. Matsumoto describe a computer-aided design technique for an economical urban cable television system. W. D. Wasson and R. K. Chitkara outline a recognition scheme based on analysis

Concheiro, A. Alonso, Ed.; And Others

453

Leiter-R versus developmental quotient for estimating cognitive function in preschoolers with pervasive developmental disorders  

PubMed Central

The utility of the developmental quotient (DQ) obtained with the Psychoeducational Profile Revised (PEP-R) was assessed as a means of estimating cognitive ability in young children with pervasive developmental disorders. Data from the PEP-R were analysed in a sample of 44 children aged from 2.0 to 5.9 years (mean 3.46 1), 13 with an autistic disorder and 31 with a pervasive developmental disorder not otherwise specified. DQ scores were compared with scores from the Leiter International Performance Scale Revised-Visualization and Reasoning Battery (Leiter-R) in the same 44 children. Overall and domain DQs on the PEP-R were significantly correlated with Leiter-R scores. This study suggests that DQ scores obtained from the PEP-R in preschool children with pervasive developmental disorders may be a viable alternative to the Leiter-R as an assessment tool. PMID:20856598

Portoghese, Claudia; Buttiglione, Maura; De Giacomo, Andrea; Lafortezza, Mariaelena; Lecce, Paola A; Martinelli, Domenico; Lozito, Vito; Margari, Lucia

2010-01-01

454

Proceedings of the IEEE International Conference on Mechatronics & Automation  

E-print Network

· July 2005 0-7803-9044-X/05/$20.00 © 2005 IEEE Virtual Prototyping and Hardware-in-the-Loop Testing for hardware-in-the-loop testing. We anticipate that such a coupling of computational analysis with development of hardware-in-the-loop simulations will play a significant role in rapid and systematic validation

Krovi, Venkat

455

Data Center Transport Mechanisms: Congestion Control Theory and IEEE Standardization  

E-print Network

and deployment. Projects are underway in the IEEE 802.1 standards body, especially in the Data Center Bridging server farms (for web-hosting), as the con- vergence of computing and networking (high, server virtualization, and the development of high-performance Network Interface Cards (NICs). Mohammad

Prabhakar, Balaji

456

IEEE Eng Med Biol Mag. Author manuscript Issues in image-guided therapy  

E-print Network

IEEE Eng Med Biol Mag. Author manuscript Page /1 5 Issues in image-guided therapy Haigron Pascal 1 ; computer assisted surgery ; computer vision ; image guided therapy ; medical robotics Medical robotics, Computer Assisted Surgery (CAS), Image-Guided Therapy (IGT) and the like emerged more than 20 years ago

Paris-Sud XI, Université de

457

Generic Node Removal for Factor-Graph SLAM Nicholas Carlevaris-Bianco, Student Member, IEEE, Michael Kaess, Member, IEEE, and  

E-print Network

1 Generic Node Removal for Factor-Graph SLAM Nicholas Carlevaris-Bianco, Student Member, IEEE on a generic factor-based method for node removal in factor-graph simultaneous localization and mapping (SLAM by long-term SLAM applications whereby nodes are removed in order to control the computational cost

Eustice, Ryan

458

Designing User-Friendly Interfaces for Pervasive Gaming Applications  

E-print Network

to these communication-related aspects, future home environments also address fun and entertainment as important driving of computing systems while at the same time make the games accessible for ordinary people including elders, who

459

Examining pervasive technology practices in schools : a mental models approach  

E-print Network

Studies of computers and education have failed to account for the relevance and importance of tacit assumptions and unquestioned expectations that underlie educational technology practices. A major premise of this dissertation ...

Vaikakul, Savalai, 1976-

2005-01-01

460

Decoupling algorithms from the organization of computation for high performance image processing  

E-print Network

Future graphics and imaging applications-from self-driving cards, to 4D light field cameras, to pervasive sensing-demand orders of magnitude more computation than we currently have. This thesis argues that the efficiency ...

