These are representative sample records from Science.gov related to your search topic.
For comprehensive and current results, perform a real-time search at Science.gov.
1

Sample Title 68 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE  

E-print Network

the right Smart Cars on Smart Roads: An IEEE Intelligent Transportation Systems Society Update Fei-Yue Wang-1268/06/$20.00 © 2006 IEEE Transportation systems play a crit- ical role in virtually all facets of modern life. However technology fields, including pervasive computing. The IEEE Intelligent Transportation Systems Society (www

Yang, Liuqing

2

IEEE Pervasive Computing (Revised) Cardiovascular Monitoring Using Earphones and a Mobile Device  

E-print Network

catastrophes and treatment therapies of chronic disease. Resting heart rate, one of the simplest cardiovascular) for cardiovascular disease [1]. In particular, the association between accelerated resting heart rate and mortalityIEEE Pervasive Computing (Revised) 1 Cardiovascular Monitoring Using Earphones and a Mobile Device

3

Published by the IEEE CS n 1536-1268/11/$26.00 2011 IEEE PERVASIVE computing 13 S M A R T E N E R G Y S Y S T E M S  

E-print Network

Published by the IEEE CS n 1536-1268/11/$26.00 © 2011 IEEE PERVASIVE computing 13 S M A R T E N E R G Y S Y S T E M S S ustainability and stimulating pro- environmental behavior are increas- ingly. Mike Hazas and Adrian Friday Lancaster University James Scott Microsoft Research Look Back before

Hazas, Mike

4

14 PERVASIVE computing Published by the IEEE CS 1536-1268/09/$25.00 2009 Ieee G U E S T E D I T O R S ' I N T R O D U C T I O N  

E-print Network

14 PERVASIVE computing Published by the IEEE CS 1536-1268/09/$25.00 © 2009 Ieee G U E S T E D I T O R S ' I N T R O D U C T I O N T he genesis of a ubiquitously net- worked sensor/actuator infra "nervous system" that extends across places, things, and people. Concurrently, although 3D virtual

5

1536-1268/07/$25.00 2007 IEEE Published by the IEEE Computer Society PERVASIVE computing 39 Underground  

E-print Network

Underground Aesthetics: Rethinking Urban Computing R ecent interest in urban computing grows not least out study of an existing ur- ban mobility site--namely, Lon- don'sUnderground, aes- thetic experiences of the Underground. In parallel with the study, we designed a music

Dourish,Paul

6

14 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 2014 IEEE Wearable Computing  

E-print Network

's capacity limit. The ISWC technical program cov- ered a rich set of topics with oral and poster-awareness, textiles and sensor technologies, eye- wear computing, and interaction. Context Awareness Topics related to better performance than using com- mon statistical features. We also saw the technical program move

Gatica-Perez, Daniel

7

Pervasive computing: vision and challenges  

Microsoft Academic Search

This article discusses the challenges in computer systems research posed by the emerging field of pervasive computing. It first examines the relationship of this new field to its predecessors: distributed systems and mobile computing. It then identifies four new research thrusts: effective use of smart spaces, invisibility, localized scalability, and masking uneven conditioning. Next, it sketches a couple of hypothetical

M. Satyanarayanan

2001-01-01

8

Electronic Textiles: A Platform for Pervasive DIANA MARCULESCU, MEMBER, IEEE, RADU MARCULESCU, MEMBER, IEEE,  

E-print Network

Electronic Textiles: A Platform for Pervasive Computing DIANA MARCULESCU, MEMBER, IEEE, RADU of electronics and textiles into one: electronic textiles, or e-textiles. E-textiles, also called smart fabrics and opportunities for future research. Keywords--Electronic textiles, fault tolerance, low-power design, remote

9

Project Aura: Toward Distraction-Free Pervasive Computing  

NSDL National Science Digital Library

In the April-June 2002 special issue of the IEEE Pervasive Computing journal, a team from Carnegie Mellon University contributed with a discussion of their Project Aura. The project's goal is to increase computing efficiency, particularly in wireless environments, so that "distractions such as poor performance and failures" are minimized. With greater system reliability and fewer distractions, users can make better use of their time and focus on the task at hand. This article describes the specifics of Project Aura, bringing together many areas that are being studied to accomplish the team's goals. The Aura home page gives further insights into research and additional papers.

Garlan, David.; Siewiorek, Daniel P.; Steenkiste, Peter A.

2002-01-01

10

40 PERVASIVE computing Published by the IEEE CS n 1536-1268/13/$31.00 2013 IEEE E d g E o f t h E C l o u d  

E-print Network

computing is well under way. Implicit in this convergence is the assumption that the cloud is easily the different ways in The convergence of mobile computing and cloud computing is predicated on a reliable, high PERVASIVE computing 41 which the cloud can be leveraged to improve mobile computing. Cloud Benefits Mobile

Satyanarayanan, Mahadev "Satya"

11

Architecturing Conflict Handling of Pervasive Computing Resources  

E-print Network

resource conflict handling. Our approach has been implemented and validated on various building automation of areas, including building automation and assisted living. Typically, a pervasive computing environment, and carry out these decisions by orchestrating actuating devices. For example, in building automation

Paris-Sud XI, Université de

12

Will Pervasive Computing be Manageable?  

E-print Network

, people intelligent environment Mobile portable computing devices Wireless communication User View for workstation and mobile device applications Adaptive information display Replicate characteristics of paper + text to speech conversion Gesture recognition WAP phone is not a useable computing device!! Remove

Sloman, Morris

13

Context-Aware Pervasive Computing at Large: Three Example Applications  

E-print Network

: the situation What is a context-aware pervasive computing system? A system that can respond intelligentlyContext-Aware Pervasive Computing at Large: Three Example Applications Seng W. Loke Department;Context-Awareness in Pervasive Computing Started in Schilit's PhD thesis on context-awareness for mobile

Loke, Seng W. - Loke, Seng W.

14

Logistics Management System Design under Pervasive Computing Environment  

Microsoft Academic Search

Pervasive computing as the third mode of computing is being applied in all aspects of life. The paper has given out a new design of logistic by using products and theory of pervasive. Design of modern logistics management system, under using of pervasive computing environment, will make Logistics industry achieve greater efficiency and more relaxed management environment.

Tiening Wang; Nansong Hu

2010-01-01

15

Miniature Software for Large Pervasive Computing Applications  

Microsoft Academic Search

There is a need for new software engineering methods that apply specifically and exclusively to the implementation of real-time code for pervasive computing applications. Applications will consist of hundreds or thousands of tiny process- ing units. While it is expected that model-based tools and aspect-oriented techniques will be used to reason and design the large complex applications, there is currently

David B. Stewart

16

Is cloud computing essential to the future of pervasive services?  

Microsoft Academic Search

Cloud computing is a new paradigm for deploying computing\\/information services, which is based pervasive and on demand access to computing utilities, an abstraction of unlimited computing resources, and a usage-based payment model made users essentially \\

Julie A. McCann; Manish Parashar; Omer Rana; Luca Foschini; Tim Kindberg

2009-01-01

17

Field-based Motion Coordination in Pervasive Computing Scenarios  

Microsoft Academic Search

As computing is becoming pervasive, autonomous computer-based systems are going to be embedded in all everyday objects and in the physical environment. In such a scenario, mobility too, in different forms, will be pervasive. Mobile users, mobile devices, computer-enabled vehicles, as well as mobile software compo- nents, define an open and dynamic networked world that will be the stage of

Marco Mamei; Franco Zambonelli

18

The Augmented Knight's Castle Integrating Mobile and Pervasive Computing  

E-print Network

The Augmented Knight's Castle ­ Integrating Mobile and Pervasive Computing Technologies that are realized in our augmented playset, based on various mobile and pervasive computing technologies. Radio in the playset. Mobile phones and "smart toys" equipped with sensors and RFID readers are introduced

19

The SOUPA Ontology for Pervasive Computing  

Microsoft Academic Search

This paper describes SOUPA (Standard Ontology for Ubiquitous and Pervasive Applications) and the use of this ontology in building the Context Broker Architecture (CoBrA). CoBrA is a new agent architecture for supporting pervasive context-aware systems in a smart space environment. The SOUPA ontology is expressed using the Web Ontology Language OWL and includes modular component vocabularies to represent intelligent agents

Harry Chen; Tim Finin; Anupam Joshi

20

Visualizing the research on pervasive and ubiquitous computing  

Microsoft Academic Search

The aim of this paper is to identify the research status quo on pervasive and ubiquitous computing via scientometric analysis.\\u000a Information visualization and knowledge domain visualization techniques were adopted to determine how the study of pervasive\\u000a and ubiquitous computing has evolved. A total of 5,914 papers published between 1995 and 2009 were retrieved from the Web\\u000a of Science with a

Rongying Zhao; Ju Wang

2011-01-01

21

Building Efficient Wireless Infrastructures for Pervasive Computing Environments  

ERIC Educational Resources Information Center

Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but

Sheng, Bo

2010-01-01

22

IPv6 MANET: An Essential Technology for Future Pervasive Computing  

Microsoft Academic Search

In the near future, a pervasive computing environment can be expected to be based on the recent progresses and advances in computing and communication technologies. The Next generation (Next-Gen) of mobile communications will include both prestigious infrastructured wireless networks and novel infrastructureless Mobile Adhoc NETworks (MANETs). The special features of MANET bring great opportunities together with severe challenges. With this

J. Gnana Jayanthi; S. Albert Rabara; A. R. Macedo Arokiaraj

2010-01-01

23

The Age of Pervasive Computing? Everything Smart, Everything Connected?  

Microsoft Academic Search

\\u000a Given the continuing technical progress in computing and communication, it seems that we are heading towards an all-encompassing\\u000a use of networks and computing power, a new era commonly termed Pervasive Computing. Its vision is grounded in the firm belief\\u000a amongst the scientific community that Moores Law (i.e. the observation that the computer power available on a chip approximately\\u000a doubles every

Friedemann Mattern

2003-01-01

24

Pervasive Computing and Communication Technologies for U-Learning  

ERIC Educational Resources Information Center

The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or

Park, Young C.

2014-01-01

25

Impress: Towards Next-Generation Ubiquitous and Pervasive Computing Systems  

Microsoft Academic Search

Research in pervasive and ubiquitous computing has resulted in a number of prototype systems developed and implemented in isolation. If this research area is to have impact, the next generation of research prototypes must move beyond single laboratories and isolated, independent software frameworks. Future sys- tems must not only inter-work and inter-operate, but should enable more rapid prototyping and incorporation

James P. Black; Hao Chen

26

Pervasive computing goes the last hundred feet with RFID systems  

Microsoft Academic Search

I examine a class of pervasive computers: radio frequency identification tags. RFID tags turn everyday objects into network nodes that uplink IDs and status data to enterprise databases, storing new information as needed. They literally vanish into commonplace objects, offering efficiencies in handling, location, and condition tracking. However, some people caution that we must implement privacy and security features from

V. Stanford

2003-01-01

27

Pervasive Computing usage for realization conception Smart auditory  

Microsoft Academic Search

Conception of Smart auditory is offered in this article. Approach based on Pervasive Computing and software based on technology UPnP is used for this realization. Practical realization of this conception is considered on the example of information about the curriculum of lessons in a current auditory. This conception allows adding new property to the auditory, namely intellectuality.

U. A. Andriieshyna; M. Y. Ternovoy

2008-01-01

28

Towards pervasive computing in health care A literature review  

PubMed Central

Background The evolving concepts of pervasive computing, ubiquitous computing and ambient intelligence are increasingly influencing health care and medicine. Summarizing published research, this literature review provides an overview of recent developments and implementations of pervasive computing systems in health care. It also highlights some of the experiences reported in deployment processes. Methods There is no clear definition of pervasive computing in the current literature. Thus specific inclusion criteria for selecting articles about relevant systems were developed. Searches were conducted in four scientific databases alongside manual journal searches for the period of 2002 to 2006. Articles included present prototypes, case studies and pilot studies, clinical trials and systems that are already in routine use. Results The searches identified 69 articles describing 67 different systems. In a quantitative analysis, these systems were categorized into project status, health care settings, user groups, improvement aims, and systems features (i.e., component types, data gathering, data transmission, systems functions). The focus is on the types of systems implemented, their frequency of occurrence and their characteristics. Qualitative analyses were performed of deployment issues, such as organizational and personnel issues, privacy and security issues, and financial issues. This paper provides a comprehensive access to the literature of the emerging field by addressing specific topics of application settings, systems features, and deployment experiences. Conclusion Both an overview and an analysis of the literature on a broad and heterogeneous range of systems are provided. Most systems are described in their prototype stages. Deployment issues, such as implications on organization or personnel, privacy concerns, or financial issues are mentioned rarely, though their solution is regarded as decisive in transferring promising systems to a stage of regular operation. There is a need for further research on the deployment of pervasive computing systems, including clinical studies, economic and social analyses, user studies, etc. PMID:18565221

Orwat, Carsten; Graefe, Andreas; Faulwasser, Timm

2008-01-01

29

Students Develop Real-World Web and Pervasive Computing Systems  

Microsoft Academic Search

In the academic year 2001-2, Pace University CSIS students developed real-world Web and pervasive computing systems for actual customers. We describe the general use of team projects in CSIS at Pace University, the real-world projects from this academic year, the benefits of including real-world projects in the curriculum, and their cost in terms of the instructor load and the project

Charles C. Tappert

30

Pervasive computing in the large: socio-technical fabric  

Microsoft Academic Search

Trends in miniaturizing of technology (modern microelectronics, system-on-chip technologies, ultra compact memory systems, Micro-mechanics, Nano-devices) and exponential growth and globalization of communication infrastructures have opened an unexpectedly wide terrain for ICT research in general, and Pervasive Computing in particular. The first generation of ICT aiming towards autonomic systems and their adaptation was driven by the availability of technology to connect

Alois Ferscha

2010-01-01

31

2 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$26.00 2009 IEEE V I R T U A L M A C H I N E S  

E-print Network

that millions of users world- wide experience through BlackBerries, iPhones, Windows Mobile, and other mobile on the other path is an entirely new world in which mobile computing seamlessly augments users' cognitive-rich, mobile computing. Crisp interactive response, which is essential for seamless augmentation of human

Satyanarayanan, Mahadev "Satya"

32

An Architecture-Based Approach for Compute-Intensive Pervasive Systems in Dynamic Environments  

E-print Network

of dynamism in contemporary distributed systems and the convergence of mobile computing with cloud computing challenges and requirements for integrating cloud computing with pervasive systems operating in dynamic computing and smart environments with important applications in environmental, civilian, military, industry

33

A trust-based security system for ubiquitous and pervasive computing environments  

Microsoft Academic Search

Traditionally, authentication and access control based users are the main methods used to provide security for individual computers and small networks. However, now that pervasive computing is encompassing new technologies and attracting more interest, these strategies are inadequate for meeting the special characteristics of ubiquitous and pervasive computing environments because such distributed systems lack central control and have flexible topologies.

Azzedine Boukerche; Yonglin Ren

2008-01-01

34

12 PERVASIVE computing Published by the IEEE CS n 1536-1268/12/$31.00 2012 IEEE G u e s t e d i t o r s ' i n t r o d u c t i o n  

E-print Network

University of Stuttgart #12;APRIL­JUNE 2012 PERVASIVE computing 13 The subsequent articles drill down into specific interface technologies and implementations relevant for per- vasive interaction. "Ultrasonic Dop a simple implementation of ultrasonic Doppler processing to realize an inexpensive motion sensor

35

Data-Centric Middleware for Context-Aware Pervasive Computing Guanling Chen  

E-print Network

if not carefully managed. To minimize user distraction the applications must be aware of and adapt to the situationData-Centric Middleware for Context-Aware Pervasive Computing Guanling Chen , Ming Li , and David and deploying context-aware pervasive-computing applications calls for distributed software infrastructures

Kotz, David

36

Collaborative editing within the pervasive collaborative computing environment  

SciTech Connect

Scientific collaborations are established for a wide variety of tasks for which several communication modes are necessary, including messaging, file-sharing, and collaborative editing. In this position paper, we describe our work on the Pervasive Collaborative Computing Environment (PCCE) which aims to facilitate scientific collaboration within widely distributed environments. The PCCE provides a persistent space in which collaborators can locate each other, exchange messages synchronously and asynchronously and archive conversations. Our current interest is in exploring research and development of shared editing systems with the goal of integrating this technology into the PCCE. We hope to inspire discussion of technology solutions for an integrated approach to synchronous and asynchronous communication and collaborative editing.

Perry, Marcia; Agarwal, Deb

2003-09-11

37

A novel approach to visualize web anomaly attacks inpervasive computing environment  

Microsoft Academic Search

These days, a pervasive computing environment is a rapidly changing trend towards increasingly always-on connected computing\\u000a devices in the convergence environment. In a pervasive computing environment, there are various multimedia web services and\\u000a communications for various devices in order to provide interesting and invaluable information to users. Meanwhile, providing\\u000a a wide variety of the web-based multimedia services and communications may

Bonhyun Koo; Yang Sun Lee; Taeshik Shon

38

Smart Classroom: Bringing Pervasive Computing into Distance Learning  

NASA Astrophysics Data System (ADS)

In recent years, distance learning has increasingly become one of themost important applications on the internet and is being discussed and studied by various universities, institutes and companies. The Web/Internet provides relatively easy ways to publish hyper-linked multimedia content for more audiences. Yet, we find that most of the courseware are simply shifted from textbook to HTML files. However, in ost cases the teacher's live instruction is very important for catching the attention and interest of the students. That's why Real-Time Interactive Virtual Classroom (RTIVC) always plays an indispensable role in distance learning, where teachers nd students located in different places can take part in the class synchronously through certain multimedia communication systems and obtain real-time and mediarich interactions using Pervasive Computing technologies [1]. The Classroom 2000 project [2] at GIT has been devoted to the automated capturing of the classroom experience. Likewise, the Smart Classroom project [3] at our institute is focused on Tele-education. Most currently deployed real-time Tele-education systems are desktop-based, in which the teacher's experience is totally different from teaching in a real classroom.

Shi, Yuanchun; Qin, Weijun; Suo, Yue; Xiao, Xin

39

A Parameter-based Scheme for Service Composition in Pervasive Computing Environment  

E-print Network

computing environment in which each resource is en- capsulated as a pervasive service. Typically, a single the system is deployed. However, this static design limits the possible usage of resources and does not adapt

Zhou, Yuanyuan

40

RFID in Pervasive Computing: State-of-the-art and Outlook  

E-print Network

RFID in Pervasive Computing: State-of-the-art and Outlook George Roussos School of Computer Science Department of Computer Science University of Bath Bath BA2 7AY, UK April 7, 2008 Abstract rfid has already successful technologies in the history of computing. Beyond doubt, rfid is an effective automatic iden

Roussos, George

41

An ontology for context-aware pervasive computing environments  

Microsoft Academic Search

This document describes COBRA-ONT an ontology for supporting pervasive context-aware systems. COBRA-ONT, expressed in the Web Ontology Language OWL, is a collection of ontologies for describing places, agents, events and their associated properties in an intelligent meeting room domain. This ontology is developed as a part of the Context Broker Architecture (CoBrA), a broker-centric agent architecture that provides knowledge sharing,

HARRY CHEN; TIM FININ; ANUPAM JOSHI

2003-01-01

42

A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing  

E-print Network

A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing Sheikh I present a risk- aware trust based secure resource discovery model, RTSRD (Risk-aware Trust Based Secure secure and non-secure discovery of services on adaptive trust. RTSRD also incorporates a risk model

Madiraju, Praveen

43

SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment  

E-print Network

SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing discovery process lightweight and secure. In this paper we present details of the trust and risk models. We]. The concept of human trust is now being used as a tool of ensuring security and protecting user privacy

Madiraju, Praveen

44

An Adaptive Lightweight Trust Reliant Secure Resource Discovery for Pervasive Computing Environments  

Microsoft Academic Search

A secure resource discovery model for devices running in pervasive computing environments has become significant. Due to the constrained nature of these devices, the need for a model that allows discovery and sharing of resources without putting much overhead on the operation of devices is needed. The dependency on fixed powerful machines for ensuring security is not desired and also

Moushumi Sharmin; Shameem Ahmed; Sheikh Iqbal Ahamed

2006-01-01

45

SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment  

Microsoft Academic Search

SSRD is a secure resource discovery model for devices running in a pervasive computing environment. SSRD is based on a lightweight trust model. SSRD+ is an extension of the existing SSRD model. In SSRD+, we enhance the trust model by adding dynamic trust relationship and also specifying behavioral characteristics that determine the level of trust among devices. We also add

Moushumi Sharmin; Sheikh Iqbal Ahamed; Shameem Ahmed; Haifeng Li

2006-01-01

46

Smart Environments: Middleware Building Blocks for Pervasive Network Computing (A Position Paper)  

E-print Network

Smart Environments: Middleware Building Blocks for Pervasive Network Computing (A Position Paper effortless manner. In this position paper, we introduce the notion of a ``smart service'' -- services to form ``smart environments.'' Smart environments present an integrated view of services to the user

Weissman, Jon

47

Mobile Agents for Pervasive Computing Using a Novel Method of Message Passing  

E-print Network

Mobile Agents for Pervasive Computing Using a Novel Method of Message Passing David Levine, Renjith devices throughout an individual's working and living environment. Mobile agents are software entities that can migrate between servers or mobile agent environments of the network accomplishing various tasks

Záruba, Gergely

48

A Taxonomy-Driven Approach to Visually Prototyping Pervasive Computing Applications  

E-print Network

A Taxonomy-Driven Approach to Visually Prototyping Pervasive Computing Applications Zo´e Drey1 environment into a visual pro- gramming language. A taxonomy describes the relevant entities of a given to taxonomical information. We have implemented a visual environment to develop taxonomies and orchestration

Paris-Sud XI, Université de

49

At What Cost Pervasive? A Social Comuting View of Mobile Computing Systems  

Microsoft Academic Search

With the advent of pervasive systems, computers are becoming a larger part of our social lives than ever before. Depending on the design of these systems, they may either promote or inhibit social relationships. We consider four kinds of social relationships: a relationship with the system, system-mediated collaborative relationships, relationships with a community, and interpersonal relationships among co-located persons. In

D. Christopher Dryer; Chris Eisbach; Wendy S. Ark

1999-01-01

50

Pervasive Forensic Analysis Based on Mobile Cloud Computing  

Microsoft Academic Search

Cloud computing has become one of mobile's hottest topics. Moving computing processing and data storage away from mobile devices and into large data centers, mobile applications enable the users to improve productivity, to share data and to collaborate with others. Considering the benefits of mobile cloud computing, the forensic service based on mobile cloud computing could be good solution to

Jooyoung Lee; Dowon Hong

2011-01-01

51

Anatomy of a Graduate Ubiquitous\\/Pervasive Computing Course  

Microsoft Academic Search

This paper presents the author's experience in design- ing and teaching a graduate level Ubiquitous Computing (Ubicomp) course at Arizona State University. It identifies some of the challenges in teaching a Ubicomp course and presents some solutions. This course was designed for stu- dents with no prior exposure to Ubicomp or experience in Human Computer Interaction; and to have minimal

S. K. S. Gupta; Ira A. Fulton

2004-01-01

52

Trust and Mobility Aware Service Provision for Pervasive Computing  

E-print Network

percentage of people already possesses devices such as portable music players and mobile phones satisfactory user experience. The concept of service orientated computing is very useful in wireless envi

Mascolo, Cecilia

53

The Age of Pervasive Computing Everything Smart, Everything Connected?  

E-print Network

(i.e. the observation that the computer power available on a chip approximately doubles every.g. to digitize everything we draw) and clothes. All these devices will be interwoven and connected together

54

An Integrated Contextual Information Service for Pervasive Computing Applications  

E-print Network

to adapt their behavior to match a user's current environment. This research was funded in part by DARPA was provided by Intel. Glenn Judd was supported by a DoD National Defense Science and Engineering Graduate and Peter Steenkiste January 2003 CMU-CS-03-100 School of Computer Science Carnegie Mellon University

55

Delegation, Arbitration and High-Level Service Discovery as Key Elements of a Software Infrastructure for Pervasive Computing  

E-print Network

The dream of pervasive computing is slowly becoming a reality. A number of projects around the world are constantly contributing ideas and solutions that are bound to change the way we interact with our environments and ...

Gajos, Krzysztof

2003-06-01

56

48 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE C O N T E X T -A W A R E C O M P U T I N G  

E-print Network

O N T E X T - A W A R E C O M P U T I N G Context-Aware Artifacts: Two Development Approaches O ne of the most exciting and impor- tant recent developments in con- text-aware computing is to make everyday appliances, devices, and objects context aware. A context- aware artifact uses sensors to perceive

Loke, Seng W. - Loke, Seng W.

57

CloudComputing 24 Published by the IEEE Computer Society 1089-7801/09/$26.00 2009 IEEE IEEE INTERNET COMPUTING  

E-print Network

CloudComputing 24 Published by the IEEE Computer Society 1089-7801/09/$26.00 © 2009 IEEE IEEE of commercial infrastructure providers, a concept known as cloud computing.3 Handling distributed applications to operate on cloud infrastructures, such as Amazon EC2. This article provides an abstract view

Melbourne, University of

58

2010 IEEE Computer Society Student Competition System Competition  

E-print Network

2010 IEEE Computer Society Student Competition System Competition The IEEE Computer Society is launching a new design competition competition because it cuts across traditional boundaries by combining architecture with program design

Kostic, Milivoje M.

59

Introduction to the IEEE Transactions on Cloud Computing  

E-print Network

Introduction to the IEEE Transactions on Cloud Computing Rajkumar Buyya Welcome to the IEEE Transactions on Cloud Computing (TCC). It is my privilege and honor to serve as the inaugural Editor-in-Chief of TCC. I would like to thank the IEEE and the world-wide Cloud Computing community for giving me

Buyya, Rajkumar

60

Applying mobile and pervasive computer technology to enhance coordination of work in a surgical ward.  

PubMed

Collaboration, coordination, and communication are crucial in maintaining an efficient and smooth flow of work in an operating ward. This coordination, however, often comes at a high price in terms of unsuccessfully trying to get hold of people, disturbing telephone calls, looking for people, and unnecessary stress. To accommodate this situation and to increase the quality of work in operating wards, we have designed a set of pervasive computer systems which supports what we call context-mediated communication and awareness. These systems use large interactive displays, video streaming from key locations, tracking systems, and mobile devices to support social awareness and different types of communication modalities relevant to the current context. In this paper we report qualitative data from a one-year deployment of the system in a local hospital. Overall, this study shows that 75% of the participants strongly agreed that these systems had made their work easier. PMID:17911688

Hansen, Thomas Riisgaard; Bardram, Jakob E

2007-01-01

61

Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile Phones  

Microsoft Academic Search

Passive RFID technology and unobtrusive Bluetooth- enabled active tags are means to augment products and everyday objects with information technology invisible to human users. This paper analyzes general interaction pat- terns in such pervasive computing settings where informa- tion about the user's context is derived by a combination of active and passive tags present in the user's environment. The concept

Frank Siegemund; Christian Fler

2003-01-01

62

AccessControl 62 Published by the IEEE Computer Society 1089-7801/11/$26.00 2011 IEEE IEEE INTERNET COMPUTING  

E-print Network

AccessControl 62 Published by the IEEE Computer Society 1089-7801/11/$26.00 © 2011 IEEE IEEE INTERNET COMPUTING A User-Activity-Centric Framework for Access Control in Online Social Networks Jaehong social networks (OSNs) need an effective and usable access control framework. OSN users typically have

Sandhu, Ravi

63

10 Published by the IEEE Computer Society 1089-7801/10/$26.00 2010 IEEE IEEE INTERNET COMPUTING GuestEditors'Introduction  

E-print Network

and technical challenges inherent to this "Internet of Things," of which privacy is the most compelling10 Published by the IEEE Computer Society 1089-7801/10/$26.00 © 2010 IEEE IEEE INTERNET COMPUTING GuestEditors'Introduction Internet Predictions Vinton G. Cerf Google Munindar P. Singh North Carolina

64

Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-based Services  

NASA Astrophysics Data System (ADS)

During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists and science fiction writers. Today this subject has become of interest to business, government, and society. Governmental authorities exercise their power through the networked environment. Credit card databases maintain our credit history and decide whether we are allowed to rent a house or obtain a loan. Mobile telephones can locate us in real time so that we do not miss calls. Within another 10 years, all sorts of devices will be connected through the network. Our fridge, our food, together with our health information, may all be networked for the purpose of maintaining diet and well-being. The Internet will move from being an infrastructure to connect computers, to being an infrastructure to connect everything [2, 3].

Soppera, A.; Burbridge, T.

65

A trust-based secure service discovery (TSSD) model for pervasive computing  

Microsoft Academic Search

To cope with the challenges posed by device capacity and capability, and also the nature of ad hoc networks, a Service discovery model is needed that can resolve security and privacy issues with simple solutions. The use of complex algorithms and powerful fixed infrastructure is infeasible due to the volatile nature of pervasive environment and tiny pervasive devices. In this

Sheikh Iqbal Ahamed; Moushumi Sharmin

2008-01-01

66

Published by the IEEE CS n 1536-1268/08/$25.00 2008 IEEE PERVASIVE computing 13 G u e s t e d i t o r s ' i n t r o d u c t i o n  

E-print Network

t o r s ' i n t r o d u c t i o n T hese days, "hacking" and "hack- ers" are often viewed negatively or criminal intent. However, hacking's older definitions are quite different: interacting with a computer, and even (in many circles) laudatory. Some associate hacking with (usually) harm- less technical stunts

Heidemann, John

67

Wireless Adaptive Therapeutic TeleGaming in a Pervasive Computing Environment  

NASA Astrophysics Data System (ADS)

This chapter introduces a wireless, pervasive computing approach to adaptive therapeutic telegaming considered in the context of near set theory. Near set theory provides a formal basis for observation, comparison and classification of perceptual granules. A perceptual granule is defined by a collection of objects that are graspable by the senses or by the mind. In the proposed pervasive computing approach to telegaming, a handicapped person (e.g., stroke patient with limited hand, finger, arm function) plays a video game by interacting with familiar instrumented objects such as cups, cutlery, soccer balls, nozzles, screw top-lids, spoons, so that the technology that makes therapeutic exercise game-playing possible is largely invisible (Archives of Physical Medicine and Rehabilitation 89:2213-2217, 2008). The basic approach to adaptive learning (AL) in the proposed telegaming environment is ethology-inspired and is quite different from the traditional approach to reinforcement learning. In biologically-inspired learning, organisms learn to achieve some goal by durable modification of behaviours in response to signals from the environment resulting from specific experiences (Animal Behavior, 1995). The term adaptive is used here in an ethological sense, where learning by an organism results from modifying behaviour in response to perceived changes in the environment. To instill adaptivity in a video game, it is assumed that learning by a video game is episodic. During an episode, the behaviour of a player is measured indirectly by tracking the occurrence of gaming events such as a hit or a miss of a target (e.g., hitting a moving ball with a game paddle). An ethogram provides a record of behaviour feature values that provide a basis a functional registry for handicapped players for gaming adaptivity. An important practical application of adaptive gaming is therapeutic rehabilitation exercise carried out in parallel with playing action video games. Enjoyable and engaging interactive gaming will motivate patients to complete the rehabilitation process. Adaptivity is seen as a way to make action games more accessible to those who have physical and cognitive impairments. The telegaming system connects to the internet and implements a feed-and-forward mechanism that transmits gaming session tables after each gaming session to a remote registry accessible to therapists and researchers. The contribution of this chapter is the introduction of a framework for wireless telegaming useful in therapeutic rehabilitation.

