Science.gov

Sample records for ieee pervasive computing

  1. IEEE Pervasive Computing (Revised) Cardiovascular Monitoring Using Earphones and a Mobile Device

    E-print Network

    catastrophes and treatment therapies of chronic disease. Resting heart rate, one of the simplest cardiovascular) for cardiovascular disease [1]. In particular, the association between accelerated resting heart rate and mortalityIEEE Pervasive Computing (Revised) 1 Cardiovascular Monitoring Using Earphones and a Mobile Device

  2. Wearable ComputingEditor: Thad E. Starner Georgia Institute of Technology thad@cc.gatech.edu 16 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE

    E-print Network

    Kemp, Charlie

    Wearable ComputingEditor: Thad E. Starner Georgia Institute of Technology thad@cc.gatech.edu 16 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 © 2006 IEEE Wearables their algorithms outside the lab? Roboticists can use wearables as a development platform for the sophisti- cated

  3. 14 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 2014 IEEE Wearable Computing

    E-print Network

    Gatica-Perez, Daniel

    -awareness, textiles and sensor technologies, eye- wear computing, and interaction. Context Awareness Topics related firefighters. Textiles and Sensors This year also saw a renewed interest in sensor modalities. Cheng-Yuan Li integrating electronics into clothing is proper insulation of the wiring. Guido Gio- berto, from

  4. Sample Title 68 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE

    E-print Network

    Yang, Liuqing

    networks, and sensor networks have already led the way. Future cars will behave more like intelligent, autonomous ag- ents will traverse traffic control centers, road intersections, highways, streets, vehicles the right Smart Cars on Smart Roads: An IEEE Intelligent Transportation Systems Society Update Fei-Yue Wang

  5. Emotions in Pervasive Computing Environments

    E-print Network

    Jungum, Nevin Vunka

    2009-01-01

    The ability of an intelligent environment to connect and adapt to real internal sates, needs and behaviors' meaning of humans can be made possible by considering users' emotional states as contextual parameters. In this paper, we build on enactive psychology and investigate the incorporation of emotions in pervasive systems. We define emotions, and discuss the coding of emotional human markers by smart environments. In addition, we compare some existing works and identify how emotions can be detected and modeled by a pervasive system in order to enhance its service and response to users. Finally, we analyze closely one XML-based language for representing and annotating emotions known as EARL and raise two important issues which pertain to emotion representation and modeling in XML-based languages.

  6. 90 PERVASIVE computing 1536-1268/02/$17.00 2002 IEEE Forty years ago, when batch pro-

    E-print Network

    Starner, Thad E.

    will be coupled together very tightly and the resulting partner- ship will think as no human brain has ever, Licklider wanted to augment the thought process such that "human brains and comput- ing machines a diary of his every- day actions: "About 85 percent of my `thinking' time was actually spent get- ting

  7. Systems Directions for Pervasive Computing

    E-print Network

    Grimm, Robert

    ;one.world The Challenge · Average hacker needs to develop applications that ­ Adapt to a changing for change shifts burden to application developer ­ Can we do better? #12;Pile on one.world #12;one.world Say Wetherall University of Washington #12;one.world The Vision · Make computers usable for (computer

  8. 76 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 2014 IEEE Smartphones Editor: Roy Want n Google n roywant@acm.org

    E-print Network

    Cortes, Corinna

    to power monitoring in the mobile design process, either when building mobile hardware or writing software Editor: Roy Want n Google n roywant@acm.org There are several characteristics that distinguish mobile computers from static desktop computers--low-power operation, wireless networking, mobile sensing, low

  9. Mobile Virtual Environments in Pervasive Computing

    NASA Astrophysics Data System (ADS)

    Lazem, Shaimaa; Abdel-Hamid, Ayman; Gra?anin, Denis; Adams, Kevin P.

    Recently, human computer interaction has shifted from traditional desktop computing to the pervasive computing paradigm where users are engaged with everywhere and anytime computing devices. Mobile virtual environments (MVEs) are an emerging research area that studies the deployment of virtual reality applications on mobile devices. MVEs present additional challenges to application developers due to the restricted resources of the mobile devices, in addition to issues that are specific to wireless computing, such as limited bandwidth, high error rate and handoff intervals. Moreover, adaptive resource allocation is a key issue in MVEs where user interactions affect system resources, which, in turn, affects the user’s experience. Such interplay between the user and the system can be modelled using game theory. This chapter presents MVEs as a real-time interactive distributed system, and investigates the challenges in designing and developing a remote rendering prefetching application for mobile devices. Furthermore, we introduce game theory as a tool for modelling decision-making in MVEs by describing a game between the remote rendering server and the mobile client.

  10. Security Issues with Pervasive Computing Frameworks Michael Collins1

    E-print Network

    Dobson, Simon

    Security Issues with Pervasive Computing Frameworks Michael Collins1 , Simon Dobson2 , Paddy Nixon2 Systems Research Group, School of Computer Science and Informatics, UCD Dublin, Ireland 1 michael.collins

  11. The Implications of Pervasive Computing on Network Design

    NASA Astrophysics Data System (ADS)

    Briscoe, R.

    Mark Weiser's late-1980s vision of an age of calm technology with pervasive computing disappearing into the fabric of the world [1] has been tempered by an industry-driven vision with more of a feel of conspicuous consumption. In the modified version, everyone carries around consumer electronics to provide natural, seamless interactions both with other people and with the information world, particularly for eCommerce, but still through a pervasive computing fabric.

  12. Pervasive Collaboratorive Computing Environment Jabber Toolkit

    Energy Science and Technology Software Center (ESTSC)

    2004-05-15

    PCCE Project background: Our experience in building distributed collaboratories has shown us that there is a growing need for simple, non-intrusive, and flexible ways to stay in touch and work together. Towards this goal we are developing a Pervasive Collaborative Computing Environment (PCCE) within which participants can rendezvous and interact with each other. The PCCE aims to support continuous or ad hoc collaboration, target daily tasks and base connectivity, be easy to use and installmore »across multiple platforms, leverage off of existing components when possible, use standards-based components, and leverage off of Grid services (e.g., security and directory services). A key concept for this work is "incremental trust", which allows the system's "trust" of a given user to change dynamically. PCCE Jabber client software: This leverages Jabber. an open Instant Messaging (IM) protocol and the related Internet Engineering Task Force (IETF) standards "XMPP" and "XMPP-IM" to allow collaborating parties to chat either one-on-one or in "chat rooms". Standard Jabber clients will work within this framework, but the software will also include extensions to a (multi-platform) GUI client (Gaim) for X.509-based security, search, and incremental trust. This software also includes Web interfaces for managing user registration to a Jabber server. PCCE Jabber server software: Extensions to the code, database, and configuration files for the dominant open-source Jabber server, "jabberd". Extensions for search, X.509 security, and incremental trust. Note that the jabberd software is not included as part of this software.« less

  13. Building Efficient Wireless Infrastructures for Pervasive Computing Environments

    ERIC Educational Resources Information Center

    Sheng, Bo

    2010-01-01

    Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…

  14. 1536-1268/02/$17.00 2002 IEEE PERVASIVE computing 59 R E A C H I N G W E I S E R ' S V I S I O N

    E-print Network

    Sukhatme, Gaurav S.

    their actions. Recall the story of Sal in Weiser's article; Sal looked out her window and saw "tracks with pervasive networks of sensor-rich, embedded computation. Such systems fulfill two of Weiser's key objectives, vibration, heat, light, moisture, pressure, ultrasound, radio, magnetic, and many more exotic modes

  15. 2012 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops The Estrellita System

    E-print Network

    Hayes, Gillian R.

    2012 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops The Estrellita System A Health Informatics Tool to Support Caregivers of Preterm Infants Sen H@uci.edu Abstract-Preterm infants have significantly higher rates of functional limitations and are at risk

  16. Pervasive Computing and Communication Technologies for U-Learning

    ERIC Educational Resources Information Center

    Park, Young C.

    2014-01-01

    The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…

  17. 24 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/03/$17.00 2003 IEEE D E A L I N G W I T H U N C E R T A I N T Y

    E-print Network

    LeGland, François

    awareness is important to many pervasive computing applica- tions. Unfortunately, no location sen- sor takes perfect measurements or works well in all situations. Thus, the motivation behind this article is twofold such beliefs over the state space conditioned on all information contained in the sensor data. To illustrate

  18. Towards pervasive computing in health care – A literature review

    PubMed Central

    Orwat, Carsten; Graefe, Andreas; Faulwasser, Timm

    2008-01-01

    Background The evolving concepts of pervasive computing, ubiquitous computing and ambient intelligence are increasingly influencing health care and medicine. Summarizing published research, this literature review provides an overview of recent developments and implementations of pervasive computing systems in health care. It also highlights some of the experiences reported in deployment processes. Methods There is no clear definition of pervasive computing in the current literature. Thus specific inclusion criteria for selecting articles about relevant systems were developed. Searches were conducted in four scientific databases alongside manual journal searches for the period of 2002 to 2006. Articles included present prototypes, case studies and pilot studies, clinical trials and systems that are already in routine use. Results The searches identified 69 articles describing 67 different systems. In a quantitative analysis, these systems were categorized into project status, health care settings, user groups, improvement aims, and systems features (i.e., component types, data gathering, data transmission, systems functions). The focus is on the types of systems implemented, their frequency of occurrence and their characteristics. Qualitative analyses were performed of deployment issues, such as organizational and personnel issues, privacy and security issues, and financial issues. This paper provides a comprehensive access to the literature of the emerging field by addressing specific topics of application settings, systems features, and deployment experiences. Conclusion Both an overview and an analysis of the literature on a broad and heterogeneous range of systems are provided. Most systems are described in their prototype stages. Deployment issues, such as implications on organization or personnel, privacy concerns, or financial issues are mentioned rarely, though their solution is regarded as decisive in transferring promising systems to a stage of regular operation. There is a need for further research on the deployment of pervasive computing systems, including clinical studies, economic and social analyses, user studies, etc. PMID:18565221

  19. An Adaptive Sensor Mining Framework for Pervasive Computing Applications

    NASA Astrophysics Data System (ADS)

    Rashidi, Parisa; Cook, Diane J.

    Analyzing sensor data in pervasive computing applications brings unique challenges to the KDD community. The challenge is heightened when the underlying data source is dynamic and the patterns change. We introduce a new adaptive mining framework that detects patterns in sensor data, and more importantly, adapts to the changes in the underlying model. In our framework, the frequent and periodic patterns of data are first discovered by the Frequent and Periodic Pattern Miner (FPPM) algorithm; and then any changes in the discovered patterns over the lifetime of the system are discovered by the Pattern Adaptation Miner (PAM) algorithm, in order to adapt to the changing environment. This framework also captures vital context information present in pervasive computing applications, such as the startup triggers and temporal information. In this paper, we present a description of our mining framework and validate the approach using data collected in the CASAS smart home testbed.

  20. IEEE Computer Society 2012724()

    E-print Network

    Kasahara, Hironori

    () 2008 LSI 2008 2008 Intel Asia Academic Forum Best Research Award 2010IEEE Computer Society Golden Core-tasks (MTs) Block of Pseudo Assignments (BPA): Basic Block (BB) Repetition Block (RB) : natural loop Subroutine Block (SB): subroutine Program BPA RB SB Near fine grain parallelization Loop level

  1. Volcano Monitoring: A Case Study in Pervasive Computing

    NASA Astrophysics Data System (ADS)

    Peterson, Nina; Anusuya-Rangappa, Lohith; Shirazi, Behrooz A.; Song, Wenzhan; Huang, Renjie; Tran, Daniel; Chien, Steve; Lahusen, Rick

    Recent advances in wireless sensor network technology have provided robust and reliable solutions for sophisticated pervasive computing applications such as inhospitable terrain environmental monitoring. We present a case study for developing a real-time pervasive computing system, called OASIS for optimized autonomous space in situ sensor-web, which combines ground assets (a sensor network) and space assets (NASA’s earth observing (EO-1) satellite) to monitor volcanic activities at Mount St. Helens. OASIS’s primary goals are: to integrate complementary space and in situ ground sensors into an interactive and autonomous sensorweb, to optimize power and communication resource management of the sensorweb and to provide mechanisms for seamless and scalable fusion of future space and in situ components. The OASIS in situ ground sensor network development addresses issues related to power management, bandwidth management, quality of service management, topology and routing management, and test-bed design. The space segment development consists of EO-1 architectural enhancements, feedback of EO-1 data into the in situ component, command and control integration, data ingestion and dissemination and field demonstrations.

  2. 80 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 2014 IEEE ConferencesEditor: Elizabeth Belding n UC Santa Barbara n ebelding@cs.ucsb.edu

    E-print Network

    a historical overview of a project that's tightly linked to Mark Weiser's vision of ubiquitous computing. He, and Thad Starner of Georgia Institute of Technology, Tech- nical Lead on Google's Project Glass. Gross't satisfied by simple cartoon movies anymore but demand customized digital and physi- cal experiences

  3. Data-Centric Middleware for Context-Aware Pervasive Computing Guanling Chen

    E-print Network

    Kotz, David

    if not carefully managed. To minimize user distraction the applications must be aware of and adapt to the situationData-Centric Middleware for Context-Aware Pervasive Computing Guanling Chen , Ming Li , and David and deploying context-aware pervasive-computing applications calls for distributed software infrastructures

  4. Collaborative editing within the pervasive collaborative computing environment

    SciTech Connect

    Perry, Marcia; Agarwal, Deb

    2003-09-11

    Scientific collaborations are established for a wide variety of tasks for which several communication modes are necessary, including messaging, file-sharing, and collaborative editing. In this position paper, we describe our work on the Pervasive Collaborative Computing Environment (PCCE) which aims to facilitate scientific collaboration within widely distributed environments. The PCCE provides a persistent space in which collaborators can locate each other, exchange messages synchronously and asynchronously and archive conversations. Our current interest is in exploring research and development of shared editing systems with the goal of integrating this technology into the PCCE. We hope to inspire discussion of technology solutions for an integrated approach to synchronous and asynchronous communication and collaborative editing.

  5. Smart Classroom: Bringing Pervasive Computing into Distance Learning

    NASA Astrophysics Data System (ADS)

    Shi, Yuanchun; Qin, Weijun; Suo, Yue; Xiao, Xin

    In recent years, distance learning has increasingly become one of themost important applications on the internet and is being discussed and studied by various universities, institutes and companies. The Web/Internet provides relatively easy ways to publish hyper-linked multimedia content for more audiences. Yet, we find that most of the courseware are simply shifted from textbook to HTML files. However, in ost cases the teacher's live instruction is very important for catching the attention and interest of the students. That's why Real-Time Interactive Virtual Classroom (RTIVC) always plays an indispensable role in distance learning, where teachers nd students located in different places can take part in the class synchronously through certain multimedia communication systems and obtain real-time and mediarich interactions using Pervasive Computing technologies [1]. The Classroom 2000 project [2] at GIT has been devoted to the automated capturing of the classroom experience. Likewise, the Smart Classroom project [3] at our institute is focused on Tele-education. Most currently deployed real-time Tele-education systems are desktop-based, in which the teacher's experience is totally different from teaching in a real classroom.