Ragan-Kelley, Jonathan Millard

2014-01-01

461

Computational Intelligence, Volume 28, Number 1, 2012 KEMNAD: A KNOWLEDGE ENGINEERING METHODOLOGY FOR  

E-print Network

of modular and reusable design pattern (templates) of subtasks. Thus, it is much easier to build (Koulouris, Spanoudakis, and Tsigkritis 2007; Ragone et al. 2008), pervasive computing (Bag¨u´es et al. 2008

Zhang, Minjie

462

Preserve Your Privacy with PCO: A Privacy Sensitive Architecture for Context Obfuscation for Pervasive E-Community Based Applications  

Microsoft Academic Search

Context awareness is just beginning to revolutionize the ways we interact with networked devices. In order for context awareness to flourish, especially in a pervasive environment, users must be certain that their privacy is respected. Privacy in pervasive online community depends on the level of granularity of the provided information, user's relation to possible recipients, and the possible usage of

Farzana Rahman; Ferdaus Ahmed Kawsar; Sheikh Iqbal Ahamed

2010-01-01

463

An IEEE 1394-Firewall-Based Embedded Video System for Surveillance Applications  

Microsoft Academic Search

In order to address the need for portable inexpensive systems for video surveillance, we built a computer vision system that provides digital video data transfer from a CCD camera using embedded software\\/hardware via the IEEE 1394 protocol, also known as FireWire or i.Link, and Ethernet TCP\\/IP interfaces. Controlled by an extended version of the IEEE 1394-based digital camera specification (DCAM),

Ashraf Saad; Donnie Smith

2003-01-01

464

Proceedings of the 12th IEEE International Conference on Computer Communications and Networks, ICCCN 2003, Dallas, Texas, October 2003, pp.311-318.  

E-print Network

are weighted against their general advantage, these approaches do not seem to be gaining any acceptance. Zaghal Networking and Media Communications Research Laboratories Department of Computer Science, Kent

Khan, Javed I.

465

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 20, NO. 12, DECEMBER 1998 1371 Real-Time American Sign Language  

E-print Network

, Student Member, IEEE, Joshua Weaver, and Alex Pentland, Member, IEEE Computer Society Abstract--We present training through Baum-Welch re-estimation was uncommon. Results were not reported with the standard accuracy measures accepted in the speech- and handwriting-recognition communities, and training and testing

Collins, Robert T.

466

1248 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS--PART A: SYSTEMS AND HUMANS, VOL. 38, NO. 6, NOVEMBER 2008 A HumanComputer Interface Using Symmetry  

E-print Network

-grade computer with video input from an inexpensive Universal Serial Bus camera and works without special lighting. The system detects and tracks the person's face using multiscale template correlation a practical tool for people with severe paralysis. Index Terms--Assistive technology, disabled computer users

Betke, Margrit

467

In: Proceedings of the IEEE Real-Time Technology and Applications Symposium, Chicago, IL, May 1995, pp. 4-14. SUPPORT FOR REAL-TIME COMPUTING WITHIN GENERAL  

E-print Network

, pp. 4-14. SUPPORT FOR REAL-TIME COMPUTING WITHIN GENERAL PURPOSE OPERATING SYSTEMS Supporting Co operating system and a predictable real-time ker- nel, to co-exist on the same hardware. We discuss for real-time computing beyond allowing tasks to manipulate their exe- cution priority. Operating systems

Jeffay, Kevin

468

Appears in IEEE Transactions on Parallel and Distributed Systems, Volume 4(8), August 1993. The Scalability of FFT on Parallel Computers #  

E-print Network

. The Scalability of FFT on Parallel Computers # Anshul Gupta and Vipin Kumar Department of Computer Science, University of Minnesota Minneapolis, MN ­ 55455 agupta@cs.umn.edu kumar@cs.umn.edu TR 90­53, October 1990­Tukey FFT algorithm on a few classes of architectures, the methodology can be used to study the performance

Kumar, Vipin

469

Evidence-based Nursing Care Support enhanced by Minimally Privacy Invasive and Pervasive Sensing Technology  