Peters, James F.; Szturm, Tony; Borkowski, Maciej; Lockery, Dan; Ramanna, Sheela; Shay, Barbara

68

2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any c  

E-print Network

.ieee.org/web/publications/rights/index.html. MOBILE AND UBIQUITOUS SYSTEMS www.computer.org/pervasive Hacking, Mashing, Gluing: Understanding;46 PERVASIVE computing Published by the IEEE CS 1536-1268/08/$25.00 © 2008 IEEE T H E H A C K I N G T R A D I T I O N Hacking, Mashing, Gluing: Understanding Opportunistic Design Björn Hartmann, Scott Doorley

Pratt, Vaughan

69

Proceedings of the 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'03) 1063-6919/03 $17.00 2003 IEEE  

E-print Network

Proceedings of the 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition on Computer Vision and Pattern Recognition (CVPR'03) 1063-6919/03 $17.00 © 2003 IEEE #12;Proceedings of the 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'03) 1063

Vese, Luminita A.

70

Pervasive sensing  

NASA Astrophysics Data System (ADS)

The coordinated exploitation of modern communication, micro- sensor and computer technologies makes it possible to give global reach to our senses. Web-cameras for vision, web- microphones for hearing and web-'noses' for smelling, plus the abilities to sense many factors we cannot ordinarily perceive, are either available or will be soon. Applications include (1) determination of weather and environmental conditions on dense grids or over large areas, (2) monitoring of energy usage in buildings, (3) sensing the condition of hardware in electrical power distribution and information systems, (4) improving process control and other manufacturing, (5) development of intelligent terrestrial, marine, aeronautical and space transportation systems, (6) managing the continuum of routine security monitoring, diverse crises and military actions, and (7) medicine, notably the monitoring of the physiology and living conditions of individuals. Some of the emerging capabilities, such as the ability to measure remotely the conditions inside of people in real time, raise interesting social concerns centered on privacy issues. Methods for sensor data fusion and designs for human-computer interfaces are both crucial for the full realization of the potential of pervasive sensing. Computer-generated virtual reality, augmented with real-time sensor data, should be an effective means for presenting information from distributed sensors.

Nagel, David J.

2000-11-01

71

Proc. International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2003), Rio de Janeiro, Brazil, 2003. Active Architecture for Pervasive Contextual Services  

E-print Network

requirements to the provision of glob- ally pervasive contextual services is a matching serv- ice capable a correlation of input events and facts that is relevant to a contextual service. For example, these items might be correlated: · user Bob likes ice cream, but only when the weather is hot and when he has spare time to eat

Dunlop, Mark D.

72

The Gator Tech Smart House: A Programmable Pervasive Space  

Microsoft Academic Search

Research groups in both academia and industry have developed prototype systems to demonstrate the benefits of pervasive computing in various application domains. Unfortunately, many first-generation pervasive computing systems lack the ability to evolve as new technologies emerge or as an application domain matures. To address this limitation, the University of Florida's Mobile and Pervasive Computing Laboratory is developing programmable pervasive

Sumi Helal; William C. Mann; Hicham El-zabadani; Jeffrey King; Youssef Kaddoura; Erwin Jansen

2005-01-01

73

SocialComputingintheBlogosphere 30 Published by the IEEE Computer Society 1089-7801/10/$26.00 2010 IEEE IEEE INTERNET COMPUTING  

E-print Network

states that "Nothing in this Act shall be construed as permitting the censorship of the Internet."1-7801/10/$26.00 © 2010 IEEE IEEE INTERNET COMPUTING T he value of any piece of informa- tion depends on its relevance the Malaysian press is tightly controlled, the government has officially encouraged Internet- based enterprises

Kokar, Mieczyslaw M.

74

Editor: Charles Petrie petrie@stanford.edu 2 Published by the IEEE Computer Society 1089-7801/13/$31.00 2013 IEEE IEEE INTERNET COMPUTING  

E-print Network

-7801/13/$31.00 © 2013 IEEE IEEE INTERNET COMPUTING "T he Transportation Security Administration (TSA), the federal that barred employees from accessing web sites containing `controversial opinions.' In July 2010, TSA dropped that ban, most probably because such a broad ban would violate TSA employees' First Amendment rights."1

Petrie, Charles

75

Editor: Charles Petrie petrie@stanford.edu 2 Published by the IEEE Computer Society 1089-7801/14/$31.00 2014 IEEE IEEE INTERNET COMPUTING  

E-print Network

-7801/14/$31.00 © 2014 IEEE IEEE INTERNET COMPUTING N o, I'm not trying to apply the term "Inter- net of Things function, and is carried out by the Internet Assigned Num- bers Authority (IANA). Ok, is this a thing for Internet protocols, some of which include things like MIME types and TCP port numbers. Most importantly

Petrie, Charles

76

Pervasive Healthcare  

Microsoft Academic Search

The US healthcare industry is confronting a number of challenges, including skyrocketing costs, a growing incidence of medical errors, inadequate staffing, and lack of coverage in rural and underserved urban areas. Healthcare workers are under increasing pressure to provide better services to more people using limited financial and human resources. One proposed solution to the current crisis is pervasive healthcare.

Upkar Varshney

2003-01-01

77

Studying the Elusive Experience in Pervasive Games  

ERIC Educational Resources Information Center

Studying pervasive games is inherently difficult and different from studying computer or board games. This article builds upon the experiences of staging and studying several playful pervasive technology prototypes. It discusses the challenges and pitfalls of evaluating pervasive game prototypes and charts methods that have proven useful in

Stenros, Jaakko; Waern, Annika; Montola, Markus

2012-01-01

78

Computational Intelligence and AI in Games: A New IEEE Transactions  

E-print Network

increase in the quality, diversity and pervasiveness of video games. The value of the worldwide computer and video games market is estimated to be $USD25bn annually1 , and is predicted to grow rapidly over to chess and checkers do not work well for Go, and are even less applicable to video games where the state

Lucas, Simon M.

79

Authenticating Pervasive Devices with Human Protocols  

Microsoft Academic Search

Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication resources necessary for most cryptographic authentication schemes. Surprisingly, low-cost pervasive devices like Radio Frequency Identification (RFID) tags share similar capabilities with another weak computing device: people. These similarities motivate the adoption of techniques from human- computer security

Ari Juels; Stephen A. Weis

2005-01-01

80

A Computationally Inexpensive Empirical Model of IEEE 802.11p Radio Shadowing  

E-print Network

A Computationally Inexpensive Empirical Model of IEEE 802.11p Radio Shadowing in Urban Environments.sommer,eckhoff,german,dressler}@informatik.uni-erlangen.de Abstract--We present a realistic, yet computationally inexpen- sive simulation model for IEEE 802.11p radio shadowing in urban environments. Based on real world measurements using IEEE 802.11p/DSRC devices, we

Breu, Ruth

81

Pervasive Computing at Scale: Transforming the State of the Art Diane J. Cook Sajal K. Das  

E-print Network

, smart phones, wireless communications and networking technologies, combined with emerging data mining harvesting, cloud computing, smart phones, behavior modeling, internet of things 1. Introduction The remarkable recent growth in computing power, sensors and embedded devices, smart phones, wireless

Cook, Diane J.

82

Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology  

PubMed Central

EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system. PMID:24917804

Zao, John K.; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodrguez Mndez, Sergio Jos; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping

2014-01-01

83

Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology.  

PubMed

EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system. PMID:24917804

Zao, John K; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodrguez Mndez, Sergio Jos; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping

2014-01-01

84

c 2012 IEEE. 2012 27th Annual ACM/IEEE Symposium on Logic in Computer Science Logics of Dynamical Systems  

E-print Network

Systems (Invited Paper) Andr´e Platzer Computer Science Department Carnegie Mellon University Pittsburghc 2012 IEEE. 2012 27th Annual ACM/IEEE Symposium on Logic in Computer Science Logics of Dynamical, USA aplatzer@cs.cmu.edu Abstract--We study the logic of dynamical systems, that is, logics and proof

Platzer, André

85

TEMPORAL MESSAGE ORDERING IN WIRELESS SENSOR NETWORKS Institute for Pervasive Computing  

E-print Network

Computing ETH Zurich, Switzerland email: roemer@inf.ethz.ch ABSTRACT Wireless sensor networks (WSN capable of limited computation, wireless communication, and sensing. In a wide variety of ap- plication, military sys- tems, and business processes, WSNs are envisioned to fulfill complex monitoring tasks. While

86

iCare Project: Adopting Pervasive and Persuasive Computing for Assisted Cognition  

E-print Network

is an interdisciplinary research effort. Our original team members come from mostly computing background, but have since been extended to cover diverse backgrounds in occupational therapy, psychology, medicine, and nursing

Ouhyoung, Ming

87

IEEE TPDS, MANY-TASK COMPUTING, NOVEMBER 2010 1 Performance Analysis of Cloud Computing  

E-print Network

IEEE TPDS, MANY-TASK COMPUTING, NOVEMBER 2010 1 Performance Analysis of Cloud Computing Services with different needs. Thus, clouds have the potential to provide to their owners the benefits of an economy scientific computing workloads. In this work we analyze the performance of cloud computing services

Iosup, Alexandru

88

Ecological Validity and Pervasiveness in the Evaluation of Ubiquitous Computing Technologies for Health Care  

Microsoft Academic Search

The difficulties associated with the evaluation of ubiquitous computing (Ubicomp) technologies increase in application domains such as hospitals, where human life can be at risk, privacy of personal records is paramount, and labor is costly and highly distributed across space and time. For the last 6 years numerous Ubicomp technologies in support of hospital work have been created and pilot-tested.

Jess Favela; Monica Tentori; Vctor M. Gonzlez

2010-01-01

89

IEEE TRANSACTIONS ON COMPUTERS, VOL. *, NO. *, * * 1 The Reliability Wall for Exascale  

E-print Network

technol- ogy, architecture, power, reliability, programmability, and usability. This research addressesIEEE TRANSACTIONS ON COMPUTERS, VOL. *, NO. *, * * 1 The Reliability Wall for Exascale Supercomputing Xuejun Yang, Member, IEEE, Zhiyuan Wang, Jingling Xue, Senior Member, IEEE, and Yun Zhou Abstract--Reliability

Xue, Jingling

90

Nominee for IEEE Computer Society President-Elect (2016 President)  

E-print Network

and government. Also, I will try to give young people technological dreams. The Computer Society's core by Internet: August 4 - 12:00 noon EDT, October 6, 2014 You will receive an e-mail from IEEE-CS for the voting in creating modern products and services attractive to young and experienced members and potential members

Kasahara, Hironori

91

IEEE TRANSACTIONS ON VISUALIZATION & COMPUTER GRAPHICS 1 Virtualized Traffic  

E-print Network

of traffic sensors (cameras, road sensors, GPS) to the use of mobile phones for car tracking. Inspired visual analysis of actual traffic events (e.g. accidents) based on sensor data. Main Results: Given twoIEEE TRANSACTIONS ON VISUALIZATION & COMPUTER GRAPHICS 1 Virtualized Traffic: Reconstructing

North Carolina at Chapel Hill, University of

92

A framework for evaluating pervasive systems  

Microsoft Academic Search

Purpose A decade and a half after the debut of pervasive computing, a large number of prototypes, applications, and interaction interfaces have emerged. However, there is a lack of consensus about the best approaches to create such systems or how to evaluate them. To address these issues, this paper aims to develop a performance evaluation framework for pervasive computing

Hen-I Yang; Chao Chen; Bessam Abdulrazak; Sumi Helal

2010-01-01

93

A Distributed Resource Furnishing to Offload Resource-Constrained Devices in Cyber Foraging Toward Pervasive Computing  

Microsoft Academic Search

Mobile devices are pursuing the succession of desktop PCs these days. Cyber Foraging is the project that investigated overcoming\\u000a scarce computing resources and reducing the power consumptions of mobile devices. In this paper, we propose a framework for\\u000a remote execution of mobile devices in the way of delivering user data and invoking and manipulating the software of a surrogate\\u000a with

Ja-won Seo; Myong-soon Park

2007-01-01

94

1556-603X/10/$26.002010IEEE FEBRUARY 2011 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE 55 Michael Margaliot  

E-print Network

1556-603X/10/$26.00©2010IEEE FEBRUARY 2011 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE 55 Michael Margaliot Tel Aviv University, Israel Rami Abielmona Larus Technologies, CANADA Emil M. Petriu University, nuclear facilities, emergency services, etc.) [1].When trying to monitor such large geographically

Petriu, Emil M.

95

DTT: A distributed trust toolkit for pervasive systems  

E-print Network

Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around distributed trust management. While such ...

Lagesse, Brent

96

Automatic implementation generation for pervasive applications  

E-print Network

Pervasive computing promises to put computers in almost every corner of our life. Unfortunately, it also promises to make programmers' jobs harder since they cannot know what components are available in the run-time ...

Paluska, Justin Mazzola, 1981-

2004-01-01

97

Towards Pervasive Computing @ NIST  

E-print Network

of embedded and mobile information appliances y PDAs, cell phones, CrossPad, InfoPen... y Over 4 billion Health Care y Smart Hospitals and mobile doctors z Education y Smart classrooms and campuses y More of widely accepted standards for service discovery, APIs, interoperability, pico-cellular wireless networks

98

MAY JUNE 1997 http://computer.org/internet/ IEEE INTERNET COMPUTING COLLABORATING  

E-print Network

56 MAY · JUNE 1997 http://computer.org/internet/ IEEE INTERNET COMPUTING THE COLLABORATING SPIDER COLLABORATION RESOURCES Since this is the collaboration issue, the Spider set out to explore the Web and see what he could find to help him become a better collaborator. WWW Collaboration Projects · union

Filman, Robert E.

99

A research on cloud computing based on IEEE1451  

Microsoft Academic Search

In view of the disadvantages of traditional measurement and control system, this article has proposed a cloud computing based on IEEE1451. It has defined the functions and goal of this system through the analysis of market demands, set up a hierarchical structure model, and established a software structure and application pattern with the combination of C\\/S structure and B\\/S structure.

Jian Wang; Peng Liu

2010-01-01

100

26 IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | NOVEMBER 2011 1556-603X/11/$26.002011IEEE European Centre for Soft Computing, SPAIN  

E-print Network

, European Centre for Soft Computing, SPAIN O. Cordón, European Centre for Soft Computing, SPAIN CITIC-UGR: Research Center on Information and Communication Technologies, University of Granada, 18014 Granada, SPAIN, SPAIN J. Santamaría, University of Granada, SPAIN #12;NOVEMBER 2011 | IEEE COMPUTATIONAL INTELLIGENCE

Granada, Universidad de

101

IEEE TRANSACTIONS ON COMPUTERS 1 Analysis of Backward Congestion Notification  

E-print Network

. Currently, the impacts of delay on the performance of BCN are unidentified. When the speed of Ethernet for Enhanced Ethernet Networks Wanchun Jiang, Fengyuan Ren, Member, IEEE, Chuang Lin, Senior Member, IEEE, Ivan Stojmenovic, Fellow, IEEE, Abstract--At present, companies and standards organizations are enhancing Ethernet

Stojmenovic, Ivan

102

IEEE Communications Magazine September 201224 ver the past few years, cloud computing has rapidly  

E-print Network

IEEE Communications Magazine · September 201224 ver the past few years, cloud computing has rapidly (switches and routers) used in creating cloud computing infrastructure. Cloud computing networks must to be addressed for the long-term success of cloud computing. We kept our scope wider to consider all aspects

Jain, Raj

103

Trust of Medical Devices, Applications, and Users in Pervasive Healthcare  

E-print Network

Trust of Medical Devices, Applications, and Users in Pervasive Healthcare Michael Clifford Computer sources in networks of pervasive healthcare devices, sensors, and applications. Categories and Subject Descriptors J.3 [Life and Medical Sciences]: Health; C.2.0 [Computer­ Communication Networks]: General

Bishop, Matt

104

Trust of Medical Devices, Applications, and Users in Pervasive Healthcare  

E-print Network

Trust of Medical Devices, Applications, and Users in Pervasive Healthcare Michael Clifford Computer sources in networks of pervasive healthcare devices, sensors, and applications. Categories and Subject Descriptors J.3 [Life and Medical Sciences]: Health; C.2.0 [Computer- Communication Networks]: General

Bishop, Matt

105

10 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/07/$25.00 2007 IEEE Psychotherapy  

E-print Network

Ubiquitous Psychotherapy T herapists commonly use cognitive behavioral therapy to treat anxiety, depression the therapist's presence outside the office, Handheld-based tools let therapists customize psychotherapy

Antunes, Pedro

106

Domain Name System 18 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES 1540-7993/09/$26.00 2009 IEEE SEPTEMBER/OCTOBER 2009  

E-print Network

Domain Name System 18 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES 1540-7993/09/$26.00 © 2009 IEEE SEPTEMBER/OCTOBER 2009 T he Domain Name System is the Internet's primary infrastructure component. The DNS translates easy-to-remember Internet destina- tion addresses (URLs) into Internet

107

40 0272-1732/00/$10.00 2000 IEEE Processors designed for computer  

E-print Network

40 0272-1732/00/$10.00 © 2000 IEEE Processors designed for computer entertainment must perform 3D synthesis means the real-time syn- thesis of a computer graphics animation scene that projects a great deal Ohba Teiji Yutaka Toyoshi Okada Masakazu Suzuoki SonyComputer Entertainment TWO VECTOR UNITS EMBEDDED

Moshovos, Andreas

108

IEEE Conf. on Computer Vision and Pattern Recognition, 1998. To appear. Illumination Cones for Recognition  

E-print Network

IEEE Conf. on Computer Vision and Pattern Recognition, 1998. To appear. Illumination Cones Center for Computational Vision and Control Department of Electrical Engineering Yale University New in an ob- ject's appearance. While there has been a great deal of literature in computer vision detailing

Jaffe, Jules

109

2 IEEE TRANSACTIONS ON EDUCATION, VOL. 46, NO. 1, FEBRUARY 2003 Review of Computer Vision Education  

E-print Network

2 IEEE TRANSACTIONS ON EDUCATION, VOL. 46, NO. 1, FEBRUARY 2003 Review of Computer Vision Education vision is becoming a mainstream subject of study in computer science and engineering. With the rapid imaging and vision. The purpose of this paper is to review the status of computer vision education today

Bebis, George

110

A computationally inexpensive empirical model of IEEE 802.11p radio shadowing in urban environments  

Microsoft Academic Search

We present a realistic, yet computationally inexpen- sive simulation model for IEEE 802.11p radio shadowing in urban environments. Based on real world measurements using IEEE 802.11p\\/DSRC devices, we estimated the effect that buildings and other obstacles have on the radio communication between vehicles. Especially for evaluating safety applications in the field of Vehicular Ad Hoc Networks (VANETs), stochastic models are

Christoph Sommer; David Eckhoff; Reinhard German; Falko Dressler

2011-01-01

111

50 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 2012 IEEE COVER FEATURE  

E-print Network

, and advertisements. Space multipl However, for advertising-based public display networks to become truly pervasive, using all available with informative content. WHY ADVERTISING? Advertising performs a vital function in society by con- veying

112

IEEE Computer Society Task Force on Cluster Computing  

NSDL National Science Digital Library

The TFCC is an international forum promoting cluster computing research and education. It participates in helping to set up and promote technical standards in this area. The Task Force is concerned with issues related to the design, analysis, development and implementation of cluster-based systems. Of particular interest are: cluster hardware technologies, distributed environments, application tools and utilities, as well as the development and optimisation of cluster-based applications.

113

A Framework for Safe Composition of Heterogeneous SOA Services in a Pervasive Computing Environment with Resource Constraints  

ERIC Educational Resources Information Center

The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.

Reyes Alamo, Jose M.

2010-01-01

114

OBCOM2006 INT'L CONFERENCE ON MOBILE, UBIQUITOUS & PERVASIVE COMPUTING Information and Communication Technologies (ICT) are critical to  

E-print Network

and Communication Technologies (ICT) are critical to India's future and underpin realization of the Vision 2020. It is essential that ICT sector meet the rise in demand for health and social care and to modernize services. In this context, use of mobile computing and communication is the key success factor for us in the global race

Melbourne, University of

115

2012 IEEE 4th International Conference on Cloud Computing Technology and Science 978-1-4673-4510-1/12/$31.00 2012 IEEE  

E-print Network

2012 IEEE 4th International Conference on Cloud Computing Technology and Science 978Reduce applications that couples cloud computing with distributed embedded computing. Specifically, our system as Cloud services. These large- scale centers provide all sorts of computational services to a multiplicity

Hone, James

116

Cloud Computing: A Digital Libraries Perspective (To appear in IEEE Cloud 2010)  

E-print Network

Cloud Computing: A Digital Libraries Perspective (To appear in IEEE Cloud 2010) Pradeep TeregowdaSeerx provides autonomous ci- tation indexing, full text indexing, and extensive document metadata from documents virtualization and cloud computing are particularly attractive choices for CiteSeerx , which is challenged

Urgaonkar, Bhuvan

117

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Fracturing Rigid Materials  

E-print Network

to fracturing (and denting) brittle materials. To avoid the computational burden imposed by the stringent timeIEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Fracturing Rigid Materials Zhaosheng Bao mesh upon which finite element analysis can be carried out to provide a stress map for fracture

Fedkiw, Ron

118

Personal Pervasive Environments: Practice and Experience  

PubMed Central

In this paper we present our experience designing and developing two different systems to enable personal pervasive computing environments, Plan B and the Octopus. These systems were fully implemented and have been used on a daily basis for years. Both are based on synthetic (virtual) file system interfaces and provide mechanisms to adapt to changes in the context and reconfigure the system to support pervasive applications. We also present the main differences between them, focusing on architectural and reconfiguration aspects. Finally, we analyze the pitfalls and successes of both systems and review the lessons we learned while designing, developing, and using them. PMID:22969340

Ballesteros, Francisco J.; Guardiola, Gorka; Soriano, Enrique

2012-01-01

119

2012 IEEE 4th International Conference on Cloud Computing Technology and Science 978-1-4673-4510-1/12/$31.00 2012 IEEE  

E-print Network

2012 IEEE 4th International Conference on Cloud Computing Technology and Science 978 the use of distributed computing infrastructures such as Grids and Clouds, equipped with GPUs, in order. Keywords-component; Distributed and parallel computing, Grid, Cloud, GPU, OpenCL, machine learning

Paris-Sud XI, Université de

120

IEEE TRANSACTIONS ON COMPUTERS, VOL. C-31, NO. 5, MAY 1982 The Extra Stage Cube: A Fault-Tolerant  

E-print Network

IEEE TRANSACTIONS ON COMPUTERS, VOL. C-31, NO. 5, MAY 1982 The Extra Stage Cube: A Fault, IEEE Abstract-The Extra Stage Cube (ESC) interconnection network, a fault-tolerant structure and a bypass capability for two stages. It is shown that the ESC provides fault tolerance for any single

121

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. X, NO. Y, MONTH YEAR PREPRINT 1 Analyzing Locomotion Synthesis with  

E-print Network

Analyzing Locomotion Synthesis with Feature-Based Motion Graphs Mentar Mahmudi, Student Member, IEEE and Marcelo Kallmann, Member, IEEE Abstract--We propose feature-based motion graphs for realistic locomotion improvements in comparison to traditional motion graph techniques. Index Terms--Computer Animation, Locomotion

Kallmann, Marcelo

122

IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. X, NO. X, MONTH 201X 1 Monetary Cost-Aware Checkpointing and  

E-print Network

-Aware Checkpointing and Migration on Amazon Cloud Spot Instances Sangho Yi, Member, IEEE, Artur Andrzejak, and Derrick Kondo, Member, IEEE Abstract--Recently introduced spot instances in the Amazon Elastic Compute Cloud (EC with different pricing models for cost-cutting, resource- hungry users. Second, prices can differ dynamically (as

Kondo, Derrick

123

Towards an Indoor Location System Using RF Signal Strength in IEEE 802.11 Networks  

Microsoft Academic Search

Location is one of the most important contexts used in pervasive computing environments. GPS systems are intensely used to detect the location information; they mainly work in outdoor environment. Applications call for precise, easy-to-build, and easy-to-use indoor location systems. This paper presents our work to implement an indoor location determination system for Microsoft-Windows-based platforms using a preexisting IEEE 802.11 wireless

Adam Harder; Lanlan Song; Yu Wang

2005-01-01

124

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Exploring Connectivity of the Brain's White Matter  

E-print Network

these white matter connections in human brains. Knowledge about these white matter connections should enhance our understanding of normal brain function. Such knowledge should also help diagnose certainIEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Exploring Connectivity of the Brain

Stanford University

125

0018-9162/03/$17.00 2003 IEEE68 Computer Domain-Specific  

E-print Network

is worthless if a hacker can disassemble the card and retrieve sensitive data by observing its power. SECURITY PYRAMID The pyramid in Figure 2 represents the security design domain using the 3G mobile phone by the IEEE Computer Society #12;The pyramid's top level considers an end-to-end model of the main parties

Verbauwhede, Ingrid

126

Robustness Testing of Java Server Applications Chen Fu, Ana Milanova, Member, IEEE Computer Society,  

E-print Network

Robustness Testing of Java Server Applications Chen Fu, Ana Milanova, Member, IEEE Computer Society for white-box coverage testing of error recovery code (i.e., exception handlers) of server applications-generated instrumentation to guide the fault injection and to record the recovery code exercised. (An injected fault

Milanova, Ana

127

Appeared in Proc. of IEEE Computer Animation and Social Agents (CASA) 2004 Automatic Dynamic Expression Synthesis  

E-print Network

Appeared in Proc. of IEEE Computer Animation and Social Agents (CASA) 2004 Automatic Dynamic Expression Synthesis For Speech Animation Zhigang Deng Dept. of CS zdeng@usc.edu Murtaza Bulut Dept. of EE://graphics.usc.edu Abstract Although a large amount of research has been done in speech animation, both 2D and 3D, one

Shahabi, Cyrus

128

IEEE TRANSACTIONS ON SERVICES COMPUTING, 201X 1 Spot Transit: Cheaper Internet Transit  

E-print Network

IEEE TRANSACTIONS ON SERVICES COMPUTING, 201X 1 Spot Transit: Cheaper Internet Transit for Elastic Internet transit market, where transit is sold using the under-utilized backbone capacity at a lower price. The providers can improve profit by capitalizing the perishable capacity, and customers can buy transit

Li, Baochun

129

Proc. IEEE Int. Conference on Computational Photography (ICCP) 2011 Multiscale Ultrawide Foveated Video Extrapolation  

E-print Network

Proc. IEEE Int. Conference on Computational Photography (ICCP) 2011 Multiscale Ultrawide Foveated reduction using foveated video extrapolation, but fails to preserve the structure of the scene. This paper introduces a multi-scale method which combines a coarse to fine approach with foveated video ex- trapolation

Schechner, Yoav Yosef

130

What is the role GIS could play in the future pervasive semantic grid service environment?  

NASA Astrophysics Data System (ADS)

Adopting the Web Service, Grid Computing and Semantic Web technologies, Geographic Information System (GIS) have got newly development in recent years. We first present the state of art of such technologies and their applying in GIS. Then we introduced the Pervasive Computing vision and analyses the possible way merging Semantic Grid Service and Pervasive computing, forming we called Pervasive Semantic Grid Service(PSGS). To help archive the Pervasive vision, we introduced the Geographic Overlaying Grid to mediate the pervasive devices and the beneath infrastructure. After that, we put the vision forward to see how GIS would influence our daily life in the future pervasive environment. We compared the concept of Digital Earth raised 8 years age and the Pervasive environment with Geographic Overlaying Grid and showed the difference between them. Finally, we point out that GIS can be "tick point" between the cyber space and the real physical space, helping people find their way "return" to real world from virtual cyber world.

Yin, Dafei; Fang, Yu

2006-10-01

131

Authentication protocols in pervasive computing  

E-print Network

for passwords as in Blue- tooth, shared secrets or trusted parties, which are often too complex and expensive rates or public keys) over some medium (e.g. WiFi) and then display a short and non-secret digest

Jeavons, Peter

132

IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. XX, NO. X, XXXX 1 Cloud Federations in the Sky: Formation Game  

E-print Network

IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. XX, NO. X, XXXX 1 Cloud Federations in the Sky federation, virtual machine, game theory. 1 INTRODUCTION CLOUDS are large-scale distributed computing sys (VM) instances. Cloud computing systems' ability to provide on de- mand access to always-on computing

Grosu, Daniel

133

74 Published by the IEEE Computer Society 1089-7801/09/$26.00 2009 IEEE IEEE INTERNET COMPUTING InternetofThingsTrack  

E-print Network

to the real world is the Internet of Things,2 which connects such resources with everyday objects's based on the Internet of Things and its technologies. Their framework for integrating Web services-Essen Heinrich Hu?mann University of Munich Perci: Pervasive Service Interaction with the Internet of Things #12

134

76 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 2014 IEEE Smartphones Editor: Roy Want n Google n roywant@acm.org  

E-print Network

. The reality is that it's hard to make a better battery that's both high capacity and safe. In fact, even Li-ion by either increas- ing the energy capacity of the phone's battery, or reducing its average power consumption. Improving Battery Technology Over the last 30 years, recharge- able battery energy capacities have increased

Cortes, Corinna

135

Published by the IEEE CS 1536-1268/12/$31.00 2012 IEEE PERVASIVE computing 7 Smartphones Editor: Roy Want Google roywant@acm.org  

E-print Network

wars of the desktop era are being revisited, with Apple's iOS and Google's Android leading the charge: Roy Want Google roywant@acm.org As smartphones get smarter by uti- lizing new intelligence-based sensing applications, such as the CenceMe app.1 CenceMe implements classifiers directly on the phone

Campbell, Andrew T.