  6. Guest editorial. Special section on affective and pervasive computing for healthcare.

    PubMed

    Vasilakos, Athanasios V; Lisetti, Christine

    2010-03-01

    This special section is focused on the novel and practical ways, and solid contributions, to improve affective computing and pervasive technologies. There are 19 papers in this special section. PMID:20684047

  7. RFID in Pervasive Computing: State-of-the-art and Outlook

    E-print Network

    Roussos, George

    RFID in Pervasive Computing: State-of-the-art and Outlook George Roussos School of Computer Science Department of Computer Science University of Bath Bath BA2 7AY, UK April 7, 2008 Abstract rfid has already successful technologies in the history of computing. Beyond doubt, rfid is an effective automatic iden

  8. IEEE Computer Society: http://computer.org Computer: http://computer.org/computer

    E-print Network

    Stanford University

    IEEE Computer Society: http://computer.org Computer: http://computer.org/computer computer@computer.org IEEE Computer Society Publications Office: +1 714 821 8380 COVER FEATURES GUEST EDITOR'S INTRODUCTION 28 Computational Photography--The Next Big Step Oliver Bimber Computational photography extends

  9. Electronic Textiles: A Platform for Pervasive DIANA MARCULESCU, MEMBER, IEEE, RADU MARCULESCU, MEMBER, IEEE,

    E-print Network

    Marculescu, Diana

    of electronics and textiles into one: electronic textiles, or e-textiles. E-textiles, also called smart fabrics as wireless communication capabilities. Sensors and simple computational elements are embedded in e-textiles

  10. International Conference on Pervasive Computing Technologies for Healthcare Innsbruck, Austria, 29th

    E-print Network

    Widya, Ing

    of wireless communication technologies of different quality. We analyze the needs of three mobile healthcare1st International Conference on Pervasive Computing Technologies for Healthcare Innsbruck, Austria. Index Terms--Vital sign, representation, flexibility, M-health I. INTRODUCTION obile healthcare (M

  11. A Cross-Layer Design for Adaptive Multimodal Interfaces in Pervasive Computing

    E-print Network

    Li, Juan "Jen"

    A Cross-Layer Design for Adaptive Multimodal Interfaces in Pervasive Computing Jun Kong Weiyi Zhang.zhang, j.li, arjun.roy}@ndsu.edu ABSTRACT Multimodal interfaces have attracted more and more attention and development of multimodal interfaces. However, it is still a challenging issue of supporting adaptations

  12. Tracking Real-World Phenomena with Smart Dust Institute for Pervasive Computing

    E-print Network

    Tracking Real-World Phenomena with Smart Dust Kay R¨omer Institute for Pervasive Computing Dept-grain-sized device. Dense networks of Smart Dust should then be able to unobtrusively mon- itor real-world processes for tracking the lo- cation of real-world phenomena (using a toy car as an example) with Smart Dust. The system

  13. iCricket: A Programmable Brick for Kids' Pervasive Computing Applications

    E-print Network

    iCricket: A Programmable Brick for Kids' Pervasive Computing Applications Fred Martin, Kallol Par control board with built-in motor and sensor interface circuits. It is designed for use by pre networked iCrickets communicate with one another, retriev- ing sensor values and remotely running each other

  14. PerVision: An integrated Pervasive Computing/Computer Vision Approach to Tracking Objects in a Self-Sensing Space1

    E-print Network

    Helal, Abdelsalam

    PerVision: An integrated Pervasive Computing/Computer Vision Approach to Tracking Objects in a Self. Abstract We propose a novel approach to self-sensing spaces, in which classical computer vision algorithms the ambitious vision of completely self-sensing spaces. 1. Introduction The pervasive computing laboratory

  15. IEEE Computer Society 1986 , 1988

    E-print Network

    Kasahara, Hironori

    1997 2005 STARC() 2008 LSI 2008 2008 Intel Asia Academic Forum Best Research Award 2010IEEE Computer Executable Condition Analysis for coarse grain tasks (Macro-tasks) BPA BPA 1 BPA 3 BPA2 BPA 4 BPA 5 BPA 6 RB 7 RB15 BPA 8 BPA 9 BPA 10 RB 11 BPA 12 BPA 13 RB 14 RB END RB RB BPA RB Data Dependency Control flow

  16. A Dynamic Programming Framework for Pervasive Computing Environments

    E-print Network

    Julien, Christine

    @mail.utexas.edu ABSTRACT As lightweight sensors and mobile computing devices be- come ubiquitous, they provide increasing architecture for managing the resulting context-aware interactions to provide transparent, lightweight decision, the goal is usually filtering and aggregation to improve ef- ficiency. We focus on a significantly altered

  17. CloudComputing 24 Published by the IEEE Computer Society 1089-7801/09/$26.00 2009 IEEE IEEE INTERNET COMPUTING

    E-print Network

    Buyya, Rajkumar

    CloudComputing 24 Published by the IEEE Computer Society 1089-7801/09/$26.00 © 2009 IEEE IEEE of commercial infrastructure providers, a concept known as cloud computing.3 Handling distributed applications to operate on cloud infrastructures, such as Amazon EC2. This article provides an abstract view

  18. Pervasive access to images and data--the use of computing grids and mobile/wireless devices across healthcare enterprises.

    PubMed

    Pohjonen, Hanna; Ross, Peeter; Blickman, Johan G; Kamman, Richard

    2007-01-01

    Emerging technologies are transforming the workflows in healthcare enterprises. Computing grids and handheld mobile/wireless devices are providing clinicians with enterprise-wide access to all patient data and analysis tools on a pervasive basis. In this paper, emerging technologies are presented that provide computing grids and streaming-based access to image and data management functions, and system architectures that enable pervasive computing on a cost-effective basis. Finally, the implications of such technologies are investigated regarding the positive impacts on clinical workflows. PMID:17249406

  19. Introduction to the IEEE Transactions on Cloud Computing

    E-print Network

    Buyya, Rajkumar

    Introduction to the IEEE Transactions on Cloud Computing Rajkumar Buyya Welcome to the IEEE Transactions on Cloud Computing (TCC). It is my privilege and honor to serve as the inaugural Editor-in-Chief of TCC. I would like to thank the IEEE and the world-wide Cloud Computing community for giving me

  20. Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-based Services

    NASA Astrophysics Data System (ADS)

    Soppera, A.; Burbridge, T.

    During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists and science fiction writers. Today this subject has become of interest to business, government, and society. Governmental authorities exercise their power through the networked environment. Credit card databases maintain our credit history and decide whether we are allowed to rent a house or obtain a loan. Mobile telephones can locate us in real time so that we do not miss calls. Within another 10 years, all sorts of devices will be connected through the network. Our fridge, our food, together with our health information, may all be networked for the purpose of maintaining diet and well-being. The Internet will move from being an infrastructure to connect computers, to being an infrastructure to connect everything [2, 3].

  1. Proceedings of the 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'03) 1063-6919/03 $17.00 2003 IEEE

    E-print Network

    Vese, Luminita A.

    Proceedings of the 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'03) 1063-6919/03 $17.00 © 2003 IEEE #12;Proceedings of the 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'03) 1063-6919/03 $17.00 © 2003 IEEE #12;Proceedings

  2. Published by the IEEE CS n 1536-1268/08/$25.00 2008 IEEE PERVASIVE computing 13 G u e s t e d i t o r s ' i n t r o d u c t i o n

    E-print Network

    Heidemann, John

    t o r s ' i n t r o d u c t i o n T hese days, "hacking" and "hack- ers" are often viewed negatively or criminal intent. However, hacking's older definitions are quite different: interacting with a computer, and even (in many circles) laudatory. Some associate hacking with (usually) harm- less technical stunts

  3. 34 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$25.00 2009 IEEE C r o s s -r e a l i t y e n v i r o n m e n t s

    E-print Network

    -level events that would otherwise be regarded as noise or clutter in the virtual world get filtered out. Cross and react to real-world events in an automated fashion. Meanwhile, another class of Web-based computing plat- forms has recently emerged that enables virtual simulations of the real world over which people can

  4. 10 Published by the IEEE Computer Society 1089-7801/10/$26.00 2010 IEEE IEEE INTERNET COMPUTING GuestEditors'Introduction

    E-print Network

    and technical challenges inherent to this "Internet of Things," of which privacy is the most compelling10 Published by the IEEE Computer Society 1089-7801/10/$26.00 © 2010 IEEE IEEE INTERNET COMPUTING GuestEditors'Introduction Internet Predictions Vinton G. Cerf Google Munindar P. Singh North Carolina

  5. Wireless Adaptive Therapeutic TeleGaming in a Pervasive Computing Environment

    NASA Astrophysics Data System (ADS)

    Peters, James F.; Szturm, Tony; Borkowski, Maciej; Lockery, Dan; Ramanna, Sheela; Shay, Barbara

    This chapter introduces a wireless, pervasive computing approach to adaptive therapeutic telegaming considered in the context of near set theory. Near set theory provides a formal basis for observation, comparison and classification of perceptual granules. A perceptual granule is defined by a collection of objects that are graspable by the senses or by the mind. In the proposed pervasive computing approach to telegaming, a handicapped person (e.g., stroke patient with limited hand, finger, arm function) plays a video game by interacting with familiar instrumented objects such as cups, cutlery, soccer balls, nozzles, screw top-lids, spoons, so that the technology that makes therapeutic exercise game-playing possible is largely invisible (Archives of Physical Medicine and Rehabilitation 89:2213-2217, 2008). The basic approach to adaptive learning (AL) in the proposed telegaming environment is ethology-inspired and is quite different from the traditional approach to reinforcement learning. In biologically-inspired learning, organisms learn to achieve some goal by durable modification of behaviours in response to signals from the environment resulting from specific experiences (Animal Behavior, 1995). The term adaptive is used here in an ethological sense, where learning by an organism results from modifying behaviour in response to perceived changes in the environment. To instill adaptivity in a video game, it is assumed that learning by a video game is episodic. During an episode, the behaviour of a player is measured indirectly by tracking the occurrence of gaming events such as a hit or a miss of a target (e.g., hitting a moving ball with a game paddle). An ethogram provides a record of behaviour feature values that provide a basis a functional registry for handicapped players for gaming adaptivity. An important practical application of adaptive gaming is therapeutic rehabilitation exercise carried out in parallel with playing action video games. Enjoyable and engaging interactive gaming will motivate patients to complete the rehabilitation process. Adaptivity is seen as a way to make action games more accessible to those who have physical and cognitive impairments. The telegaming system connects to the internet and implements a feed-and-forward mechanism that transmits gaming session tables after each gaming session to a remote registry accessible to therapists and researchers. The contribution of this chapter is the introduction of a framework for wireless telegaming useful in therapeutic rehabilitation.

  6. COVER FEATURE Published by the IEEE Computer Society 0018-9162/12/$31.00 2012 IEEE

    E-print Network

    Hartemink, Alexander

    COMPUTER24 COVER FEATURE Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE personal experiences with modeling cell division in the budding or brewer's yeast, Saccharomyces cerevisiae. Although we faced a variety of computational issues along the way, the collaboration's challenges extended

  7. Pervasive Computing Technologies to Continuously Assess Alzheimer’s Disease Progression and Intervention Efficacy

    PubMed Central

    Lyons, Bayard E.; Austin, Daniel; Seelye, Adriana; Petersen, Johanna; Yeargers, Jonathan; Riley, Thomas; Sharma, Nicole; Mattek, Nora; Wild, Katherine; Dodge, Hiroko; Kaye, Jeffrey A.

    2015-01-01

    Traditionally, assessment of functional and cognitive status of individuals with dementia occurs in brief clinic visits during which time clinicians extract a snapshot of recent changes in individuals’ health. Conventionally, this is done using various clinical assessment tools applied at the point of care and relies on patients’ and caregivers’ ability to accurately recall daily activity and trends in personal health. These practices suffer from the infrequency and generally short durations of visits. Since 2004, researchers at the Oregon Center for Aging and Technology (ORCATECH) at the Oregon Health and Science University have been working on developing technologies to transform this model. ORCATECH researchers have developed a system of continuous in-home monitoring using pervasive computing technologies that make it possible to more accurately track activities and behaviors and measure relevant intra-individual changes. We have installed a system of strategically placed sensors in over 480 homes and have been collecting data for up to 8?years. Using this continuous in-home monitoring system, ORCATECH researchers have collected data on multiple behaviors such as gait and mobility, sleep and activity patterns, medication adherence, and computer use. Patterns of intra-individual variation detected in each of these areas are used to predict outcomes such as low mood, loneliness, and cognitive function. These methods have the potential to improve the quality of patient health data and in turn patient care especially related to cognitive decline. Furthermore, the continuous real-world nature of the data may improve the efficiency and ecological validity of clinical intervention studies. PMID:26113819

  8. Pervasive Computing Technologies to Continuously Assess Alzheimer's Disease Progression and Intervention Efficacy.

    PubMed

    Lyons, Bayard E; Austin, Daniel; Seelye, Adriana; Petersen, Johanna; Yeargers, Jonathan; Riley, Thomas; Sharma, Nicole; Mattek, Nora; Wild, Katherine; Dodge, Hiroko; Kaye, Jeffrey A

    2015-01-01

    Traditionally, assessment of functional and cognitive status of individuals with dementia occurs in brief clinic visits during which time clinicians extract a snapshot of recent changes in individuals' health. Conventionally, this is done using various clinical assessment tools applied at the point of care and relies on patients' and caregivers' ability to accurately recall daily activity and trends in personal health. These practices suffer from the infrequency and generally short durations of visits. Since 2004, researchers at the Oregon Center for Aging and Technology (ORCATECH) at the Oregon Health and Science University have been working on developing technologies to transform this model. ORCATECH researchers have developed a system of continuous in-home monitoring using pervasive computing technologies that make it possible to more accurately track activities and behaviors and measure relevant intra-individual changes. We have installed a system of strategically placed sensors in over 480 homes and have been collecting data for up to 8?years. Using this continuous in-home monitoring system, ORCATECH researchers have collected data on multiple behaviors such as gait and mobility, sleep and activity patterns, medication adherence, and computer use. Patterns of intra-individual variation detected in each of these areas are used to predict outcomes such as low mood, loneliness, and cognitive function. These methods have the potential to improve the quality of patient health data and in turn patient care especially related to cognitive decline. Furthermore, the continuous real-world nature of the data may improve the efficiency and ecological validity of clinical intervention studies. PMID:26113819

  9. 46 Published by the IEEE Computer Society 1089-7801/15/$31.00 2015 IEEE IEEE INTERNET COMPUTING CloudComputing

    E-print Network

    Dustdar, Schahram

    CloudComputing Cloud Resource Orchestration Programming Overview, Issues, and Directions Rajiv Ranjan The pervasiveness and power of cloud computing alleviates some of the problems application administrators face-enabled ser- vices. Cloud computing1 providers such as Amazon Web Services (AWS) and Microsoft Azure give

  10. Pervasive sensing

    NASA Astrophysics Data System (ADS)

    Nagel, David J.