Microsoft Academic Search

This paper introduces a system for nursing homes, where daily activities of elderly persons are monitored by pervasive sensors. In this system, the sensors detect and save position of an elderly person as his life log and these logs are analyzed for obtaining the evidence of his activities of daily living. The collected evidence enables caregivers to provide effective support

Toshio Hori; Yoshifumi Nishida; Shin'ichi Murakami

2006-01-01

470

iGrocer-A Ubiquitous and Pervasive Smart Grocery Shopping System  

E-print Network

iGrocer- A Ubiquitous and Pervasive Smart Grocery Shopping System Sangeetha Shekar, Prashant Nair dimension to the way we shop, bank, and go about many of our everyday activities. iGrocer is a smart grocery shopping assistant, that re-defines grocery shopping. It is capable of maintaining nutrition profiles

Helal, Abdelsalam

471

The most pervasive systematic joints hosted by Devonian black shale of the Appa-  

E-print Network

of natural gas. Production from black shale relies, in part, on the successful stimulation of naturalABSTRACT The most pervasive systematic joints hosted by Devonian black shale of the Appa- lachian equivalent black shale of the distal, shallower region of the delta to the west, 25% of the joint inter

Engelder, Terry

472

Mental Development and Autistic Behavior in Children with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

The aim of this study was to clarify the features of mental development and autistic behavior in children with pervasive developmental disorders (PDD) from the viewpoint of remedial therapy. The Tokyo Child Development Schedule (TCDS) and the Tokyo Autistic Behavior Scale (TABS), designed to be completed by children's caregivers, were used. A

Suzuki, Mayo

2011-01-01

473

iCapture: Facilitating Spontaneous User-Interaction with Pervasive Displays using Smart Devices  

Microsoft Academic Search

The eCampus project at Lancaster University is an inter-disciplinary project aiming to deploy a wide range of situated displays across the University campus in order to create a large per- vasive communications infrastructure. At present, we are conducting a series of parallel research activities in order to investigate how the pervasive communications infrastructure can support the daily needs of staff,

Keith Mitchell; Nicholas J. P. Race; Michael Suggitt

474

Brief Report: Prevalence of Pervasive Developmental Disorder in Brazil--A Pilot Study  

ERIC Educational Resources Information Center

This pilot study presents preliminary results concerning the prevalence of Pervasive Developmental Disorder (PDD) in South America. It was a three-phase study conducted in a typical town in Southeast Brazil. Case definition was based in a combination of standardized instruments and clinical evaluations by experts. The prevalence of PDD was

Paula, Cristiane S.; Ribeiro, Sabrina H.; Fombonne, Eric; Mercadante, Marcos T.

2011-01-01

475

Timing of Social Gaze Behavior in Children with a Pervasive Developmental Disorder.  

ERIC Educational Resources Information Center

A study found that 13 low-functioning children (ages 3-7) with pervasive developmental disorder (PDD) showed fewer social initiatives than 19 high-functioning children with PDD, 19 children with language disorders, and 19 controls. Higher-functioning children with PDD differed from non-PDD controls in levels of visual checking and of returning

Willemsen-Swinkels, Sophie H. N.; Buitelaar, Jan K.; Weijnen, Florence G.; van Engeland, Herman

1998-01-01

476

OO Petri Net based Business Rule modeling of intelligent taxation system in pervasive environment  

Microsoft Academic Search

In the pervasive environment, intelligent taxation systems are required to be adaptive to the changing environment and the volatile requirements of taxation rules. The business rule technique is effective in achieving these kinds of adaptation. In this paper, we present an OO Petri Net based Business Rule modeling method of Intelligent Taxation System. And the structure and grammar rules of

Jinjiao Lin; Haitao Pu; Lizhen Cui

2010-01-01

477

Prevalence of Gastrointestinal Disorders in Adult Clients with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

Background: In clients with pervasive developmental disorders (PDD), some authors have noticed the presence of gastrointestinal disorders and behavioural disorders. An augmented prevalence of different histological anomalies has also been reported. The aim of our study is to highlight the prevalence of gastrointestinal disorders in this adult with

Galli-Carminati, G.; Chauvet, I.; Deriaz, N.