136

Trustworthiness of Pervasive Healthcare Folders  

E-print Network

Chapter IX Trustworthiness of Pervasive Healthcare Folders Tristan Allard University of Versailles with the objective to increase the quality of care while decreasing its cost. Pervasive healthcare aims itself at making healthcare information securely available anywhere and anytime, even in disconnected environments

Paris-Sud XI, Université de

137

Player Feedback Evaluation: Indicating Mass Public Potential for Pervasive Games  

Microsoft Academic Search

Player feedback data was collected for the pervasive game Meet Your Heartbeat Twin, an event-type LBS (Location-Based Service)\\u000a game including affective computing through the players live heartbeats. Correlation analysis of the data demonstrates broad\\u000a client profile for pervasive games, covering age, gender and hobbies. The data also shows that Urban Games are clearly a novel\\u000a experience; they are not an

Ivo Flammer; Chen Yan; Wolf Ka; August Flammer; Jean-paul Cheung; Romain Pellerin

2009-01-01

138

292 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 3, MARCH 1997 Parallel Computer Vision  

E-print Network

Computer Vision on a Reconfigurable Multiprocessor Network Suchendra M. Bhandarkar, Member, IEEE Computer suited for a number of problems in low- and intermediate-level computer vision such as the FFT, edge-level vision algorithms on a transputer- based prototype are presented. Index Terms--Reconfigurable multiring

Bhandarkar, Suchendra "Suchi" M.

139

IEEE Benelux EMBS Symposium December 6-7, 2007 ON THE DEVELOPMENT OF A BRAIN-COMPUTER INTERFACE  

E-print Network

IEEE Benelux EMBS Symposium December 6-7, 2007 ON THE DEVELOPMENT OF A BRAIN-COMPUTER INTERFACE University Nijmegen, The Netherlands Abstract This work describes a brain-computer interface (BCI) system Centre for Cognitive Neuroimaging at Radboud University Nijmegen. 1 Introduction A brain-computer

Heskes, Tom

140

Vigil : Providing Trust for Enhanced Security in Pervasive Systems  

Microsoft Academic Search

Computing today is moving away from the desktop, becoming diffused into our surroundings and onto our personal digital devices. Moreover, ad-hoc networks such as Bluetooth provide for spontaneous connec- tivity between computationally enabled devices within proximity to each other. In such pervasive computing environments, users expect to access resources and services at any time from anywhere. This expectation results in

Lalana Kagal; Jeffrey Undercoffer; Filip Perich; Anupam Joshi; Tim Finin; Yelena Yesha

2002-01-01

141

IEEE TRANSACTIONS ON VISUALIZATION & COMPUTER GRAPHICS 1 A Deformable Surface Model for  

E-print Network

simulation ! 1 INTRODUCTION Water drops appear everywhere in our daily life, from wall panels when we take-Time Water Drop Animation Yizhong Zhang, Student Member, IEEE, Huamin Wang, Member, IEEE Shuai Wang, Member, IEEE, Yiying Tong, Member, IEEE, and Kun Zhou, Member, IEEE Abstract--A water drop behaves differently

142

Cabot: On the Ontology for the Middleware Support of Context-Aware Pervasive Applications  

Microsoft Academic Search

\\u000a Middleware support is a major topic in pervasive computing. Existing studies mainly address the issues in the organization\\u000a of and the collaboration amongst devices and services, but pay little attention to the design support of context-aware pervasive\\u000a applications. Most of these applications are required to be adaptable to dynamic environments and self-managed. However, most\\u000a context-aware pervasive applications nowadays have to

Chang Xu; Shing-chi Cheung; Cindy Lo; K. C. Leung; Jun Wei

2004-01-01

143

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. XX, NO. Y, MONTH 1998 1 Modeling of Ship Trajectory in Collision  

E-print Network

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. XX, NO. Y, MONTH 1998 1 Modeling of Ship and other moving ships, the problem of avoiding collisions is reduced to a dynamic optimiza- tion task system. This new extension of EP/N computes a safe-optimum path of a ship in given static and dy- namic

Michalewicz, Zbigniew

144

IEEE/ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS 1 F 2 Dock: Fast Fourier ProteinProtein Docking  

E-print Network

IEEE/ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS 1 F 2 Dock: Fast Fourier Protein­Protein this protein­protein docking code F 2 Dock (F 2 = Fast Fourier) . We have calibrated F 2 Dock based­ranking docking solutions based on desolvation energy . Index Terms---Computational Structural Biology, Protein­Protein

Chowdhury, Rezaul A.

145

IEEE Transactions on Computational Intelligence and AI in Games (Special Issue on Brain/Neuronal-Computer Games Interfaces and Interaction), 2013, in press.  

E-print Network

, the broader use of the P300 BCI in BCI-controlled video games is recommended. Index Terms--Brain computer [4], [5]. BCI-controlled games (primarily video games) constitute an area that may meet the interestsIEEE Transactions on Computational Intelligence and AI in Games (Special Issue on Brain

Kaplan, Alexander

146

IEEE INTERNET COMPUTING 1089-7801/05/$20.00 2005 IEEE Published by the IEEE Computer Society NOVEMBER DECEMBER 2005 65 Service-OrientedComputingTrack  

E-print Network

services in e-commerce transactions; the aggregation of hotel, car rental, and airline services by Expedia NOVEMBER · DECEMBER 2005 65 Service-OrientedComputingTrack Editors: Michael N. Huhns · huhns@sc .edu and effectors (including actu- ators and robotic devices) will enable online entities to not only become aware

Swarup, Samarth

147

IEEE INTERNET COMPUTING 1089-7801/05/$20.00 2005 IEEE Published by the IEEE Computer Society NOVEMBER DECEMBER 2005 65 Service-OrientedComputingTrack  

E-print Network

services in e-commerce transactions; the aggregation of hotel, car rental, and airline services by Expedia NOVEMBER · DECEMBER 2005 65 Service-OrientedComputingTrack Editors: Michael N. Huhns · huhns@sc .edu (including actu- ators and robotic devices) will enable online entities to not only become aware of the phys

148

IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING , VOL. X, NO. X, MONTHX 200X 1 Molds for Meshes: Computing Smooth Parting  

E-print Network

IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING , VOL. X, NO. X, MONTHX 200X 1 Molds, Member, IEEE Abstract--We consider the problem of computing a parting line for a mold for a complex mesh undercuts ensure that such a parting line is practically useful. Note to Practitioners--Molding

Martin, Ralph R.

149

in Proc. IEEE Conf. on Computer Design: VLSI in Computers & Processors, Austin, Texas, October 5-7, 1998, pp. 384-389 Fault-Tolerant Architecture for High Performance  

E-print Network

in simple consumer products like microwave oven, washing machine, and cellular phones as wellin Proc. IEEE Conf. on Computer Design: VLSI in Computers & Processors, Austin, Texas, October 5 increase the already long interrupt latencies. Increasingly, the system designers are responding

Khan, Gul N.

150

Software Aspects of IEEE Floating-Point Computations for Numerical Applications in High Energy Physics  

SciTech Connect

Floating-point computations are at the heart of much of the computing done in high energy physics. The correctness, speed and accuracy of these computations are of paramount importance. The lack of any of these characteristics can mean the difference between new, exciting physics and an embarrassing correction. This talk will examine practical aspects of IEEE 754-2008 floating-point arithmetic as encountered in HEP applications. After describing the basic features of IEEE floating-point arithmetic, the presentation will cover: common hardware implementations (SSE, x87) techniques for improving the accuracy of summation, multiplication and data interchange compiler options for gcc and icc affecting floating-point operations hazards to be avoided About the speaker Jeffrey M Arnold is a Senior Software Engineer in the Intel Compiler and Languages group at Intel Corporation. He has been part of the Digital->Compaq->Intel compiler organization for nearly 20 years; part of that time, he worked on both low- and high-level math libraries. Prior to that, he was in the VMS Engineering organization at Digital Equipment Corporation. In the late 1980s, Jeff spent 2 years at CERN as part of the CERN/Digital Joint Project. In 2008, he returned to CERN to spent 10 weeks working with CERN/openlab. Since that time, he has returned to CERN multiple times to teach at openlab workshops and consult with various LHC experiments. Jeff received his Ph.D. in physics from Case Western Reserve University.

None

2010-05-11

151

Software Aspects of IEEE Floating-Point Computations for Numerical Applications in High Energy Physics  

ScienceCinema

Floating-point computations are at the heart of much of the computing done in high energy physics. The correctness, speed and accuracy of these computations are of paramount importance. The lack of any of these characteristics can mean the difference between new, exciting physics and an embarrassing correction. This talk will examine practical aspects of IEEE 754-2008 floating-point arithmetic as encountered in HEP applications. After describing the basic features of IEEE floating-point arithmetic, the presentation will cover: common hardware implementations (SSE, x87) techniques for improving the accuracy of summation, multiplication and data interchange compiler options for gcc and icc affecting floating-point operations hazards to be avoided About the speaker Jeffrey M Arnold is a Senior Software Engineer in the Intel Compiler and Languages group at Intel Corporation. He has been part of the Digital->Compaq->Intel compiler organization for nearly 20 years; part of that time, he worked on both low- and high-level math libraries. Prior to that, he was in the VMS Engineering organization at Digital Equipment Corporation. In the late 1980s, Jeff spent 2 years at CERN as part of the CERN/Digital Joint Project. In 2008, he returned to CERN to spent 10 weeks working with CERN/openlab. Since that time, he has returned to CERN multiple times to teach at openlab workshops and consult with various LHC experiments. Jeff received his Ph.D. in physics from Case Western Reserve University.

None

2011-10-06

152

540 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 9, NO. 6, DECEMBER 2005 Behavioral Diversity, Choices and Noise in the  

E-print Network

Diversity, Choices and Noise in the Iterated Prisoner's Dilemma Siang Y. Chong, Member, IEEE, and Xin Yao. The coevolutionary model with high behavioral diversity in the population is more resistant to noise. It is shown computation, iterated prisoner's dilemma (IPD), representation. I. INTRODUCTION THE ABSTRACT mathematical game

Yao, Xin

153

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 A High-Quality High-Fidelity Visualization of the  

E-print Network

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 A High-Quality High-Fidelity Visualization of the September 11 Attack on the World Trade Center Paul Rosen, Voicu Popescu, Christoph Hoffmann towards producing a visualization of the September 11 Attack on the North Tower of New York's World Trade

Irfanoglu, Ayhan

154

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. ?, NO. ?, FEB. 2010 1 Visualization of the Static aspects of Software  

E-print Network

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. ?, NO. ?, FEB. 2010 1 Visualization activities mainly because software complexity is difficult to manage. Graphical visualization of software has and providing valuable information to improve its quality. However, visualizing software is not an easy task

155

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 56, NO. 10, OCTOBER 2008 4703 Computation of Delay-Free Nonlinear Digital Filter  

E-print Network

, it enables to discretize analog filter networks described by nonlinear ordinary differential equation systems of autonomous ordinary differential equations (ODEs) can be modeled as a network of smaller system blocks Federico Fontana, Member, IEEE, and Federico Avanzini Abstract--A method for the computation of nonlinear

Avanzini, Federico

156

1120 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 5, OCTOBER 2009 Frankenstein's PSO: A Composite Particle Swarm  

E-print Network

1120 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 5, OCTOBER 2009 Frankenstein's PSO this composite algorithm Frankenstein's PSO in an analogy to the popular character of Mary Shelley's novel. Frankenstein's PSO performance evaluation shows that by integrating components in novel ways effective

Birattari, Mauro

157

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 1 Theoretical Fundamentals of Gate Level  

E-print Network

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 1 Theoretical. I. Introduction HIGH assurance systems such as flight control networks and financial, military influence a trusted one, e.g., data from passenger network shall never affect the flight control network

Sherwood, Tim

158

IEEE/ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS 1 F2Dock: Fast Fourier Protein-Protein Docking  

E-print Network

IEEE/ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS 1 F2Dock: Fast Fourier Protein-Protein this protein-protein docking code F2Dock (F2 = Fast Fourier) . We have calibrated F2Dock based on an extensive Interactions, Fast Fourier Methods, Algorithms, Docking, Redocking 3 1 INTRODUCTION PROTEINS are stable, folded

Chowdhury, Rezaul A.

159

IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 33, NO. 8, AUGUST 1998 1199 Computational Sensor for  

E-print Network

quantity of data must be read out and further inspected before a decision for an appropriate action is madeIEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 33, NO. 8, AUGUST 1998 1199 Computational Sensor 222 24 array of cells, is built in 2-m CMOS technology. Each cell occupies 62 m 222 62 m of silicon

Brajovic, Vladimir

160

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, VOL. XX, NO. X, XXXX 20XX 1 Big Data Opportunities and Challenges  

E-print Network

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, VOL. XX, NO. X, XXXX 20XX 1 Big Data Opportunities, and Graham J. Williams Abstract--"Big Data" as a term has been among the biggest trends of the last three and perspectives of the authors relating to the new opportunities and challenges brought forth by the big data

Jin, Yaochu

161

ColisTrack: testbed for a pervasive environment management system  

Microsoft Academic Search

One of the leading challenges for pervasive computing is to ease the application development to smoothly handle the surrounding environment. We consider the case where the environment produces heterogeneous and continuous data, e. g. temperature readings, car positions... We have defined a scenario for containers transportation tracking in a medical context involving the transportation of fragile biological matter in sensor-enhanced

Yann Gripay; Frdrique Laforest; Francois Lesueur; Nicolas Lumineau; Jean-Marc Petit; Vasile-Marian Scuturici; Samir Sebahi; Sabina Surdu

2012-01-01

162

Tourette Syndrome and Comorbid Pervasive Developmental Disorders  

Microsoft Academic Search

We examined the rates of comorbid pervasive developmental disorders in participants with Tourette syndrome. We used 7288 participants from the Tourette Syndrome International Database Consortium Registry. We found 334 (4.6%; 1 of every 22 participants) with Tourette syndrome had a comorbid pervasive developmental disorder. In participants with Tourette syndrome and comorbid pervasive developmental disorders, 98.8% had one or more comorbidities

Larry Burd; Qing Li; Jacob Kerbeshian; Marilyn G. Klug; Roger D. Freeman

2009-01-01

163

16 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/04/$20.00 2004 IEEE F I R S T R E S P O N S E  

E-print Network

the next step in wire- less communication's miniaturization, and their power and size make it feasible, crit- ical care environments. To test it, we developed two wireless vital sign monitors and a PDA Harvard University Steve Moulton Boston University #12;You must decentralize the discovery process

Chen, Yiling

164

62 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE R F I D T E C H N O L O G Y  

E-print Network

been an obvious target for abuse. Wireless identification is a powerful capability, and RFID reveals including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access incoming aircraft by sending out pulses of radio energy and detecting the echoes that came back.3 Radar

Tanenbaum, Andrew S.

165

To appear in Proceedings of IEEE Workshop on Computer Vision and Pattern Recognition for Human Communicative Behavior Analysis (CVPR4HB), June 2008.  

E-print Network

To appear in Proceedings of IEEE Workshop on Computer Vision and Pattern Recognition for Human. This dataset is being created as part of a project to develop a computer vision system that allows users a variety of computer vision and machine learning meth- ods designed for learning and/or indexing a large

Finzi, Adrien

166

Pervasive Developmental Disorders: A Golden Section Study .  

E-print Network

??Objectives. Pervasive developmental disability theories are combined with golden section research in an effort to understand how people organize and process interpersonal/social information. In order (more)

Davison, Mitzie

2010-01-01

167

2 Published by the IEEE Computer Society 1089-7801/12/$31.00 2012 IEEE IEEE INTERNET COMPUTING teve Jobs changed the world. He did amazing  

E-print Network

not only developed technology but also innovated business models, and to point-out one world-changing COMPUTING S teve Jobs changed the world. He did amazing work and produced amazing products that went from money. Ubiquity is certainly not the source of the claim that Jobs and Apple changed the world. And it

Petrie, Charles

168

IEEE TRANSACTIONS ON COMPUTERS, VOL. c-30, NO. 12, DECEMBER 1981 PASM: A Partitionable SIMD/MIMD System  

E-print Network

, MEMBER, IEEE, FREDERICK C. KEMMERER, MEMBER, IEEE, PHILIP T. MUELLER, JR., MEMBER, IEEE, HAROLD E are with the School of Electrical Engineering, Purdue University, West Lafayette, IN 47907. F. C. Kemmerer

169

Challenges in Securing the Interface Between the Cloud and Pervasive Systems  

SciTech Connect

Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources and issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.

Lagesse, Brent J [ORNL] [ORNL

2011-01-01

170

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. IE-34, NO. 3, AUGUST 1987 Transient Tests on a Voltage-Regulated  

E-print Network

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. IE-34, NO. 3, AUGUST 1987 _~~~~~~ Transient Tests electronics revolution becomes more pervasive, the harmonic content will become more and more intolerable

Catholic University of Chile (Universidad Católica de Chile)

171

Dynamic privacy management in pervasive sensor networks  

E-print Network

This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a ...

Gong, Nan-wei

172

Per Viz: Painkillers for Pervasive Application Debugging  

E-print Network

Debugging pervasive applications is difficult due to their distributed, asynchronous, and dynamic nature. To help ease the debugging process, we propose PerViz, a developer-targeted tool that enhances system visibility ...

Pham, Hubert

173

Communication Issues in Pervasive Healthcare Systems and  

E-print Network

Chapter 10 Communication Issues in Pervasive Healthcare Systems and Applications Demosthenes provides a systematic analysis of the communication technologies used in healthcare and homecare Vouyioukas Department of Information and Communication Systems Engineering, University of the Aegean

Vouyioukas, Demosthenes

174

546 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 5, NO. 5, OCTOBER 2001 A Computational Laboratory for  

E-print Network

by means of labor-market experiments. Index Terms--Agent-based computational economics, buyer-seller trade networks, C++ class framework, compu- tational laboratory, evolution, labor-market experiments, network the sensitivity of a system to changes in a wide variety of key parameters without becoming immersed

Tesfatsion, Leigh

175

IEEE TRANSACTIONS ON COMPUTERS, VOL. c-33, NO. 6, JUNE 1984 [5] W. C. Carter, "The ubiquitous parity bit," in Proc. 12th Annu. Int. Symp.  

E-print Network

IEEE TRANSACTIONS ON COMPUTERS, VOL. c-33, NO. 6, JUNE 1984 [5] W. C. Carter, "The ubiquitous Cliffs, NJ: Prentice-Hall, 1984. [14] J. Savir, G. Ditlow, and P. H. Bardell, "Random pattern testability 28-30, 1983, pp. 222-226. [17] L. -T. Wang, "A new condensed linear feedback shift register designed

Stanford University

176

1070 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 29, NO. 7, JULY 2010 Dose Map and Placement Co-Optimization for  

E-print Network

-aware dose map optimization as quadratic and quadratic constraint programs which are solved using efficient1070 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 29, NO. 7 quadratic program solvers. In this paper, we mainly focus on the placement-aware dose map optimization

Kahng, Andrew B.

177

608 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 18, NO. 5, MAY 1999 An Efficient Approach to Multilayer Layer  

E-print Network

minimization in high-performance IC, PCB, and MCM designs. I. INTRODUCTION AS very large scale integration608 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 18, NO. 5 of multilayer gridless integrated circuit (IC), printed circuit board (PCB), and multichip module (MCM) layouts

Cong, Jason "Jingsheng"

178

1288 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 33, NO. 9, SEPTEMBER 2014 Leveraging Gate-Level Properties to Identify  

E-print Network

1288 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 33, NO. 9 devices, airplanes, and automobiles continue to dominate some of the most critical aspects of our lives. In such sys- tems, the movement of information throughout a device must be tightly controlled to prevent

Kastner, Ryan

179

442 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 31, NO. 3, MARCH 2012 Efficient Trace Signal Selection for Silicon Debug by  

E-print Network

442 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 31, NO. 3 to the complex designs and the inaccuracies in modeling integrated circuits (ICs) along with process variations the internal signal observability, however, the system needs to be halted to read out responses from

Touba, Nur A.

180

916 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 16, NO. 8, AUGUST 1997 On the Quality of Accumulator-Based  

E-print Network

916 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 16, NO. 8 uses an accumulator to generate a composite fault signature for a circuit under test. The error on the central limit theorem of statistics and can be applied to other count-based compaction schemes. Our

Chakrabarty, Krishnendu

181

Published by the IEEE CS n 1536-1268/10/$26.00 2010 IEEE PERVASIVE computing 37 C O N N E C T E D Y O U T H  

E-print Network

of America's youth. Mobile device own- ership and social media use have been increas- ing over the past few with a cell phone.3 However, despite students' strong connection with the digital world and media environments and these systems' potential to improve learning,4,5 they're rarely used in US schools, where students spend

Hayes, Gillian R.

182

In Proceedings of the First IEEE International Conference on Pervasive Computing and Com-munications (PerCom 2003), pages 216223, Dallas-Fort Worth, USA, March 2003. IEEE.  

E-print Network

applications can be greatly enhanced when provided with the locations of people and devices. Ultra- sonic at high update rates [1]. To achieve this level of performance while tracking many people and devices own track- ing infrastructure, it might be harder to guarantee that centrally-administered location

Hazas, Mike

183

IEEE TRANSACTIONS ON COMPUTERS, VOL. c-25, NO. 10, OCTOBER 1976 The Effects-of Emerging Technology and Emulation  

E-print Network

BELL, FELLOW, IEEE, AND CHARLES H. KAMAN, MEMBER, IEEE Abstract-The structure of microprogrammed-Mellon University, Pittsburgh, PA 15213. He is with the Digital Equipment Corporation, Maynard, MA. C. H. Kaman

Massachusetts at Amherst, University of

184

Proceedings IEEE Visualization 1998, pages 487490. cIEEE Computer Society Press, 1998. Three-Dimensional Visualization of Microstructures  

E-print Network

evolution, and therefore mechanical properties, during the thermo- mechanical processing of materials.1 by computer visualization to £Scientific Visualization Laboratory; contractor from Scientific and En

Swan II, J. Edward

185

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Improving Security and Performance in the Tor  

E-print Network

in the Tor Network through Tunable Path Selection Robin Snader and Nikita Borisov, Member, IEEE Abstract--The Tor anonymous communication network uses self-reported bandwidth values to select routers for building operator to attract tunnels for compromise. Although Tor limits the self-reported bandwidth, it uses a high

Borisov, Nikita

186

24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2012 CFR

...2012-04-01 false Tests of pervasive poverty, unemployment and general distress...Requirements 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be...

2012-04-01

187

24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2012 CFR

...2012-04-01 false Tests of pervasive poverty, unemployment and general distress...Requirements 598.110 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty is...

2012-04-01

188

24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2014 CFR

...2013-04-01 true Tests of pervasive poverty, unemployment and general distress...Requirements 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be...

2014-04-01

189

24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2013 CFR

...2013-04-01 false Tests of pervasive poverty, unemployment and general distress...Requirements 598.110 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty is...

2013-04-01

190

24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2014 CFR

...2013-04-01 true Tests of pervasive poverty, unemployment and general distress...Requirements 598.110 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty is...

2014-04-01

191

24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2011 CFR

...2010-04-01 true Tests of pervasive poverty, unemployment and general distress...Requirements 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be...

2011-04-01

192

24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2010 CFR

...2010-04-01 false Tests of pervasive poverty, unemployment and general distress...Requirements 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be...

2010-04-01

193

24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2013 CFR

...2013-04-01 false Tests of pervasive poverty, unemployment and general distress...Requirements 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be...

2013-04-01

194

Pervasive Restart In MOOSE-based Applications  

SciTech Connect

Multiphysics applications are inherently complicated. Solving for multiple, interacting physical phenomena involves the solution of multiple equations, and each equation has its own data dependencies. Feeding the correct data to these equations at exactly the right time requires extensive effort in software design. In an ideal world, multiphysics applications always run to completion and produce correct answers. Unfortunately, in reality, there can be many reasons why a simulation might fail: power outage, system failure, exceeding a runtime allotment on a supercomputer, failure of the solver to converge, etc. A failure after many hours spent computing can be a significant setback for a project. Therefore, the ability to continue a solve from the point of failure, rather than starting again from scratch, is an essential component of any high-quality simulation tool. This process of continuation is commonly termed restart in the computational community. While the concept of restarting an application sounds ideal, the aforementioned complexities and data dependencies present in multiphysics applications make its implementation decidedly non-trivial. A running multiphysics calculation accumulates an enormous amount of state: current time, solution history, material properties, status of mechanical contact, etc. This state data comes in many different forms, including scalar, tensor, vector, and arbitrary, application-specific data types. To be able to restart an application, you must be able to both store and retrieve this data, effectively recreating the state of the application before the failure. When utilizing the Multiphysics Object Oriented Simulation Environment (MOOSE) framework developed at Idaho National Laboratory, this state data is stored both internally within the framework itself (such as solution vectors and the current time) and within the applications that use the framework. In order to implement restart in MOOSE-based applications, the total state of the system (both within the framework and without) must be stored and retrieved. To this end, the MOOSE team has implemented a pervasive restart capability which allows any object within MOOSE (or within a MOOSE-based application) to be declared as state data, and handles the storage and retrieval of said data.

Derek Gaston; Cody Permann; David Andrs; John Peterson; Andrew Slaughter; Jason Miller

2014-01-01

195

Autism Spectrum Disorders (Pervasive Developmental Disorders)  

ERIC Educational Resources Information Center

This booklet focuses on classic autism, pervasive developmental disorder not otherwise specified (PDD-NOS), and Asperger syndrome, with brief descriptions of Rett syndrome and childhood disintegrative disorder. The booklet describes possible indicators of autism spectrum disorders (ASD), their diagnosis, available aids, treatment options, adults

Strock, Margaret

2007-01-01

196

Requesting Pervasive Services by Touching RFID Tags  

Microsoft Academic Search

We suggest a general framework for requesting pervasive services by touching RFID tags. The tags conne ct the physical and digital environments. Visual symbols c ommunicate to users the objects that can be touched and the services that can be activated. When a user touches such a symbol with a mobile phone, the data stored in the tag and other

Jukka Riekki; Timo Salminen; Ismo Alakrpp

2006-01-01

197

Pervasive safety application with model checking in smart houses: The INOVUS intelligent oven  

Microsoft Academic Search

Safety is a major challenge in developing assistive software for people with special needs in smart houses. INOVUS is an ongoing project about safety issues of cooking activities. This paper presents the INOVUS project and highlights lacks in current software development processes to meet safety requirements in pervasive computing. In the INOVUS project, we propose an approach to introduce model

Thibault De Champs; Bessam Abdulrazak; Hlne Pigot; Mohammed Ouenzar; Marc Frappier; Benot Fraikin

2011-01-01

198

The Pervasiveness and Impact of Electronic Communication Technologies in Organizations: A Survey of Major American Corporations.  

ERIC Educational Resources Information Center

A survey of the Fortune 500 corporations was conducted to ascertain the pervasiveness and perceived impact of five electronic communication technologies (electronic mail, videotex, interactive computers, video teleconferencing, and word processing). Ninety-four corporations responded to a 53-item questionnaire and follow-up survey. Analysis of the

Hellweg, Susan A.; And Others

199

Body Sensor Network - A Wireless Sensor Platform for Pervasive Healthcare Monitoring  

Microsoft Academic Search

With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In addition to providing continuous monitoring and analysis of physiological parameters, the recently proposed Body Sensor Networks (BSN) incorporate context aware sensing for increased sensitivity and specificity. To facilitate research and development in BSN and multi-sensor data fusion, a BSN

Benny P. L. Lo; Surapa Thiemjarus; Rachel King; Guang-Zhong Yang

200

Pervasive Systems in Health Care  

NASA Astrophysics Data System (ADS)

An important characteristic of ?Ambient Intelligence? (AmI) environments is the merging of physical and digital space (i.e. tangible objects and physical environments are acquiring a digital representation). As the computer disappears in the environments surrounding our activities, the objects therein are transformed to artifacts, that is, they are augmented with Information and Communication Technology (ICT) components (i.e. sensors, actuators, processor, memory, wire-less communication modules) and can receive, store, process and transmit information. Artifacts may be totally new objects or improved versions of existing objects, which by using the ambient technology, allow people to carry out novel or traditional tasks in unobtrusive and effective ways.

Kameas, Achilles; Calemis, Ioannis

201

The Youngest Case of Pervasive Refusal Syndrome?  

Microsoft Academic Search

To date, the youngest previously recorded case of pervasive refusal syndrome (PRS) was eight years old. A four-year-old Australian-born Chinese boy presented to a tertiary paediatric referral centre with a four-week history of food refusal and selective mutism; he was severely dehydrated and marasmic. During admission several behavioural problems were noted including: persistent refusal to eat or drink, obsessions with

Sharon Taylor; David R. Dossetor; Henry Kilham; Elizabeth Bernard

2000-01-01

202

Pervasive Healthcare and Wireless Health Monitoring  

Microsoft Academic Search

Abstract With an increasingly mobile,society and,the worldwide deployment of mobile and wireless networks, the wireless infrastructure can support many,current and emerging,healthcare applications. This could fulfill the vision of Pervasive Healthcare or healthcare to anyone, anytime, and anywhere by removing locational, time and other restraints while increasing both the coverage and the quality. In this paper, we present applications and require-

Upkar Varshney

2007-01-01

203

54 Computer Published by the IEEE Computer Society 0018-9162/08/$25.002008IEEE C O V E R F E A T U R E  

E-print Network

R E Harnessing Digital Evolution N early 150 years ago, Charles Darwin explained how evolution at the dawn of evolution in another world: the world of computing. There, evolution helps humans solve complex-widening variety of problems. As the "Evolution in a Computer" sidebar shows, evolutionary computa- tion methods

204

54 Computer Published by the IEEE Computer Society 0018-9162/08/$25.00 2008 IEEE C O V E R F E A T U R E  

E-print Network

A T U R E Harnessing Digital Evolution N early 150 years ago, Charles Darwin explained how evolution at the dawn of evolution in another world: the world of computing. There, evolution helps humans solve complex-widening variety of problems. As the "Evolution in a Computer" sidebar shows, evolutionary computa- tion methods

205

726 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 31, NO. 5, MAY 2012 A Reliable Routing Architecture and  

E-print Network

, David Fick, Student Member, IEEE, Valeria Bertacco, Senior Member, IEEE, Dennis Sylvester, Fellow, IEEE 48109 USA (e-mail: awde- orio@umich.edu; dfick@umich.edu; valeria@umich.edu; dmcs@umich.edu; blaauw

Bertacco, Valeria

206

Evolving Content in the Galactic Arms Race Video Game In: Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG09). Piscataway, NJ:IEEE  

E-print Network

Evolving Content in the Galactic Arms Race Video Game In: Proceedings of the IEEE Symposium Erin J. Hastings, Ratan K. Guha, and Kenneth O. Stanley Abstract-- Video game content includes. In most modern video games, the set of content shipped with the game is static and unchanging, or at best

Stanley, Kenneth O.