    2000-11-01

    The coordinated exploitation of modern communication, micro- sensor and computer technologies makes it possible to give global reach to our senses. Web-cameras for vision, web- microphones for hearing and web-'noses' for smelling, plus the abilities to sense many factors we cannot ordinarily perceive, are either available or will be soon. Applications include (1) determination of weather and environmental conditions on dense grids or over large areas, (2) monitoring of energy usage in buildings, (3) sensing the condition of hardware in electrical power distribution and information systems, (4) improving process control and other manufacturing, (5) development of intelligent terrestrial, marine, aeronautical and space transportation systems, (6) managing the continuum of routine security monitoring, diverse crises and military actions, and (7) medicine, notably the monitoring of the physiology and living conditions of individuals. Some of the emerging capabilities, such as the ability to measure remotely the conditions inside of people in real time, raise interesting social concerns centered on privacy issues. Methods for sensor data fusion and designs for human-computer interfaces are both crucial for the full realization of the potential of pervasive sensing. Computer-generated virtual reality, augmented with real-time sensor data, should be an effective means for presenting information from distributed sensors.

  11. Pervasive Knowledge, Social Networks, and Cloud Computing: E-Learning 2.0

    ERIC Educational Resources Information Center

    Anshari, Muhammad; Alas, Yabit; Guan, Lim Sei

    2015-01-01

    Embedding Web 2.0 in learning processes has extended learning from traditional based learning-centred to a collaborative based learning-centred institution that emphasises learning anywhere and anytime. While deploying Semantic Web into e-learning offers a broader spectrum of pervasive knowledge acquisition to enrich users' experience in learning.…

  12. IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 1 Predicting Continuous Conflict Perception

    E-print Network

    Filippone, Maurizio

    IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 1 Predicting Continuous Conflict Perception with Bayesian Member, IEEE Abstract--Conflict is one of the most important phenomena of social life, but it is still conversational social signals (loudness, overlapping speech, etc.) and predicts the conflict level perceived

  13. Editor: Charles Petrie petrie@stanford.edu 2 Published by the IEEE Computer Society 1089-7801/15/$31.00 2015 IEEE IEEE INTERNET COMPUTING

    E-print Network

    Petrie, Charles

    -7801/15/$31.00 © 2015 IEEE IEEE INTERNET COMPUTING S o you want to be a whistle blower. Just gen up a strong PGP key. But let's look at the other vulnerabilities. First, there are government hack attacks. A previous "Peering this hacking. Second, the government's job is made easier by the fact that software is eternally imperfect

  14. Editor: Charles Petrie petrie@stanford.edu 2 Published by the IEEE Computer Society 1089-7801/14/$31.00 2014 IEEE IEEE INTERNET COMPUTING

    E-print Network

    Petrie, Charles

    -7801/14/$31.00 © 2014 IEEE IEEE INTERNET COMPUTING N o, I'm not trying to apply the term "Inter- net of Things function, and is carried out by the Internet Assigned Num- bers Authority (IANA). Ok, is this a thing for Internet protocols, some of which include things like MIME types and TCP port numbers. Most importantly

  15. Distributed Pervasive Worlds: The Case of Exergames

    ERIC Educational Resources Information Center

    Laine, Teemu H.; Sedano, Carolina Islas

    2015-01-01

    Pervasive worlds are computing environments where a virtual world converges with the physical world through context-aware technologies such as sensors. In pervasive worlds, technology is distributed among entities that may be distributed geographically. We explore the concept, possibilities, and challenges of distributed pervasive worlds in a case…

  16. IT Monoculture 14 Published by the ieee ComPuter soCiety 1540-7993/09/$25.00 2009 ieee ieee seCurity & PrivaCy

    E-print Network

    Schneider, Fred B.

    IT Monoculture 14 Published by the ieee ComPuter soCiety 1540-7993/09/$25.00 © 2009 ieee ieee seCurity & PrivaCy Conventional wisdom holds that software monocultures are exceptionally vulnerable to malware suggests that deploying a monoculture in conjunction with automated diversity is indeed a very sensible

  17. Forensics Education PUBLISHED BY THE IEEE COMPUTER SOCIETY I 1540-7993/03/$17.00 2003 IEEE I IEEE SECURITY & PRIVACY 15

    E-print Network

    Erbacher, Robert F.

    Forensics Education PUBLISHED BY THE IEEE COMPUTER SOCIETY I 1540-7993/03/$17.00 © 2003 IEEE I IEEE enforcement. A key step in improving forensic techniques lies in creating a comprehensive approach to forensics educa- tion. However, the efforts of theorists and practitioners in this new field have yet

  18. Computational Intelligence and AI in Games: A New IEEE Transactions

    E-print Network

    Lucas, Simon M.

    increase in the quality, diversity and pervasiveness of video games. The value of the worldwide computer and video games market is estimated to be $USD25bn annually1 , and is predicted to grow rapidly over to chess and checkers do not work well for Go, and are even less applicable to video games where the state

  19. 1536-1268/07/$25.00 2007 IEEE Published by the IEEE Computer Society PERVASIVE computing 39 Underground

    E-print Network

    Dourish,Paul

    mobility and technology offeranalternateformulationfor applications development--one based on the experiences of ur- ban dwellers relating to one an- other and to their city. We conducted an ethno- graphic,bydevelopingmobiledigitaltokens thatcouldbeusedtomanipulatedocumentsstored centrally.2 Researchers at the University of Glas- gow investigated forms of "co-visiting" cities

  20. IEEE TPDS, MANY-TASK COMPUTING, NOVEMBER 2010 1 Performance Analysis of Cloud Computing

    E-print Network

    Langendoen, Koen

    of clouds and other scientific computing platforms, for general and MTC-based scientific computing workloadsIEEE TPDS, MANY-TASK COMPUTING, NOVEMBER 2010 1 Performance Analysis of Cloud Computing Services scientific computing workloads. In this work we analyze the performance of cloud computing services

  1. C O V E R F E A T U R E 0018-9162/07/$20.00 2007 IEEE62 Computer Published by the IEEE Computer Society

    E-print Network

    Hammerstrom, Dan

    IS NANOARCHITECTURE? We define nanoarchitecture as the organization of basic computational structures composed computational mod- els. Since architecture is rarely created in a vacuum, these issues will greatly effectC O V E R F E A T U R E 0018-9162/07/$20.00 © 2007 IEEE62 Computer Published by the IEEE Computer

  2. Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology.

    PubMed

    Zao, John K; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodríguez Méndez, Sergio José; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping

    2014-01-01

    EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system. PMID:24917804

  3. Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology

    PubMed Central

    Zao, John K.; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodríguez Méndez, Sergio José; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping

    2014-01-01

    EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system. PMID:24917804

  4. Computational Photography 32 March/April 2007 Published by the IEEE Computer Society 0272-1716/07/$25.00 2007 IEEE

    E-print Network

    Nayar, Shree K.

    Computational Photography 32 March/April 2007 Published by the IEEE Computer Society 0272-1716/07/$25.00 © 2007 IEEE Many computational photography appli- cations require sets of images that are captured-speed multispectral video. In this article, we demonstrate results for each of these. Optical splitting trees Optical

  5. Editor: Charles Petrie petrie@stanford.edu 2 Published by the IEEE Computer Society 1089-7801/13/$31.00 2013 IEEE IEEE INTERNET COMPUTING

    E-print Network

    Petrie, Charles

    -7801/13/$31.00 © 2013 IEEE IEEE INTERNET COMPUTING R ecently, a friend asked me to write about Bitcoin. This has always. They are somewhat more subject to hacking and you can't insure them. Lose your hard drive, lose your stash. I don-it-yourself (DIY) money enabled by novel uses of the Internet -- that is, you can now use the Internet to turn data

  6. Pervasive and Mobile Computing 9 (2013) 881891 Contents lists available at ScienceDirect

    E-print Network

    Sreenan, Cormac J.

    2013-01-01

    f o Article history: Available online 12 July 2013 Keywords: Human mobility Smartphone Wireless and Mobile Computing journal homepage: www.elsevier.com/locate/pmc Analysis of smartphone user mobility sensor network Opportunistic data collection a b s t r a c t The increasing ubiquity of smartphones

  7. IEEE Computer Society 1987 IFAC World Congress Young Author Prize

    E-print Network

    Kasahara, Hironori

    2008 Intel Asia Academic Forum Best Research Award 2009IEEE Computer Society Golden Core Member) Block of Pseudo Assignments (BPA): Basic Block (BB) Block of Pseudo Assignments (BPA): Basic Block (BB) Repetition Block (RB) : natural loop Subroutine Block (SB): subroutine( ) BPA Near fine grain

  8. 00189162/99/$10.00 1999 IEEE 72 Computer

    E-print Network

    Torrellas, Josep

    0018­9162/99/$10.00 © 1999 IEEE 72 Computer S calable shared­memory multiprocessors are emerging by multiple processes in a sequential machine. The shared­memory paradigm makes it easier to write par­ allel programs, but tuning the application to reduce the impact of frequent long­latency memory accesses still

  9. IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 1 Detecting Depression Severity

    E-print Network

    Cohn, Jeffrey F.

    IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 1 Detecting Depression Severity from Vocal Prosody Ying the relation between vocal prosody and change in depression severity over time, 57 participants from a clinical trial for treatment of depression were evaluated at seven-week intervals using a semi

  10. Proc. International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2003), Rio de Janeiro, Brazil, 2003. Active Architecture for Pervasive Contextual Services

    E-print Network

    Dunlop, Mark D.

    be correlated: · user Bob likes ice cream, but only when the weather is hot and when he has spare time to eat Street sells ice cream, and is open between 9.00 and 17.00 · Bob knows Anna · Anna is at coordinate 56.3397,, Ron Morrison School of Computer Science, University of St Andrews, North Haugh, St Andrews, Fife KY16

  11. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Exploring Connectivity of the Brain's White Matter

    E-print Network

    Stanford University

    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Exploring Connectivity of the Brain Graphics Interaction Techniques, Computer Graphics Applications, Visualization, DTI, MR Trac- tography. I of white matter pathways. #12;IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 2 Based on magnetic

  12. Towards Pervasive Computing @ NIST

    E-print Network

    Mills, Kevin

    and interoperability y Current industry focus is on short-term, isolated, niche standards y NIST can work with industry) costing $10 will include · pico-cell wireless transceiver · virtual machine · run-time environment z Goals

  13. IEEE Computer SocietyMulticore 1986 , 1988

    E-print Network

    Kasahara, Hironori

    Academic Forum Best Research Award 2010IEEE CS Golden Core Member Award 2014 226 NEDO NEDO Analysis for Coarse Grain Tasks (Macro-tasks) BPA BPA 1 BPA 3 BPA2 BPA 4 BPA 5 BPA 6 RB 7 RB15 BPA 8 BPA 9 BPA 10 RB 11 BPA 12 BPA 13 RB 14 RB END RB RB BPA RB Data Dependency Control flow Conditional branch

  14. SEPTEMBER OCTOBER 1997 http://computer.org/internet/ IEEE INTERNET COMPUTING SPIDER'S NET

    E-print Network

    Filman, Robert E.

    50 SEPTEMBER · OCTOBER 1997 http://computer.org/internet/ IEEE INTERNET COMPUTING MANAGING A SPIDER'S NET Having acquired an intranet, the Spider was confronted with the task of managing the damn thing Management Information Protocol. SNMP was originally a quick fix, an approach to Internet management put

  15. IEEE TRANSACTIONS ON ELECTRONIC COMPUTERS, OCTOBER 1967 Reviews of Books and Papers in the Computer Field

    E-print Network

    Widrow, Bernard

    IEEE TRANSACTIONS ON ELECTRONIC COMPUTERS, OCTOBER 1967 Reviews of Books and Papers in the Computer, Department of Electrical Engineering, University of Iowa, Iowa City, Iowa 52240 A. SYSTEMS R67-51 Electronic Digital Systems-R. K. Richards (New York: Wiley, 1966). The heart of this book is the extensive chapter

  16. Internet Predictions 16 www.computer.org/internet/ IEEE INTERNET COMPUTING

    E-print Network

    Young, R. Michael

    graphics, real-world/augmented reality inter- faces, and arti cial intelligence. Playing in the CloudInternet Predictions 16 www.computer.org/internet/ IEEE INTERNET COMPUTING systems dissipate at mani@cs.caltech.edu. The Play's the Thing R. Michael Young North Carolina State University F or most

  17. Proceedings of the The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems (MASCOTS'04)

    E-print Network

    Menascé, Daniel A.

    Proceedings of the The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems (MASCOTS'04) 1526-7539/04 $20.00 © 2004 IEEE #12;Proceedings of the The IEEE Computer Society's 12th Annual International Symposium on Modeling

  18. Using Logic Programming to Detect Activities in Pervasive Healthcare

    E-print Network

    Christensen, Henrik Bærbak

    Using Logic Programming to Detect Activities in Pervasive Healthcare Henrik Bærbak Christensen- gramming in a pervasive computing project in the healthcare domain. An expert system is used to detect healthcare activities in a pervasive hospital environment where positions of people and things are tracked

  19. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN, VOL. 8, NO. 10, OCTOBER 1989 1 Behavioral Transformation for Algorithmic Level

    E-print Network

    Walker, Robert A.

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN, VOL. 8, NO. 10, OCTOBER 1989 1 Behavioral. INTRODUCTION Over the past few years, Computer Aided Design (CAD) and design automation (DA) have begun to gain Transformation for Algorithmic Level IC Design ROBERT A. WALKER, MEMBER, IEEE, AND DONALD E. THOMAS, FELLOW, IEEE

  20. Proceedings of IEEE Virtual Reality 2003, pages 285286, cIEEE Computer Society, 2003. Evaluation of the ShapeTape Tracker for Wearable, Mobile Interaction

    E-print Network

    Swan II, J. Edward

    experiments designed to evaluate the effectiveness of Measurand's ShapeTape for wearable, mobile interaction of wearable computing has created the need for new human­to­computer interaction paradigms and inter- faceProceedings of IEEE Virtual Reality 2003, pages 285­286, cIEEE Computer Society, 2003. Evaluation

  1. IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 38, NO. 4, OCTOBER 2013 701 Statistical Characterization and Computationally

    E-print Network

    Meleis, Waleed

    model. Beam tracing tools, such as Bellhop [1], use ray theory to provide an accurate deter- ministic and Computationally Efficient Modeling of a Class of Underwater Acoustic Communication Channels Parastoo Qarabaqi, Student Member, IEEE, and Milica Stojanovic, Fellow, IEEE Abstract--Underwater acoustic channel models

  2. 22 July/August 2013 Published by the IEEE Computer Society 0272-1716/13/$31.00 2013 IEEE Big-Data Visualization

    E-print Network

    Park, Haesun

    Visualization Customizing Computational Methods for Visual Analytics with Big Data Jaegul Choo and Haesun Park22 July/August 2013 Published by the IEEE Computer Society 0272-1716/13/$31.00 © 2013 IEEE Big-Data Georgia Tech Owing to the complexities and obscuri- ties in large-scale datasets ("big data"), interest

  3. 22 July/August 2013 Published by the IEEE Computer Society 0272-1716/13/$31.00 2013 IEEE Big-Data Visualization

    E-print Network

    Park, Haesun

    22 July/August 2013 Published by the IEEE Computer Society 0272-1716/13/$31.00 © 2013 IEEE Big-Data Visualization Customizing Computational Methods for Visual Analytics with Big Data Jaegul Choo and Haesun Park Georgia Tech Owing to the complexities and obscuri- ties in large-scale datasets ("big data"), interest

  4. T H E M E A R T I C L E 22 1070-9924/97/$10.00 1997 IEEE IEEE COMPUTATIONAL SCIENCE & ENGINEERING

    E-print Network

    van Engelen, Robert A.