2006-01-01

478

Pervasive Sharing of Genetic Effects in Autoimmune Chris Cotsapas1,2,3,4,5.  

E-print Network

Pervasive Sharing of Genetic Effects in Autoimmune Disease Chris Cotsapas1,2,3,4,5. , Benjamin F between common single nucleotide polymorphisms (SNPs) and risk of common autoimmune and inflammatory (immune-mediated) diseases, some of which are shared between two diseases. Along with epidemiological

Abecasis, Goncalo

479

Mobile iTV: new challenges for the design of pervasive multimedia systems  

Microsoft Academic Search

This SIG will stimulate informal debate around the futures of interfaces for pervasive multimedia systems such as mobile and ubiquitous iTV with special attention to the new contextual usage of this media in entertainment, work and government contexts.It aims to create a provocative framework to uncover future usage scenarios and generate debate about novel processes for creation, sharing, and consumption

Anxo Cereijo Roibs; David Geerts; Licia Calvi; Akseli Anttila; Owen Daly-jones

2006-01-01

480

Pervasive and Mobile Information Systems UDMS Stuttgart -October 2007 Pr. R. Laurini  

E-print Network

Internet and VoIP phone access, gaming, and network connectivity for consumer electronics delivery · Police · Monitoring (children, animals, etc.) · m-commerce · m-auctions · Outdoor games such as televisions, DVD players, and digital cameras Free WIFI hotspot #12;Pervasive and Mobile Information Systems

Laurini, Robert

481

Brief Report: Pervasive Developmental Disorder Can Evolve into ADHD--Case Illustrations  

ERIC Educational Resources Information Center

Despite prominent attentional symptoms in Pervasive Developmental Disorders (PDD) the relationship between PDD and Attention Deficit Hyperactivity Disorder (ADHD) has received little direct examination. In addition, outcome studies of children with PDD often focus on language, educational placement, or adaptive skills, but seldom on loss of the

Fein, Deborah; Dixon, Pamela; Paul, Jennifer; Levin, Harriet

2005-01-01

482

Regression of Language and Non-Language Skills in Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

Background: As part of the pervasive developmental disorders (PDD), there is a subgroup of individuals reported to have a different onset of symptom appearance consisting of an apparently normal early development, followed by a loss of verbal and/or non-verbal skills prior to 2 years of age. This study aims at comparing the symptomatology of

Meilleur, A. -A. S.; Fombonne, E.

2009-01-01

483

Providing QoS in ontology centered context aware pervasive systems  

Microsoft Academic Search

There has been significant research in adapting the Semantic Web technologies to create flexible context aware pervasive systems to enhance fields such as assisted living or smart environments. Several ontology based techniques have been proposed to simplify modeling knowledge and its relationships, and several ontology centered middleware tools are currently being developed to provide flexible and viable solutions for application

Roman Arora; Vangelis Metsis; Rong Zhang; Fillia Makedon

2009-01-01

484

On Facebook, Most Ties are Weak The emergence of pervasive socio-technical networks brings new  

E-print Network

On Facebook, Most Ties are Weak Abstract The emergence of pervasive socio-technical networks brings's theory can be extended to online social networks like Facebook, suggesting to use interaction data requires knowledge of the topology of the social network, e.g., who is friend with whom on Facebook. Our

Ferrara, Emilio

485

'All That Glitters Is Not Gold': Misdiagnosis of Psychosis in Pervasive Developmental Disorders - A Case Series  

Microsoft Academic Search

The early literature established the validity of the distinction between early onset schizophrenia and autism. In the modern context of increasing recognition of pervasive developmental disorders (PDD) and a growing interest in very early onset schizophrenia and other childhood onset psychoses, this clinical distinction is often difficult to make. This article looks at problems arising from overdiagnos- ing psychosis in