207

730272-1732/03/$17.00 2003 IEEE Published by the IEEE computer Society The 30th International Symposium on Com-  

E-print Network

Micro. To kick off this panel, Daniel Citron presented "MisSPECulation: Partial and Misleading Use program committee and IEEE Micro thank moderator John Hennessy, and pan- elists Daniel Citron, Dave amounts of time, according to how much they have to say that's useful. First, Daniel Citron will come up

Wiseman, Yair

208

C O V E R F E A T U R E 0018-9162/06/$20.00 2006 IEEE52 Computer Published by the IEEE Computer Society  

E-print Network

. Students who choose our BA and double major in Art/Electronic Media Arts Design/Digital Media Studies might"humane gaming,"a term that includes medical and educational game applications and socially conscious gaming computer science, digital media studies, electronic media arts design, and studio art. We created our

Leutenegger, Scott T.

209

C O V E R F E A T U R E 0018-9162/06/$20.00 2006 IEEE46 Computer Published by the IEEE Computer Society  

E-print Network

and executing from that state on a local processor. TIME-SHARING REDUX In his 1983 classic, "Hints for Computer the Alto is that it doesn't run faster at night." This quote succinctly captures the joy of a time-sharing thin clients in signifi- cant numbers. Microsoft is also reported to be close to releasing a stripped

Andersen, Dave

210

C O V E R F E A T U R E 0018-9162/07/$25.00 2007 IEEE62 Computer Published by the IEEE Computer Society  

E-print Network

-level sensor events and high-level situational awareness. Database technologies, including extensions to data for extracting situational awareness from sensed data is therefore needed. During the past three years, we have," formally known as situational awareness. In the context of computer security, situational awareness

Cybenko, George

211

Human Centric Computing School COMSC  

E-print Network

human activities and interactions when using traditional and pervasive computing systems. · Apply humanHuman Centric Computing School COMSC As information systems become more pervasive and complex. This module takes a systems approach to Human Centric Computing and deals with relevant aspects of Human

Martin, Ralph R.

212

Adaptive User Profiles in Pervasive Advertising Environments  

NASA Astrophysics Data System (ADS)

Nowadays modern advertising environments try to provide more efficient ads by targeting costumers based on their interests. Various approaches exist today as to how information about the users' interests can be gathered. Users can deliberately and explicitly provide this information or user's shopping behaviors can be analyzed implicitly. We implemented an advertising platform to simulate an advertising environment and present adaptive profiles, which let users setup profiles based on a self-assessment, and enhance those profiles with information about their real shopping behavior as well as about their activity intensity. Additionally, we explain how pervasive technologies such as Bluetooth can be used to create a profile anonymously and unobtrusively.

Alt, Florian; Balz, Moritz; Kristes, Stefanie; Shirazi, Alireza Sahami; Mennenh, Julian; Schmidt, Albrecht; Schrder, Hendrik; Goedicke, Michael

213

1530-437X (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.  

E-print Network

"zero-power" sensors which open up applications in highly-pervasive and distributed rfid-enabled sensing, and presents a variety of implementations of RFID-based sensors which can be used to detect strain, temperature.1109/JSEN.2013.2297436, IEEE Sensors Journal 1 RFID-Based Sensors for "Zero-Power" Autonomous Wireless

Tentzeris, Manos

214

Directions for Peer-to-Peer based mobile pervasive augmented reality gaming  

Microsoft Academic Search

Pervasive augmented reality gaming and mobile P2P are both attracting significant focus and much progress has occurred recently. Augmented reality games extend reality with virtual elements to enhance game experience and mobile P2P networks provide autonomous, self-organizing, scalable and robust communication platforms. We review the technological challenges in both mobile P2P computing and AR domains by investigating some existing related

Chao Huang; Aaron Harwood; Shanika Karunasekera

2007-01-01

215

Ensuring Semantic Annotation and Retrieval within Pervasive E-Learning Systems  

Microsoft Academic Search

In the age of mobility, many times a certain teacher, a student or a document face difficulties to be integrated in different e-learning systems. Focusing on the computer science field, we present a service-oriented solution for annotating and retrieving the documents and persons involved in this domain, enhancing their mobility inside pervasive e-learning systems. The solution is based on the

Mihaela Brut; Dana Al Kukhun; Florence Sedes

2008-01-01

216

Enabling run-time composition and support for heterogeneous pervasive multi-agent systems  

Microsoft Academic Search

User needs-driven and computer-supported development of pervasive heterogeneous and dynamic multi-agent systems remains a great challenge for agent research community. This paper presents an innovative approach to composing, validating and supporting multi-agent systems at run-time. Multi-agent systems (MASs) can and should be assembled quasi-automatically and dynamically based on high-level user specifications which are transformed into a shared and common goalmission.

Glenn T. Jayaputera; Arkady B. Zaslavsky; Seng Wai Loke

2007-01-01

217

7 CFR 25.102 - Pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2013 CFR

...2013-01-01 2013-01-01 false Pervasive poverty, unemployment and general distress...Requirements 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be...

2013-01-01

218

7 CFR 25.102 - Pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2014 CFR

...2014-01-01 2014-01-01 false Pervasive poverty, unemployment and general distress...Requirements 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be...

2014-01-01

219

7 CFR 25.102 - Pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2012 CFR

...2012-01-01 2012-01-01 false Pervasive poverty, unemployment and general distress...Requirements 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be...

2012-01-01

220

Low Cost Intelligent Pervasive Location Tracking (iPLOT)  

E-print Network

Low Cost Intelligent Pervasive Location Tracking (iPLOT) in All Environments for the Management. This task requires a multi-disciplinary approach combining communications systems design, digital signal, christened intelligent pervasive location tracking (iPLOT), with a particular reference to user and system

221

Pervasive Healthcare Overview A Personal Perspective (May 2007)  

Microsoft Academic Search

The latest outstanding advances in mobile network technologies, wireless communications and medical sensors are propelling a new and exciting research for 21 st century pervasive healthcare systems. Such systems have the capacity to provide health services for patients regardless of time and place. The aim of this paper is to overview the state of the art pervasive healthcare technologies by

Sabrina Nefti

222

IEEE Network July/August 20114 loud computing is a recent trend in information  

E-print Network

a respected information source on foundational research and trends in cloud computing. The first article, and delivered. The key driving forces behind the emergence of cloud computing include the overcapacity of today of storage, and progressive improvements in networking technologies. Cloud computing opens new per- spectives

Pallis, George

223

Simulating the pervasive fracture and fragmentation of materials and structures using randomly close-packed Voronoi tessellations.  

SciTech Connect

Under extreme loading conditions most often the extent of material and structural fracture is pervasive in the sense that a multitude of cracks are nucleating, propagating in arbitrary directions, coalescing, and branching. Pervasive fracture is a highly nonlinear process involving complex material constitutive behavior, material softening, localization, surface generation, and ubiquitous contact. Two primary applications in which pervasive fracture is encountered are (1) weapons effects on structures and (2) geomechanics of highly jointed and faulted reservoirs. A pure Lagrangian computational method based on randomly close-packed Voronoi tessellations is proposed as a rational approach for simulating the pervasive fracture of materials and structures. Each Voronoi cell is formulated as a finite element using the reproducing kernel method. Fracture surfaces are allowed to nucleate only at the intercell faces. The randomly seeded Voronoi cells provide an unbiased network for representing cracks. In this initial study two approaches for allowing the new surfaces to initiate are studied: (1) dynamic mesh connectivity and the instantaneous insertion of a cohesive traction when localization is detected, and (2) a discontinuous Galerkin approach in which the interelement tractions are an integral part of the variational formulation, but only become active once localization is detected. Pervasive fracture problems are extremely sensitive to initial conditions and system parameters. Dynamic problems exhibit a form of transient chaos. The primary numerical challenge for this class of problems is the demonstration of model objectivity and, in particular, the identification and demonstration of a measure of convergence for engineering quantities of interest.

Bishop, Joseph E.

2008-09-01

224

[10] S. V. Campos, E. M. Clarke, W. Marrero, M. Minea, and H. Hiraishi. Computing quantitative characteristics of finitestate realtime systems. In IEEE RealTime Systems Symposium, 1994.  

E-print Network

. In IEEE Real­Time Systems Symposium, 1993. [17] T. A. Henzinger, P. H. Ho, and H. Wong­Toi. Hy--427. Springer­Verlag, 1994. [12] E. M. Clarke and E. A. Emerson. Synthesis of synchronization skeletons­Verlag, 1981. Lecture Notes in Computer Science, volume 131. [13] E. M. Clarke, E. A. Emerson, and A. P. Sistla

Clarke, Edmund M.

225

73IEEE INTERNET COMPUTING http://computer.org/internet/ NOVEMBER DECEMBER 1999 It's getting near the holidays, so the  

E-print Network

the holidays, so the Spider turned to see who besides Santa might be breaking in. Internet Auditing Project would take about a month. As it was, their project used five workstations and took three weeks to personal computing.) Onion Routing · Naval Research Laboratory · http://onion-router.nrl. navy.mil/ I

Filman, Robert E.

226

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS Visualization Task Performance with 2D, 3D,  

E-print Network

.3 Picture/Image Generation - Display Algorithms, J. Computer Applications (e.g., CAD, Medical Imaging medical scans. To see details without occlu- sion, radiologists typically view such data in 2D slices

Tory, Melanie

227

34 IEEE TRANSACTIONS ON COMPUTERS, VOL. 47, NO. 1, JANUARY 1998 A Hierarchical Adaptive Distributed  

E-print Network

to a network management system based on SNMP (Simple Network Management Protocol). Experimental results management, SNMP. -------------------- 3 -------------------- 1 INTRODUCTION S computer networks have grown protocol. Applications based on the Simple Network Management Protocol (SNMP) [1], [2], [3] are currently

Duarte Jr., Elias Procópio

228

Capacity of Pervasive Camera Based Communication Under Perspective Distortions  

E-print Network

to a desktop PC or even a smartphone screen displaying the time-varying code to download a file or perhaps-to-camera communications for larger data transfers. Such communications could be particularly attractive in pervasive

Gruteser, Marco

229

The Anatomy of Pervasive Self Care Services George Roussos  

E-print Network

The Anatomy of Pervasive Self Care Services George Roussos Birkbeck College University of London g million people report living with a long term condition (such as diabetes, asthma, adult congenital heart

Roussos, George

230

PATHOS: Pervasive at Home Sleep Monitoring  

PubMed Central

Sleeping disorders affect a large percentage of the population, and many of them go undiagnosed each year because the method of diagnosis is to stay overnight at a sleep center. Because pervasive technologies have become so prevalent and affordable, sleep monitoring is no longer confined to a permanent installation, and can therefore be brought directly into the user home. We present a unique solution to the problem of home sleep monitoring that has the possibility to take the place of and expand on the data from a sleep center. PATHOS focuses not only on analyzing patterns during the night, but also on collecting data about the subject lifestyle that is relevant and important to the diagnosis of his/her sleep. PATHOS means evoking emotion. Here, we mean Pathos will help us to keep healthy: both mentally and physically. Our solution uses existing technology to keep down cost and is completely wireless in order to provide portability and be easily to customize. The daytime collection also utilizes existing technology and offers a wide range of input methods to suit any type of person. We also include an in-depth look at the hardware we used to implement and the software providing user interaction. Our system is not only a viable alternative to a sleep center, it also provides functions that a static, short-term solution cannot provide, allowing for a more accurate diagnosis and treatment. PMID:18437237

Obermiller, Ian; Ahamed, Sheikh I.

2008-01-01

231

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 12, DECEMBER 2008 2107 Optimizing Nonmonotonic Interconnect Using  

E-print Network

Stephen M. Plaza, Igor L. Markov, Senior Member, IEEE, and Valeria M. Bertacco, Member, IEEE Abstract@umich.edu; valeria@umich.edu). Color versions of one or more of the figures in this paper are available online

Bertacco, Valeria

232

IEEE TRANSACTIONS ON MAGNETICS, VOL. 38, NO. 2, MARCH 2002 1269 Computing Methods of Hypersingular Integral  

E-print Network

's equations are required to evaluate this perturbation. The field computation is fully three­dimensional (3-D. A driving coil generates a time-varying field inducing eddy-current in a conducting piece (Fig. 1). A flaw, we consider the perturbation problem: the difference between the unperturbed problem and the full

Boyer, Edmond

233

August 2005 IEEE Computational Intelligence Society 5 1917 Karl Steinbuch 2005  

E-print Network

Konrad Zuse (who developed a functioning pro- gram-controlled computing machine c.1936), Steinbuch has Medicine, the Konrad Adenauer Science Award, the Jakob Fugger Medal, and the Prime Minister's Merit Medal was director of development at the Stuttgart "Informatik-Werk" of Standard Electric Lorenz AG (SEL

Hartenstein, Reiner

234

0018-9162/01/$10.00 2001 IEEE42 Computer Hyperlinking  

E-print Network

to map e-services using a simple form of augmented reality.2 Typical augmented reality systems require irst-generation mobile computing technolo- gies typically use protocols such as WAP and i-mode to let PDAs, smart phones, and other wireless devices with Web browsers access the Internet, thereby freeing

Cui, Jun-Hong

235

14-th IEEE International Conference on Peer-to-Peer Computing Fully Distributed Robust Singular Value  

E-print Network

of Szeged, Hungary MTA-SZTE Research Group on Artificial Intelligence, Hungary Institute for Computer one row of the matrix (personal attributes, documents, media ratings, etc). In our P2P model, we do and synthetic data as well. We demonstrate that the convergence speed of our method is competitive while

Jelasity, Márk

236

CIMSA 2005 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications  

E-print Network

Virginia University Abstract ­ This paper introduces a new and novel methodology for fully data-driven best practices identification and analysis based on soft computing techniques. Using this new methodology "best that exist. Predictive analysis, on the other hand, takes the problem to a new level by developing

Mohaghegh, Shahab

237

Pervasive Transcription of a Herpesvirus Genome Generates Functionally Important RNAs  

PubMed Central

ABSTRACT Pervasive transcription is observed in a wide range of organisms, including humans, mice, and viruses, but the functional significance of the resulting transcripts remains uncertain. Current genetic approaches are often limited by their emphasis on protein-coding open reading frames (ORFs). We previously identified extensive pervasive transcription from the murine gammaherpesvirus 68 (MHV68) genome outside known ORFs and antisense to known genes (termed expressed genomic regions [EGRs]). Similar antisense transcripts have been identified in many other herpesviruses, including Kaposis sarcoma-associated herpesvirus and human and murine cytomegalovirus. Despite their prevalence, whether these RNAs have any functional importance in the viral life cycle is unknown, and one interpretation is that these are merely noise generated by functionally unimportant transcriptional events. To determine whether pervasive transcription of a herpesvirus genome generates RNA molecules that are functionally important, we used a strand-specific functional approach to target transcripts from thirteen EGRs in MHV68. We found that targeting transcripts from six EGRs reduced viral protein expression, proving that pervasive transcription can generate functionally important RNAs. We characterized transcripts emanating from EGRs 26 and 27 in detail using several methods, including RNA sequencing, and identified several novel polyadenylated transcripts that were enriched in the nuclei of infected cells. These data provide the first evidence of the functional importance of regions of pervasive transcription emanating from MHV68 EGRs. Therefore, studies utilizing mutation of a herpesvirus genome must account for possible effects on RNAs generated by pervasive transcription. PMID:24618256

Canny, Susan P.; Reese, Tiffany A.; Johnson, L. Steven; Zhang, Xin; Kambal, Amal; Duan, Erning; Liu, Catherine Y.; Virgin, Herbert W.

2014-01-01

238

1306 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 57, NO. 6, JUNE 2010 Electronic Cleansing for Computed Tomography  

E-print Network

1306 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 57, NO. 6, JUNE 2010 Electronic Cleansing-invariant method to determine material fractions in voxels near such T-junctions. The proposed electronic cleansing the width of the PSF. (b) Electronic cleansing replaces H with L. (c) Transfer function based on thresholds

van Vliet, Lucas J.

239

IEEE TRANSACTIONS ON MOBILE COMPUTING, TMC-0278-1006.R1 1 Efficient Placement and Dispatch of Sensors  

E-print Network

of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng, Senior Member, IEEE Abstract-- Sensor deployment is a critical issue because it affects the cost and detection capability of a wireless sensor network. In this work, we consider two related deployment problems: sensor placement

Tseng, Yu-Chee

240

2114 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 56, NO. 8, AUGUST 2009 Mental State Estimation for BrainComputer  

E-print Network

2114 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 56, NO. 8, AUGUST 2009 Mental State (ECoGs) of six epileptic patients, engaged in a memory reach task. A novel signal analysis technique, brainstem stroke, and high cervi- cal spinal cord injury [1]. While these patients have little

Nenadic, Zoran

241

250 IEEE TRANSACTIONS ON ADVANCED PACKAGING, VOL. 27, NO. 2, MAY 2004 The SOP for Miniaturized, Mixed-Signal Computing,  

E-print Network

250 IEEE TRANSACTIONS ON ADVANCED PACKAGING, VOL. 27, NO. 2, MAY 2004 The SOP for Miniaturized and consumer functions. The concept of system-on-package (SOP) originated in the mid-1990s at the NSF-funded Packaging Research Center at the Georgia Institute of Technology. This can be thought of as a conceptual

Tentzeris, Manos

242

IEEE T-CIAIG SPECIAL ISSUE ON COMPUTATIONAL AESTHETICS IN GAMES 1 Adapting Models of Visual Aesthetics  

E-print Network

Aesthetics for Personalized Content Creation Antonios Liapis, Georgios N. Yannakakis Member, IEEE, Julian as the initial population of an interactive evolution experiment in which players are asked to choose spaceships-Driven Procedural Content Generation, Constrained Optimization, In- teractive Evolution I. INTRODUCTION IN most

Togelius, Julian

243

IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 15, NO. 5, SEPTEMBER 2004 1151 A Computational Model of Auditory  

E-print Network

of Auditory Selective Attention Stuart N. Wrigley, Member, IEEE, and Guy J. Brown Abstract--The human auditory focus. However, recent studies suggest that attention plays a key role in the formation of auditory simulates a range of psychophysical phenomena. Index Terms--Attention, auditory scene analysis, binding

Wrigley, Stuart

244

NetworkingforPervasiveComputing ResearchfromtheNationalInstituteofStandards  

E-print Network

Information Technology Laboratory, Douglas Maughan, manager of the Defense Advanced Research Projects Agency for System Adaptability, Dependability and Assurance, and James Puffenbarger of the Advanced Research Kevin L. Mills, Editor C O M P U T E R NETWORKING Advanced Network Technology Division Information

245

Pervasive computing in play-based occupational therapy for children  

E-print Network

Embedding digital technology into playful activity can make play-based occupational therapy more effective. This study proposes two play-based activities to improve children's eating and tooth-brushing behavior.

Chi, Pei-Yu

246

Location Privacy in Pervasive Computing Claudio A. Ardagna, Marco Cremonini,  

E-print Network

by legal disputes involving rental companies tracking their cars by means of Global Positioning System (GPS,cremonini,decapita,samarati}@dti.unimi.it Abstract Recent technological advances have made it feasible to measure and track the location of users, vehicles, and practically any mobile object. Positioning and tracking systems are then collecting a huge

Samarati, Pierangela

247

Improving the Effectiveness of Medical Treatment with Pervasive Computing  

E-print Network

, Switzerland {floerkem|siegemun}@inf.ethz.ch 1 Vision Hippocrates, the father of medicine, already realized a challenge more than twenty centuries after Hippocrates. When Sullivan et al. [4] studied the cost

248

0-7803-XXXX-X/13/$25.00 2014 IEEE 30th IEEE SEMI-THERM Symposium On-chip Phase Change Heat Sinks Designed for Computational Sprinting  

E-print Network

0-7803-XXXX-X/13/$25.00 © 2014 IEEE 30th IEEE SEMI-THERM Symposium On-chip Phase Change Heat Sinks on-chip phase change heat sinks filled with low melting temperature metallic alloys are demonstrated are constrained by the poor heat dissipation of passive convection. To stabilize device and chip temperatures

Martin, Milo M. K.

249

Multiscale Density Estimation R. M. Willett, Student Member, IEEE, and R. D. Nowak, Member, IEEE  

E-print Network

1 Multiscale Density Estimation R. M. Willett, Student Member, IEEE, and R. D. Nowak, Member, IEEE July 4, 2003 Abstract The nonparametric density estimation method proposed in this paper is computationally fast, capable of detect- ing density discontinuities and singularities at a very high resolution

Nowak, Robert

250

Pervasive transcription: illuminating the dark matter of bacterial transcriptomes.  

PubMed

The conventional view of transcription posits that mRNAs are generated from the coding DNA strand and are delineated by gene boundaries; however, recent reports have mapped transcription start sites to unexpected locations in bacterial genomes, including the non-coding strand. The resultant RNAs were previously dismissed as artefacts, but models that describe such events as 'pervasive transcription' are now gaining support. In this Opinion article, we discuss our current understanding of pervasive transcription, its genetic origin and its regulation. On the basis of existing observations, we propose that RNAs that result from pervasive transcription are more than 'transcriptional noise' and have important functions in gene regulation and genome evolution. PMID:25069631

Wade, Joseph T; Grainger, David C

2014-09-01

251

"What Are You Viewing?" Exploring the Pervasive Social TV Experience  

NASA Astrophysics Data System (ADS)

The vision of pervasive TV foresees users engaging with interactive video services across a variety of contexts and user interfaces. Following this idea, this chapter extends traditional Social TV toward the notion of pervasive Social TV (PSTV) by including mobile viewing scenarios. We discuss social interaction enablers that integrate TV content consumption and communication in the context of two case studies that evaluate Social TV on mobile smartphones as well as the traditional set-top-box-based setup. We report on the impact of social features such as text-chat, audio-chat, and synchronized channel-choice on the end-user's media experience. By analyzing the commonalities and the differences between mobile and living-room Social TV that we found, we provide guidance on the design of pervasive Social TV systems as well as on future research issues.

Schatz, Raimund; Baillie, Lynne; Frhlich, Peter; Egger, Sebastian; Grechenig, Thomas

252

32 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/04/$20.00 2004 IEEE U B I Q U I T O U S S Y S T E M S O F T W A R E  

E-print Network

B I Q U I T O U S S Y S T E M S O F T W A R E Semantic Space: An Infrastructure for Smart Spaces C't be interrupted and schedules a call back when the seminar ends. Soon after the seminar, Professor Geller asks

Dong, Jin Song

253

94 IEEE TRANSACTIONS ON NANOTECHNOLOGY, VOL. 13, NO. 1, JANUARY 2014 On the Electrostatics of Bernal-Stacked Few-Layer  

E-print Network

, IEEE, Hong Li, Member, IEEE, Wei Liu, Member, IEEE, and Kaustav Banerjee, Fellow, IEEE Abstract was arranged by Associate Editor A. Ghosh. Y. Khatami was with the Department of Electrical and Computer of California, Santa Barbara, CA 93106 USA (e-mail: liuwei@ece.ucsb.edu; kaustav@ece.ucsb.edu). Color versions

254

4 July/August 2009 Published by the IEEE Computer Society 0272-1716/09/$25.00 2009 IEEE Visualization Viewpoints  

E-print Network

(video games for training or learning), VR, and human-computer inter- tween these extremes. Out of curiosity, we asked two women with no computer science training to look resistant to using a new system. So, getting "eyes on the screen" can be problematic. The serious-games

Tory, Melanie

255

Semantic Computing, Cloud Computing, and Semantic Search Engine  

Microsoft Academic Search

Semantic Computing extends Semantic Web both in breadth and depth. It bridges, and integrates, technologies such as software engineering, user interface, natural language processing, artificial intelligence, programming language, grid computing and pervasive computing, among others, into a complete and unified theme. Cloud Computing, the dream of computing as a utility, shifts user programs and data from personal computers to the

Phillip C.-Y. Sheu; Shu Wang; Qi Wang; Ke Hao; Raymond A. Paul

2009-01-01

256

IEEE TRANSACTIONS ON MOBILE COMPUTING, TMC-0168-0605.R2 1 SoftMAC: Layer 2.5 Collaborative MAC  

E-print Network

commercial IEEE 802.11 MAC DCF hardware, and propose a novel software solution, called Layer 2.5 SoftMAC. Our proposed SoftMAC resides between the IEEE 802.11 MAC layer and IP layer to coordinate the real-time (RT wireless nodes equipped with IEEE 802.11 a/b/g combo cards. Our evaluation and testing results demonstrate

Minnesota, University of

257

A comparison of three rounding algorithms for IEEE oating-point multiplication.  

E-print Network

1 A comparison of three rounding algorithms for IEEE oating-point multiplication. Guy Even and Peter-M. Seidel Abstract| A new IEEE compliant oating-point round- ing algorithm for computing., and 16 logic levels in the algorithm of Yu and Zyner. Keywords| oating-point arithmetic, IEEE 754

Seidel, Peter-Michael

258

492 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010 Forensic Detection of Image Manipulation Using  

E-print Network

, IEEE, and K. J. Ray Liu, Fellow, IEEE Abstract--As the use of digital images has increased, so has it for publication was Dr. Jessica J. Fidrich. The authors are with the Department of Electrical and Computer Engi

Liu, K. J. Ray

259

Brave New World: Pervasive Insecurity of Embedded Network Devices  

E-print Network

Brave New World: Pervasive Insecurity of Embedded Network Devices Ang Cui, Yingbo Song, Pratap V and together form our world-wide com- munication infrastructure. Widely deployed and often misconfigured of a vulnerability assessment of embedded network devices within the world's largest ISPs and civilian networks

Yang, Junfeng

260

Pervasive Learning Games: Explorations of Hybrid Educational Gamescapes  

ERIC Educational Resources Information Center

Pervasive gaming has tremendous potential as a learning tool and represents an interesting development in the field of video games and education. The literature surrounding video games and education is vast: For more than 20 years, educationalists have been discussing the potential that exists for the application of video games to learning.

Thomas, Siobhan

2006-01-01

261

Affect comprehension in children with pervasive developmental disorders  

Microsoft Academic Search

Affect comprehension was studied in children with pervasive developmental disorders (PDD) and normal children matched for mental age. Three matching tasks were used: matching objects (a nonsocial control task), matching faces, and matching affects. The three tasks were developed to be of equal difficulty for normal children. Children were also tested for comprehension and expression of affect terms. The PDD

Mark Braverman; Deborah Fein; Dorothy Lucci; Lynn Waterhouse

1989-01-01

262

SOA Interoperability for Large-Scale Pervasive Environments  

Microsoft Academic Search

Since years, the infrastructural support of pervasive environments like intelligent rooms and houses is an active matter of research. Corresponding projects have been agreed upon service-oriented architectures (SOA) to be used for a most flexible and transparent integration of existing services and applications in those scenarios. But, in times of everywhere low-priced internet access as well as ubiquitous use of

Raphael Zender; Ulrike Lucke; Djamshid Tavangarian

2010-01-01

263

Making Sense of Accelerometer Measurements in Pervasive Physical  

E-print Network

Making Sense of Accelerometer Measurements in Pervasive Physical Activity Applications Abstract to caloric measurements, which are the standard physical activity units. The importance of these results. The paper's methodology can be used in further studies in other physical activity contexts, where more

264

Fragmented Visuospatial Processing in Children with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

Children diagnosed with Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS) and Asperger Syndrome (AS) may be characterised by a similar perceptual focus on details as children with autistic disorder (AD). This was tested by analysing their performance in a visuoperceptual task [the Children's Embedded Figure Test (CEFT)] and a

Schlooz, Wim A. J. M.; Hulstijn, Wouter; van den Broek, Pieter J. A.; van der Pijll, Angela C. A. M.; Gabreels, Fons; van der Gaag, Rutger J.; Rotteveel, Jan J.

2006-01-01

265

Distributed video game streaming system for pervasive gaming  

E-print Network

Distributed video game streaming system for pervasive gaming A. Jurgelionis1 , F. Bellotti2 , A. De video game streaming system. Newly developed streaming protocols and system architectures enable that the Games@Large system is capable of running video games of different genres, also including First Person

Eisert, Peter

266

Policy Based Control of Context Aware Pervasive Services  

E-print Network

Policy Based Control of Context Aware Pervasive Services Evi Syukur1 and Seng Wai Loke2 1 School awareness is important if we want to give a mobile user autonomous, responsive and attentive services issues regarding location modeling, system design and implementation of simple awareness scenarios

Loke, Seng W. - Loke, Seng W.

267

Chapter XX: Pervasive Sensing and Monitoring for Situational Awareness  

E-print Network

and processes which can then be used to gain situational awareness of the activities in the instrumented spaceChapter XX: Pervasive Sensing and Monitoring for Situational Awareness. Situational awareness, in a broad sense, refers to a continuum of knowledge that captures the current state

268

Injury Treatment among Children with Autism or Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

This study examined the differences in the frequency and type of injury for children with autism and pervasive developmental disorder (PDD) compared with typically developing peers, when both groups are insured by Medicaid. The relative rate (RR) of emergency/hospital treatment of injury for children with autism or PDD compared to controls was

McDermott, Suzanne; Zhou, Li; Mann, Joshua

2008-01-01

269

Pervasive Developmental Disorders in Individuals with Cerebral Palsy  

ERIC Educational Resources Information Center

The aim of the present study was to describe the prevalence and associated factors of pervasive developmental disorders (PDD), including autistic disorder and PDD not otherwise specified (NOS), in a clinical sample of 126 children and adolescents (75 males, 51 females; age range 4-18y, mean 8y 8mo, SD 3y 8mo) with tetraplegic, hemiplegic,

Kilincaslan, Ayse; Mukaddes, Nahit Motavalli

2009-01-01

270

Pervasive and Social Compu3ng George Roussos  

E-print Network

Cp://nexus.ludios.net/ Facebook personal social graph Real-world social network inferred via BT Kostakos et #12;· Beyond instrumenta3on and connec3vity ­Map-reduce and other Big DataPervasive and Social Compu3ng George Roussos Birkbeck College, University

Roussos, George

271

Survey of IEEE802.21 Media Independent Handover Services  

E-print Network

\\handover\\index.html #12;1. Introduction Computer networks have evolved over time from coaxial to Ethernet, from 802.11b Independent Information Services (MIIS) 4. Reference Models 4.1 IEEE 802.3 4.2 IEEE 802.11 4.3 IEEE 802.16 4 to 802.11g, analog cellular to 1G to 2G to 2.5G to 3G, with many more improvements in store including 802.11

Jain, Raj

272

Online Gaming 18 COPublished by the ieee COmPuter and reliability sOCieties 1540-7993/09/$25.00 2009 ieee may/June 2009  

E-print Network

into developing their next big title. The market leader alone--Blizzard Enter- tainment's World of Warcraft (Wo to Blizzard, and any violations result in temporary or permanent account bans. However, the Warden has several bot writers, and it runs on the client's computer, which is completely out of Blizzard's control

Kruegel, Christopher

273

66 PERVASIVEcomputing Published by the IEEE CS n 1536-1268/08/$25.002008IEEE Editor:ShaniMurraynsmurray@computer.org  

E-print Network

:ShaniMurraynsmurray@computer.org User Innovation and Hacking Eric von Hippel and Joseph A. Paradiso In the introduction to this special issue on hacking, the guest editors describe the true hacker as "an individual who can achieve miracles--often via hacking--to serve their own needs. Who are users? Users, as we define the term, are firms

274

48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.  