    T H E M E A R T I C L E 22 1070-9924/97/$10.00 © 1997 IEEE IEEE COMPUTATIONAL SCIENCE & ENGINEERING Modeling ROBERT VAN ENGELEN AND LEX WOLTERS Leiden University GERARD CATS Royal Netherlands Meteorological that each patch can be handled by one processor of the parallel computer. L.F. Richardson had already envis

  5. IEEE TRANSACTIONS OF COMPUTATIONAL BIOLOGY AND BIOINFORMATICS 1 Decoding Genetic Variations

    E-print Network

    Vikalo, Haris

    IEEE TRANSACTIONS OF COMPUTATIONAL BIOLOGY AND BIOINFORMATICS 1 Decoding Genetic Variations genomes and thus enable unprecedented studies of genetic variations. Information about variations of conducting routine tests of genetic variations. Identification and study of such variations helps reveal sus

  6. Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'04), IEEE Computer Society Press

    E-print Network

    Cao, Longbing

    in stock marketing often hold some private trading strategies. Evaluation and optimization markets. 1. Introduction Stock traders cantake less risk if they back-test their trading strategies'04), IEEE Computer Society Press Agent Services-Based Infrastructure for Online Assessment of Trading

  7. Trust of Medical Devices, Applications, and Users in Pervasive Healthcare

    E-print Network

    Bishop, Matt

    Trust of Medical Devices, Applications, and Users in Pervasive Healthcare Michael Clifford Computer sources in networks of pervasive healthcare devices, sensors, and applications. Categories and Subject Descriptors J.3 [Life and Medical Sciences]: Health; C.2.0 [Computer­ Communication Networks]: General

  8. Trust of Medical Devices, Applications, and Users in Pervasive Healthcare

    E-print Network

    Bishop, Matt

    Trust of Medical Devices, Applications, and Users in Pervasive Healthcare Michael Clifford Computer sources in networks of pervasive healthcare devices, sensors, and applications. Categories and Subject Descriptors J.3 [Life and Medical Sciences]: Health; C.2.0 [Computer- Communication Networks]: General

  9. 50 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 2012 IEEE COVER FEATURE

    E-print Network

    of media, including free newspapers, radio, and TV, we believe that advertising-- not direct sales. For advertising-based public display net- works to become truly pervasive, they must provide a tangible social However, for advertising-based public display networks to become truly pervasive, using all available

  10. 10 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/07/$25.00 2007 IEEE Psychotherapy

    E-print Network

    Antunes, Pedro

    Ubiquitous Psychotherapy T herapists commonly use cognitive behavioral therapy to treat anxiety, depression the therapist's presence outside the office, Handheld-based tools let therapists customize psychotherapy

  11. IEEE TRANSACTIONS ON MOBILE COMPUTING 1 RF-sensing of activities from non-cooperative

    E-print Network

    Beigl, Michael

    an empty environment or a walking, lying, crawling or standing person, in case-studies of an active, device than 1 meter radius. Index Terms--J.9.d Pervasive computing, H.5.5.c Signal analysis, synthesis of sensing changes or fluctuation in a received RF-signal. Radio waves are blocked, reflected or scat- tered

  12. 12 IEEE SoftwarE | published by the ieee computer society 0740-7459/ 14/ $31.00 2014 I EEE Editor: Diomidis Spinellis

    E-print Network

    Cortes, Corinna

    12 IEEE SoftwarE | published by the ieee computer society 0740-7459/ 14/ $31.00 © 2014 I EEE Editor of the automotive industry's history re- late to the way we currently develop and adopt infrastructure in our- center infrastructures developed by the largest cloud service providers. Even if the benefits

  13. 96 March/April 2007 Published by the IEEE Computer Society 0272-1716/07/$25.00 2007 IEEE Graphically Speaking Editor: Miguel Encarnao

    E-print Network

    Zyda, Michael

    and ample memory and processing power. Interestingly, the games preinstalled on these devices for China96 March/April 2007 Published by the IEEE Computer Society 0272-1716/07/$25.00 © 2007 IEEE Graphically Speaking Editor: Miguel Encarnação Mobile gaming is one of the fastest growing seg- ments

  14. 18 May/June 2009 Published by the IEEE Computer Society 0272-1716/09/$25.00 2009 IEEE Visual-Analytics Evaluation

    E-print Network

    Maciejewski, Ross

    18 May/June 2009 Published by the IEEE Computer Society 0272-1716/09/$25.00 © 2009 IEEE Visual-Analytics Evaluation Generating Synthetic Syndromic- Surveillance Data for Evaluating Visual-Analytics Techniques Ross), along This system generates synthetic syndromic- surveillance data for evaluating visualization

  15. Battery Emulation 150 0740-7475/05/$20.00 2005 IEEE Copublished by the IEEE CS and the IEEE CASS IEEE Design & Test of Computers

    E-print Network

    Shinozuka, Masanobu

    Battery Emulation 150 0740-7475/05/$20.00 © 2005 IEEE Copublished by the IEEE CS and the IEEE CASS in portable devices such as PDAs and celluar phones, batteries are quickly becoming a lim- iting factor. Recently, researchers have started develop- ing battery-aware power management techniques that exploit

  16. C O V E R F E A T U R E 58 Computer Published by the IEEE Computer Society 0018-9162/08/$25.002008IEEE

    E-print Network

    Tanenbaum, Andrew S.

    -9162/08/$25.00©2008IEEE Turning Teenagers into Stores T he intersection of computers, the Internet, music, and teenagers individual teenagers for copyright viola- tion, seeking maximum publicity when they settled out of court) wasn't a good business model. This led to the development of online music stores that let customers

  17. COMMUNICATIONS OF THE ACM May 2000/Vol. 43, No. 5 51 For pervasive computing performance, exploit the

    E-print Network

    Scheuermann, Peter

    in medicine, security, factory automation, envi- ronmental monitoring, and condition-based maintenance technology and low-power signal processing, computation, and low-cost wireless networking in a compact system. Compact geometry and low cost allow WINS to be embedded and distributed at a fraction of the cost

  18. A Framework for Safe Composition of Heterogeneous SOA Services in a Pervasive Computing Environment with Resource Constraints

    ERIC Educational Resources Information Center

    Reyes Alamo, Jose M.

    2010-01-01

    The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…

  19. Virtual and Augmented Reality Supported Simulators 28 November/December 2006 Published by the IEEE Computer Society 0272-1716/06/$20.00 2006 IEEE

    E-print Network

    Basdogan, Cagatay

    Computer Society 0272-1716/06/$20.00 © 2006 IEEE VR-based surgical simulators that provide realistic visual a memory.3 This memory effect is evident in the constitu- tive relationship between the stress and strain

  20. Final version to IEEE Pervasive Computing Magazine ConvenienceProbe: A Phone-based Data Collection and

    E-print Network

    Chu, Hao-hua

    method. Index Terms--Phone sensing, data collection and analysis, consumer behavior and marketing relevant information of consumption behavior. This data collection of human behavior enables geographical, and logging of customers' CVS trips. Automating data collection makes it possible to gather consumer behavior

  1. IEEE TRANSACTIONS ON COMPUTERS, TC-2011-04-0261 1 A Parallel Neuromorphic Text Recognition

    E-print Network

    Qiu, Qinru

    IEEE TRANSACTIONS ON COMPUTERS, TC-2011-04-0261 1 A Parallel Neuromorphic Text Recognition System intelligence has entered a new era. In this paper, we present a HPC-based context-aware Intelligent Text increases? What is the bottle- neck of current HPC architectures when applied to cogni- tive computing

  2. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Visual Perception and Mixed-Initiative Interaction

    E-print Network

    Healey, Christopher G.

    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Visual Perception and Mixed-quality visualizations for a range of real-world datasets. Index Terms-- computer graphics, perception, search, user], [28], [53]. One promising approach is the use of guidelines from visual perception. The human visual

  3. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION 1 Expensive Multiobjective Optimization by

    E-print Network

    Zhang, Qingfu

    /D with Gaussian Process Model Qingfu Zhang, Senior Member, IEEE, Wudong Liu, Edward Tsang, and Botond Virginas@essex.ac.uk; edward@essex.ac.uk). B. Virginas is with Intelligent Systems Research Center, BT Exact, Adastral Park

  4. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 14, NO. 3, JUNE 2010 329 Generalizing Surrogate-Assisted Evolutionary

    E-print Network

    Jin, Yaochu

    IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 14, NO. 3, JUNE 2010 329 Generalizing Surrogate Sendhoff, Senior Member, IEEE Abstract--Using surrogate models in evolutionary search pro- vides. Recent surrogate-assisted evolutionary frameworks have relied on the use of a variety of different

  5. 860 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN. VOL X. NO 8. AUGUSI IYXY Generation of Performance Constraints for Layout

    E-print Network

    Kalla, Priyank

    Constraints for Layout RAVI NAIR, SENIOR MEMBER, IEEE, c . LEONARD BERMAN, MEMBER, IEEE, PETER s. HAUGE provide fast algo- rithms which maximize the delay range, and hence the margin for error in layout of the interconnection length to compute delays during logic de- sign. After layout, exact lengths are used in order

  6. IEEE TRANSACTIONS ON SERVICES COMPUTING, 201X 1 Spot Transit: Cheaper Internet Transit

    E-print Network

    Li, Baochun

    IEEE TRANSACTIONS ON SERVICES COMPUTING, 201X 1 Spot Transit: Cheaper Internet Transit for Elastic Internet transit market, where transit is sold using the under-utilized backbone capacity at a lower price. The providers can improve profit by capitalizing the perishable capacity, and customers can buy transit

  7. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Mixed Media Painting and Portraiture

    E-print Network

    Brooks, Stephen

    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Mixed Media Painting and Portraiture Stephen Brooks Abstract-- This paper presents a technique for mixed media non-photorealistic painting traditional visual media such as oil, watercolor, tempera, ink or pencil. But this begs the question: why mix

  8. IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 4, APRIL 1997 425 Parallel Signature Analysis Design

    E-print Network

    Stanford University

    structures that compact response from a single circuit output. Fig. 1. Parallel signature analysis. The finalIEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 4, APRIL 1997 425 Parallel Signature Analysis Design--This paper presents parallel signature design techniques that guarantee the aliasing probability to be less

  9. IEEE/ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS 1 Detection of outlier residues for improving

    E-print Network

    Wong, Limsoon

    IEEE/ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS 1 Detection of outlier residues to the complexity in protein systems and the imbalanced distribution between interface and non-interface residues to describe the extent a residue is considered as an outlier in comparison to the other residues: the distance

  10. 0018-9162/00/$10.00 2000 IEEE46 Computer Biometrics

    E-print Network

    0018-9162/00/$10.00 © 2000 IEEE46 Computer Biometrics: The Future of Identification W ouldn't you; passwords can be forgotten or compromised. One of the earliest and best-known biometric tech- nologies applications for investigating criminals. Biometric technology has now become a viable alternative to tra

  11. IEEE TRANSACTIONS ON MOBILE COMPUTING 1 LineKing: Coffee Shop Wait-Time Monitoring

    E-print Network

    Ferhatosmanoglu, Hakan

    IEEE TRANSACTIONS ON MOBILE COMPUTING 1 LineKing: Coffee Shop Wait-Time Monitoring Using and forecasting coffee shop line wait times. LineKing consists of a smartphone component that provides automatic-time estimation. LineKing is used on a daily basis by hundreds of users to monitor the wait- times of a coffee

  12. To Appear: IEEE Computer Outlook Special Issue, 2012 Society's Nervous System

    E-print Network

    To Appear: IEEE Computer ­ Outlook Special Issue, 2012 Society's Nervous System: Building Effective for the future, we must create a nervous system for humanity that maintains the stability of our societies Government, Energy, and Public Health Systems Alex Pentland, Room E15-387, The Media Lab, 20 Ames St

  13. IEEE TRANSACTIONS ON COMPUTERS, VOL. C-25, NO. 12, DECEMBER 1976 Software Engineering

    E-print Network

    Hayes, Jane E.

    IEEE TRANSACTIONS ON COMPUTERS, VOL. C-25, NO. 12, DECEMBER 1976 Software Engineering BARRY W. BOEHM Abstract-This paper provides a definition of the term "software engineering" and a survey- able in the various phases ofthe software life cycle-requirements engineering, design, coding, test

  14. PUBLISHED IN IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014 1 Between Worlds: Securing Mixed

    E-print Network

    Hamlen, Kevin W.