DAVID R. D OSSETOR

486

Facial electromyographicresponses to emotional information from faces and voices in individuals with Pervasive Developmental Disorder  

Microsoft Academic Search

Background: Despite extensive research, it is still debated whether impairments in social skills of individuals with pervasive developmental disorder (PDD) are related to specific deficits in the early processing of emotional information. We aimed to test both automatic processing of facial affect as well as the integration of auditory and visual emotion cues in individuals with PDD. Methods: In a

Maurice J. C. M. Magne; Beatrice de Gelder; Herman van Engeland; Chantal Kemner

2007-01-01

487

An Adaptive Architecture for Context-Aware Interaction in Pervasive Applications  

E-print Network

An Adaptive Architecture for Context-Aware Interaction in Pervasive Applications Alan Colman, Minh Tran, Jun Han Centre for Information Technology Research (CITR) Swinburne University of Technology Melbourne, Victoria, Australia {acolman, mtran, jhan}@ict.swin.edu.au Abstract Adaptation is one of the key

Han, Jun

488

Gastrointestinal Symptoms in a Sample of Children with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

Objective: To evaluate gastrointestinal (GI) problems in a large, well-characterized sample of children with pervasive developmental disorders (PDDs). Methods: One hundred seventy two children entering one of two trials conducted by the Research Units on Pediatric Psychopharmacology (RUPP) Autism Network were assessed comprehensively prior to

Nikolov, Roumen N.; Bearss, Karen E.; Lettinga, Jelle; Erickson, Craig; Rodowski, Maria; Aman, Michael G.; McCracken, James T.; McDougle, Christopher J.; Tierney, Elaine; Vitiello, Benedetto; Arnold, L. Eugene; Shah, Bhavik; Posey, David J.; Ritz, Louise; Scahill, Lawrence

2009-01-01

489

Pervasive Developmental Disorder: Client-Centered Approach. A Guide for Parents and Teachers.  

ERIC Educational Resources Information Center

This guide to pervasive developmental disorder (PDD) or autistic spectrum disorder (ASD) first provides a review of the literature on defining characteristics of PDD/ASD, causes of PDD, and diagnosis of PDD. Review of intervention and treatment comprises the major portion of the paper. After briefly considering parent education, this section

Stewart, Bonnie C.

490

Validation of an Interview-Based Rating Scale Developed in Japan for Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

The pervasive developmental disorders (PDDs) Autism Society Japan Rating Scale (PARS), an interview-based instrument for evaluating PDDs, has been developed in Japan with the aim of providing a method that (1) can be used to evaluate PDD symptoms and related support needs and (2) is simpler and easier than the currently used "gold standard"

Ito, Hiroyuki; Tani, Iori; Yukihiro, Ryoji; Adachi, Jun; Hara, Koichi; Ogasawara, Megumi; Inoue, Masahiko; Kamio, Yoko; Nakamura, Kazuhiko; Uchiyama, Tokio; Ichikawa, Hironobu; Sugiyama, Toshiro; Hagiwara, Taku; Tsujii, Masatsugu

2012-01-01

491

Children and Adolescents with Pervasive Developmental Disorders: The Role of a Crisis Service  

Microsoft Academic Search

This paper discusses the role that a crisis service may play in serving children and adolescents with pervasive developmental disorders. At Youthdale Treatment Centres, we operate a 10-bed, inpatient, emergency secure treatment unit under the Child and Family Service Act. Although few are referred, children and adolescents with autistic spectrum disorders may be admitted to this unit provided they meet

Susan D. Sweet

492

Brief Report: Representational Momentum for Dynamic Facial Expressions in Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

Individuals with pervasive developmental disorder (PDD) have difficulty with social communication via emotional facial expressions, but behavioral studies involving static images have reported inconsistent findings about emotion recognition. We investigated whether dynamic presentation of facial expression would enhance subjective perception of

Uono, Shota; Sato, Wataru; Toichi, Motomi

2010-01-01

493

Designing a Publish-Subscribe Substrate for Privacy/Security in Pervasive Environments  

E-print Network

and information, etc. Appli- cations are also emerging where cell phone companies track users' location to help.iitd.ernet.in Abstract To help explore issues in design of pervasive environ- ments, a sensor network for tracking due to increased interest in use of technologies such as RFID tags for tracking objects, people

Prakash, Atul

494

Using Verbal Scaffolding to Facilitate Conversational Participation and Language Acquisition in Children with Pervasive Developmental Disorders.  