Code of Federal Regulations, 2013 CFR

...the Environmental Assessment of Personal Computer Products. 52.223-16 Section...the Environmental Assessment of Personal Computer Products. As prescribed in 23.705...the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

2013-10-01

275

48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.  

Code of Federal Regulations, 2010 CFR

...Environmental Assessment of Personal Computer Products. 52.223-16 Section...Environmental Assessment of Personal Computer Products. As prescribed in 23...Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

2010-10-01

276

IEEE Communications Magazine Call for Papers  

E-print Network

://mc.manuscriptcentral.com/commagieee) by the deadline. Submit articles to the "March 2015/Mobile Cloud Computing" category. Important DatesIEEE Communications Magazine Call for Papers Feature Topic on Mobile Cloud Computing Mobile Cloud Computing refers to an infrastructure where both the data storage and the data processing occur

Fu, Xiaoming

277

Pervasive access to MRI bias artifact suppression service on a grid.  

PubMed

Bias artifact corrupts MRIs in such a way that the image is afflicted by illumination variations. Some of the authors proposed the exponential entropy-driven homomorphic unsharp masking ( E(2)D-HUM) algorithm that corrects this artifact without any a priori hypothesis about the tissues or the MRI modality. Moreover, E(2)D-HUM does not care about the body part under examination and does not require any particular training task. People who want to use this algorithm, which is Matlab-based, have to set their own computers in order to execute it. Furthermore, they have to be Matlab-skilled to exploit all the features of the algorithm. In this paper, we propose to make such algorithm available as a service on a grid infrastructure, so that people can use it almost from everywhere, in a pervasive fashion, by means of a suitable user interface running on smartphones. The proposed solution allows physicians to use the E(2)D-HUM algorithm (or any other kind of algorithm, given that it is available as a service on the grid), being it remotely executed somewhere in the grid, and the results are sent back to the user's device. This way, physicians do not need to be aware of how to use Matlab to process their images. The pervasive service provision for medical image enhancement is presented, along with some experimental results obtained using smartphones connected to an existing Globus-based grid infrastructure. PMID:19129027

Ardizzone, Edoardo; Gambino, Orazio; Genco, Alessandro; Pirrone, Roberto; Sorce, Salvatore

2009-01-01

278

The pervasive role of biological cohesion in bedform development.  

PubMed

Sediment fluxes in aquatic environments are crucially dependent on bedform dynamics. However, sediment-flux predictions rely almost completely on clean-sand studies, despite most environments being composed of mixtures of non-cohesive sands, physically cohesive muds and biologically cohesive extracellular polymeric substances (EPS) generated by microorganisms. EPS associated with surficial biofilms are known to stabilize sediment and increase erosion thresholds. Here we present experimental data showing that the pervasive distribution of low levels of EPS throughout the sediment, rather than the high surficial levels of EPS in biofilms, is the key control on bedform dynamics. The development time for bedforms increases by up to two orders of magnitude for extremely small quantities of pervasively distributed EPS. This effect is far stronger than for physical cohesion, because EPS inhibit sand grains from moving independently. The results highlight that present bedform predictors are overly simplistic, and the associated sediment transport processes require re-assessment for the influence of EPS. PMID:25656496

Malarkey, Jonathan; Baas, Jaco H; Hope, Julie A; Aspden, Rebecca J; Parsons, Daniel R; Peakall, Jeff; Paterson, David M; Schindler, Robert J; Ye, Leiping; Lichtman, Ian D; Bass, Sarah J; Davies, Alan G; Manning, Andrew J; Thorne, Peter D

2015-01-01

279

Supporting People with Dementia Using Pervasive Healthcare Technologies  

NASA Astrophysics Data System (ADS)

In this chapter, an introduction is provided into pervasive healthcare technology, specifically as the use of information and communications technology in support of European policies, primarily inclusion. The focus of the chapter, and indeed the book, is on how such technologies can support people suffering from debilitating diseases including Alzheimer's. The work describes a research project called COGKNOW, comprising a multidisciplinary research consortium of scientists from across Europe, and relates some of the early achievements of the group from some very different perspectives, including technical, clinical, ethical, and of course how the needs of people with dementia and their carers can be harnessed in the development process to produce pervasive healthcare technology and services that are valued by all the stakeholders in the process.

Mulvenna, Maurice D.; Nugent, Chris D.; Moelaert, Ferial; Craig, David; Dres, Rose-Marie; Bengtsson, Johan E.

280

Pervasive and Non-Pervasive Conduct Problems in a Clinic Sample Aged 4-8 Years: Child, Family and Day-Care/School Factors  

ERIC Educational Resources Information Center

Differences between pervasive (home and day-care/school) versus non-pervasive (home only) conduct problems were examined in regard to various child, parent/family, and day-care/school characteristics in an outpatient clinic sample of 120 children aged 4-8 years. All children scored above the 90th percentile on the Eyberg Child Behavior Inventory

Drugli, May Britt; Larsson, Bo; Clifford, Graham; Fossum, Sturla

2007-01-01

281

To appear in Empirical Evaluation Techniques in Computer Vision, K.W. Bowyer and P.J. Phillips, eds, IEEE Computer Society Press, Los Alamitos, CA, 1998.  

E-print Network

To appear in Empirical Evaluation Techniques in Computer Vision, K.W. Bowyer and P.J. Phillips, eds of Computer Vision Algorithms Kevin W. Bowyer1 and P. Jonathon Phillips2 1 Department of Computer Science of Standards and Technology Gaithersburg, MD 20899, USA jonathon@nist.gov 1: Introduction Computer vision

Bowyer, Kevin W.

282

780 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 53, NO. 5, MAY 2006 FDTD Analysis of a Gigahertz TEM Cell  

E-print Network

Member, IEEE, Susan C. Hagness, Senior Member, IEEE, John H. Booske, Senior Member, IEEE, Satnam Mathur. Booske are with the Department of Electrical and Computer Engineering, University of Wisconsin, Madison, WI 53706 USA (e-mail: hagness@engr.wisc.edu; booske@engr.wisc.edu). S. Mathur was with McKesson Bio

Sheridan, Jennifer

283

656 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 3, JUNE 2008 Polynomial Time Approximation Algorithms for  

E-print Network

, Jian Tang, Member, IEEE, and Krishnaiyan Thulasiraman, Fellow, IEEE Abstract--We study the multi by IEEE/ACM TRANSACTIONS ON NETWORKING Editor Z.-L. Zhang. The work of G. Xue, W. Zhang, and J. Tang USA (e-mail: weiyi.zhang@ndsu.edu). J. Tang is with the Department of Computer Science, Montana State

Tang, Jian "Neil"

284

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. X, NO. X, SEPTEMBER 2013 1 On the Quality of Service of Cloud Gaming  

E-print Network

Gaming Systems Kuan-Ta Chen, Member, IEEE, Yu-Chun Chang, Hwai-Jung Hsu, De-Yu Chen, Chun-Ying Huang, Member, IEEE, Cheng-Hsin Hsu, Member, IEEE Abstract Cloud gaming, i.e., real-time game playing via thin issues between games and computers. As a result, cloud gaming is generating a great deal of interests

Chen, Sheng-Wei

285

Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries  

E-print Network

re- sponse. 1 Introduction A current trend in pervasive devices is towards multi-radio support to infrastructure networks. Many current cell phones already contain Bluetooth radios that enable peer Communications (DSRC), a wire- less communications standard for inter-vehicle net- works based on the IEEE 802

Gruteser, Marco

286

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 23, NO. 6, JUNE 2004 987 Computational Forensic Techniques for Intellectual  

E-print Network

. Computational forensic engineering (CFE) copes with these prob- lems by trying to identify the tool used 2004 987 Computational Forensic Techniques for Intellectual Property Protection Jennifer L. Wong, Darko Kirovski, and Miodrag Potkonjak Abstract--Computational forensic engineering (CFE) aims to identify

Wong, Jennifer L.

287

IEEE Network July/August 201356 0890-8044/13/$25.00 2013 IEEE he cloud has long been envisioned as the next gener-  

E-print Network

Polytechnic Institute and State University Abstract Cloud computing is envisioned as the next generation of elastic resources [1]. In this emerging computing platform, the cloud provider, application developersIEEE Network · July/August 201356 0890-8044/13/$25.00 © 2013 IEEE he cloud has long been envisioned

Hou, Y. Thomas

288

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 9, NO. 1, FEBRUARY 2001 205 ACKNOWLEDGMENT  

E-print Network

. Soc. Optical Engineering (SPIE). Field Programmable Gate Arrays (FPGAs) Fast Board Development. Rytting, "A cad suite for high-performance fpga design," in Proc. IEEE Workshop FPGAs Custom Computing Terms--Adaptive computing, Boolean satisfiability, computer arithmetic, configurable computing. I

Hellebrand, Sybille

289

IEEE History Center  

NSDL National Science Digital Library

The Institute of Electrical and Electronics Engineers (IEEE) History Center functions "to preserve, research and promote the history of information and electrical technologies." There are many resources on the center's Web site that provide an excellent perspective into some of the original breakthroughs in electrical design and the more recent advancements in computer technology. Historical articles and list of frequently asked questions are given on the site, as well as many transcripts of interviews with influential people of the industry. A Milestones section highlights 45 of the most groundbreaking achievements around the world. Every day, a new electrical engineering-related anniversary is presented on the homepage.

290

[Pervasive refusal syndrome in a 12-year-old boy].  

PubMed

We describe a formerly healthy boy aged 12 years with a two-month history of severe coughing and abdominal pain leading to school absence. During admission he became increasingly immobilised and unable to perform activities of daily life, and finally simply adopted the foetal position and needed gastric tube feeding. Gradual restitution was achieved during a 34-month stay as an inpatient at a child psychiatric department. He fulfilled all proposed criteria of the pervasive refusal syndrome. At a follow-up at the age of 20 years, he was pursuing a normal independent life with his girlfriend and was attending higher education. PMID:21501567

Christensen, Ann-Margrethe Rnholt; Thelle, Thomas

2011-04-18

291

Fluoxetine treatment of selective mutism in pervasive developmental disorder.  

PubMed

We report the successful treatment of selective mutism in a child with pervasive developmental disorder (PDD). There are several studies and case reports in which Fluoxetine has been reported effective in diminishing adult social anxiety and increasing speech in public settings. The literature is much smaller for children. The efficacy of fluoxetine supports the argument that selective mutism is a developmental equivalent of social anxiety disorder. To our knowledge this is the first description of successful treatment when the selective mutism is complicated by PDD. PMID:24941208

Silveira, Raza; Jainer, Ashok Kumar; Bates, Gordon

2004-01-01

292

ALiCE: A Java-based Grid Computing System  

E-print Network

A computational grid is a hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities. This talk is divided into three parts. Firstly, ...

Teo, Yong Meng

293

Published by the IEEE CS n 1536-1268/10/$26.00 2010 IEEE PERVASIVE computing 71 W E A R A B L E C O M P U T I N G A N D H E A L T H C A R E  

E-print Network

, because the heart is the loudest organ in the body and easy to sense acousti- cally, PCG can use a very applications consists of a custom integrated circuit, an antenna for radio frequency energy harvesting of transmitted patient data, whether it should trigger an alarm. Energy Harvesting The tag contains a low

Sarpeshkar, Rahul

294

24 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$25.00 2009 IEEE C r o s s -r e a l i t y e n v i r o n m e n t s  

E-print Network

by some of today's leading specula- tive-fiction authors.1,2 Researchers and practitioners have been with Online Virtual Worlds"). Classically subsumed under the heading of mixed reality,3 common implementations been around for over two decades (for example, lucasFilm's 1986 Habitat), they have evolved enormously

295

On the Use of IEEE Std. 802.15.4 to Enable Wireless Sensor Networks in Building Automation  

Microsoft Academic Search

IEEE 802.15.4 is a new standard that addresses the need of low-rate wireless personal area networks or LR-WPAN with a focus\\u000a on enabling pervasive wireless sensor networks for residential, commercial and industrial applications. The standard is characterized\\u000a by maintaining a high level of simplicity, allowing for low cost and low power implementations. This paper presents a brief\\u000a technical introduction of

Jos A. Gutirrez

2007-01-01

296

On the use of IEEE 802.15.4 to enable wireless sensor networks in building automation  

Microsoft Academic Search

IEEE 802.15.4 is a new standard that addresses the need of low-rate wireless personal area networks or LR-WPAN with a focus on enabling pervasive wireless sensor networks for residential, commercial and industrial applications. The standard is characterized by maintaining a high level of simplicity, allowing for low cost and low power implementations. This work presents a brief technical introduction of

Jose A. Gutierrez

2004-01-01

297

IEEE Copyright Statement: Copyright IEEE.  

E-print Network

* Conference or Journal Yr/Mo Citation J 2013.00 Distributed Energy Resources Integration Challenges in Low, L.A.F.M. ; Ilic, M.D. IEEE Transactions on Sustainable Energy, Volume: 4 , Issue: 1, 2013, Page , Page(s): 214 - 232 J 2011.00 Dynamic Monitoring and Decision Systems for Enabling Sustainable Energy

Ilic, Marija D.

298

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, ACCEPTED FOR PUBLICATION 1 Information Flow Control for  

E-print Network

Control for Secure Cloud Computing Jean Bacon, Fellow, IEEE, David Eyers, Member, IEEE, Thomas F. JSafetyNet: End- to-End Application Security in the Cloud." J. Bacon, T. F. J.-M. Pasquier, and J. Singh are with the Computer Lab- oratory, University of Cambridge, UK (e-mail: {jean.bacon, thomas.pasquier, jatinder

Cambridge, University of

299

Pervasive Developmental Disorders: From DSM-III to DSM-III-R.  

ERIC Educational Resources Information Center

This paper provides a history of the development of the DSM-III-R (Diagnostic and Statistical Manual III, Revised) section on pervasive developmental disorders. It describes the process by which the text and criteria for "Autistic Disorder" and "Pervasive Developmental Disorder Not Otherwise Specified" were decided and gives reasons for changes

Waterhouse, Lynn; And Others

1992-01-01

300

A framework for long-term archiving of pervasive device information  

Microsoft Academic Search

In this paper we describe an approach for preserving personal information, stored on pervasive devices, using a reliable platform. Nowadays, pervasive devices such as mobile phones or personal multimedia players, provide software and hardware capabilities that allow individuals to read and create digital contents. Therefore it is important to provide the ability to archive these contents for later retrieval and

Reza Rawassizadeh; Amin Anjomshoaa; Martin Tomitsch

2011-01-01

301

Reliability and Validity of the "Pervasive Developmental Disorders Rating Scale" and the "Gilliam Autism Rating Scale"  

ERIC Educational Resources Information Center

The psychometric properties of the Pervasive Developmental Disorders Rating scale (Eaves, 2003) and the Gilliam Autism Rating Scale (Gilliam, 1995) were investigated in this study. One hundred thirty-four individuals with autism, other pervasive developmental disorders, or conditions frequently confused with autism participated in the study. The

Eaves, Ronald C.; Woods-Groves, Suzanne; Williams, Thomas O., Jr.; Fall, Anna-Maria

2006-01-01

302

Developing a theory and practise of pervasive information capture, processing, visualization and documentation  

Microsoft Academic Search

Developing a theoretical framework for pervasive information environments is an enormous goal. This paper aims to provide a small step towards such a goal. The following pages report on our initial investigations to devise a framework that will continue to support locative, experiential and evaluative data from 'user feedback' in an increasingly pervasive information environment. We loosely attempt to outline

Colin Price; Elizabeth Coulter-Smith

2005-01-01

303

Pervasive Rehabilitation of Aphasia with an eXtensible Interactive System  

E-print Network

PRAXIS: Pervasive Rehabilitation of Aphasia with an eXtensible Interactive System Phase I: Design Rehabilitation of Aphasia with an eXtensible Interactive System: Phase I (PRAXIS) Supervisors: Mr. Mikael. _____________________ Kiernan Burke Date: #12;iii ABSTRACT PRAXIS: Pervasive Rehabilitation of Aphasia with an e

Boyer, Edmond

304

Ambient and wearable sensing for gait classification in pervasive healthcare environments  

Microsoft Academic Search

Pervasive healthcare environments provide an effective solution for monitoring the wellbeing of the elderly where the general trend of an increasingly ageing population has placed significant burdens on current healthcare systems. An important pervasive healthcare system functionality is patient motion analysis where gait information can be used to detect walking behavior abnormalities that may indicate the onset of adverse health

M. ElSayed; A. Alsebai; A. Salaheldin; N. El Gayar; M. ElHelw

2010-01-01

305

Criterion-Related and Construct Validity of the Pervasive Developmental Disorders Rating Scale and the Autism Behavior Checklist.  

ERIC Educational Resources Information Center

Investigates validity of the Autism Behavior Checklist (ABC) measuring characteristics of individuals with autism, and the Pervasive Developmental Disorder Rating Scale (PDDRS) measuring pervasive developmental disorders. Results showed both instruments significantly discriminated between participants with autistic disorder and children with

Eaves, Ronald C.; Campbell, Hollie A.; Chambers, DaLee

2000-01-01

306

1194 IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, VOL. 51, NO. 4, APRIL 2003 Sensing Volume of Open-Ended Coaxial Probes for  

E-print Network

, IEEE, John H. Booske, Senior Member, IEEE, and Michal Okoniewski, Senior Member, IEEE Abstract. Booske are with the Department of Electrical and Computer Engineering, University of Wisconsin­Madison, Madison, WI 53706 USA (e-mail: hagness@engr.wisc.edu; booske@engr.wisc.edu). Digital Object Identifier 10

Sheridan, Jennifer

307

IEEE TRANSACTIONS ON TERAHERTZ SCIENCE AND TECHNOLOGY, VOL. 2, NO. 4, JULY 2012 449 A High-Q Terahertz Resonator for the Measurement  

E-print Network

, Irena Knezevic, Member, IEEE, Susan C. Hagness, Fellow, IEEE, and John H. Booske, Fellow, IEEE Abstract with AWR Corporation, Mequon, WI 53092 USA. I. Knezevic, S. C. Hagness, and J. H. Booske (e-mail: booske@engr.wisc.edu). M. J. Weber was with Department of Electrical and Computer

Sheridan, Jennifer

308

3188 IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, VOL. 57, NO. 12, DECEMBER 2009 An Analytical Approach to Computer-  

E-print Network

of existing CAT methods is the sequential tuning scheme that is applicable to strongly detuned resonators to bring a severely detuned in-line coupled resonator filter to res- onance. The major difficulties An Analytical Approach to Computer- Aided Diagnosis and Tuning of Lossy Microwave Coupled Resonator Filters Meng

Wu, Ke-Li

309

IEEE TRANSACTIONS ON COMPUTERS, VOL. c-33, NO. 10, OCT[OBER 1984 x X XX * Xn Xn  

E-print Network

., vol. C-28, Sept. 1979. [4] S. A. Cook, "The complexity of theorem-proving procedures," in Proc. 3rd and D. S. Johnson, Computers and Intractability: A Guide to the Theory ofNP-Completeness. San Francisco model which provides a means for realizing an arbitrary permutation through various cellular- array

Oruc, A. Yavuz

310

IEEE PHOTONICS TECHNOLOGY LETTERS, VOL. 15, NO. 1, JANUARY 2003 45 Efficient Computation of Outage Probabilities Due  

E-print Network

for the computation of the penalty induced by polarization effects in long-haul transmis- sion systems. The reduced Probabilities Due to Polarization Effects in a WDM System Using a Reduced Stokes Model and Importance Sampling-fiber transmission system due to the com- bination of polarization mode dispersion, polarization dependent loss

Zweck, John

311

56 IEEE COMMUNICATIONS LETTERS, VOL. 10, NO. 1, JANUARY 2006 Computation of Bit-Error Probabilities for Optical  

E-print Network

APDs, originally developed by McIntyre [7], is not applicable to thin APDs. Subsequently, a generalized-sampling methods for computing bit-error probabil- ities for avalanche-photodiode (APD) based optical receivers, de to include the effect of dead space, which is significant in high-speed APDs with thin multiplication regions

Hayat, Majeed M.

312

In Proc. 13th IEEE International Conference on Computer Vision, Barcelona, Spain, November 2011. Extracting Foreground Masks towards Object Recognition  

E-print Network

. Extracting Foreground Masks towards Object Recognition Amir Rosenfeld and Daphna Weinshall School of Computer recognition more directly - the extraction of a foreground mask, which identifies the locations of objects segmentation datasets, achieving excellent results in providing a foreground mask. We also provide comparisons

Weinshall, Daphne

313

IEEE TRANSACTIONS ON MEDICAL IMAGING, VOL. 27, NO. 5, MAY 2008 589 Using Perturbation Theory to Compute the  

E-print Network

of diffusion tensors (DTs) at neighboring voxels within a DT image, or at corresponding locations across. The morphological similarity of DTs typically has been computed using either the principal directions (PDs) of DTs. Although comparing PDs allows the similarity of one morphological feature of DTs to be visualized directly

314

Withdrawal Study of Memantine in Pediatric Patients With Autism, Asperger's Disorder, or Pervasive Developmental Disorder Not Otherwise Specified Previously Treated With Memantine  

ClinicalTrials.gov

Autism Spectrum Disorder (ASD); Autism; Autistic Disorder; Asperger's Disorder; Asperger's; Pediatric Autism; Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS); Pervasive Child Development Disorder

2013-10-31

315

Safety Study of Memantine in Pediatric Patients With Autism, Asperger's Disorder or Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS)  

ClinicalTrials.gov

Autism Spectrum Disorder (ASD); Autism; Autistic Disorder; Asperger's Disorder; Asperger's; Pediatric Autism; Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS); Pervasive Child Development Disorder

2014-06-05

316

The molecular basis of cognitive deficits in pervasive developmental disorders  

PubMed Central

Persons with pervasive developmental disorders (PDD) exhibit a range of cognitive deficits that hamper their quality of life, including difficulties involving communication, sociability, and perspective-taking. In recent years, a variety of studies in mice that model genetic syndromes with a high risk of PDD have provided insights into the underlying molecular mechanisms associated with these disorders. What is less appreciated is how the molecular anomalies affect neuronal and circuit function to give rise to the cognitive deficits associated with PDD. In this review, we describe genetic mutations that cause PDD and discuss how they alter fundamental social and cognitive processes. We then describe efforts to correct cognitive impairments associated with these disorders and identify areas of further inquiry in the search for molecular targets for therapeutics for PDD. PMID:22904374

Bhattacharya, Aditi; Klann, Eric

2012-01-01

317

Fragmented visuospatial processing in children with pervasive developmental disorder.  

PubMed

Children diagnosed with Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS) and Asperger Syndrome (AS) may be characterised by a similar perceptual focus on details as children with autistic disorder (AD). This was tested by analysing their performance in a visuoperceptual task [the Children's Embedded Figure Test (CEFT)] and a graphic reproduction task [the Rey Complex Figure Task (Rey CFT)]. Control groups were children with Tourette Syndrome (TS) and typically developing children. The TS sample performed similarly to the normal control group in both tasks. The CEFT results did not show the expected preference for local processing in children with PDD-NOS. However, the Rey CFT data revealed that the children with this lesser variant of PDD processed visuospatial information in a fragmented way and were deficient in global processing. PMID:16897391

Schlooz, Wim A J M; Hulstijn, Wouter; van den Broek, Pieter J A; van der Pijll, Angela C A M; Gabrels, Fons; van der Gaag, Rutger J; Rotteveel, Jan J

2006-11-01

318

Pervasive axonal transport deficits in multiple sclerosis models.  

PubMed

Impaired axonal transport can contribute to axon degeneration and has been described in many neurodegenerative diseases. Multiple sclerosis (MS) is acommon neuroinflammatory disease, which is characterized by progressive axon degeneration-whether, when, and how axonal transport is affected in this condition is unknown. Here we used invivo two-photon imaging to directly assay transport of organelles and the stability of microtubule tracks in individual spinal axons in mouse models of MS. We found widespread transport deficits, which precededstructural alterations of axons, cargos, or microtubules and could be reversed by acute anti-inflammatoryinterventions or redox scavenging. Our study shows that acute neuroinflammation induces a pervasive state of reversible axonal dysfunction, which coincides with acute disease symptoms. Moreover, perpetuated transport dysfunction, as we found in a model of progressive MS, led to reduced distal organelle supply and could thus contribute to axonal dystrophy in advanced stages of the disease. PMID:25433639

Sorbara, Catherine Diamante; Wagner, Naomi Elizabeth; Ladwig, Anne; Niki?, Ivana; Merkler, Doron; Kleele, Tatjana; Marinkovi?, Petar; Naumann, Ronald; Godinho, Leanne; Bareyre, Florence Martine; Bishop, Derron; Misgeld, Thomas; Kerschensteiner, Martin

2014-12-17

319

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. XX, NO. XX, JANUARY 20XX 1 Cone Tracing for Furry Object Rendering  

E-print Network

Tracing for Furry Object Rendering Hao Qin, Menglei Chai, Qiming Hou, Zhong Ren and Kun Zhou, Senior Member, IEEE Abstract--We present a cone-based ray tracing algorithm for high-quality rendering of furry for furry objects which is able to render images of quality comparable to those generated by alternative

Zhou, Kun

320

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2006 211 Microfluidics-Based Biochips: Technology  

E-print Network

, FEBRUARY 2006 211 Microfluidics-Based Biochips: Technology Issues, Implementation Platforms, and Design, Fellow, IEEE Abstract--Microfluidics-based biochips are soon expected to revolutionize clinical diagnosis of bioassays. As more bioassays are executed concurrently on a biochip, system integration and design

Chakrabarty, Krishnendu

321

1248 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS--PART A: SYSTEMS AND HUMANS, VOL. 38, NO. 6, NOVEMBER 2008 A HumanComputer Interface Using Symmetry  

E-print Network

, such as multiple sclerosis (MS) or amyotrophic lateral sclerosis (ALS or "Lou Gehrig's disease"). According to the National Multiple Sclerosis Society [3], approximately 400 000 Americans acknowledge having MS, and every1248 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS--PART A: SYSTEMS AND HUMANS, VOL. 38, NO. 6

Betke, Margrit

322

1012 IEEE TRANSACTIONS ON ELECTROMAGNETIC COMPATIBILITY, VOL. 47, NO. 4, NOVEMBER 2005 removed. This permits the FDTD method to be used for computing the  

E-print Network

1012 IEEE TRANSACTIONS ON ELECTROMAGNETIC COMPATIBILITY, VOL. 47, NO. 4, NOVEMBER 2005 removed. Telecom., vol. 54, no. 5­6, pp. 297­ 310, 1999. [5] S. A. Cummer, "Modeling electromagnetic propagation are consideredandrepresentedby a chainof quadripolarmatrices: theinverter, the cables, and the induction motor. At last

Boyer, Edmond

323

Wearable computers: no longer science fiction  

Microsoft Academic Search

By using devices carried on the body, wearable computers allow the exploration of the principles of pervasive computing immediately instead of waiting for the deployment of the ubiquitous infrastructure often associated with the field. However, wearable computers are often misunderstood, both in their research and application. I've been wearing a computer as part of my daily life since 1993, and

T. E. Starner

2002-01-01

324

Human-computer interaction in ubiquitous computing environments  

Microsoft Academic Search

Purpose The purpose of this paper is to explore characteristics of human-computer interaction when the human body and its movements become input for interaction and interface control in pervasive computing settings. Design\\/methodology\\/approach The paper quantifies the performance of human movement based on Fitt's Law and discusses some of the human factors and technical considerations that arise in trying

Jemal H. Abawajy

2009-01-01

325

Usage Management in Cloud Computing  

Microsoft Academic Search

User concerns regarding data handling within the cloud will gain increasing importance as cloud computing becomes more pervasive. Existing service level agreement (SLA) frameworks are not designed for flexibly handling even relatively straightforward usage policies. This paper introduces the notion and importance of usage management in cloud computing. It provides an analysis of features and challenges involved in deploying a

Pramod A. Jamkhedkar; Christopher C. Lamb; Gregory L. Heileman

2011-01-01

326

SCAMPI: Service platform for soCial Aware Mobile and Pervasive computIng  

E-print Network

, J. Ott Comnet Aalto University, Finland M. Conti, A. Passarella IIT CNR, Italy S. Giordano, D to lists, requires prior specific permission and/or a fee. MCC'12, August 17, 2012, Helsinki, Finland to distributed data mining. Indeed, it is appealing to exploit the richness of diverse social, contextual

Ott, Jörg

327

MB++: An Integrated Architecture for Pervasive Computing and High-Performance Computing  

E-print Network

@cc.gatech.edu Umakishore Ramachandran rama@cc.gatech.edu Abstract MB++ is a system that caters to the dynamic needs. The stream server manages all data streams in the system and dispatches new dataflow graphs to the trans are constrained in processing capability, memory, and power consumption. In contrast, high-performance systems

Ramachandran, Umakishore

328

Guest Editors' Introduction: Special Issue on Cloud Computing  

E-print Network

Guest Editors' Introduction: Special Issue on Cloud Computing Vojislav B. Misic, Senior Member, IEEE, Rajkumar Buyya, Dejan Milojicic, Fellow, IEEE, and Yong Cui ? CLOUD is a novel computing paradigm orientation, and market- oriented computing. Cloud provides flexible resource allocation on demand

Melbourne, University of

329

A user-centric vision of service-oriented Pervasive Information Systems  

E-print Network

, the Pervasive Information System (PIS). PIS intend to increase user productivity by making IS services available in terms of size and functionality (mobile phones, portable laptops, sensors and so on), by providing

Paris-Sud XI, Université de

330

Quantitative Analysis of the Human Airway Microbial Ecology Reveals a Pervasive Signature for Cystic Fibrosis  

E-print Network

individuals, we identified diverse microbial communities in the healthy samples, contravening conventional that diminished microbial diversity is associated with severity of pulmonary inflammation within our adult CFQuantitative Analysis of the Human Airway Microbial Ecology Reveals a Pervasive Signature

Quake, Stephen R.