    PUBLISHED IN IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014 1 Between Worlds: Securing. Although Flash and JavaScript security has been examined extensively, the security of un- trusted content, outlining several practical sce- narios that threaten the security of web applications. The severity

  15. Symposium on Intelligent Embedded Systems (IES 2014) at IEEE Symposium Series in Computational Intelligence 2014

    E-print Network

    Alippi, Cesare

    Symposium on Intelligent Embedded Systems (IES 2014) at IEEE Symposium Series in Computational Intelligence 2014 http://ies14-ssci.deib.polimi.it/ Orlando, Florida, December 9 -12, 2014 Organizers Cesare (Italy) Daniele Caltabiano (Italy) Intelligent embedded systems, i.e., embedded processing systems

  16. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Energy Conservation for the Simulation of

    E-print Network

    Fedkiw, Ron

    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Energy Conservation for the Simulation that allows one to conserve energy using the time integration scheme of one's choice. Traditionally, the time integration methods that deal with energy conservation, such as symplectic, geometric, and variational

  17. Accepted by IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2014 Abstract--Hyper-heuristic approaches aim to automate

    E-print Network

    Qu, Rong

    Accepted by IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2014 Abstract--Hyper-heuristic approaches aim to automate heuristic design in order to solve multiple problems instead of designing tailor-made methodologies for individual problems. Hyper-heuristics accomplish this through a high level heuristic

  18. Smart Grid Communication and Co-Simulation Vincenzo Liberatore, Member, IEEE Computer, Ahmad Al-Hammouri

    E-print Network

    Liberatore, Vincenzo

    1 Smart Grid Communication and Co-Simulation Vincenzo Liberatore, Member, IEEE Computer, Ahmad Al-Hammouri Abstract--The smart power grid will extensively rely on networked control to increase efficiency in smart grid com- munication, and proposes PowerNet, a system of heterogeneous yet interoperable networks

  19. Cloud Computing: A Digital Libraries Perspective (To appear in IEEE Cloud 2010)

    E-print Network

    Giles, C. Lee

    Cloud Computing: A Digital Libraries Perspective (To appear in IEEE Cloud 2010) Pradeep Teregowda of infrastructure for Web based digital library search engines such as CiteSeerx present several challenges. Cite, particularly digital libraries and search engines, a wide variety of options for growth and reduction

  20. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Blood Flow Clustering and Applications in

    E-print Network

    of stenting [2], [3], the development of thrombosis (blood clotting, which is a desirable outcome of stentingIEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Blood Flow Clustering and Applications, Holger Theisel, Bernhard Preim Abstract--Understanding the hemodynamics of blood flow in vascular

  1. IEEE TRANSACTIONS ON MOBILE COMPUTING 1 Robust Estimators for Variance-Based

    E-print Network

    Patwari, Neal

    IEEE TRANSACTIONS ON MOBILE COMPUTING 1 Robust Estimators for Variance-Based Device, such as variance-based radio tomographic imaging (VRTI), use received signal strength (RSS) variations caused, we propose a new estimator, least squares variance-based radio tomography (LSVRT), which reduces

  2. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Image-Based Stained Glass

    E-print Network

    Brooks, Stephen

    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Image-Based Stained Glass Stephen Brooks of a work of stained glass. To this end, we develop a novel approach which involves image warping is first segmented. Each segment is subsequently transformed to match real segments of stained glass

  3. Mutual Anonymity for Mobile P2P Systems Jinsong Han, Member, IEEE Computer Society, and

    E-print Network

    Liu, Yunhao

    Mutual Anonymity for Mobile P2P Systems Jinsong Han, Member, IEEE Computer Society, and Yunhao Liu protocols attempt to provide mutual anonymity for users. Most existing anonymous designs, however, are path secret-sharing-based mutual anonymity protocol, termed PUZZLE, which enables anonymous query issuance

  4. Appeared in Proc. of IEEE Computer Animation and Social Agents (CASA) 2004 Automatic Dynamic Expression Synthesis

    E-print Network

    Deng, Zhigang

    Appeared in Proc. of IEEE Computer Animation and Social Agents (CASA) 2004 Automatic Dynamic Expression Synthesis For Speech Animation Zhigang Deng Dept. of CS zdeng@usc.edu Murtaza Bulut Dept. of EE://graphics.usc.edu Abstract Although a large amount of research has been done in speech animation, both 2D and 3D, one

  5. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN, 2007 1 FLUTE: Fast Lookup Table Based Rectilinear

    E-print Network

    Chu, Chris C.-N.

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN, 2007 1 FLUTE: Fast Lookup Table Based Rectilinear present a very fast and accu- rate rectilinear Steiner minimal tree (RSMT) algorithm called FLUTE. FLUTE and runtime. FLUTE is optimal for low-degree nets (up to degree 9 in our current implementation) and is still

  6. 436 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 3, MARCH 2008 Quantum Circuit Simplification and

    E-print Network

    Miller, D. Michael

    436 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 3, MARCH 2008 Quantum Circuit Simplification and Level Compaction Dmitri Maslov, Gerhard W. Dueck, Member, IEEE, D. Michael Miller, Member, IEEE, and Camille Negrevergne Abstract--Quantum circuits are time

  7. [Pervasive developmental disorders].

    PubMed

    Ferreri, Mélanie

    2014-04-01

    Pervasive developmental disorders (PDD-ICD10), covering roughly the same entity as the autism spectrum disorders (ASD DSM-IVTR and DSM-V) include a heterogeneous clinical reality. PDD develop in childhood and are characterized by alterations in socialization, communication and behavior disorders with stereotypies and repetitive movements. Autism is included in PDD and has led to many debates in France and to the publication of recommendations and government plans, in recent years. We propose in this article to review the current knowledge of this topic. PMID:24855782

  8. IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. XX, NO. X, XXXX 1 Cloud Federations in the Sky: Formation Game

    E-print Network

    Grosu, Daniel

    IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. XX, NO. X, XXXX 1 Cloud Federations in the Sky federation, virtual machine, game theory. 1 INTRODUCTION CLOUDS are large-scale distributed computing sys (VM) instances. Cloud computing systems' ability to provide on de- mand access to always-on computing

  9. Published by the IEEE CS 1536-1268/12/$31.00 2012 IEEE PERVASIVE computing 7 Smartphones Editor: Roy Want Google roywant@acm.org

    E-print Network

    Campbell, Andrew T.

    . These smartphones include an accelerometer, a digital compass, a gyroscope, a GPS, quad microphones, dual cameras). It wasn't until early 2007 that Nokia released a phone with an embedded accelerometer. Interestingly, because the accelerometer was only there for video stabilization and photo orientation. However, when

  10. 24 PERVASIVE computing Published by the IEEE CS n 1536-1268/15/$31.00 2015 IEEE Edge Analytics in the

    E-print Network

    Satyanarayanan, Mahadev "Satya"

    in the Internet of Things M any of the "things" in the Internet of Things (IoT) are video cameras, which the Internet, even though there are many situations in which timely re- mote access can be valuable exactly this theme: a clue to solving a crime is embedded in the backgrounds of old crowd

  11. 74 Published by the IEEE Computer Society 1089-7801/09/$26.00 2009 IEEE IEEE INTERNET COMPUTING InternetofThingsTrack

    E-print Network

    to the real world is the Internet of Things,2 which connects such resources with everyday objects's based on the Internet of Things and its technologies. Their framework for integrating Web services-Essen Heinrich Hußmann University of Munich Perci: Pervasive Service Interaction with the Internet of Things #12

  12. Adaptable Multimodal Interfaces in Pervasive Environments

    E-print Network

    Adaptable Multimodal Interfaces in Pervasive Environments Pierre-Alain Avouac, Philippe Lalanda of pervasive environments, multimodal interaction plays a pivotal role because multimodality provides flexibility and naturalness for interaction. The challenge of multimodal interfaces in pervasive environments

  13. Pervasive Advertising Jrg Mller1

    E-print Network

    Pervasive Advertising Jörg Müller1 , Florian Alt2 , Daniel Michelis3 1 Deutsche Telekom technologies leave the labs, they are starting to be used for the purpose of advertising. Pervasive Advertising shaping this development in a meaningful way. In particular, many marketing and advertising professionals

  14. Plasmas: Diversity, pervasiveness and potential

    SciTech Connect

    Eastman, Timothy E.

    1998-01-01

    When considered inclusively, plasma science and technology encompass immense diversity, pervasiveness and potential: diversity through numerous topical areas (see list of nearly 200 in Table II); pervasiveness with examples covering the full range of energy, time and spatial scale; and potential through innumerable current and future applications.

  15. IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 45, NO. 1, JANUARY 2010 235 Optical I/O Technology for Tera-Scale Computing

    E-print Network

    Palermo, Sam

    for Tera-Scale Computing Ian A. Young, Fellow, IEEE, Edris Mohammed, Jason T. S. Liao, Member, IEEE the potential to achieve TB/s interconnect and enable platforms suitable for the tera-scale computing era. Index of tera-scale computing. To meet these bandwidth demands, traditional electrical in- terconnect techniques

  16. Pervasive media violence.

    PubMed

    Schooler, C; Flora, J A

    1996-01-01

    In this review, we focus our discussion on studies examining effects on children and young adults. We believe that the current epidemic of youth violence in the United States justifies a focus on this vulnerable segment of society. We consider media effects on individual children's behaviors, such as imitating aggressive acts. In addition, we examine how the media influence young people's perceptions of norms regarding interpersonal relationships. Next, we assess mass media effects on societal beliefs, or what children and adolescents think the "real world" is like. We suggest these media influences are cumulative and mutually reinforcing, and discuss the implications of repeated exposure to prominent and prevalent violent media messages. Finally, we catalog multiple intervention possibilities ranging from education to regulation. From a public health perspective, therefore, we evaluate the effects that pervasive media messages depicting violence have on young people and present multiple strategies to promote more healthful outcomes. PMID:8724228

  17. 292 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 3, MARCH 1997 Parallel Computer Vision

    E-print Network

    Bhandarkar, Suchendra "Suchi" M.

    Computer Vision on a Reconfigurable Multiprocessor Network Suchendra M. Bhandarkar, Member, IEEE Computer suited for a number of problems in low- and intermediate-level computer vision such as the FFT, edge-level vision algorithms on a transputer- based prototype are presented. Index Terms--Reconfigurable multiring

  18. 18 IEEE TRANSACTIONS ON APPLIED SUPERCONDUCTIVITY, VOL. 9, NO. 1, MARCH 1999 Tools for the Computer-Aided Design

    E-print Network

    Friedman, Eby G.

    circuits depends upon the application of computer-aided design (CAD) tools. This paper summarizes and methodologies which fall under the general name of computer-aided design (CAD). The development of CAD tools18 IEEE TRANSACTIONS ON APPLIED SUPERCONDUCTIVITY, VOL. 9, NO. 1, MARCH 1999 Tools for the Computer-Aided

  19. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.706(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

  20. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

  1. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

  2. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

  3. 272 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 19, NO. 2, FEBRUARY 2000 [3] C. J. Alpert, J.-H. Huang, and A. B. Kahng, "Multilevel circuit

    E-print Network

    Young, Evangeline Fun Yu

    272 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 19, NO. 2 for placement of stan- dard cell VLSI circuits," IEEE Trans. Computer-Aided Design, vol. 4, pp. 92­98, Jan. 1985 techniques," in Proc. IEEE Int. Conf. Computer-Aided Design, 1996, pp. 194­200. [10] C. M. Fiduccia and R. M

  4. 800 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 23, NO. 5, MAY 2004 of layers. For example, for three-layer routing, the circuit s38584

    E-print Network

    Tehranipoor, Mohammad

    800 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 23, NO. 5- ticommodity flow," IEEE Trans. Computer-Aided Design, vol. 20, pp. 622­632, May 2001. [2] C. J. Alpert, J.-H. Huang, and A. B. Kahng, "Multilevel circuit parti- tioning," IEEE Trans. Computer-Aided Design, vol. 17

  5. In Third IEEE-CS Workshop on Perceptual Organization in Computer Vision at International Conference of Computer Vision, Vancouver, July 2001.

    E-print Network

    August, Jonas

    In Third IEEE-CS Workshop on Perceptual Organization in Computer Vision at International Conference of Computer Vision, Vancouver, July 2001. A Field Model for Contour Organization and Partial Di#11;erential of perceptual organization in computer vision have entrenched this discrete thinking, even to the extent

  6. 2 Published by the IEEE Computer Society 1089-7801/15/$31.00 2015 IEEE IEEE INTERNET COMPUTING Physical-Cyber-SocialComputing

    E-print Network

    Sheng, Michael

    Physical-Cyber-SocialComputing Matching Over Linked Data Streams in the Internet of Things Yongrui Qin on computers and can be called the Internet of Computers. In contrast, the Internet of Things (IoT) aims predicts that the number of Internet- connected things will reach 50 billion by 2020.1 Connecting all

  7. IEEE TRANSACTIONS ON VISUALIZATION & COMPUTER GRAPHICS 1 A Deformable Surface Model for

    E-print Network

    simulation ! 1 INTRODUCTION Water drops appear everywhere in our daily life, from wall panels when we take-Time Water Drop Animation Yizhong Zhang, Student Member, IEEE, Huamin Wang, Member, IEEE Shuai Wang, Member, IEEE, Yiying Tong, Member, IEEE, and Kun Zhou, Member, IEEE Abstract--A water drop behaves differently

  8. Optimizing On-Demand Data Broadcast Scheduling in Pervasive Environments

    E-print Network

    Whitley, Darrell

    , Indrajit Ray and Darrell Whitley Department of Computer Science Colorado State University Fort Collins, CO altogether. The devices interact with each other and with other computing devices by exchanging rapid. For example, a typical pervasive health care system involves multiple sen- sor nodes disseminating data

  9. Optimizing On-Demand Data Broadcast Scheduling in Pervasive Environments

    E-print Network

    Ray, Indrakshi

    , Indrajit Ray and Darrell Whitley Department of Computer Science Colorado State University Fort Collins, CO altogether. The devices interact with each other and with other computing devices by exchanging rapid of data dissemination. For example, a typical pervasive health care system involves multiple sen- sor

  10. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. XX, NO. Y, MONTH 1998 1 Modeling of Ship Trajectory in Collision

    E-print Network

    Michalewicz, Zbigniew

    IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. XX, NO. Y, MONTH 1998 1 Modeling of Ship and other moving ships, the problem of avoiding collisions is reduced to a dynamic optimiza- tion task system. This new extension of EP/N computes a safe-optimum path of a ship in given static and dy- namic

  11. IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 1, NO. 3, SEPTEMBER 2009 169 A Turing Test for Computer Game Bots

    E-print Network

    Sukthankar, Gita Reese

    machine to be intelligent. The Turing Test was first proposed in Alan Turing's 1950 paper [1], in which A Turing Test for Computer Game Bots Philip Hingston, Senior Member, IEEE Abstract--In this paper, a version of the Turing Test is proposed, to test the ability of computer game playing agents ("bots

  12. IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING , VOL. X, NO. X, MONTHX 200X 1 Molds for Meshes: Computing Smooth Parting

    E-print Network

    Martin, Ralph R.

    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING , VOL. X, NO. X, MONTHX 200X 1 Molds, Member, IEEE Abstract--We consider the problem of computing a parting line for a mold for a complex mesh undercuts ensure that such a parting line is practically useful. Note to Practitioners--Molding

  13. Software Aspects of IEEE Floating-Point Computations for Numerical Applications in High Energy Physics

    ScienceCinema

    None

    2011-10-06

    Floating-point computations are at the heart of much of the computing done in high energy physics. The correctness, speed and accuracy of these computations are of paramount importance. The lack of any of these characteristics can mean the difference between new, exciting physics and an embarrassing correction. This talk will examine practical aspects of IEEE 754-2008 floating-point arithmetic as encountered in HEP applications. After describing the basic features of IEEE floating-point arithmetic, the presentation will cover: common hardware implementations (SSE, x87) techniques for improving the accuracy of summation, multiplication and data interchange compiler options for gcc and icc affecting floating-point operations hazards to be avoided About the speaker Jeffrey M Arnold is a Senior Software Engineer in the Intel Compiler and Languages group at Intel Corporation. He has been part of the Digital->Compaq->Intel compiler organization for nearly 20 years; part of that time, he worked on both low- and high-level math libraries. Prior to that, he was in the VMS Engineering organization at Digital Equipment Corporation. In the late 1980s, Jeff spent 2½ years at CERN as part of the CERN/Digital Joint Project. In 2008, he returned to CERN to spent 10 weeks working with CERN/openlab. Since that time, he has returned to CERN multiple times to teach at openlab workshops and consult with various LHC experiments. Jeff received his Ph.D. in physics from Case Western Reserve University.