ERIC Educational Resources Information Center

This article describes a discourse-based language intervention strategy in which children with pervasive developmental disorders are taught to make use of prior linguistic context to participate verbally in structured, interactive dialogues. The paper also describes the use of behavioral methodologies, especially milieu therapies, and the need for

Kirchner, Diane M.

1991-01-01

495

Pervasive Parallelism in Data Mining: Dataflow solution to Co-clustering Large and Sparse Netflix Data  

E-print Network

Pervasive Parallelism in Data Mining: Dataflow solution to Co-clustering Large and Sparse Netflix Texas, USA (512) 471-8980 ghosh@ece.utexas.edu ABSTRACT All Netflix Prize algorithms proposed so far implementation of a collabo- rative filtering (CF) solution to the Netflix Prize problem [1] based on weighted co

Ghosh, Joydeep

496

Evaluating outdoor play for children: virtual vs. tangible game objects in pervasive games  

Microsoft Academic Search

In this paper we report a case study where two versions of the same outdoor pervasive game were compared: one featuring a virtual game object and the other with a tangible representation of it. Our aim was to explore the effect on social interaction and physical activity; two characteristics of Head-Up Games. Based on evaluation with 27 children we can

Iris Soute; Maurits Kaptein; Panos Markopoulos

2009-01-01

497

Pervasive Games in a Mote-Enabled Virtual World Using Tuple Space Middleware  

E-print Network

Pervasive Games in a Mote-Enabled Virtual World Using Tuple Space Middleware Luca Mottola to the game plot, e.g., virtual objects. Motes are typically very small in size, and therefore can be hidden, and joysticks to interact with a completely virtual environment. Conversely, a more exciting game experience can

Picco, Gian Pietro

498

Automatic Processing of Emotional Faces in High-Functioning Pervasive Developmental Disorders: An Affective Priming Study  

ERIC Educational Resources Information Center

This study examined automatic processing of emotional faces in individuals with high-functioning Pervasive Developmental Disorders (HFPDD) using an affective priming paradigm. Sixteen participants (HFPDD and matched controls) were presented with happy faces, fearful faces or objects in both subliminal and supraliminal exposure conditions, followed

Kamio, Yoko; Wolf, Julie; Fein, Deborah

2006-01-01

499

Pervasive Developmental Disorder Behavior in Adolescents with Intellectual Disability and Co-Occurring Somatic Chronic Diseases  

ERIC Educational Resources Information Center

Evidence on the association between somatic chronic diseases in ID-adolescents and the full range of pervasive developmental disorder behavior (PDD behavior) is scarce. The aim of the present study is to assess the association between somatic chronic diseases in ID-adolescents and mild PDD behavior. We obtained data on 1044 ID-adolescents, aged

Oeseburg, B.; Groothoff, J. W.; Dijkstra, G. J.; Reijneveld, S. A.; Jansen, D. E. M. C.

2010-01-01

500

Sex Differences in WISC-III Profiles of Children with High-Functioning Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

Using the Japanese version of the Wechsler Intelligence Scale for Children-Third Edition (WISC-III), 26 girls with high-functioning (IQ greater than or equal to 70) pervasive developmental disorders (HFPDD) (mean age, 8.2 years) were compared with 116 boys with HFPDD (mean age, 9.0 years). Compared with the boys, the girls scored significantly

Koyama, Tomonori; Kamio, Yoko; Inada, Naoko; Kurita, Hiroshi

2009-01-01