331

The New Economy, eValue and the Impact on User Acceptance of Pervasive IT  

Microsoft Academic Search

This paper explores the nature of eValue creation, assessment and distribution within communities joined through the Web, and the possible implications on end user acceptance of pervasive information technology (IT). Specifically, we draw on developments of the \\

Elitsa V. Shumarova; Paul A. Swatman

332

Learning from failure in health care: frequent opportunities, pervasive barriers  

PubMed Central

The notion that hospitals and medical practices should learn from failures, both their own and others', has obvious appeal. Yet, healthcare organisations that systematically and effectively learn from the failures that occur in the care delivery process, especially from small mistakes and problems rather than from consequential adverse events, are rare. This article explores pervasive barriers embedded in healthcare's organisational systems that make shared or organisational learning from failure difficult and then recommends strategies for overcoming these barriers to learning from failure, emphasising the critical role of leadership. Firstly, leaders must create a compelling vision that motivates and communicates urgency for change; secondly, leaders must work to create an environment of psychological safety that fosters open reporting, active questioning, and frequent sharing of insights and concerns; and thirdly, case study research on one hospital's organisational learning initiative suggests that leaders can empower and support team learning throughout their organisations as a way of identifying, analysing, and removing hazards that threaten patient safety. PMID:15576689

Edmondson, A

2004-01-01

333

Video summarization and personalization for pervasive mobile devices  

NASA Astrophysics Data System (ADS)

We have designed and implemented a video semantic summarization system, which includes an MPEG-7 compliant annotation interface, a semantic summarization middleware, a real-time MPEG-1/2 video transcoder on PCs, and an application interface on color/black-and-white Palm-OS PDAs. We designed a video annotation tool, VideoAnn, to annotate semantic labels associated with video shots. Videos are first segmentated into shots based on their visual-audio characteristics. They are played back using an interactive interface, which facilitate and fasten the annotation process. Users can annotate the video content with the units of temporal shots or spatial regions. The annotated results are stored in the MPEG-7 XML format. We also designed and implemented a video transmission system, Universal Tuner, for wireless video streaming. This system transcodes MPEG-1/2 videos or live TV broadcasting videos to the BW or indexed color Palm OS devices. In our system, the complexity of multimedia compression and decompression algorithms is adaptively partitioned between the encoder and decoder. In the client end, users can access the summarized video based on their preferences, time, keywords, as well as the transmission bandwidth and the remaining battery power on the pervasive devices.

Tseng, Belle L.; Lin, Ching-Yung; Smith, John R.

2001-12-01

334

Global Prevalence of Autism and Other Pervasive Developmental Disorders  

PubMed Central

We provide a systematic review of epidemiological surveys of autistic disorder and pervasive developmental disorders (PDDs) worldwide. A secondary aim was to consider the possible impact of geographic, cultural/ethnic, and socioeconomic factors on prevalence estimates and on clinical presentation of PDD. Based on the evidence reviewed, the median of prevalence estimates of autism spectrum disorders was 62/10 000. While existing estimates are variable, the evidence reviewed does not support differences in PDD prevalence by geographic region nor of a strong impact of ethnic/cultural or socioeconomic factors. However, power to detect such effects is seriously limited in existing data sets, particularly in low-income countries. While it is clear that prevalence estimates have increased over time and these vary in different neighboring and distant regions, these findings most likely represent broadening of the diagnostic concets, diagnostic switching from other developmental disabilities to PDD, service availability, and awareness of autistic spectrum disorders in both the lay and professional public. The lack of evidence from the majority of the world's population suggests a critical need for further research and capacity building in low- and middle-income countries. Autism Res 2012, 5: 160179. 2012 International Society for Autism Research, Wiley Periodicals, Inc. PMID:22495912

Elsabbagh, Mayada; Divan, Gauri; Koh, Yun-Joo; Kim, Young Shin; Kauchali, Shuaib; Marcn, Carlos; Montiel-Nava, Cecilia; Patel, Vikram; Paula, Cristiane S; Wang, Chongying; Yasamy, Mohammad Taghi; Fombonne, Eric

2012-01-01

335

A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access  

E-print Network

-based wireless broadband access networks. Then, we verify the LPM through computer simulations and presentA Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim1 , Chong-free handover scheme called LPM (Last Packet Marking) for IEEE 802.16e-based broadband wire- less access

Kim, Chong-Kwon

336

Understanding the Impact of Cross Technology Interference on IEEE 802.15.4  

E-print Network

with hetero- geneous devices including WiFi (IEEE 802.11), Bluetooth, 2.4 GHz cordless phones, microwave ovens.1 [Computer-Communication Networks]: Network Architecture and Design--Wireless communication Keywords IEEE 802 channel hopping, 20 dBm Analog Phone single channel, n/a FHSS Phone channel hopping, 21 dBm Microwave non

337

Comparing the Performance of IP Over Ethernet and IEEE-1394 on a Java Platform  

E-print Network

-computer communication. The IP works on top of a physical network such as Ethernet. Two common protocols that provideComparing the Performance of IP Over Ethernet and IEEE-1394 on a Java Platform R.C. Norris and D Ethernet and IEEE-1394 isochronous streams. 1. Introduction Java [1] is an effective platform

Miller, D. Michael

338

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. -, NO. , ---1 Optical Switching Networks with Minimum  

E-print Network

Number of Limited Range Wavelength Converters Hung Q. Ngo, Member, IEEE, Dazhen Pan, Member, IEEE offer much richer Manuscript received ­ ­, ---; revised ­ ­, ---. The work of Hung Q. Ngo was supported [1]. Hung Q. Ngo and Dazhen Pan are with the Computer Science and Engineering department, State

Ngo, Hung Q.

339

Pervasive Learning--Using Games to Tear down the Classroom Walls  

ERIC Educational Resources Information Center

Pervasive gaming is a new and emerging gaming genre where the physical and social aspects of the real world are integrated into the game and blends into the player's everyday life. Given the nature of pervasive games, it may be possible to use that type of game as a tool to support learning in a university course by providing a gameplay where

Plhn, Trygve

2014-01-01

340

Augmented Reality in Corporate Pervasive e-Education: Novel ways to support aviation maintenance training  

Microsoft Academic Search

In today's information driven society and economy new media and mobility are winning increasing importance. Developments in distributed, dynamic, ubiquitous (available everywhere) and pervasive (omnipresent) technologies and of mobile devices during the last years facilitated the research of augmented reality (AR) systems (Azuma, 1997, Azuma et al., 2001, Ludwig&Reimann, 2005) and pervasive e-education (Holzinger,Nischelwitzer&Kickmeier-Rust, 2006). AR is supposed to gain

Johannes CHRISTIAN

2006-01-01

341

Curriculum vitae of Piero Zappi 1 CONTACT INFORMATION  

E-print Network

International Conference on Human Factors. · Pervasive Health 2008, 2nd International Conference on Pervasive Computing Technologies for Healthcare 2008. · Fourth Annual IEEE International Conference on PervasiveCurriculum vitae of Piero Zappi 1 CONTACT INFORMATION Position: Post doctoral researcher at System

Simunic, Tajana

342

Toward specifying pervasive developmental disorder-not otherwise specified.  

PubMed

Pervasive developmental disorder-not otherwise specified (PDD-NOS) is the most common and least satisfactory of the PDD diagnoses. It is not formally operationalized, which limits its reliability and has hampered attempts to assess its validity. We aimed, first, to improve the reliability and replicability of PDD-NOS by operationalizing its DSM-IV-TR description and, second, to test its validity through comparison with autistic disorder (AD) and Asperger's disorder (AsD). In a sample of 256 young people (mean age = 9.1 years) we used Developmental, Diagnostic and Dimensional (3Di) algorithmic analysis to classify DSM-IV-TR AD (n = 97), AsD (n = 93) and PDD-NOS (n = 66). Groups were compared on independent measures of core PDD symptomatology, associated autistic features, and intelligence. Contrary to the assumption that PDD-NOS is heterogeneous, almost all (97%) of those with PDD-NOS had one distinct symptom pattern, namely impairments in social reciprocity and communication, without significant repetitive and stereotyped behaviors (RSB). Compared to AD and AsD, they had comparably severe but more circumscribed social communication difficulties, with fewer non-social features of autism, such as sensory, feeding and visuo-spatial problems. These individuals appear to have a distinct variant of autism that does not merely sit at the less severe end of the same continuum of symptoms. The current draft guidelines for DSM-V, which mandate the presence of RSBs for any PDD diagnosis, would exclude such people from the autistic spectrum. PMID:21298812

Mandy, William; Charman, Tony; Gilmour, Jane; Skuse, David

2011-04-01

343

Pervasive Growth Reduction in Norway Spruce Forests following Wind Disturbance  

PubMed Central

Background In recent decades the frequency and severity of natural disturbances by e.g., strong winds and insect outbreaks has increased considerably in many forest ecosystems around the world. Future climate change is expected to further intensify disturbance regimes, which makes addressing disturbances in ecosystem management a top priority. As a prerequisite a broader understanding of disturbance impacts and ecosystem responses is needed. With regard to the effects of strong winds the most detrimental disturbance agent in Europe monitoring and management has focused on structural damage, i.e., tree mortality from uprooting and stem breakage. Effects on the functioning of trees surviving the storm (e.g., their productivity and allocation) have been rarely accounted for to date. Methodology/Principal Findings Here we show that growth reduction was significant and pervasive in a 6.79million hectare forest landscape in southern Sweden following the storm Gudrun (January 2005). Wind-related growth reduction in Norway spruce (Picea abies (L.) Karst.) forests surviving the storm exceeded 10% in the worst hit regions, and was closely related to maximum gust wind speed (R2?=?0.849) and structural wind damage (R2?=?0.782). At the landscape scale, wind-related growth reduction amounted to 3.0 million m3 in the three years following Gudrun. It thus exceeds secondary damage from bark beetles after Gudrun as well as the long-term average storm damage from uprooting and stem breakage in Sweden. Conclusions/Significance We conclude that the impact of strong winds on forest ecosystems is not limited to the immediately visible area of structural damage, and call for a broader consideration of disturbance effects on ecosystem structure and functioning in the context of forest management and climate change mitigation. PMID:22413012

Seidl, Rupert; Blennow, Kristina

2012-01-01

344

IEEE SoutheastCon 2014 Unbridled Innovation, Engineering Excellence  

E-print Network

· Cloud Computing See http://ewh.ieee.org/reg/3/southeastcon2014/ for details and deadlines. #12; of the electrical, electronic, and computer engineering disciplines. This event will bring researchers: · Power and Sustainable Energy · Health Informatics and Healthcare · Military and Security Applications

Dietz, Henry G. "Hank"

345

Novel pervasive scenarios for home management: the Butlers architecture.  

PubMed

Many efforts today aim to energy saving, promoting the user's awareness and virtuous behavior in a sustainability perspective. Our houses, appliances, energy meters and devices are becoming smarter and connected, domotics is increasing possibilities in house automation and control, and ambient intelligence and assisted living are bringing attention onto people's needs from different viewpoints. Our assumption is that considering these aspects together allows for novel intriguing possibilities. To this end, in this paper we combine home energy management with domotics, coordination technologies, intelligent agents, ambient intelligence, ubiquitous technologies and gamification to devise novel scenarios, where energy monitoring and management is just the basic brick of a much wider and comprehensive home management system. The aim is to control home appliances well beyond energy consumption, combining home comfort, appliance scheduling, safety constraints, etc. with dynamically-changeable users' preferences, goals and priorities. At the same time, usability and attractiveness are seen as key success factors: so, the intriguing technologies available in most houses and smart devices are exploited to make the system configuration and use simpler, entertaining and attractive for users. These aspects are also integrated with ubiquitous and pervasive technologies, geo-localization, social networks and communities to provide enhanced functionalities and support smarter application scenarios, hereby further strengthening technology acceptation and diffusion. Accordingly, we first analyse the system requirements and define a reference multi-layer architectural model - the Butlers architecture - that specifies seven layers of functionalities, correlating the requirements, the corresponding technologies and the consequent value-added for users in each layer. Then, we outline a set of notable scenarios of increasing functionalities and complexity, discuss the structure of the corresponding system patterns in terms of the proposed architecture, and make this concrete by presenting some comprehensive interaction examples as comic strip stories. Next, we discuss the implementation requirements and how they can be met with the available technologies, discuss a possible architecture, refine it in the concrete case of the TuCSoN coordination technology, present a subsystem prototype and discuss its properties in the Butlers perspective. PMID:24555169

Denti, Enrico

2014-01-01

346

Introduction to This Special Issue on Context-Aware Computing.  

ERIC Educational Resources Information Center

Discusses pervasive, or ubiquitous, computing; explains the notion of context; and defines context-aware computing as the key to disperse and enmesh computation into our lives. Considers context awareness in human-computer interaction and describes the broad topic areas of the essays included in this special issue. (LRW)

Moran, Thomas P.; Dourish, Paul

2001-01-01

347

InterruptMe: Designing Intelligent Prompting Mechanisms for Pervasive Applications  

E-print Network

. However, this accessibility does not necessarily translate to reachability, as recipients might refuse Keywords Interruptibility; Mobile sensing; Context-aware computing; Machine learning. ACM Classification

Musolesi, Mirco

348

IEEE UIC/ATC Joint Panel on Smart Planet Challenges: Impediments and Enablers  

E-print Network

-things and wireless almost-everything (e.g., IEEE 802.15.4 radio, wireless sensor networks, sensor platforms), we learning and computational intelligence techniques, the potential utility and "ceiling of goals" of smart

Kourai, Kenichi

349

186 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 48, NO. 2, FEBRUARY 2003 Pose Estimation Using Line-Based Dynamic Vision  

E-print Network

by the SSF through its Centre for Autonomous Systems, by the Royal Institute of Technology Line-Based Dynamic Vision and Inertial Sensors Henrik Rehbinder, Member, IEEE, and Bijoy K. Ghosh, Fellow, IEEE Abstract--In this paper, an observer problem from a computer vision application is studied

Ghosh, Bijoy K.

350

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 1, JANUARY 2009 109 DiversityMultiplexing Tradeoff in ISI Channels  

E-print Network

­Multiplexing Tradeoff in ISI Channels Leonard H. Grokop, Member, IEEE, and David N. C. Tse, Senior Member, IEEE Abstract--The optimal diversity­multiplexing tradeoff curve for the intersymbol interference (ISI) channel is computed, intersymbol interference (ISI), max- imum-likelihood sequence estimation , minimum mean-square- error (MMSE

Tse, David

351

Light-Weight Cryptography for Ubiquitous Computing  

E-print Network

Light-Weight Cryptography for Ubiquitous Computing Securing Cyberspace Workshop IV: Special purpose hardware for cryptography ­ Attacks and Applications University of California at Los Angeles, December 4-Weight Asymmetric Cryptography #12;Securing Pervasive Computing Contents 1. Security in Embedded Systems 2. Light

Paar, Christof

352

Examining pervasive technology practices in schools : a mental models approach  

E-print Network

Studies of computers and education have failed to account for the relevance and importance of tacit assumptions and unquestioned expectations that underlie educational technology practices. A major premise of this dissertation ...

Vaikakul, Savalai, 1976-

2005-01-01

353

978-1-4799-5151-2/14/$31.00 2014 IEEE 555 2014 10th International Conference on Natural Computation (ICNC)  

E-print Network

Computation (ICNC) A Brain-Computer Interface for Shared Vehicle Control on TORCS Car Racing Game Dahee Kim University Seoul, Korea Abstract--Brain-computer interface (BCI), an actively progressing field in brain filter method and using only controller module. Keywords-brain-computer interface; EEG; TORCS; shared

Cho, Sung-Bae

354

Decoupling algorithms from the organization of computation for high performance image processing  

E-print Network

Future graphics and imaging applications-from self-driving cards, to 4D light field cameras, to pervasive sensing-demand orders of magnitude more computation than we currently have. This thesis argues that the efficiency ...

Ragan-Kelley, Jonathan Millard

2014-01-01

355

Linux for High Performance and Real-Time Computing on SMP Systems  

E-print Network

.dekeyser,philippe.marquet,eric.piel,julien.soula}@lifl.fr Hugo KOHMANN Dolphin Interconnect, Oslo, Norway hugo@dolphinics.no Alexis BERLEMONT Openwide, Paris-performance computing capabilities and real-time behavior, although pervasive (simulation, medicine, training

Piel, ?ric

356

Neutral versus Emotional Human Stimuli Processing in Children with Pervasive Developmental Disorders not Otherwise Specified  

ERIC Educational Resources Information Center

Pervasive developmental disorder not otherwise specified (PDD-NOS) represents up to two-thirds of autism spectrum disorders; however, it is usually described in terms of the symptoms not shared by autism. The study explores processing of neutral and emotional human stimuli (by auditory, visual and multimodal channels) in children with PDD-NOS (n =

Vannetzel, Leonard; Chaby, Laurence; Cautru, Fabienne; Cohen, David; Plaza, Monique

2011-01-01

357

Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments  

E-print Network

of pervasive and context sensing technology, to provide entity mapping, policy and trust management services, yet the rendering of these services may be dependent on the location. Our identities are represented and technology. We conclude with our expectations, intended contributions and scope for future work. 2. Virtual

Beigl, Michael

358

Is Pervasive Developmental Disorder Not Otherwise Specified Less Stable than Autistic Disorder? A Meta-Analysis  

ERIC Educational Resources Information Center

We reviewed the stability of the diagnosis of pervasive developmental disorder not otherwise specified (PDD-NOS). A Medline search found eight studies reiterating a diagnostic assessment for PDD-NOS. The pooled group included 322 autistic disorder (AD) and 122 PDD-NOS cases. We used percentage of individuals with same diagnose at Times 1 and 2 as

Rondeau, Emelie; Klein, Leslie S.; Masse, Andre; Bodeau, Nicolas; Cohen, David; Guile, Jean-Marc

2011-01-01

359

Affective e-Learning: Using "Emotional" Data to Improve Learning in Pervasive Learning Environment  

ERIC Educational Resources Information Center

Using emotion detection technologies from biophysical signals, this study explored how emotion evolves during learning process and how emotion feedback could be used to improve learning experiences. This article also described a cutting-edge pervasive e-Learning platform used in a Shanghai online college and proposed an affective e-Learning model,

Shen, Liping; Wang, Minjuan; Shen, Ruimin

2009-01-01

360

Designing a Publish-Subscribe Substrate for Privacy/Security in Pervasive Environments  

E-print Network

and information, etc. Appli- cations are also emerging where cell phone companies track users' location to help.iitd.ernet.in Abstract To help explore issues in design of pervasive environ- ments, a sensor network for tracking due to increased interest in use of technologies such as RFID tags for tracking objects, people

Prakash, Atul

361

Evidence for Pervasive Adaptive Protein Evolution in Daniel L. Halligan1  

E-print Network

Evidence for Pervasive Adaptive Protein Evolution in Wild Mice Daniel L. Halligan1 , Fiona Oliver1 of Biological Sciences, University of Edinburgh, Edinburgh, United Kingdom, 2 Centre for the Study of Evolution to molecular evolution has been one of the most controversial issues in evolutionary biology for more than 40

Dean, Matthew D.

362

Pervasive Indels and Their Evolutionary Dynamics after the Fish-Specific Genome Duplication  

E-print Network

Pervasive Indels and Their Evolutionary Dynamics after the Fish-Specific Genome Duplication of duplicate genes. We here study thousands of duplicate genes in five fish (teleost) species with completely sequenced genomes. The ancestor of these species has been subject to a fish-specific genome duplication

Wagner, Andreas

363

Pervasive Vulnerabilities: Sexual Harassment in School. Adolescent Cultures, School, and Society. Volume 54  

ERIC Educational Resources Information Center

"Pervasive Vulnerabilities" explores the beliefs, attitudes, and behaviors of adolescent girls and boys and female teachers in order to expose the continuing persistence of sexual harassment in the United States. The book addresses the sexual double standard that continues to hold girls and women accountable for male sexual aggression, and

Rahimi, Regina; Liston, Delores D.

2012-01-01

364

Interaction of Social and Play Behaviors in Preschoolers With and Without Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

This study investigated the relationship between the social and play behaviors of young children with pervasive developmental disorder (PDD) and without PDD. Videotaped observations of 21 preschool children (12 with PDD and 9 without PDD) were examined independently for (a) social complexity and (b) play complexity that was assessed on an

Pierce-Jordan, Sandra; Lifter, Karin

2005-01-01

365

Prevalence of Gastrointestinal Disorders in Adult Clients with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

Background: In clients with pervasive developmental disorders (PDD), some authors have noticed the presence of gastrointestinal disorders and behavioural disorders. An augmented prevalence of different histological anomalies has also been reported. The aim of our study is to highlight the prevalence of gastrointestinal disorders in this adult with

Galli-Carminati, G.; Chauvet, I.; Deriaz, N.

2006-01-01

366

Epidemiological Surveys of Autism and Other Pervasive Developmental Disorders: An Update  

Microsoft Academic Search

This paper was commissioned by the committee on the Effectiveness of Early Education in Autism of the National Research Council (NRC). It provides a review of epidemiological studies of pervasive developmental disorders (PDD) which updates a previously published article (The epidemiology of autism: a review. Psychological Medicine 1999; 29: 769786). The design, sample characteristics of 32 surveys published between 1966

Eric Fombonne

2003-01-01

367

Subclassification of children with autism and pervasive developmental disorder: A questionnaire based on Wing's Subgrouping scheme  

Microsoft Academic Search

A questionnaire (the Wing Subgroups Questionnaire, or WSQ) for subclassifying children with autism into one of Wing's three hypothesized subgroups was developed, and the validity of this measure was assessed. Forty parents of children with autism or pervasive developmental disorder not otherwise specified (PDDNOS) completed the questionnaire. Results indicated that the questionnaire has adequate external criterion-referenced validity with similar subgroup

Paul Castelloe; Geraldine Dawson

1993-01-01

368

Brief Report: Representational Momentum for Dynamic Facial Expressions in Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

Individuals with pervasive developmental disorder (PDD) have difficulty with social communication via emotional facial expressions, but behavioral studies involving static images have reported inconsistent findings about emotion recognition. We investigated whether dynamic presentation of facial expression would enhance subjective perception of

Uono, Shota; Sato, Wataru; Toichi, Motomi

2010-01-01

369

The Pervasiveness of 1/f Scaling in Speech Reflects the Metastable Basis of Cognition  

ERIC Educational Resources Information Center

Human neural and behavioral activities have been reported to exhibit fractal dynamics known as "1/f noise," which is more aptly named "1/f scaling." Some argue that 1/f scaling is a general and pervasive property of the dynamical substrate from which cognitive functions are formed. Others argue that it is an idiosyncratic property of

Kello, Christopher T.; Anderson, Gregory G.; Holden, John G.; Van Orden, Guy C.

2008-01-01

370

Targeting Social Skills Deficits in an Adolescent with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

Social skills deficits are a defining feature of individuals diagnosed with autism and other pervasive developmental disorders (PDD), which can impair functioning and put the individual at higher risk for developing problem behavior (e.g., self-injury, aggression). In the current study, an adolescent with PDD displayed inappropriate social

Hagopian, Louis P.; Kuhn, David E.; Strother, Geri E.

2009-01-01

371

Promoting Social Skill Development in Children with Pervasive Developmental Disorders: A Feasibility and Efficacy Study  

ERIC Educational Resources Information Center

A randomized controlled design was employed to evaluate a social skills intervention for children with pervasive developmental disorders. Aims included evaluating the acceptability of the program and gathering preliminary evidence on efficacy. Forty-four children, ages 8-11 years, were randomly assigned to treatment or wait list. Treatment

Koenig, Kathleen; White, Susan Williams; Pachler, Maryellen; Lau, Monika; Lewis, Moira; Klin, Ami; Scahill, Lawrence

2010-01-01

372

Depression in Children with Autism\\/Pervasive Developmental Disorders: A Case-Control Family History Study  

Microsoft Academic Search

Limited information is available about the occurrence of depression in children with autism and other pervasive developmental disorders (PDD). Although depression has been described in autistic children, questions about its validity have often been raised. One approach to address this issue is to investigate family histories of those autistic children diagnosed with clinical depression. Based on data available in nonautistic

Mohammad Ghaziuddin; John Greden

1998-01-01

373

Impairment of quality of life in parents of children and adolescents with pervasive developmental disorder  

Microsoft Academic Search

BACKGROUND: Little is known about the Quality of Life (QOL) in parents of children with developmental diseases as compared to other severe neurological or psychiatric disorders. Aims of the present study were: to evaluate QOL in parents of children affected by Pervasive Development Disorder (PDDs), Cerebral Palsy (CP) or Mental Retardation (MR) as compared to a control group (CG); to

Diego Mugno; Liliana Ruta; Valentina Genitori D'Arrigo; Luigi Mazzone

2007-01-01

374

Pervasive Developmental Disorder: Client-Centered Approach. A Guide for Parents and Teachers.  

ERIC Educational Resources Information Center

This guide to pervasive developmental disorder (PDD) or autistic spectrum disorder (ASD) first provides a review of the literature on defining characteristics of PDD/ASD, causes of PDD, and diagnosis of PDD. Review of intervention and treatment comprises the major portion of the paper. After briefly considering parent education, this section

Stewart, Bonnie C.

375

Facial electromyographicresponses to emotional information from faces and voices in individuals with Pervasive Developmental Disorder  

Microsoft Academic Search

Background: Despite extensive research, it is still debated whether impairments in social skills of individuals with pervasive developmental disorder (PDD) are related to specific deficits in the early processing of emotional information. We aimed to test both automatic processing of facial affect as well as the integration of auditory and visual emotion cues in individuals with PDD. Methods: In a

Maurice J. C. M. Magne; Beatrice de Gelder; Herman van Engeland; Chantal Kemner

2007-01-01

376

Retrospective Study of Quetiapine in Children and Adolescents with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

A retrospective study was conducted in a clinic specialized in treating individuals with developmental disabilities to examine the effectiveness and tolerability of quetiapine in children and adolescents with pervasive developmental disorders. Ten consecutive outpatients (age = 12.0 [plus or minus] 5.1 years) treated with quetiapine (dose = 477

Hardan, Antonio Y.; Jou, Roger J.; Handen, Benjamin L.

2005-01-01

377

Review of Adaptive Behavior Studies in Mentally Retarded Persons with Autism/Pervasive Developmental Disorder.  

ERIC Educational Resources Information Center

A review of research on the adaptive behavior of persons with both mental retardation and autism/pervasive developmental disorder finds the performances of these dually disabled individuals to be particularly poor in the domain of social skills/socialization and somewhat less poor in the communication domain. In addition, autistic mentally

Kraijer, Dirk

2000-01-01

378

Regression of Language and Non-Language Skills in Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

Background: As part of the pervasive developmental disorders (PDD), there is a subgroup of individuals reported to have a different onset of symptom appearance consisting of an apparently normal early development, followed by a loss of verbal and/or non-verbal skills prior to 2 years of age. This study aims at comparing the symptomatology of

Meilleur, A. -A. S.; Fombonne, E.

2009-01-01

379

On Facebook, Most Ties are Weak The emergence of pervasive socio-technical networks brings new  

E-print Network

On Facebook, Most Ties are Weak Abstract The emergence of pervasive socio-technical networks brings of weak ties theory proposed by Mark Granovetter. Some authors recently investigated whether Granovetter to predict tie strength. Those approaches require to handle user-generated data that are often not publicly

Ferrara, Emilio

380

Sleep Correlates of Pervasive Developmental Disorders: A Review of the Literature  

ERIC Educational Resources Information Center

Sleep disturbance is a significant problem in the general pediatric population, and it occurs even more frequently in children with pervasive developmental disorders (PDDs). Much time and energy have been spent examining the characteristics that predispose children to insomnia and it is likely that equivalent factors influence sleep in PDDs.

Hollway, Jill A.; Aman, Michael G.

2011-01-01

381

Abnormalities on the Neurological Examination and EEG in Young Children with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

This study examined the nature and frequency of neurological and EEG abnormalities in 60 young children (ages 2-6 years) with pervasive developmental disorders. A number of standard neurological functions could not be adequately assessed due to the young age of the children and/or limited comprehension and cooperation. The most common neurological

Akshoomoff, Natacha; Farid, Nikdokht; Courchesne, Eric; Haas, Richard

2007-01-01

382

Predictors and Moderators of Psychological Distress in Mothers of Children with Pervasive Developmental Disorders  

Microsoft Academic Search

This study explored potential predictors of psychological distress and moderators of the relation between parenting stress and psychological distress in mothers of children with pervasive developmental disorders (PDDs). Ninety-seven mothers of children diagnosed with autism spectrum disorders completed measures assessing children's functional impairment, parenting stress, number of social supports, satisfaction with social support, parenting sense of competence, number of coping

Lauren E. Tobing; David S. Glenwick

2007-01-01

383

Predictors and Moderators of Psychological Distress in Mothers of Children with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

This study explored potential predictors of psychological distress and moderators of the relation between parenting stress and psychological distress in mothers of children with pervasive developmental disorders (PDDs). Ninety-seven mothers of children diagnosed with autism spectrum disorders completed measures assessing children's functional

Tobing, Lauren E.; Glenwick, David S.

2006-01-01

384

Curiosity, Interest and Engagement in Technology-Pervasive Learning Environments: A New Research Agenda  

ERIC Educational Resources Information Center

This paper identifies the need for developing new ways to study curiosity in the context of today's pervasive technologies and unprecedented information access. Curiosity is defined in this paper in a way which incorporates the concomitant constructs of interest and engagement. A theoretical model for curiosity, interest and engagement in new

Arnone, Marilyn P.; Small, Ruth V.; Chauncey, Sarah A.; McKenna, H. Patricia

2011-01-01

385

Face Recognition in Children with a Pervasive Developmental Disorder Not Otherwise Specified.  

ERIC Educational Resources Information Center

A study investigated the accuracy and speed of face recognition in 26 children (ages 7-10) with Pervasive Developmental Disorder Not Otherwise Specified. Subjects needed an amount of time to recognize the faces that almost equaled the time they needed to recognize abstract patterns that were difficult to distinguish. (Contains references.)

Serra, M.; Althaus, M.; de Sonneville, L. M. J.; Stant, A. D.; Jackson, A. E.; Minderaa, R. B.

2003-01-01

386

Epidemiological Surveys of Autism and Other Pervasive Developmental Disorders: An Update  

Microsoft Academic Search

This paper was commissioned by the committee on the Effectiveness of Early Education in Autism of the National Research Council (NRC). It provides a review of epidemiological stud- ies of pervasive developmental disorders (PDD) which updates a previously published article (The epidemiology of autism: a review. Psychological Medicine 1999; 29: 769-786). The de- sign, sample characteristics of 32 surveys published

Eric Fombonne

2003-01-01

387

Molecular and Cytogenic Analyses on Brazilian Youths with Pervasive Developmental Disorders.  

ERIC Educational Resources Information Center

This study evaluated cytogenetic and molecular parameters in 30 Brazilian youths with autism or other pervasive developmental disorders (PDD). The high frequency of chromosomopathies found support the hypothesis that PDDs may develop as a consequence to chromosomal abnormalities and justify the cytogenetic and molecular assessment during diagnosis

Estecio, Marcos Roberto Higino; Fett-Conte, Agnes Cristina; Varella-Garcia, Marileila; Fridman, Cintia; Silva, Ana Elizabete

2002-01-01

388

Depression in Children with Autism/Pervasive Developmental Disorders: A Case-Control Family History Study.  