  14. Trustworthiness of Pervasive Healthcare Folders

    E-print Network

    with the objective to increase the quality of care while decreasing its cost. Pervasive healthcare aims itself) with a large external Flash memory on a USB key form factor. Embedding the patient folder as well as a database. INTRODUCTION Driven by the need to improve the quality of care while decreasing costs, many countries around

  15. in: Proceedings of the IEEE International Conference on Computer Vision Systems, New York City, USA, January 5-7, A Vision System for Interactive Object Learning

    E-print Network

    Peters, Gabriele

    in: Proceedings of the IEEE International Conference on Computer Vision Systems, New York City, USA architecture which can be used for a variety of applications in computer vision and computer graphics the usability of the proposed system. 1 Introduction Both, computer vision as well as computer graphics

  16. 68 1541-1672/09/$26.00 2009 IEEE IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society

    E-print Network

    Chen, Chaomei

    . After 1991, sev- eral additional countries joined them. By 2003, China was the second most productive analytical units M any countries are aspiring to advance their economies through science and technology (S.computer.org/intelligent 69 over different time periods. For ex- ample, Figure 2 shows a visualization for US Patent and Trade

  17. 60 1541-1672/15/$31.00 2015 IEEE IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society

    E-print Network

    Moraitis, Pavlos

    characteristics of AmI computing components.2 Researchers working on the Home sERvices for specialised elderly for elderly people suffering from mild cognitive impairment (MCI), mild/moderate Alzheimer's disease (AD), and other diseases (diabetes, cardio- vascular) with identified risk factors, aiming to significantly

  18. 1120 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 5, OCTOBER 2009 Frankenstein's PSO: A Composite Particle Swarm

    E-print Network

    Birattari, Mauro

    1120 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 5, OCTOBER 2009 Frankenstein's PSO this composite algorithm Frankenstein's PSO in an analogy to the popular character of Mary Shelley's novel. Frankenstein's PSO performance evaluation shows that by integrating components in novel ways effective

  19. IEEE TRANSACTIONS ON AFFECTIVE COMPUTING, VOL. X, NO. X, MONTH 201X 1 Affect and Social Processes

    E-print Network

    for studying the impact of a range of affective and social factors in online communication with Internet usersIEEE TRANSACTIONS ON AFFECTIVE COMPUTING, VOL. X, NO. X, MONTH 201X 1 Affect and Social Processes in Online Communication - Experiments with an Affective Dialog System Marcin Skowron, Mathias Theunis

  20. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (IN SUBMISSION) 1 Hacking is not random: a case-control study of

    E-print Network

    Thornton, Mitchell

    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (IN SUBMISSION) 1 Hacking is not random type. We then cross-list this information with data on webservers hacked to serve phishing pages likely to be hacked than those not running any CMS, and that servers running Apache and Nginx are more

  1. 0018-9162/99/$10.00 1999 IEEE2 Computer lthough there have been many data-mining

    E-print Network

    Han, Jiawei

    0018-9162/99/$10.00 © 1999 IEEE2 Computer A lthough there have been many data-mining methodologies- ment, particularly in the form of guidance and user control. We believe that data mining is most a search.1 Mining can also be improved by employing a multi- dimensional, hierarchical view of the data

  2. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. A, NO. B, CCC 200D 1 A Tutorial for Competent Memetic Algorithms

    E-print Network

    Smith, James E.

    ]. These methods are inspired by models of natural systems that combine the evolutionary adaptation of a population are inspired by models of adaptation in natural systems that combine the evolutionary adaptation of ManuscriptIEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. A, NO. B, CCC 200D 1 A Tutorial for Competent

  3. 1720 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 8, AUGUST 2014 Context-Aware Energy Enhancements for Smart

    E-print Network

    Pasricha, Sudeep

    wireless data and location interface configurations that can optimize energy consumption in mobile devices1720 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 8, AUGUST 2014 Context-Aware Energy, business, and social interaction. Unfortunately, the energy demands of newer ambient intelligence

  4. To appear in IEEE Transactions on Visualization and Computer Graphics Order of Magnitude Markers: An Empirical Study on Large

    E-print Network

    Jones, Mark W.

    To appear in IEEE Transactions on Visualization and Computer Graphics Order of Magnitude Markers: An Empirical Study on Large Magnitude Number Detection Rita Borgo, Joel Dearden, and Mark W. Jones 0 80000, and Order Of Magnitude Markers (OOMMs). Abstract--In this paper we introduce Order of Magnitude Markers

  5. 14-th IEEE International Conference on Peer-to-Peer Computing Defining and Understanding Smartphone Churn over

    E-print Network

    Jelasity, Márk

    14-th IEEE International Conference on Peer-to-Peer Computing Defining and Understanding Smartphone in human history, yet the adoption of P2P techniques has been very slow. One reason is the lack know that when a smartphone is on a charger connected to a WiFi network behind a friendly NAT device

  6. IEEE TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, TCBB-2014-03-0071 1 A Deep Learning Network Approach to ab

    E-print Network

    Cheng, Jianlin Jack

    IEEE TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, TCBB-2014-03-0071 1 A Deep Learning that have traditionally employed neural networks are experimenting with novel deep learning techniques prediction, we wanted to determine whether deep learning could contribute to the advancement of this field

  7. Appeared in: IEEE Transactions on Visualization and Computer Graphics, 18(12):20412050, 2012. Augmented Topological Descriptors of Pore Networks

    E-print Network

    . Wes Bethel, Member, IEEE Abstract--One potential solution to reduce the concentration of carbon it for long periods of time. One vehicle to this solution is carbon sequestration. By carbon sequestration, we networks. We illustrate our results using synchrotron-based X-ray computed microtomography of glass beads

  8. IEEE TRANS. EVOL. COMPUT. , VOL. X, NO. X, FALL 2005 1 HMM-Based Semantic Learning for a Mobile Robot

    E-print Network

    Squire, Kevin

    IEEE TRANS. EVOL. COMPUT. , VOL. X, NO. X, FALL 2005 1 HMM-Based Semantic Learning for a Mobile be part of a more general, embodied intelligent system, one capable of using associative learning to form. He goes on at the end of the paper to suggest that initially, machines could perhaps learn to compete

  9. 354 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 7, NO. 2, MAY 2011 Neural Network Assisted Computationally Simple

    E-print Network

    Efe, Mehmet Önder

    Computationally Simple PID Control of a Quadrotor UAV Mehmet Önder Efe, Senior Member, IEEE Abstract electrical variables, e.g., the loss in the battery voltage. Proportional Integral and Derivative (PID) type burden of the proposed scheme is very low. Index Terms--Fractional order control, unmanned aerial vehi

  10. IEEE TRANSACTIONS ON NANOTECHNOLOGY, VOL. 6, NO. 4, JULY 2007 451 Computing Division Using Single-Electron Tunneling

    E-print Network

    Cotofana, Sorin

    IEEE TRANSACTIONS ON NANOTECHNOLOGY, VOL. 6, NO. 4, JULY 2007 451 Computing Division Using Single--Emerging nanotechnologies, like single-electron tun- neling (SET) technology, possesses properties that are fundamen- tally exists and which cannot be directly simulated, it demonstrates the possibilities that nanotechnology

  11. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. X, NO. X, XXX XXX 1 Geometry Synthesis on Surfaces Using

    E-print Network

    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. X, NO. X, XXX XXX 1 Geometry grammars. In previous work, shape grammars have been used to model geometric or organic patterns in the plane and three- dimensional objects like architecture and trees. Extending shape grammars with fields

  12. IEEE TRANSACTIONS ON NANOBIOSCIENCE, VOL. 5, NO. 1, MARCH 2006 41 Computational Modeling of a New Fluorescent

    E-print Network

    IEEE TRANSACTIONS ON NANOBIOSCIENCE, VOL. 5, NO. 1, MARCH 2006 41 Computational Modeling of a New Fluorescent Biosensor for Caspase Proteolytic Activity Improves Dynamic Range Jason Jui-Hsuan Chiang and Kevin biosensors that are useful for measuring protease activity is composed of a tandem fusion of yellow

  13. IEEE TRANSACTIONS ON COMPUTERS, VOL. 51, NO. 5, MAY 2002 1 Architectures for Unified Field Inversion with

    E-print Network

    IEEE TRANSACTIONS ON COMPUTERS, VOL. 51, NO. 5, MAY 2002 1 Architectures for Unified Field two new inversion algorithms for binary extension and prime fields which are slightly mod­ ified is also introduced, in which the field elements are represented us­ ing a multi­word format. This feature

  14. IEEE TRANSACTIONS ON COMPUTERS, VOL. 51, NO. 5, MAY 2002 1 Architectures for Unified Field Inversion with

    E-print Network

    IEEE TRANSACTIONS ON COMPUTERS, VOL. 51, NO. 5, MAY 2002 1 Architectures for Unified Field new inversion algorithms for binary extension and prime fields which are slightly mod- ified versions, in which the field elements are represented us- ing a multi-word format. This feature allows a scalable

  15. 20153IEEE (Institute of Electrical and Electronics Engineers) Control Sysems Society

    E-print Network

    Takada, Shoji

    20153IEEE (Institute of Electrical and Electronics Engineers) Control Sysems Society President-Elect, President, Past President32014 Q: IEEE Control Systems Society IEEE A IEEE (Institute of Electrical and Electronics Engineers) 42 IEEE41 IEEE 802.11aLAN IEEE Computer, ComSoc (Communications Society), SP

  16. A shortened version of this paper appeared in IEEE Computer, October 1994. 1 HighPressure Steam Engines and Computer Software \\Lambda

    E-print Network

    Leveson, Nancy

    A shortened version of this paper appeared in IEEE Computer, October 1994. 1 High­Pressure Steam the same mistakes. In particular, parallels exist between the early develop­ ment of high­pressure steam A History of the Growth of the Steam Engine (1883) Hero of Alexandria, who lived around 60 AD, con­ ducted

  17. Boston University Computer Science Tech. Report No. 200022,Dec. 2000 (revised Apr. 2001). To Appear in Proc. IEEE International Conf. on Computer Vision (ICCV). Canada. Jul. 2001.

    E-print Network

    ­ resent a hand pose. We test our system both on synthetic sequences and on sequences taken with a color). To Appear in Proc. IEEE International Conf. on Computer Vision (ICCV). Canada. Jul. 2001. 3D Hand Pose:frrosales,athitsos,lsigal,sclaroffg@bu.edu Abstract A system for recovering 3D hand pose from monocu­ lar color sequences is proposed. The system

  18. 0018-9162/13/$31.00 2013 IEEE Published by the IEEE Computer Society AUGUST 2013 85 INVISIBLE COMPUTINGINVISIBLE COMPUTING

    E-print Network

    Hartmann, Björn

    , Smart Things: Ubiq- uitous Computing User Experience Design, Morgan Kaufmann, 2010). As Figure 1 shows these devices connect directly to the Internet, but power constraints often lead to designs in which the device, tablet computer, or other local hub. That local device in turn exchanges data with the Internet through

  19. COVER FEATURE Published by the IEEE Computer Society 0018-9162/09/$26.00 2009 IEEE

    E-print Network

    Torrellas, Josep

    terascale performance--namely, 1012 operations per second (tera-ops). Clearly, attaining such a general-purpose tera-op chip, peta-op departmental server, and exa-op data center would revolutionize computing that consumes 20 kilowatts (KW), and a tera-op chip multiprocessor that consumes 20 watts (W). These numbers

  20. Japanese Computational Grid Research Project: SATOSHI MATSUOKA, MEMBER, IEEE, SINJI SHIMOJO, MEMBER, IEEE, MUTSUMI AOYAGI,

    E-print Network

    and Development is conducting research on leading-edge, grid-enabled nanoscience and nanotechnology simulation applications in all areas of science and engineering. Keywords--Computational grid, nanoscience, research grid." Another essential part of NAREGI is the inclusion of nanoscience as a representative application area

  1. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 21, NO. 6, JUNE 2002 715 Short Papers_______________________________________________________________________________

    E-print Network

    Chakrabarty, Krishnendu

    sequences for synchronous sequential (nonscan) circuits was presented in [2] and for full-scan circuitsIEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 21, NO. 6, JUNE 2002 715 Short Papers

  2. Proceedings of the IEEE international conference on computers

    SciTech Connect

    Not Available

    1985-01-01

    This book presents the papers given at a conference on array processors and supercomputers. Topics considered at the conference included fault-tolerant systolic arrays, computer architecture, systolic processing, algorithms, performance, sorting, monitoring, parallel processing, speech recognition, vector processing, VLSI, image processing, and data-flow processing.

  3. 54 computer Published by the IEEE Computer Society 0018-9162/13/$31.00 2013 IEEE Cover Feature

    E-print Network

    Cortes, Corinna

    though it has never been anything more than a marketing term for the Internet. The term originated Communications Ongoing efforts to legally define cloud computing and regulate separate parts of the Internet the Internet less secure. P olicymakers across the globe continue to try to define and regulate the cloud, even

  4. 1368 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 21, NO. 11, NOVEMBER 2002 watermark's strength. We explain the basic approach and develop spe-

    E-print Network

    Madden, Patrick H.