ERIC Educational Resources Information Center

This study compared the family histories of 13 children with autism or pervasive developmental disorder (PDD) with depression and 10 similar children without depression. Ten of the depressed children had a positive family history of depression compared to three of the nondepressed group. Findings support the validity of depression as a distinct

Ghaziuddin, Mohammad; Greden, John

1998-01-01

389

Predicting Language Outcome in Infants with Autism and Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

Background: To examine longitudinal associations between diagnosis, joint attention, play and imitation abilities and language outcome in infants with autism and pervasive developmental disorder. Methods and Procedures: Experimental measures of joint attention, play and imitation were conducted with a sample of infants with autism spectrum

Charman, Tony; Baron-Cohen, Simon; Swettenham, John; Baird, Gillian; Drew, Auriol; Cox, Antony

2003-01-01

390

Using Virtual Reality Environment to Improve Joint Attention Associated with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

The focus of this study is using data glove to practice Joint attention skill in virtual reality environment for people with pervasive developmental disorder (PDD). The virtual reality environment provides a safe environment for PDD people. Especially, when they made errors during practice in virtual reality environment, there is no suffering or

Cheng, Yufang; Huang, Ruowen

2012-01-01

391

C O M M E N TA R Y The most common and pervasive human  

E-print Network

C O M M E N TA R Y The most common and pervasive human health problems are caused by diseases of common and chronic human disease, including cancer, pulmonary and cardiovascular diseases, obe- sity are an ideal genetic resource. They can produce unlimited num- bers of genetically identical mice that can

Broman, Karl W.

392

Facial Electromyographic Responses to Emotional Information from Faces and Voices in Individuals with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

Background: Despite extensive research, it is still debated whether impairments in social skills of individuals with pervasive developmental disorder (PDD) are related to specific deficits in the early processing of emotional information. We aimed to test both automatic processing of facial affect as well as the integration of auditory and visual

Magnee, Maurice J. C. M.; de Gelder, Beatrice; van Engeland, Herman; Kemner, Chantal

2007-01-01

393

A Preliminary Study on Screening Prevalence of Pervasive Developmental Disorder in Schoolchildren in Iran  

ERIC Educational Resources Information Center

To study prevalence rates of pervasive developmental disorder (PDD) symptoms and differences between subtypes in school age Iranian children. A random sample of 2,000 school age children from both genders was selected. A parent-completed, DSM-IV-referenced rating scale of PDD symptoms was used. About 1.9% of the sample obtained screening cutoff

Ghanizadeh, Ahmad

2008-01-01

394

Automatic Processing of Emotional Faces in High-Functioning Pervasive Developmental Disorders: An Affective Priming Study  

ERIC Educational Resources Information Center

This study examined automatic processing of emotional faces in individuals with high-functioning Pervasive Developmental Disorders (HFPDD) using an affective priming paradigm. Sixteen participants (HFPDD and matched controls) were presented with happy faces, fearful faces or objects in both subliminal and supraliminal exposure conditions, followed

Kamio, Yoko; Wolf, Julie; Fein, Deborah

2006-01-01

395

Social Sensors and Pervasive Services: Approaches and Perspectives Alberto Rosi, Marco Mamei, Franco Zambonelli  

E-print Network

, Franco Zambonelli Department of Science and Engineering Methods University of Modena and Reggio Emilia Reggio Emilia, Italy Email: name.surname@unimore.it Simon Dobson, Graeme Stevenson, Juan Ye SchoolSocial Sensors and Pervasive Services: Approaches and Perspectives Alberto Rosi, Marco Mamei

Dobson, Simon

396

A Bio-chemical Approach to Awareness in Pervasive Graeme Stevenson, Juan Ye  

E-print Network

of Modena and Reggio Emilia, Italy firstname.lastname@unimore.it ABSTRACT The emerging proliferationA Bio-chemical Approach to Awareness in Pervasive Systems Graeme Stevenson, Juan Ye and Simon these responsibilities across the environment. This paper explores a bio-chemically inspired approach to realising

Dobson, Simon

397

An Open-Label Trial of Escitalopram in Pervasive Developmental Disorders.  

ERIC Educational Resources Information Center

Objective: To assess the effect of escitalopram in the treatment of pervasive developmental disorders (PDDs). Method: This 10-week study had a forced titration, open-label design. Twenty-eight subjects (mean age 125.1 [+ or -] 33.5 months) with a PDD received escitalopram at a dose that increased weekly to a maximum dose of 20 mg as tolerated. The

Owley, Thomas; Walton, Laura; Salt, Jeff; Guter, Stephen J., Jr.; Winnega, Marrea; Leventhal, Bennett L.; Cook, Edwin H., Jr.

2005-01-01

398

Validation of an Interview-Based Rating Scale Developed in Japan for Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

The pervasive developmental disorders (PDDs) Autism Society Japan Rating Scale (PARS), an interview-based instrument for evaluating PDDs, has been developed in Japan with the aim of providing a method that (1) can be used to evaluate PDD symptoms and related support needs and (2) is simpler and easier than the currently used "gold standard"

Ito, Hiroyuki; Tani, Iori; Yukihiro, Ryoji; Adachi, Jun; Hara, Koichi; Ogasawara, Megumi; Inoue, Masahiko; Kamio, Yoko; Nakamura, Kazuhiko; Uchiyama, Tokio; Ichikawa, Hironobu; Sugiyama, Toshiro; Hagiwara, Taku; Tsujii, Masatsugu

2012-01-01

399

An Integrated Regulatory Network Reveals Pervasive Cross-Regulation among Transcription and Splicing  

E-print Network

regarded as being comprised of independent steps, from RNA transcription to protein translation. To dateAn Integrated Regulatory Network Reveals Pervasive Cross-Regulation among Transcription transcription and splicing. To study the interplay between these processes we derived a transcription

Mandel-Gutfreund, Yael

400

Audiovisual Speech Integration in Pervasive Developmental Disorder: Evidence from Event-Related Potentials  

ERIC Educational Resources Information Center

Background: Integration of information from multiple sensory sources is an important prerequisite for successful social behavior, especially during face-to-face conversation. It has been suggested that communicative impairments among individuals with pervasive developmental disorders (PDD) might be caused by an inability to integrate synchronously

Magnee, Maurice J. C. M.; de Gelder, Beatrice; van Engeland, Herman; Kemner, Chantal

2008-01-01

401

Mental Development and Autistic Behavior in Children with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

The aim of this study was to clarify the features of mental development and autistic behavior in children with pervasive developmental disorders (PDD) from the viewpoint of remedial therapy. The Tokyo Child Development Schedule (TCDS) and the Tokyo Autistic Behavior Scale (TABS), designed to be completed by children's caregivers, were used. A

Suzuki, Mayo

2011-01-01

402

Retrospective Evaluation of an Intensive Method of Treatment for Children with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

The objective of this preliminary study was to evaluate a novel intensive therapy program in young children with pervasive developmental disorder (PDD). Twenty-three children treated at the Mifne Institute in Israel between 1997 and 1999 were assessed. Videos taken before coming to Mifne and after intensive treatment at the institute and before

Vorgraft, Yitzchak; Farbstein, Ilana; Spiegel, Rene; Apter, Alan

2007-01-01

403

Gastrointestinal Symptoms in a Sample of Children with Pervasive Developmental Disorders  

ERIC Educational Resources Information Center

Objective: To evaluate gastrointestinal (GI) problems in a large, well-characterized sample of children with pervasive developmental disorders (PDDs). Methods: One hundred seventy two children entering one of two trials conducted by the Research Units on Pediatric Psychopharmacology (RUPP) Autism Network were assessed comprehensively prior to

Nikolov, Roumen N.; Bearss, Karen E.; Lettinga, Jelle; Erickson, Craig; Rodowski, Maria; Aman, Michael G.; McCracken, James T.; McDougle, Christopher J.; Tierney, Elaine; Vitiello, Benedetto; Arnold, L. Eugene; Shah, Bhavik; Posey, David J.; Ritz, Louise; Scahill, Lawrence

2009-01-01

404

Autism Spectrum\\/Pervasive Developmental Disorder Disability Professional Documentation\\/Verification Form  

Microsoft Academic Search

This form is for Autism Spectrum\\/Pervasive Developmental Disorders only. Psychiatric or psychological conditions require completion of the PSYCHIATRIC\\/PSYCHOLOGICAL DOCUMENTATION, Medical conditions require completion of the Medical, Physical, Sensory form. Documentation required to verify the student's condition and its severity, includes completion of this form or provision of equivalent information to Disabilities Services by a medical professional with the appropriate training

405

A New Way with Autistic and Other Children with Pervasive Developmental Disorders.  

ERIC Educational Resources Information Center

This monograph describes the program of the Language and Cognitive Development Center (Massachusetts), which serves toddlers and school-aged children with autism or other pervasive developmental disorders (PDD). An introduction presents incidence figures, the program's philosophy, the program's approach to assessment, intervention with children

Miller, Arnold; Eller-Miller, Eileen

406

Enable Pervasive Healthcare through Continuous Remote Health Monitoring  

E-print Network

the human body are able to measure the fundamental health parameters in a situation where large society. Since the start of this century, the proportion of seniors in the world has been increasing more and education outside hospital [5]. Recent advances in computing technologies including body sensors

Shen, Xuemin "Sherman"

407

A model for controlling program behaviour in pervasive networks  

Microsoft Academic Search

In an environment where devices and appliances with computational power are connected together, controlling the behaviour of programs that run in this network becomes important. Furthermore, the management of multiple programs executing on many devices needs to be kept under control, to ensure the safety and robustness of the wider system. We propose a programming language approach to handling this

Tim Owen; Julian Rathke; Ian Wakeman; D. Watson

2002-01-01

408

Perci: Pervasive Service Interaction with the Internet of Things  

Microsoft Academic Search

The advancement of ubiquitous computing technologies has greatly improved the availability of digital resources in the real world. Here, the authors investigate mobile interaction with tagged, everyday objects and associated information that's based on the Internet of things and its technologies. Their framework for integrating Web services and mobile interaction with physical objects relies on information typing to increase interoperability.

Gregor Broll; Enrico Rukzio; Massimo Paolucci; Matthias Wagner; Albrecht Schmidt; Heinrich Hussmann

2009-01-01

409

THAD E. STARNER, Ph.D. Associate Professor of Computing  

E-print Network

(Cambridge, MA), 1992-1993 Honors 3 patents granted and 3 patents in process. Most cited paper on sign and Ubiquitous Computing, IBM Systems J., and Pervasive Computing (magazine). Selected peer-reviewed publications and AI/Alife, 1995. T. Starner. "Human Powered Wearable Computing." IBM Systems Journal 35(3), 1996. T

Starner, Thad E.

410

IEEE Builds Better Young Professionals  

E-print Network

innovation and excellence for the benefit of humanity 5 11/17/14 #12;IEEE Humanitarian Opportunities #12;IEEE in North America, Europe, Asia and the Middle East (US News and World Report 2011, Times Higher Education humanities, use of image processing in art conservation, music classification, and more #12;With IEEE Xplore

411

Accep. for publ. in the Proc. of the 31st Hawaii Int. Conf. on System Sciences, Computer Society Press, IEEE, 1997 Application of Technology and Asynchronous Learning Networks  

E-print Network

Accep. for publ. in the Proc. of the 31st Hawaii Int. Conf. on System Sciences, Computer Society and National Superconducting Cyclotron Laboratory bComputer Science Department cCollege of Natural Science of the computer-assisted personalized ap- proach (CAPA) system and its use in large lecture classes is described

412

766 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS--PART C: APPLICATIONS AND REVIEWS, VOL. 37, NO. 5, SEPTEMBER 2007 Computational Intelligence in Product Design  

E-print Network

, NO. 5, SEPTEMBER 2007 Computational Intelligence in Product Design Engineering: Review and Trends. Computational intelligence (CI) offers models and algorithms that can contribute greatly to design for and approaches in product design engineering. Index Terms--Computational intelligence (CI), decision making

Kusiak, Andrew

413

IEEE TRANSACTIONS ON MAGNETICS, VOL. 48, NO. 2, FEBRUARY 2012 427 A New Integral Formulation for Eddy Current Computation in Thin  

E-print Network

for Eddy Current Computation in Thin Conductive Shells T. Le-Duc, G. Meunier, O. Chadebec, and J Fourier, CNRS UMR 5269, Grenoble, France In order to compute eddy current distributions in thin conductive conductive shells. I. INTRODUCTION I NTEGRAL formulations dedicated to the computation of eddy currents

Paris-Sud XI, Université de

414

Memorias Conferencia Internacional IEEE Mexico 1971, Sobre Sistemas, Redes Y Computadoras. Volumen I and Volumen II. (Proceedings of International Conference of IEEE Concerning Systems, Networks, and Computers. Volume I and Volume II.  

ERIC Educational Resources Information Center

The following papers in English from this international conference may be of particular interest to those in the field of education. T. Nakahara, A. Tsukamota, and M. Matsumoto describe a computer-aided design technique for an economical urban cable television system. W. D. Wasson and R. K. Chitkara outline a recognition scheme based on analysis

Concheiro, A. Alonso, Ed.; And Others

415

Throughput and delay analysis of IEEE 802.11 protocol  

Microsoft Academic Search

Wireless technologies in the LAN environment are becoming increasingly important. The IEEE 802.11 standard is the most mature technology for wireless local area networks (WLANs). The performance of the medium access control (MAC) layer, which consists of distributed coordination function (DCF) and point coordination function (PCF), has been examined over the past years. We present an analytical model to compute

P. Chatzimisios; V. Vitsas; A. C. Boucouvalas

2002-01-01

416

Proc. MTS/IEEE OCEANS`10 (2010) Underwater Stereo Using  

E-print Network

underwater imaging is also applied to archaeological docu- mentation [7] and observation of wildlife [8], [9Proc. MTS/IEEE OCEANS`10 (2010) Underwater Stereo Using Natural Flickering Illumination Yohay@miami.edu Abstract--Computer vision is challenged by the underwater environment. Poor visibility, geometrical

Schechner, Yoav Yosef

417

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1 Reliable Effects Screening  

E-print Network

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1 Reliable Effects Screening: A Distributed Continuous ¢ , Balachandran Natarajan ¢ IBM T. J. Watson Research Center, Hawthorne, NY, 10532¡ Dept. of Computer Science that their modifications do not adversely affect their software's performance across its large configuration space

Porter, Adam

418

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1 Reliable Effects Screening  

E-print Network

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1 Reliable Effects Screening: A Distributed Continuous ¤ , Balachandran Natarajan ¤ IBM T. J. Watson Research Center, Hawthorne, NY, 10532 £ Dept. of Computer Science that their modifications do not adversely affect their software's performance across its large configuration space

Schmidt, Douglas C.

419

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 43, NO. 3, MAY 1997 997 Improved Bounds on Maximum Size Binary Radar Arrays  

E-print Network

Size Binary Radar Arrays Jon Hamkins and Kenneth Zeger, Senior Member, IEEE Abstract--The maximum size N: A computational approach was taken by Robinson [2] in 1985, and radar arrays with N 25 rows were

Zeger, Kenneth

420

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. XXX, NO. YYY, AUGUST 2005 1 Using Origin Analysis to Detect Merging and  

E-print Network

to Detect Merging and Splitting of Source Code Entities Michael W. Godfrey Member, IEEE and Lijie Zou functionality disappear to?, "how much M. W. Godfrey and L. Zou are members of the School of Computer Science

Godfrey, Michael W.

421

Scheduling Nonlinear Computational Loads  

E-print Network

Scheduling Nonlinear Computational Loads JUI TSUN HUNG THOMAS G. ROBERTAZZI, Fellow, IEEE Stony node is nonlinear in the size of the assigned load. Optimal load allocation and speedup for simultaneous load distribution for a quadratic nonlinearity are obtained using simple equations. An iterative

Robertazzi, Thomas G.

422

In: Proceedings of the IEEE Real-Time Technology and Applications Symposium, Chicago, IL, May 1995, pp. 4-14. SUPPORT FOR REAL-TIME COMPUTING WITHIN GENERAL  

E-print Network

, pp. 4-14. SUPPORT FOR REAL-TIME COMPUTING WITHIN GENERAL PURPOSE OPERATING SYSTEMS Supporting Co operating system and a predictable real-time ker- nel, to co-exist on the same hardware. We discuss for real-time computing beyond allowing tasks to manipulate their exe- cution priority. Operating systems

Jeffay, Kevin

423

Appearing in IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), April 57, 2009 Accelerating SPICE Model-Evaluation using FPGAs  

E-print Network

Accelerating SPICE Model-Evaluation using FPGAs Nachiket Kapre Computer Science California Institute-point computation in SPICE model-evaluation. Model-evaluation is a key component of the SPICE circuit simulator when using a Xilinx Virtex 5 LX330T for a variety of SPICE device models. Index Terms--Spice, Analog

DeHon, André

424

A Pervasive Computing System for the Operating Room of the Future  

Microsoft Academic Search

We describe a prototype Context Aware Perioperative Information System to capture and interpret data in an operating room of the future. The captured data is used to construct the context of the surgical procedure and detect medically signicant events. Such events, and other state information, are used to automatically construct an Electronic Medical Encounter Record (EMR). The EMR records and

Sheetal Agarwal; Anupam Joshi; Timothy W. Finin; Yelena Yesha; Tim Ganous

2007-01-01

425

Multidimensional Vector Regression for Accurate and Low-Cost Location Estimation in Pervasive Computing  

Microsoft Academic Search

In this paper, we present an algorithm for multidimensional vector regression on data that are highly uncertain and nonlinear, and then apply it to the problem of indoor location estimation in a wireless local area network (WLAN). Our aim is to obtain an accurate mapping between the signal space and the physical space without requiring too much human calibration effort.

Jeffrey Junfeng Pan; James T. Kwok; Qiang Yang; Yiqiang Chen

2006-01-01

426

Abstract--In open, heterogeneous, context-aware pervasive computing systems, suitable context models and reasoning  

E-print Network

developed with concepts from the state-space model, describing context and situations as geometrical, termed "Context Spaces", which describes context and situations using geometrical metaphors and concepts from the stat-space model [15]. Based on this model we present an approach to reason about situations

Loke, Seng W. - Loke, Seng W.

427

The Pervasive Fridge A Smart Computer System Against Uneaten Food Loss  

E-print Network

Abstract -- Food waste or food loss is food that is discarded or lost uneaten. The work presented; fridge; barcode scanner; voice interaction; SMS; android. I. INTRODUCTION Food waste or food loss is food against food waste. Indeed, they are natively equipped with hardware (camera, microphone) and software

Boyer, Edmond

428

Elsevier Editorial System(tm) for Pervasive and Mobile Computing Manuscript Draft  

E-print Network

of Sport, Belconnen, 2616, ACT, Australia Abstract Detailed monitoring of training sessions of elite-down of the training session, including lap times, de- tailed statistics of strokes, and turns. To this end we use semi. In this broad field, researchers have been developing models and systems for predicting a system's location

Shamir, Ron

429

Prevalence and Interpretation of Recent Trends in Rates of Pervasive Developmental Disorders  

PubMed Central

The aims of this article are to provide an up-to-date review of the methodological features and substantive results of published epidemiological surveys of the prevalence of pervasive developmental disorders (PDD). This article updates previous reviews (1, 2) with the inclusion of new studies made available since then. The specific questions addressed inthis article are: a) how are cases of PDD defined and identified in epidemiological surveys?; b) what are the best estimates for the prevalence of autism and related pervasive developmental disorders considering the methodological implications of the surveys, and c) what interpretation can be given to time trends observed in prevalence rates of PDDs given the hypothesized secular increase in PDDs? PMID:21152334

Fombonne, Eric; Quirke, Sara; Hagen, Arlene

2009-01-01

430

Emerging Needs for Pervasive Passive Wireless Sensor Networks on Aerospace Vehicles  

NASA Technical Reports Server (NTRS)

NASA is investigating passive wireless sensor technology to reduce instrumentation mass and volume in ground testing, air flight, and space exploration applications. Vehicle health monitoring systems (VHMS) are desired on all aerospace programs to ensure the safety of the crew and the vehicles. Pervasive passive wireless sensor networks facilitate VHMS on aerospace vehicles. Future wireless sensor networks on board aerospace vehicles will be heterogeneous and will require active and passive network systems. Since much has been published on active wireless sensor networks, this work will focus on the need for passive wireless sensor networks on aerospace vehicles. Several passive wireless technologies such as microelectromechanical systems MEMS, SAW, backscatter, and chipless RFID techniques, have all shown potential to meet the pervasive sensing needs for aerospace VHMS applications. A SAW VHMS application will be presented. In addition, application areas including ground testing, hypersonic aircraft and spacecraft will be explored along with some of the harsh environments found in aerospace applications.

Wilson, William C.; Juarez, Peter D.

2014-01-01

431

282 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 11, NO. 3, MARCH 2001 Streaming Video over the Internet: Approaches  

E-print Network

282 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 11, NO. 3, MARCH 2001, IEEE Abstract--Due to the explosive growth of the Internet and increasing demand for multimedia RECENT advances in computing technology, compres- sion technology, high-bandwidth storage devices

Peha, Jon M.

432

176 IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 19, NO. 1, JANUARY 2011 Scale Transform in Rhythmic Similarity of Music  

E-print Network

--Computational ethnomusicology, music informa- tion retrieval (MIR), rhythmic similarity, scale transform. I. INTRODUCTION TWO176 IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 19, NO. 1, JANUARY 2011 Scale Transform in Rhythmic Similarity of Music André Holzapfel and Yannis Stylianou, Member, IEEE Abstract

Stylianou, Yannis

433

Session F1G 0-7803-7961-6/03/$17.00 2003 IEEE November 5-8, 2003, Boulder, CO  

E-print Network

Plummer2 , Jan Bailey3 , Mike Williams4 , Richard Thayer5 and Ted Lewis6 1 James M. Conrad, University@computer.org 3 Jan Bailey, Vice President, Wiley STM Books, jbailey@wiley.com 4 Mike Williams, author books for IEEE CS Press, thayer@csus.edu 6 Ted Lewis, author of professional books for IEEE CS Press, t.lewis

Conrad, James M.

434

228 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS--PART A: SYSTEMS AND HUMANS, VOL. 32, NO. 2, MARCH 2002 Efficient Parallel Algorithms for Distance Maps of  

E-print Network

with a reconfigurable pipelined bus system (LARPBS), which has been introduced recently based on current electronic, IEEE, and Si Qing Zheng, Senior Member, IEEE Abstract--Computing a distance map (distance transform) is an operation that converts a two-dimensional (2-D) image consisting of black and white pixels to an image where

Pan, Yi

435

Pervasive Intelligence System to Enable Safety and Assistance in Kitchen for Home-Alone Elderly  

Microsoft Academic Search

\\u000a With growing aging population, elderly with physical or cognitive impairments may end up staying alone at home. Kitchen is\\u000a generally the most vulnerable place at home as mishandling of devices or improper kitchen activities could lead to hazardous\\u000a and life threatening situations. In this paper, we have proposed pervasive intelligence system that augment existing kitchen\\u000a environment with sensors, actuators and

Aung Wai; Sivasubramaniam Shanthini Devi; Jit Biswas; Sanjib Panda

436

A ludological view on the pervasive mixed-reality game research paradigm  

Microsoft Academic Search

During the last 10years, numerous mixed-reality game prototypes have been built and studied. This paper is a game studies\\u000a attempt at understanding the findings of that research. First, this paper will look into the paradigm of pervasive mixed-reality\\u000a game research, analyzing how these games have been produced and studied. Then, there is an overview of some central, reoccurring\\u000a findings of

Markus Montola

2011-01-01

437

Response to pervasive sequence patents cover the entire human genome - authors reply  

PubMed Central

An author reply to the Letter to the Editor from Tu et al. regarding Pervasive sequence patents cover the entire human genome by J Rosenfeld and C Mason. Genome Med 2013, 5:27. See related Correspondence by Rosenfeld and Mason, http://genomemedicine.com/content/5/3/27, and related letter by Tu et al., http://genomemedicine.com/content/6/2/14 PMID:24764495

2014-01-01

438

Towards Pervasive Treatment of Non-Functional Properties at Design and Run-Time  

Microsoft Academic Search

Disregarding non-functional properties is an important project risk. They have to be taken into consideration throughout the system's life cycle. Particularly, they must be considered as early as possible in the design phase. Especially in the area of component-based software development it is also important to be able to sepa- rate functional and non-functional requirements. Pervasive treatment of non- functional

Ronald Aigner; Martin Pohlack; Simone Rttger; Steffen Zschaler

2003-01-01

439

A Pervasive Parallel Processing Framework For Data Visualization And Analysis At Extreme Scale Final Scientific and Technical Report  

SciTech Connect

The evolution of the computing world from teraflop to petaflop has been relatively effortless,with several of the existing programming models scaling effectively to the petascale. The migration to exascale, however, poses considerable challenges. All industry trends infer that the exascale machine will be built using processors containing hundreds to thousands of cores per chip. It can be inferred that efficient concurrency on exascale machines requires a massive amount of concurrent threads, each performing many operations on a localized piece of data. Currently, visualization libraries and applications are based off what is known as the visualization pipeline. In the pipeline model, algorithms are encapsulated as filters with inputs and outputs. These filters are connected by setting the output of one component to the input of another. Parallelism in the visualization pipeline is achieved by replicating the pipeline for each processing thread. This works well for todays distributed memory parallel computers but cannot be sustained when operating on processors with thousands of cores. Our project investigates a new visualization framework designed to exhibit the pervasive parallelism necessary for extreme scale machines. Our framework achieves this by defining algorithms in terms of worklets, which are localized stateless operations. Worklets are atomic operations that execute when invoked unlike filters, which execute when a pipeline request occurs. The worklet design allows execution on a massive amount of lightweight threads with minimal overhead. Only with such fine-grained parallelism can we hope to fill the billions of threads we expect will be necessary for efficient computation on an exascale machine.

Geveci, Berk

2014-10-31

440

[Review of assessment methods used to evaluate feeding for children with pervasive developmental disorder].  

PubMed

Current evaluations used by occupational therapists to assess and treat feeding problems derive mainly from the domain of dysphagia. The purpose of this article is to familiarize the reader with tools used, in research, for children with pervasive developmental disorders (PDD) and to determine if any of these meet the needs of occupational therapists. The following data bases were searched: Medline, CINAHL, HAPI and PsyINFO, using the terms pervasive developmental disorder, autism, Asperger syndrome, pervasive developmental disorder not otherwise specified, eating behavior, eating disorder, food preference, food selectivity, feeding disorders, picky eater and child. All articles published between 1980 and 2006 (n=27) were reviewed. A total of 20 studies met our selection criteria. Assessment methods are compared using the Disability Creation Model (DCP). The DCP is the Quebec alternative to the International Classification of Functioning, Disability and Health (ICF). None of the evaluation tools reviewed met all factors that may influence eating in children with PDD. Implications for research and practice in occupational therapy are discussed. PMID:18562184

Nadon, G; Ehrmann Feldman, D; Gisel, E

2008-08-01

441

RATES OF FITNESS DECLINE AND REBOUND SUGGEST PERVASIVE EPISTASIS  

PubMed Central

Unraveling the factors that determine the rate of adaptation is a major question in evolutionary biology. One key parameter is the effect of a new mutation on fitness, which invariably depends on the environment and genetic background. The fate of a mutation also depends on population size, which determines the amount of drift it will experience. Here, we manipulate both population size and genotype composition and follow adaptation of 23 distinct Escherichia coli genotypes. These have previously accumulated mutations under intense genetic drift and encompass a substantial fitness variation. A simple rule is uncovered: the net fitness change is negatively correlated with the fitness of the genotype in which new mutations appeara signature of epistasis. We find that Fisher's geometrical model can account for the observed patterns of fitness change and infer the parameters of this model that best fit the data, using Approximate Bayesian Computation. We estimate a genomic mutation rate of 0.01 per generation for fitness altering mutations, albeit with a large confidence interval, a mean fitness effect of mutations of ?0.01, and an effective number of traits nine in mutS? E. coli. This framework can be extended to confront a broader range of models with data and test different classes of fitness landscape models. PMID:24372601

Perfeito, L; Sousa, A; Bataillon, T; Gordo, I

2014-01-01

442

2012 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops VAMPIR-An Automatic Fall Detection System  

E-print Network

Health) and Workshops VAMPIR- An Automatic Fall Detection System Using a Vertical PIR Sensor Array Mihail Popescu. In this paper, we present an automatic fall detection system called VAMPIR based on a vertical array of multiple infrared (PIR) sensor denotes as VAMPIR. The VAMPIR sensor uses multiple PIR sensors (two in this work

He, Zhihai "Henry"

443

Bluetooth Security in Wearable Computing Applications  

Microsoft Academic Search

Advances in wireless sensor networking technologies have been extended to wearable computing systems and opened a plethora of applications and opportunities in the development and integration of pervasive Bluetooth Technologies with the abundance of existing specialized technologies in monitoring, data collection, and real-time analysis and reporting. Although the Bluetooth framework is acceptably secure, there are still a number of weaknesses

R. Bouhenguel; I. Mahgoub; M. Ilyas

2008-01-01

444

Determinating timing channels in compute clouds  

Microsoft Academic Search

Timing side-channels represent an insidious security challenge for cloud computing, because: (a) massive parallelism in the cloud makes timing channels pervasive and hard to control; (b) timing channels enable one customer to steal information from another without leaving a trail or raising alarms; (c) only the cloud provider can feasibly detect and report such attacks, but the provider's incentives are

Amittai Aviram; Sen Hu; Bryan Ford; Ramakrishna Gummadi

2010-01-01

445

IEEE 802.11 Distributed Coordination Function  

E-print Network

/ & . / & 802.11 #12; ­ IEEE 802.11 Distributed Coordination Function dPoint Coordination Function IEEE 802.11e IEEE 802.11e , WEP , , , -065) ( ( ) 3 -065 #12; (2/2) (MAC) ( ) 4 -065 #12;-065 5 5 #12; IEEE 802.11

Papapetrou, Evaggelos

446

No Silver Bullet : Inherent Limitations of Computer Security Technologies  

Microsoft Academic Search

Awareness of the need for secure systems has grown rapidly as computers have become increasingly pervasive in our society. Numerous computer security technologies have been proposed and implemented, but all of them fall short of providing the level of security most organizations and end- users expect. No current technology, whether used in isolation or used together with other measures, fully

Jeffrey W. Humphries; Daniel J. Ragsdale; Curtis A. Carver

2000-01-01

447

Mobile healthcare information management utilizing Cloud Computing and Android OS  

Microsoft Academic Search

Cloud Computing provides functionality for managing information data in a distributed, ubiquitous and pervasive manner supporting several platforms, systems and applications. This work presents the implementation of a mobile system that enables electronic healthcare data storage, update and retrieval using Cloud Computing. The mobile application is developed using Google's Android operating system and provides management of patient health records and

Charalampos Doukas; Thomas Pliakas; Ilias Maglogiannis

2010-01-01

448

Evidence of Pervasive Biologically Functional Secondary Structures within the Genomes of Eukaryotic Single-Stranded DNA Viruses  

PubMed Central

Single-stranded DNA (ssDNA) viruses have genomes that are potentially capable of forming complex secondary structures through Watson-Crick base pairing between their constituent nucleotides. A few of the structural elements formed by such base pairings are, in fact, known to have important functions during the replication of many ssDNA viruses. Unknown, however, are (i) whether numerous additional ssDNA virus genomic structural elements predicted to exist by computational DNA folding methods actually exist and (ii) whether those structures that do exist have any biological relevance. We therefore computationally inferred lists of the most evolutionarily conserved structures within a diverse selection of animal- and plant-infecting ssDNA viruses drawn from the families Circoviridae, Anelloviridae, Parvoviridae, Nanoviridae, and Geminiviridae and analyzed these for evidence of natural selection favoring the maintenance of these structures. While we find evidence that is consistent with purifying selection being stronger at nucleotide sites that are predicted to be base paired than at sites predicted to be unpaired, we also find strong associations between sites that are predicted to pair with one another and site pairs that are apparently coevolving in a complementary fashion. Collectively, these results indicate that natural selection actively preserves much of the pervasive secondary structure that is evident within eukaryote-infecting ssDNA virus genomes and, therefore, that much of this structure is biologically functional. Lastly, we provide examples of various highly conserved but completely uncharacterized structural elements that likely have important functions within some of the ssDNA virus genomes analyzed here. PMID:24284329

Muhire, Brejnev Muhizi; Golden, Michael; Murrell, Ben; Lefeuvre, Pierre; Lett, Jean-Michel; Gray, Alistair; Poon, Art Y. F.; Ngandu, Nobubelo Kwanele; Semegni, Yves; Tanov, Emil Pavlov; Monjane, Adrito Luis; Harkins, Gordon William; Varsani, Arvind; Shepherd, Dionne Natalie

2014-01-01

449

790 IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION,VOL. 42, NO. 6, JUNE 1994 Spectral Iterative Algorithm for RCS Computation in  

E-print Network

Algorithm for RCS Computation in Electrically Large or Intermediate Perfectly Conducting Cavities Juan M strong atten- tion in the last years in relation to radar cross section (RCS) reduction and target signatures. For RCS analysis of complex targets, duct structures such as jet engine intakes can often

Lozano, Angel

450

IEEE TRANSACTIONS ON COMPUTERS, VOL. C-27, NO. 3, MARCH 1978 It should be noted that for the left-to right-scanning algorithm  

E-print Network

-A method is described for automating the counting of asbestos fibers in air samples by computer processing-194, 1965. The Automatic Counting of Asbestos Fibers in Air Samples T. PAVLIDIS AND K. STEIGLITZ Abstract asbestos fibers in certain industrial environments are monitored by human counting from magnified air

Steiglitz, Kenneth

451

IEEE SIGNAL PROCESSING MAGAZINE [94] SEPTEMBER 2011 n this tutorial, we define and discuss key aspects of the problem of computational inference of aesthetics  

E-print Network

aspects of the problem of computational inference of aesthetics and emotion from images. We begin. A significant number of papers that have attempted to solve problems in aesthetics and emotion inference such as associating pictures with aesthetics and emotions that they arouse in humans, with low-level image composition

Tomkins, Andrew

452

Applications of software reliability using the IEEE\\/AIAA recommended practice on software reliability  

Microsoft Academic Search

Software-based systems have become the dominant player in the computer systems world. Since it is imperative that computer systems operate reliably, considering the criticality of software to the success of contemporary systems, the IEEE and AIAA commissioned the development of a new standard called the recommended practice on software reliability. This is an expository paper. It is not a research

N. Schneidewind; M. Hinchey

2009-01-01

453

IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING 1 3D-Image Reconstruction in Highly Collimated 3D  

E-print Network

IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING 1 3D-Image Reconstruction in Highly Collimated 3D introduces a novel method for image reconstruction in 3D tomography, called Searchlight Computed Tomography, Inverse Problems I. INTRODUCTION Computed Tomography (CT) is a widely used medical imaging method which

Labate, Demetrio

454

Computer Science Distinguished Lectures 2010-11 http://www.cs.iastate.edu/~colloq/new/dls.shtml  

E-print Network

Computer Science Distinguished Lectures 2010-11 http relate these efforts to our NSF-sponsored IGERT PhD program in Computational Transportation Science. Ouri/pervasive computing. He received his B.A. degree in mathematics, and his Ph.D. degree in computer science from Courant

Mayfield, John

455

Computer Science 2009 Aehlig, K and Beckmann, A  

E-print Network

-reduction', Annals of Pure and Applied Logic, Available online since 14 July 2009, 26 pp. Bauer, A and Blanck, J distribution-based approach to tracking points in velocity vector fields', in Proceedings of IEEE Computer

Grant, P. W.