    1368 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 21, NO. 11. Computer-Aided Design, Nov. 1999, pp. 591­595. [5] S. Craver, "Zero knowledge watermark detection," in Proc detection for intellectual property protection of VLSI design," in Proc. IEEE/ACM Int. Conf. Computer-Aided

  5. 1588 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 22, NO. 11, NOVEMBER 2003 and Tt and the technology parameters. For all cases, we observe that the

    E-print Network

    Mishchenko, Alan

    1588 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 22, NO. 11 computer-aided design (CAD) tools currently performing buffer insertion will eventually have to deal and blockages and bays," IEEE Trans. Comput.-Aided Design, vol. 20, pp. 556­562, Apr. 2001. [2] L. Carloni, K

  6. 62 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE R F I D T E C H N O L O G Y

    E-print Network

    Tanenbaum, Andrew S.

    in 1901, radio waves have been an important way to send messages--from Morse code to the first voice, sup- porting automated checkout, developing smart home appliances, locating children, and even foil for the development of both classical and modern security techniques, ranging from signal jamming to challenge

  7. 1536-1268/06/$20.00 2006 IEEE Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 25 R F I D T E C H N O L O G Y

    E-print Network

    Han, Richard Y.

    energy stored in an inte- grated battery. In the latter case, a tag's lifetime is limited by the stored is a LoJack device attached to a car, which incorpo- rates cellular technology and a GPS to locate the car if stolen. However, batteries make the cost, size, and life- time of active tags impractical for the retail

  8. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS AND CONTROL INSTRUMENTATION, VOL. JECI-14, NO. 1, APRIL 1967 A Study of the Applications of Analog Computers

    E-print Network

    Leach Jr.,W. Marshall

    1967 A Study of the Applications of Analog Computers V. P. KODALI, MEMBER, IEEE Abstract-An electronic analog computer is a tool for solving mathematical differential equations. The basis for the use of such a computer in the simulation of many scientific and engineering prob- lems is the possibility

  9. To appear in Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, 2007 Riemannian Analysis of Probability Density Functions with

    E-print Network

    Srivastava, Anuj

    To appear in Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, 2007 University joshi@eng.fsu.edu Abstract Applications in computer vision involve statisti- cally analyzing shape classification. 1. Introduction Several applications in computer vision, such as tex- ture

  10. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 12. NO. 8. AUGUST 1993 1209 Automatic Grid Refinement and Higher Order Flux

    E-print Network

    Florida, University of

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 12. NO. 8 of computational efficiency, therefore, is an important task for all simulation tools. The application of adaptive at the dopant concentration of 1014 ~ m - ~ .The error was computed by comparing the result- ing profiles

  11. 82 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATEDCIRCUITS AND SYSTEMS, VOL. 13, NO. 1, JANUARY 1994 Semiconductor Wafer Representation for TCAD

    E-print Network

    Florida, University of

    82 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATEDCIRCUITS AND SYSTEMS, VOL. 13, NO. 1 services that provide infrastructure and support for computer-aided design system development design, manufacturing yield optimization and process centering, and computer-integrated manufacturing

  12. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 14, NO. IO,OCTOBER 1995 1223 Grid Adaption

    E-print Network

    Florida, University of

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 14, NO. IO boundary problems, for example, see [l] and [2]. In technology-computer-aided-design, several solutions in the transformed domain. This approach is computationally fast, but difficult to use with arbitrary shapes

  13. In Proceedings of the IEEE Symposia on Human-Centric Computing Languages and Environments, pp. 2-10. First Steps in Programming: A Rationale for Attention

    E-print Network

    Blackwell, Alan

    of Computer Programming" [30], it was assumed that serious users of computers would be programmers), and bIn Proceedings of the IEEE Symposia on Human-Centric Computing Languages and Environments, pp. 2-10. First Steps in Programming: A Rationale for Attention Investment Models Alan F. Blackwell University

  14. FROM THE AREA EDITOR Published by the IEEE Computer Society 0018-9162/09/$26.00 2009 IEEE

    E-print Network

    Ramakrishnan, Naren

    IEEE About three years ago, Netflix, the movie rental com- pany, announced a $1 million prize upon Netflix's proprietary system by at least 10 percent. Some have hailed the competition as a clever example of crowd- sourcing, but there is no denying that Netflix's release of a more than 100-million

  15. Grid-enabled biosensor networks for pervasive healthcare.

    PubMed

    Chouvarda, I; Koutkias, V; Malousi, A; Maglaveras, N

    2005-01-01

    Current advances in biosensor technology allow multiple miniaturized or textile sensors to record continuously biosignals, such as blood pressure or heart rate, and transmit the information of interest to clinical sites. New applications are emerging, based on such systems, towards pervasive healthcare. This paper describes an architecture enabling biosensors, forming a Body Area Network (BAN), to be integrated in a Grid infrastructure. The Grid services proposed, such as access to recorded data, are offered via the BAN console, an enhanced wearable computer, where the recordings of multiple biosensors are integrated. Medical Grid-enabled Nodes can have access to biosensor measurements upon demand, or can agree to get notifications and alerts. Thus, in such a distributed environment, data and computational resources are independent, yet cooperating unobtrusively, contributing to the notion of pervasive healthcare. PMID:15923719

  16. 30 Published by the IEEE Computer Society 1089-7801/10/$26.00 2010 IEEE IEEE INTERNET COMPUTING GuestEditors'Introduction

    E-print Network

    Shi, Weisong

    - ued promotion of openness and social intelligence as Internet systems and applications evolve. However to help identify and avoid malicious play- ers, minimize the threat of dishonest or manipulative behavior management and information systems, e-commerce and service computing, artificial intel- ligence, and game

  17. IEEE INTERNET COMPUTING 1089-7801/05/$20.00 2005 IEEE Published by the IEEE Computer Society JULY AUGUST 2005 5 From the Editor in Chief...

    E-print Network

    Filman, Robert E.

    . Filman · filman@computer.org T his month marks the 60th anniversary of the publication of Vannevar Bush's seminal Atlantic Monthly article, "As We May Think."1 At the time, Bush was the director of the US Office, Bush discussed science's impact on fighting the war and then turned his attention to what goals

  18. RFIDMeetstheInternet 14 Published by the IEEE Computer Society 1089-7801/09/$25.00 2009 IEEE IEEE INTERNET COMPUTING

    E-print Network

    Sheng, Michael

    tracking and tracing.1,2 Passive RFID can track prod- ucts in supply chains from the supplier INTERNET COMPUTING T he ability to track individual ob- jects is essential to many aspects of modern life, such as manufac- turing, logistics, counterterrorism, and anti-counterfeiting. RFID -- a wire- less communication

  19. On Designing a Pervasive Mobile Learning Platform

    ERIC Educational Resources Information Center

    Laine, Teemu H.; Vinni, Mikko; Sedano, Carolina Islas; Joy, Mike

    2010-01-01

    This article presents the features, design and architecture of the Myst pervasive game platform that has been applied in creating pervasive mobile learning games in various contexts such as science festivals and museums in Finland. Based on our experiences with the development, we draw a set of design principles for creating successfully a…

  20. Pervasive combinatorial modification of histone H3

    E-print Network

    Cai, Long

    modified forms of histone H3.2 in asynchronously grown and butyrate-treated HeLa cells, revealing pervasive- chronously growing HeLa cells (Fig. 1a), the mass of the first peak observed (15,289.6 Da) was 42 Da higherPervasive combinatorial modification of histone H3 in human cells Benjamin A Garcia1, James J

  1. Kothe, C., Onton, J., Makeig, S. "Emotion Recognition from EEG During Self-Paced Emotional Imagery." In proceedings of: Affective Brain-Computer Interfaces (aBCI) Workshop, IEEE Affective Computing and Intelligent Interaction 2013, Geneva

    E-print Network

    Makeig, Scott

    ." In proceedings of: Affective Brain-Computer Interfaces (aBCI) Workshop, IEEE Affective Computing and Intelligent to novel (i.e., previously unseen) emotion episodes from a wide variety of scenarios including love, awe scenarios under rigorous block-wise cross-validation. Keywords--emotion; valence; brain-computer interface

  2. Edited version published as "Data Flow Management and Compliance in Cloud Computing" in Cloud Computing, Special Issue on Legal Clouds. Available: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7270240

    E-print Network

    Cambridge, University of

    Computing, Special Issue on Legal Clouds. Available: http://ieeexplore.ieee.org/xpl/articleEdited version published as "Data Flow Management and Compliance in Cloud Computing" in CloudDetails.jsp?arnumber=7270240 Seeing through the clouds: Managing data flow and compliance in cloud computing Jatinder Singh1

  3. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC) 1 Using Register Lifetime Predictions to Protect

    E-print Network

    Torrellas, Josep

    to Protect Register Files Against Soft Errors Pablo Montesinos, Member, IEEE, Wei Liu, Member, IEEE -- a storage structure that is read very frequently. To increase the resistance of register files to soft-point register files, respectively. ParShield consumes on average only 81% and 78% of the power of a design

  4. No Pervasive Computing Without Intelligent Systems

    NASA Astrophysics Data System (ADS)

    Thompson, S. G.; Azvine, B.

    It is interesting to think about the technologies that have become part of our everyday lives and compare their invention and development with those that have fallen by the wayside. Examples of failed technologies such as electrical cars and satellite mobile telephones are not uncommon, but more interestingly numerous other technologies such as instant messaging, text messaging, and b2c eCommerce have moved through the cycle of initial rejection, adoptionby a new user community, and adaptation to its needs, despite the early scepticism of many users and commentators.

  5. In 14th IEEE Symposium on Computer Based Medical Systems (CBMS'2001), 26-27 July, Bethesda A Case for Supplementing Evidence Base Medicine with Inductive

    E-print Network

    Abidi, Syed Sibte Raza

    In 14th IEEE Symposium on Computer Based Medical Systems (CBMS'2001), 26-27 July, Bethesda (USA). A Case for Supplementing Evidence Base Medicine with Inductive Clinical Knowledge: Towards a Technology Group, School of Computer Sciences, Universiti Sains Malaysia, 11800 Penang, Malaysia sraza

  6. 194 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATEDCIRCUITS AND SYSTEMS, VOL. 15, NO. 2, FEBRUARY 1996 Adaption and Flux Discretizations

    E-print Network

    Florida, University of

    194 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATEDCIRCUITS AND SYSTEMS, VOL. 15, NO. 2 dependence of the solutions. For both computational and ease of use reasons, automatic mesh generation [2 becomes indispensable in designing new technology. Together with improvement in physical modeling

  7. 790 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN, VOL. 9. NO. 7. JULY I99O The editorial staff apologizesto the authors and readersfor this prob-

    E-print Network

    Najm, Farid N.

    790 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN, VOL. 9. NO. 7. JULY I99O The editorial staff Tritns. Computer-Aided Design, vol. 9, pp. *39-450, Apr. 1990. #; #12; Design Labo- ratory, Texas Instruments,Inc., Dallas, TX75265. I. N. Hajj is with the Coordinated Science

  8. Challenges in Securing the Interface Between the Cloud and Pervasive Systems

    SciTech Connect

    Lagesse, Brent J

    2011-01-01

    Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources and issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.

  9. 546 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 5, NO. 5, OCTOBER 2001 A Computational Laboratory for

    E-print Network

    Tesfatsion, Leigh

    with computational modeling because they lack a programming background. Languages such as Starlogo are simple in implementation details. On the other hand, a CL can be de- signed to be both modular and extensible. Thus

  10. Per Viz: Painkillers for Pervasive Application Debugging

    E-print Network

    Pham, Hubert

    Debugging pervasive applications is difficult due to their distributed, asynchronous, and dynamic nature. To help ease the debugging process, we propose PerViz, a developer-targeted tool that enhances system visibility ...

  11. IEEE TRANSACTIONS ON AFFECTIVE COMPUTING (TAC) 1 Towards E-Motion Based Music RetrievalA study of Affective Gesture Recognition

    E-print Network

    Widmer, Gerhard

    to music during many of our daily activities, such as exercise, commuting, relaxation, and many peopleIEEE TRANSACTIONS ON AFFECTIVE COMPUTING (TAC) 1 Towards E-Motion Based Music RetrievalA study--The widespread availability of digitised music collections and mobile music players have enabled us to listen

  12. Metrics for Human Driving of Multiple Robots Dan R. Olsen Jr, Member IEEE Computer Society, Stephen Bart Wood, and Jonathan Turner

    E-print Network

    Olsen Jr., Dan R.

    of human beings so that they can control multiple robots simultaneously. This provides leverage for humanMetrics for Human Driving of Multiple Robots Dan R. Olsen Jr, Member IEEE Computer Society, Stephen Bart Wood, and Jonathan Turner Abstract--A goal of human-robot interaction is to expand the capability

  13. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 17, NO. 12, DECEMBER 1998 1319 Short Papers

    E-print Network

    Vivien, Frédéric

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 17, NO. 12 very- large-scale-integration (VLSI) circuits. The basic idea is to relocate registers along the paths. Vivien Abstract-- This paper is devoted to a low-complexity algorithm for retiming circuits without

  14. IEEE TRANSACTIONS ON COMPUTERS, VOL. XX, NO. XX, XXXXXX 200X 1 Dynamic Voltage Scaling in Multi-tier Web Servers

    E-print Network

    Huang, Wei

    IEEE TRANSACTIONS ON COMPUTERS, VOL. XX, NO. XX, XXXXXX 200X 1 Dynamic Voltage Scaling in Multi-tier pipelines. Contem- porary Web server installations typically adopt a three-tier architecture in which the first tier presents a Web interface, the second executes scripts that implement business logic

  15. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. XX, NO. XX, XX 2013 1 Stochastic Testing Method for Transistor-Level

    E-print Network

    Reif, Rafael

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. XX, NO. XX, XX--Uncertainties have become a major concern in integrated circuit design. In order to avoid the huge number of repeated concern in today's nanometer integrated circuit design [1]. It is well known that the uncertainties

  16. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 10, OCTOBER 2008 1775 Transforming Cyclic Circuits Into

    E-print Network

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 10, OCTOBER 2008 1775 Transforming Cyclic Circuits Into Acyclic Equivalents Osama Neiroukh, Stephen A. Edwards tools can intro- duce unwanted cycles in digital circuits, and for certain com- binational functions

  17. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. XX, NO. XX, XX 2014 1 Calculation of Generalized Polynomial-Chaos Basis

    E-print Network

    Reif, Rafael

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. XX, NO. XX, XX in the statistical analysis of integrated circuits. In stochastic spectral methods, one needs to determine a set of integrated circuits [1]­[5]. Such methods approximate the stochastic solution by a truncated generalized

  18. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 1 On the Scalability and Dynamic Load-Balancing of

    E-print Network

    Tropper, Carl

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 1 On the Scalability Abstract--As a consequence of Moore's law, the size of in- tegrated circuits has grown extensively, resulting in simulation becoming the major bottleneck in the circuit design process. On the other hand

  19. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 6, JUNE 2006 1087 SILCA: SPICE-Accurate Iterative Linear-Centric

    E-print Network

    Shi, C.-J. Richard

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 6, JUNE integrated (VLSI) circuits with strong parasitic couplings. SILCA consists of two key linear-centric tech- niques applied to time-domain nonlinear circuit simulation. For numerical integration, explicit

  20. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. #, NO. #, MONTH 20## 1 Threshold Network Synthesis and Optimization and

    E-print Network

    Zhong, Lin

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. #, NO. #, MONTH utilizing these devices. While functionally-correct threshold gates and circuits based on nanotechnologies improve the compactness and speed of very large scale integrated (VLSI) systems. While it is easy

  1. 416 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 30, NO. 3, MARCH 2011 Simultaneous Technology Mapping and Placement

    E-print Network

    Cortes, Corinna

    416 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 30, NO. 3 integrated circuits. Traditionally, these steps are applied separately to optimize the delays, possibly since to sig- nificant portion of the overall delay in very large scale integrated circuits. The trend

  2. 1338 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 23, NO. 9, SEPTEMBER 2004 Retiming for Wire Pipelining in System-On-Chip

    E-print Network

    Zhou, Hai

    . With such short clock periods, the communication among different blocks on a SOC circuit of ever increasing1338 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 23, NO. 9. In synchronous systems, a large amount of communication time is spent on multiple-clock pe- riod wires

  3. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 20, NO. 9, SEPTEMBER 2001 1059 Theory of Latency-Insensitive Design

    E-print Network

    Carloni, Luca

    -0070(01)06887-7. of semicustom integrated circuits are forced to iterate many times between logic synthesis and layout generationIEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 20, NO. 9 systems by assembling intellectual property com- ponents. Latency-insensitive designs are synchronous

  4. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 21, NO. 2, FEBRUARY 2002 169 An Esterel Compiler for Large Control-Dominated

    E-print Network

    to compile other synchronous languages with fine-grained parallelism. Index Terms--Code generation, compilersIEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 21, NO. 2 compilers with similar capacity. The primary contribution is an algorithm that generates efficient

  5. IEEE TRANSACTIONS ON NANOBIOSCIENCE SPECIAL ISSUE/SPECIAL TOPIC SECTION ON "COMPUTATIONAL NANOBIOSCIENCE" 1 Informative SNP Selection Methods Based on SNP

    E-print Network

    Zelikovsky, Alexander

    NANOBIOSCIENCE" 1 Informative SNP Selection Methods Based on SNP Prediction Jingwu He, Member, IEEE of the SNPs. Tag SNP selection can achieve (i) considerable budget savings by genotyping only a limited number of SNPs and computationally inferring all other SNPs or (ii)necessary reduction of the huge SNP sets

  6. Solomon, J. A., Watson, A. B. & Ahumada, A. (1994). Visibility of DCT basis functions: Effects of contrast masking. Proceedings, Data Compression Conference, Snowbird, Utah: IEEE Computer

    E-print Network

    Watson, Andrew B.