456

Towards Ubiquitous Bio-Information Computing: Data Protocols, Middleware, and Web Services for Heterogeneous Biological Information  

E-print Network

. It is expected that future bio-information computing could be pervasive in our daily life (e.g., Personal Health and computing heterogeneous bio-information and are interoperable. Currently, there are substantial barriers1 UBIC2 ­ Towards Ubiquitous Bio-Information Computing: Data Protocols, Middleware, and Web

Wong, Wing Hung

457

Usage Management in Cloud Computing Pramod A. Jamkhedkar, Christopher C. Lamb, Gregory L. Heileman  

E-print Network

Usage Management in Cloud Computing Pramod A. Jamkhedkar, Christopher C. Lamb, Gregory L. Heileman will gain increasing importance as cloud computing becomes more pervasive. Existing service level agreement. This paper introduces the notion and importance of usage management in cloud computing. It provides

Heileman, Gregory L.

458

Automatically Augmenting Lifelog Events Using Pervasively Generated Content from Millions of People  

PubMed Central

In sensor research we take advantage of additional contextual sensor information to disambiguate potentially erroneous sensor readings or to make better informed decisions on a single sensors output. This use of additional information reinforces, validates, semantically enriches, and augments sensed data. Lifelog data is challenging to augment, as it tracks ones life with many images including the places they go, making it non-trivial to find associated sources of information. We investigate realising the goal of pervasive user-generated content based on sensors, by augmenting passive visual lifelogs with Web 2.0 content collected by millions of other individuals. PMID:22294880

Doherty, Aiden R.; Smeaton, Alan F.

2010-01-01

459

DECEMBER 2000 IEEE Robotics  

E-print Network

DECEMBER 2000 IEEE Robotics & Automation Magazine A Hierarchical Team Robots Capable Carrying Out heterogeneous robotic that is based mainly on a miniature robotic system. Because some these operations require covert action, have chosen make robots team ex­ tremely small that evade detection. This small allows

Hougen, Dean F.

460

2222 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 5, JUNE 2012 An SMDP-Based Service Model for Interdomain  

E-print Network

, and Daiyuan Peng, Member, IEEE Abstract--Mobile cloud computing is a promising technique that shifts the data and computing service modules from individ- ual devices to a geographically distributed cloud service architec- ture. A general mobile cloud computing system is comprised of multiple cloud domains, and each domain

Shen, Xuemin "Sherman"

461

Toward Next Generation Mobile Networks Abbas Jamalipour, PhD; Fellow IEEE, Fellow IEAust  

E-print Network

been very active within the IEEE Communications Society, serving as the Chair of Satellite and Space including IEEE Distinguished Contribution to Satellite Communications Award, IEEE Communications Society-in-Chief, IEEE Wireless Communications Distinguished Lecturer, IEEE Communications Society Email: a

462

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 3, MARCH 2009 483 Rate-Distortion Efficient Piecewise Planar 3-D Scene  

E-print Network

Piecewise Planar 3-D Scene Representation From 2-D Images Evren Imre, A. Aydin Alatan, Member, IEEE is with the Department of Computer Engineering, Bilkent Uni- versity, Ankara, Turkey (e-mail: gudukbay

Güdükbay, Ugur

463

WPI-CS-TR-06-20 October 2006 Measuring the Queue Sizes of IEEE 802.11 Wireless Access Points  

E-print Network

by Feng Li Rui Lu Mingzhe Li Huahui Wu Mark Claypool Robert Kinicki Computer Science Technical Report, Massachusetts 01609-2280 #12;Measuring the Queue Sizes of IEEE 802.11 Wireless Access Points Feng Li, Rui Lu

Kinicki, Robert E.

464

Pervasive negative effects of rewards on intrinsic motivation: The myth continues  

PubMed Central

A major concern in psychology and education is that rewards decrease intrinsic motivation to perform activities. Over the past 30 years, more than 100 experimental studies have been conducted on this topic. In 1994, Cameron and Pierce conducted a meta-analysis of this literature and concluded that negative effects of reward were limited and could be easily prevented in applied settings. A more recent meta-analysis of the literature by Deci, Koestner, and Ryan (1999) shows pervasive negative effects of reward. The purpose of the present article is to resolve differences in previous meta-analytic findings and to provide a meta-analysis of rewards and intrinsic motivation that permits tests of competing theoretical explanations. Our results suggest that in general, rewards are not harmful to motivation to perform a task. Rewards given for low-interest tasks enhance free-choice intrinsic motivation. On high-interest tasks, verbal rewards produce positive effects on free-choice motivation and self-reported task interest. Negative effects are found on high-interest tasks when the rewards are tangible, expected (offered beforehand), and loosely tied to level of performance. When rewards are linked to level of performance, measures of intrinsic motivation increase or do not differ from a nonrewarded control group. Overall, the pattern of results indicates that reward contingencies do not have pervasive negative effects on intrinsic motivation. Theoretical and practical implications of the findings are addressed. PMID:22478353

Cameron, Judy; Banko, Katherine M.; Pierce, W. David

2001-01-01

465

Suppression of pervasive noncoding transcription in embryonic stem cells by esBAF.  

PubMed

Approximately 75% of the human genome is transcribed, the majority of which does not encode protein. However, many noncoding RNAs (ncRNAs) are rapidly degraded after transcription, and relatively few have established functions, questioning the significance of this observation. Here we show that esBAF, a SWI/SNF family nucleosome remodeling factor, suppresses transcription of ncRNAs from ?57,000 nucleosome-depleted regions (NDRs) throughout the genome of mouse embryonic stem cells (ESCs). We show that esBAF functions to both keep NDRs nucleosome-free and promote elevated nucleosome occupancy adjacent to NDRs. Reduction of adjacent nucleosome occupancy upon esBAF depletion is strongly correlated with ncRNA expression, suggesting that flanking nucleosomes form a barrier to pervasive transcription. Upon forcing nucleosome occupancy near two NDRs using a nucleosome-positioning sequence, we found that esBAF is no longer required to silence transcription. Therefore, esBAF's function to enforce nucleosome occupancy adjacent to NDRs, and not its function to maintain NDRs in a nucleosome-free state, is necessary for silencing transcription over ncDNA. Finally, we show that the ability of a strongly positioned nucleosome to repress ncRNA depends on its translational positioning. These data reveal a novel role for esBAF in suppressing pervasive transcription from open chromatin regions in ESCs. PMID:25691467

Hainer, Sarah J; Gu, Weifeng; Carone, Benjamin R; Landry, Benjamin D; Rando, Oliver J; Mello, Craig C; Fazzio, Thomas G

2015-02-15

466

Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey  

E-print Network

of network dynamics on trust dynamics and the impact of trust on security services. I. INTRODUCTIONTrust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey Kannan Govindan, Member IEEE and Prasant Mohapatra, Fellow IEEE Abstract Trust is an important aspect of mobile adhoc networks

California at Davis, University of

467

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using  

E-print Network

military veterans, including their social security numbers and health problems was stolen by an employeeScalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute Member, IEEE, and Wenjing Lou, Senior Member, IEEE Abstract--Personal health record (PHR) is an emerging

Hou, Y. Thomas

468

Li-Shiuan Peh Department of Electrical Engineering and Computer Science, MIT, Cambridge, MA  

E-print Network

. · B.S. Computer Science and Information Systems (First Class Honors), National University of Singa Paper Award at International Conference on Mobile Systems, Applications and Services, 2011. · IEEE Micro Top Picks paper from Hot Interconnects conference, 2009. · IEEE Micro Top Picks paper from

469

Proceedings of the 1994 ASME/IEEE joint railroad conference  

SciTech Connect

The proceedings contains 22 papers from the IEEE/ASME Joint Railroad Conference. Topics discussed include flange bearing crossing frogs; rapid transit; vehicle on-board computer systems; total transport system control functions; automated train dispatching system; wheel thermal damage limits; AC propulsion; AC traction drives; electric power supplies; failure detection and identification; cargo transportation; and critical speed for railroad vehicles. Papers within the scope of the data base have been processed separately.

Hawthorne, K.L. [ed.; Hill, J.R. [ed.

1994-12-31

470

Brain-Computer Symbiosis  

PubMed Central

The theoretical groundwork of the 1930s and 1940s and the technical advance of computers in the following decades provided the basis for dramatic increases in human efficiency. While computers continue to evolve, and we can still expect increasing benefits from their use, the interface between humans and computers has begun to present a serious impediment to full realization of the potential payoff. This article is about the theoretical and practical possibility that direct communication between the brain and the computer can be used to overcome this impediment by improving or augmenting conventional forms of human communication. It is about the opportunity that the limitations of our bodys input and output capacities can be overcome using direct interaction with the brain, and it discusses the assumptions, possible limitations, and implications of a technology that I anticipate will be a major source of pervasive changes in the coming decades. PMID:18310804

Schalk, Gerwin

2009-01-01

471

ACCEPTED VERSION, IEEE TRANSACTIONS ON ROBOTICS. THE FINAL PUBLICATION IS AVAILABLE AT IEEEXPLORE.IEEE.ORG 1 On Cooperative Patrolling: Optimal Trajectories,  

E-print Network

ACCEPTED VERSION, IEEE TRANSACTIONS ON ROBOTICS. THE FINAL PUBLICATION IS AVAILABLE AT IEEEXPLORE algorithm for its computation. Then, we describe a distributed procedure that steers the robots toward refresh time problem, under the technical assumption of a constant number of robots involved

472

Fischer/Arias/Carmien/Eden/Gorman/Konomi/Sullivan--1 HCIC'2004 Draft of a Paper to be Presented at the 2004 Meeting of the Human Computer Interaction  

E-print Network

at the 2004 Meeting of the Human Computer Interaction Consortium "Computing Off The Desktop" Supporting Collaboration and Distributed Cognition among Design Communities in Context-Aware Pervasive Computing of Computer Science, and School of Architecture and Urban Planning University of Colorado, Boulder Abstract

Fischer, Gerhard

473

(Jan. 9, 2012) Mentoring Advice on Nomination for IEEE Fellow  

E-print Network

Fellow process, based on my own experience and discussions with colleagues. Why IEEE Fellow Is An Honor people can be elevated to IEEE Fellow in a given year. As stated on the IEEE web site, "According to IEEE-tenth of one percent of the voting membership on record as of 31 December of the year preceding."1 Thus, IEEE

Bowyer, Kevin W.

474

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 3, MARCH 2010 1055 Refinements on IEEE 802.11 Distributed  

E-print Network

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 3, MARCH 2010 1055 Refinements on IEEE 802.11, Senior Member, IEEE Abstract--With the popularity of the IEEE 802.11 standards, many analytical 802.11 standard for wireless local area networks (WLANs). IEEE 802.11 represents the adaptation

Tinnirello, Ilenia

475

Movement is a pervasive feature of microbial and animal biology, from bacteria moving over tiny distances to whales  

E-print Network

1653 Movement is a pervasive feature of microbial and animal biology, from bacteria moving over tiny distances to whales migrating across hemispheres. This broad range of size, mechanisms and ecology more traditionally the realm of biology. Interestingly, there are unanticipated convergences in certain

Marden, James

476

Common and Unique Impairments in Facial-Expression Recognition in Pervasive Developmental Disorder-Not Otherwise Specified and Asperger's Disorder  

ERIC Educational Resources Information Center

This study was designed to identify specific difficulties and associated features related to the problems with social interaction experienced by individuals with pervasive developmental disorder-not otherwise specified (PDD-NOS) using an emotion-recognition task. We compared individuals with PDD-NOS or Asperger's disorder (ASP) and typically

Uono, Shota; Sato, Wataru; Toichi, Motomi

2013-01-01

477

Comparison of Data-Collection Methods in a Behavioral Intervention Program for Children with Pervasive Developmental Disorders: A Replication  

ERIC Educational Resources Information Center

Cummings and Carr (2009) compared two methods of data collection in a behavioral intervention program for children with pervasive developmental disorders: collecting data on all trials versus only the first trial in a session. Results showed that basing a child's progress on first-trial data resulted in identifying mastery-level responding

Najdowski, Adel C.; Chilingaryan, Vardui; Bergstrom, Ryan; Granpeesheh, Doreen; Balasanyan, Susie; Aguilar, Barbara; Tarbox, Jonathan

2009-01-01

478

The Comorbidity of Pervasive Developmental Disorder and Attention Deficit Hyperactivity Disorder: Results of a Retrospective Chart Review  

Microsoft Academic Search

Objective: To determine if a sample of children meeting diagnostic criteria for a Pervasive Developmental Disorder (PDD) display symptoms and impairment related to Attention Deficit Hyperactivity Disorder (ADHD) sufficient to warrant a comorbid diagnosis of ADHD. Further, do children with PDD displaying such symptoms demonstrate more impairment in daily life activities than those children only having PDD? Method: A retrospective

Sam Goldstein; Adam J. Schwebach

2004-01-01

479

Microswitch- and VOCA-Assisted Programs for Two Post-Coma Persons with Minimally Conscious State and Pervasive Motor Disabilities  

ERIC Educational Resources Information Center

Intervention programs, based on learning principles and assistive technology, were assessed in two studies with two post-coma men with minimally conscious state and pervasive motor disabilities. Study I assessed a program that included (a) an optic microswitch, activated via double blinking, which allowed a man direct access to brief music

Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Buonocunto, Francesca; Sacco, Valentina; Colonna, Fabio; Navarro, Jorge; Oliva, Doretta; Signorino, Mario; Megna, Gianfranco

2009-01-01

480

Spanish-Speaking Parents of School-Age Children with a Pervasive Developmental Disorder: A Case Study  

ERIC Educational Resources Information Center

Studies have shown that the prevalence rates of Pervasive Developmental Disorders (PDD) have increased tremendously over the last ten years. Parental involvement in the educational decision-making has also remained a key issue for schools and parents. As a result, schools employ various programs in attempts to promote and maintain parental

Cantu, Michael D.

2012-01-01

481

The Treatment of High-Functioning Pervasive Developmental Disorder and Asperger's DisorderDefining the Social Work Role  

Microsoft Academic Search

With the introduction of The Diagnostic and Statistical Manual of the American Psychiatric Association, Fourth Edition (1994), the diagnostic category pervasive developmental disorder'' (PDD) was expanded to include Asperger's disorder. In addition, high-functioning'' PDD is now more commonly recognized. It is therefore important that social workers be familiar with these disorders and the possible roles that they may have in

Kevin P. Stoddart

1998-01-01

482

The transformative power of literacy remains a pervasive concept in contemporary culture. Even within the field of literacy studies,  

E-print Network

The transformative power of literacy remains a pervasive concept in contemporary culture. Even within the field of literacy studies, where there have been critiques of the mythologies of literacy of literacy, identity, and agency. I will draw on observations and interviews with secondary and university

Dixon, Peter

483

Validity of the Autism/Pervasive Developmental Disorder Subscale of the Diagnostic Assessment for the Severely Handicapped-II.  

ERIC Educational Resources Information Center

An evaluation was made of the empirical validity of the Diagnostic Assessment for the Severely Handicapped-II (DASH-II) with 51 individuals with severe/profound mental retardation, some of whom were also diagnosed with autism, and controls. The Autism/Pervasive Developmental Disorder subscale of the DASH-II was internally consistent and just as

Matson, Johnny L.; Smiroldo, Brandi B.; Hastings, Theresa L.

1998-01-01

484

Differential Language Markers of Pathology in Autism, Pervasive Developmental Disorder Not Otherwise Specified and Specific Language Impairment  

ERIC Educational Resources Information Center

Language impairment is a common core feature in Pervasive Developmental Disorders (PDD) and Specific Language Impairment (SLI). Many studies have tried to define the specific language profiles of these disorders, some claiming the existence of overlaps, and others conceiving of them as separate categories. Fewer have sought to determine whether

Demouy, Julie; Plaza, Monique; Xavier, Jean; Ringeval, Fabien; Chetouani, Mohamed; Perisse, Didier; Chauvin, Dominique; Viaux, Sylvie; Golse, Bernard; Cohen, David; Robel, Laurence

2011-01-01

485

Platelet Serotonin Levels in Pervasive Developmental Disorders and Mental Retardation: Diagnostic Group Differences, Within-Group Distribution, and Behavioral Correlates.  

ERIC Educational Resources Information Center

Objective: To investigate group differences, the within-group distributions, and the clinical correlates of platelet serotonin (5-HT) levels in pervasive developmental disorders (PDD). Method: Platelet 5-HT levels were measured in Dutch children and young adults, recruited from 2001 through 2003, with PDD (autism, Asperger's and PDD-not otherwise

Mulder, Erik J.; Anderson, George M.; Kema, Ido P.; De Bildt, Annelies; Van Lang, Natasja D.J.; Den Boer, Johan A.; Minderaa Ruud B.

2004-01-01

486

Donepezil in the Treatment of ADHD-Like Symptoms in Youths with Pervasive Developmental Disorder: A Case Series  

ERIC Educational Resources Information Center

Background: Recent studies reported ADHD-like symptoms and cognitive deficits in pervasive developmental disorder (PDD). Because work in dementia documents improvement in executive function deficits with the acetylcholinesterase inhibitor donepezil, the authors reason that similar benefits could be obtained in PDD. Method: The authors describe

Doyle, Robert L.; Frazier, Jean; Spencer, Thomas J.; Geller, Daniel; Biederman, Joseph; Wilens, Timothy

2006-01-01

487

Learning, Engagement, and Technology: Middle School Students' Three-Year Experience in Pervasive Technology Environments in South Korea  

ERIC Educational Resources Information Center

This study explored an initiative that created a pervasive learning environment in a middle school in South Korea and examined its impact on student academic achievement and learning engagement. Forty students received a laptop to use for class projects, online collaboration, and lesson reviews over a 3-year period. To measure the effect of laptop

Hur, Jung Won; Oh, Jaekyeon

2012-01-01

488

Relationship between Motor and Executive Functioning in School-Age Children with Pervasive Developmental Disorder Not Otherwise Specified  

ERIC Educational Resources Information Center

This study examines the motor skills and executive functioning (EF) of 28 children diagnosed with pervasive developmental disorder-not otherwise specified (PDD-NOS; mean age: 10 years 6 months, range: 7-12 years; 19 boys, 9 girls) in comparison with age- and gender-matched typically developing children. The potential relationship between motor

Schurink, J.; Hartman, E.; Scherder, E. J. A.; Houwen, S.; Visscher, C.

2012-01-01

489

Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Pervasive Telemedicine System  

E-print Network

Telemedicine System David Pazmino, Michael Filippone, Pavan Mundra, and Savitha Iyengar Abstract The Pervasive Telemedicine System focuses on providing medical support to the Pace community at remote campus locations telemedicine systems that were initiated in other Universities and are being used to provide healthcare

Tappert, Charles

490

ReSCo: A Middleware Component for Reliable Service Composition in Pervasive Systems  

SciTech Connect

Service composition schemes create high-level application services by combining several basic services. Service composition schemes for dynamic, open systems, such as those found in pervasive environments, must be cognizant of the possibility of failures and attacks. In open systems, it is seldom feasible to guarantee the reliability of each node prior to access; however, there may be several possible ways to compose the same high-level service, each having a different (though possibly overlapping) set of nodes that can satisfy the composition. We approach this problem with a Reliable Service Composition middleware component, ReSCo, to determine trustworthy compositions and nodes for service composition in dynamic, open systems. ReSCo is a modular, adaptive middleware component that selects from possible composition paths and nodes to enhance reliability of service compositions. ReSCo can work with a broad range of both service composition algorithms and trust establishment mechanisms.

Lagesse, Brent J [ORNL; Kumar, Mohan [University of Texas, Arlington; Wright, Matthew [University of Texas, Arlington

2010-01-01

491

Promoting social skill development in children with pervasive developmental disorders: a feasibility and efficacy study.  

PubMed

A randomized controlled design was employed to evaluate a social skills intervention for children with pervasive developmental disorders. Aims included evaluating the acceptability of the program and gathering preliminary evidence on efficacy. Forty-four children, ages 8-11 years, were randomly assigned to treatment or wait list. Treatment consisted of a 16-week group intervention designed to teach appropriate social behavior. Between group comparisons showed that children in treatment were rated as improved on the primary outcome measure, (unblinded parent report), but not on the secondary outcome measure, a parent questionnaire. Parents reported a high level of satisfaction with the intervention. The study supports the feasibility of this intervention to families and highlights challenges for future research in social skills intervention. PMID:20204689

Koenig, Kathleen; White, Susan Williams; Pachler, Maryellen; Lau, Monika; Lewis, Moira; Klin, Ami; Scahill, Lawrence

2010-10-01

492

Detecting Subgroups in Children Diagnosed with Pervasive Developmental Disorder - Not Otherwise Specified.  

PubMed

Hierarchical cluster analyses were used to detect three subgroups in a sample of children with pervasive developmental disorder-not otherwise specified (PDD-NOS) evaluated at ages 2 and 4. At age 2, Cluster 1 demonstrated few autism symptoms and high cognitive scores; 60% no longer met criteria for PDD at 4. Cluster 2 exhibited more autism symptoms and lower cognitive scores at 2; 89.5% met criteria for ASD at 4. Cluster 3 had the lowest cognitive scores and most impaired social/communication skills at 2, but no repetitive behaviors; 60% diagnosed with Autistic Disorder at 4. Results shed light on outcomes for different PDD-NOS types and raise questions regarding the increased importance of repetitive behaviors in DSM-5. PMID:25374133

Brennan, Laura; Barton, Marianne; Chen, Chi-Ming; Green, James; Fein, Deborah

2014-11-01

493

Pervasive Layering in the Lunar Highland Crust: Evidence from Apollos 15, 16,and 17  

NASA Technical Reports Server (NTRS)

This paper presents results of a photogeologic reconnaissance of 70 mm photographs taken on the lunar surface during the Apollo 15, 16, and 17 missions, whose primary objective was to investigate the lunar highland crust. Photographs at all three sites, notably the Apennine Front, show pervasive layered structure. These layers are easily distinguished from lighting artifacts, and are considered genuine crustal structures. Their number, thickness, and extent implies that they are lava flows, not ejecta blankets or intrusive features. They appear to be the upper part of the earliest lunar crust, possibly forming a layer tens of kilometers thick. Remote sensing studies (X-ray fluorescence and reflectance spectroscopy), indicate that the highland crust is dominantly a feldspathic basalt. It is concluded that the highland layers represent a global crust formed by eruptions of high-alumina basalt in the first few hundred million years of the Moon's history.

Lowman, Paul D., Jr.; Yang, Tiffany

2005-01-01

494

Pervasively Altered Hematite-Rich Deposits Southeast of Home Plate, Gusev Crater, Mars  

NASA Technical Reports Server (NTRS)

The investigation of Home Plate and its surroundings in the Inner Basin of the Columbia Hills in Gusev Crater has added substantially to the water story on Mars. Textural, morphological, and geochemical evidence from Home Plate point towards an explosive origin, probably a hydrovolcanic explosion [1]. High silica deposits in the immediate vicinity of Home Plate suggest hydrothermal alteration [e.g. 2,3]. Pervasively altered deposits rich in hematite were investigated to the southeast of Home Plate. Of these, the target Halley, the target KingGeorgeIsland on the GrahamLand outcrop, and the targets Montalva and Riquelme on the Troll outcrop were investigated in situ with the Alpha Particle X-ray spectrometer (APXS), the Microscopic Imager (MI), and the Moessbauer (MB) spectrometer (Fig. 1).

Schroder, C.; Arvidson, R. E.; Schmidt, M. E.; Gellert, R.; Klingelhoefer, G.; Ming, D. W.; Morris, R. V.; Rice, J. W.; Yen, A. S.; deSouza, P. A., Jr.

2008-01-01

495

Mediated interaction: Social Informatics in the era of ubiquitous computing  

E-print Network

emphasis is put in SI on the interaction of information technologies with their institutional and cultural more pervasive and ubiquitous use of computers, however, seems to call for complementary approaches engine, agent-based models Introduction: an original vision Social Informatics (SI), as an area

Indiana University

496

Supporting collaborative computing and interaction  

SciTech Connect

To enable collaboration on the daily tasks involved in scientific research, collaborative frameworks should provide lightweight and ubiquitous components that support a wide variety of interaction modes. We envision a collaborative environment as one that provides a persistent space within which participants can locate each other, exchange synchronous and asynchronous messages, share documents and applications, share workflow, and hold videoconferences. We are developing the Pervasive Collaborative Computing Environment (PCCE) as such an environment. The PCCE will provide integrated tools to support shared computing and task control and monitoring. This paper describes the PCCE and the rationale for its design.

Agarwal, Deborah; McParland, Charles; Perry, Marcia

2002-05-22

497

Above-Campus Services: Shaping the Promise of Cloud Computing for Higher Education  

ERIC Educational Resources Information Center

The concept of today's cloud computing may date back to 1961, when John McCarthy, retired Stanford professor and Turing Award winner, delivered a speech at MIT's Centennial. In that speech, he predicted that in the future, computing would become a "public utility." Yet for colleges and universities, the recent growth of pervasive, very high speed

Wheeler, Brad; Waggener, Shelton

2009-01-01

498

414 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 6, NO. 3, JUNE 2004 Low Power Design of DCT and IDCT for  

E-print Network

414 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 6, NO. 3, JUNE 2004 Low Power Design of DCT and IDCT--This paper examines low power design techniques for discrete cosine transform (DCT) and inverse discrete include skipping DCT computation of low energy macroblocks, skipping IDCT computation of blocks with all

Ha, Dong S.

499

978 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 55, NO. 3, MARCH 2008 Validation of Finite Element Models  

E-print Network

Element Models of Liver Tissue Using Micro-CT Hongjian Shi, Aly A. Farag*, Senior Member, IEEE, Rachid at validating some soft tissue de- formation models using high-resolution micro-computed tomog- raphy (Micro-CT tissue, Micro-CT. I. INTRODUCTION COMPUTER-AIDED surgical simulation progressed sig- nificantly

Farag, Aly A.

500

SPARSE REPRESENTATION FOR COMPUTER VISION AND PATTERN RECOGNITION  

E-print Network

SPARSE REPRESENTATION FOR COMPUTER VISION AND PATTERN RECOGNITION By John Wright Yi Ma Julien OF IEEE, MARCH 2009 1 Sparse Representation For Computer Vision and Pattern Recognition John Wright to see significant impact in computer vision, often on non-traditional applications where the goal