    1994-01-01

    Solomon, J. A., Watson, A. B. & Ahumada, A. (1994). Visibility of DCT basis functions: Effects of contrast masking. Proceedings, Data Compression Conference, Snowbird, Utah: IEEE Computer Society Press, 361-370. Visibility of DCT basis functions: Effects of contrast masking. Joshua A. Solomon Andrew B

  7. Solomon, J. A., Watson, A. B. & Ahumada, A. (1994). Visibility of DCT basis functions: Effects of contrast masking. Proceedings, Data Compression Conference, Snowbird, Utah: IEEE Computer

    E-print Network

    Watson, Andrew B.

    1994-01-01

    1 Solomon, J. A., Watson, A. B. & Ahumada, A. (1994). Visibility of DCT basis functions: Effects of contrast masking. Proceedings, Data Compression Conference, Snowbird, Utah: IEEE Computer Society Press, 361­370. Visibility of DCT basis functions: Effects of contrast masking. Joshua A. Solomon Andrew B

  8. 680 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 20, NO. 5, MAY 2001 Hybrid Dynamic/Quadratic Programming Algorithm for

    E-print Network

    Chu, Chris C.-N.

    680 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 20, NO. 5, MAY 2001 Hybrid Dynamic/Quadratic Programming Algorithm for Interconnect Tree Optimization Yu-Yen Mo less memory than the pure DP approach. Index Terms--Buffer insertion, interconnect, optimization

  9. 278 IEEE TRANSACTIONS ON COMPUTERS, VOL. 38, NO. 2, FEBRUARY 1989 where h is the decision tree height, or the number of radial cuts,

    E-print Network

    278 IEEE TRANSACTIONS ON COMPUTERS, VOL. 38, NO. 2, FEBRUARY 1989 where h is the decision tree of decision trees can also be used for enumeration of all permutations in the case of general fan-outf . We, the process of constructing decision trees becomes quite complex and elaborate for large values off

  10. IEEE TRANSACTIONS ON COMPUTER AIDED DESIGN OF IC AND SYSTEMS, VOL. X, NO. X, MONTH 200X 1 Interconnect-aware Low Power High-level Synthesis

    E-print Network

    Zhong, Lin

    IEEE TRANSACTIONS ON COMPUTER AIDED DESIGN OF IC AND SYSTEMS, VOL. X, NO. X, MONTH 200X 1 into account physical design information and coupling capacitance to estimate interconnect power consumption of the interconnects in the resultant design. Optimizing inter- connects during high-level synthesis is therefore

  11. 2012 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 10, OCTOBER 2006 Optimizing Polynomial Expressions by

    E-print Network

    Kastner, Ryan

    2012 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 10, and designers often resort to hand optimizing these expressions. This paper leverages the algebraic techniques known in the compiler design community [1], [2]; common subexpression elimination (CSE), scalar

  12. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 34, NO. 6, JUNE 2015 873 Guest Editorial

    E-print Network

    Bhunia, Swarup

    opportunities for rogues throughout the IC supply chain to inflict these attacks with aplomb and for a varietyIEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 34, NO. 6, JUNE systems on which modern society is reliant for mission- and safety-critical functions. To see why, let us

  13. New tricks with old sensors: Pervasive Technologies for Novel Applications

    NASA Astrophysics Data System (ADS)

    Merrett, Geoff

    2013-06-01

    Sensors are interleaved into society, instrumenting considerable aspects of our lives without our comprehension. Sensors such as the MEMS accelerometer have transitioned from their original domains to applications that they were never conceived for: from games controllers to contextually rotating the screen on your smartphone. Further advances in technologies such as pervasive computing and networked embedded sensing are enabling new applications and smart devices which utilise sensors in new ways. In this presentation I will highlight new trends, applications and research in these fields, and show how "simple" sensors are being used in larger connected systems - from assistive technologies to distributed monitoring.

  14. IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 21, NO. 1, JANUARY 2012 425 [6] C. Zhang, J. Wang, S. Han, M. Yi, and Z. Zhang, "Automatic real-time

    E-print Network

    Starzyk, Janusz A.

    ­371, Apr. 2008. [11] H. Kato and K. T. Tan, "Pervasive 2D barcodes for camera phone appli- cations," IEEE the road or its boundaries in such environments. However, a salient and consistent feature of most roads

  15. 66 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$25.00 2009 IEEE O c c u pa t i O n a l t h e r a p y

    E-print Network

    Chu, Hao-hua

    , and performance capability· refers to physical and mental abilities needed to perform the occupational behavior and abilities needed to perform daily functional activities.1 Play-based occupational therapy has proven such as eating, brushing teeth, or sleeping can't be observed during this time. If therapists can't directly

  16. 2 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$26.00 2009 IEEE V I R T U A L M A C H I N E S

    E-print Network

    Satyanarayanan, Mahadev "Satya"

    that millions of users world- wide experience through BlackBerries, iPhones, Windows Mobile, and other mobile hardware.1 At any given cost and level of technol- ogy, considerations such as weight, size, battery life small or light or have too long a battery life. Although mobile hardware continues to evolve and improve

  17. 2 PERVASIVE computing Published by the IEEE CS n 1536-1268/11/$26.00 2011 IEEE P e r v a s i v e r e ta i l

    E-print Network

    Chu, Hao-hua

    much time a user spends shop- ping. Experiments using more than 630 hours (or 220,000 steps) of user: · Shopping time is the amount of time spent on shopping trips--specifically, we define in-store shopping time considered nonshop- ping time. A phone-based shopping tracker transforms the problem of monitoring shopping

  18. Published by the IEEE CS n 1536-1268/10/$26.00 2010 IEEE PERVASIVE computing 37 C O N N E C T E D Y O U T H

    E-print Network

    Hayes, Gillian R.

    of America's youth. Mobile device own- ership and social media use have been increas- ing over the past few years: 93 percent of US teens go online, 73 percent use social network- ing sites,1 75 percent own that de- fine the climate of mobile phone and social media use in classrooms. Understanding these policies

  19. 40 PERVASIVE computing Published by the IEEE CS n 1536-1268/13/$31.00 2013 IEEE E d g E o f t h E C l o u d

    E-print Network

    Satyanarayanan, Mahadev "Satya"

    ,2 and the extended Christmas Eve 2012 outage of Netflix's video streaming service due to an Amazon failure.3 such as free-form speech recognition, natural language translation, face and object recognition, dynamic

  20. Published by the IEEE CS n 1536-1268/11/$26.00 2011 IEEE PERVASIVE computing 49 S M A R T E N E R G Y S Y S T E M S

    E-print Network

    must be retrofit--such as HVAC (heat- ing, ventilation, and air conditioning) systems, water heaters ENERGY SYSTEMS FM radio broadcasts, and local broad- casts from residential meters. We can at- tain LSV on the residential meter. We built a prototype and conducted experiments in a residence to illustrate NILSV's promise

  1. 2 PERVASIVE computing Published by the IEEE CS I 1536-1268/11/$26.00 2011 IEEE S M A R T E N E R G Y S Y S T E M S

    E-print Network

    Han, Qi "Chee"

    to a load database-- for example, a 500-watt step might represent a refrigerator turning on. This works whole-house measurements. Hence, the second approach measures each load in the home separately, using-powered devices (such as a stove, hot- water heater, air conditioner, and clothes dryer) each receive dedicated

  2. 80 March/April 2009 Published by the IEEE Computer Society 0272-1716/09/$25.00 2009 IEEE Projects in VR

    E-print Network

    Lindeman, Robert W.

    in VR Editor: Lawrence Rosenblum and Simon Julier Practicing What We Preach: IEEE VR 2009 Virtual Reality 2009. IEEE VR is the premier conference in its field, covering a wide range of technologies, systems, and evaluations of VR techniques. Cir- cumstances led us to hold our PC meeting in Sec- ond Life

  3. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passive Online Detection of 802.11 Traffic Using

    E-print Network

    Wang, Bing

    , Member, IEEE, Bing Wang, Member, IEEE, Yu Gu, Member, IEEE, Jim Kurose, Fellow, IEEE, Don Towsley, Fellow. Wang is with the University of Connecticut, Y. Gu, J. Kurose and D. Towsley are with the University

  4. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 11, NO. 1, FEBRUARY 2007 77 Christiansen Grammar Evolution: Grammatical

    E-print Network

    Alfonseca, Manuel

    Grammar Evolution: Grammatical Evolution With Semantics Alfonso Ortega, Marina de la Cruz, and Manuel Alfonseca, Member, IEEE Abstract--This paper describes Christiansen grammar evo- lution (CGE), a new evolutionary automatic programming algorithm that extends standard grammar evolution (GE) by replacing context

  5. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Improving Security and Performance in the Tor

    E-print Network

    Borisov, Nikita

    in the Tor Network through Tunable Path Selection Robin Snader and Nikita Borisov, Member, IEEE Abstract--The Tor anonymous communication network uses self-reported bandwidth values to select routers for building operator to attract tunnels for compromise. Although Tor limits the self-reported bandwidth, it uses a high

  6. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. , NO. , 2005 1 Geometry-Dependent Lighting

    E-print Network

    Varshney, Amitabh

    -Dependent Lighting Chang Ha Lee, Xuejun Hao, and Amitabh Varshney, Member, IEEE Abstract-- In this paper we introduce geometry- dependent lighting that allows lighting parameters to be defined independently and possibly discrepantly over an object or scene based on the local geometry. We present and discuss Light Collages

  7. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 A Unified Approach to Streamline Selection and

    E-print Network

    Wang, Chaoli

    Selection and Viewpoint Selection for 3D Flow Visualization Jun Tao, Student Member, IEEE, Jun Ma, Student scien- tific and engineering disciplines such as climate model- ing, turbulent combustion streamline pool for effective display. Streamline seeding for 2D and 3D vector fields has been well studied

  8. Pervasive Restart In MOOSE-based Applications

    SciTech Connect

    Derek Gaston; Cody Permann; David Andrs; John Peterson; Andrew Slaughter; Jason Miller

    2014-01-01

    Multiphysics applications are inherently complicated. Solving for multiple, interacting physical phenomena involves the solution of multiple equations, and each equation has its own data dependencies. Feeding the correct data to these equations at exactly the right time requires extensive effort in software design. In an ideal world, multiphysics applications always run to completion and produce correct answers. Unfortunately, in reality, there can be many reasons why a simulation might fail: power outage, system failure, exceeding a runtime allotment on a supercomputer, failure of the solver to converge, etc. A failure after many hours spent computing can be a significant setback for a project. Therefore, the ability to “continue” a solve from the point of failure, rather than starting again from scratch, is an essential component of any high-quality simulation tool. This process of “continuation” is commonly termed “restart” in the computational community. While the concept of restarting an application sounds ideal, the aforementioned complexities and data dependencies present in multiphysics applications make its implementation decidedly non-trivial. A running multiphysics calculation accumulates an enormous amount of “state”: current time, solution history, material properties, status of mechanical contact, etc. This “state” data comes in many different forms, including scalar, tensor, vector, and arbitrary, application-specific data types. To be able to restart an application, you must be able to both store and retrieve this data, effectively recreating the state of the application before the failure. When utilizing the Multiphysics Object Oriented Simulation Environment (MOOSE) framework developed at Idaho National Laboratory, this state data is stored both internally within the framework itself (such as solution vectors and the current time) and within the applications that use the framework. In order to implement restart in MOOSE-based applications, the total state of the system (both within the framework and without) must be stored and retrieved. To this end, the MOOSE team has implemented a “pervasive” restart capability which allows any object within MOOSE (or within a MOOSE-based application) to be declared as “state” data, and handles the storage and retrieval of said data.

  9. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 false Tests of pervasive poverty, unemployment and general distress...Requirements § 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be...

  10. Adaptive User Profiles in Pervasive Advertising Environments

    E-print Network

    Adaptive User Profiles in Pervasive Advertising Environments Florian Alt1 , Moritz Balz2 , Stefanie advertising environments try to provide more effi- cient ads by targeting costumers based on their interests. We implemented an advertising platform to simulate an advertising environment and present adaptive

  11. Pervasive UWB Sensor Networks for Oil exploration

    E-print Network

    Savazzi, Stefano

    identified to allow for energy aware beaconing and self- localization. II. OIL EXPLORATION: A SHORT TUTORIAL exploration one (or more) energy source(s) are placed on the surface of the area of interest to generate shortPervasive UWB Sensor Networks for Oil exploration S. Savazzi1, L. Goratti2, D. Fontanella1,3, M

  12. Pervasive `Calm' for Autonomous Robotic Agents

    E-print Network

    Pervasive `Calm' Perception for Autonomous Robotic Agents Thiemo Wiedemeyer, Ferenc Bálint that these tasks impose onto perception mech- anisms. There is a strong need to scale robot perception capabilities requiring the robotic agent to wait for the results of perception processes. Appears in: Proceedings

  13. Challenges in Data Quality Assurance in Pervasive

    E-print Network

    Kotz, David

    to continuously monitor glucose levels, allowing getting wet. with insulin injection times, meals, and exerciseChallenges in Data Quality Assurance in Pervasive Health Monitoring Systems Janani Sriram Minho - to change unhealthy behavior (such as losing weight or quitting smoking), or athletes wishing to monitor

  14. Empirical Validation of the Involvement Component of the Pervasive GameFlow Model

    E-print Network

    Romero, Pablo

    is whether aspects of involvement in computer desktop games are also valid for the immersion and enjoyment and immersion of players. The second compared two versions of an outdoor game, one with and the other without aspect of the immersion and enjoyment of players of pervasive games and that there is no signifi- cant

  15. Dynamic Pervasive Storytelling in Long Lasting Learning Games

    ERIC Educational Resources Information Center

    Pløhn, Trygve; Louchart, Sandy; Aalberg, Trond

    2015-01-01

    Pervasive gaming is a reality-based gaming genre originating from alternative theatrical forms in which the performance becomes a part of the players' everyday life. In recent years much research has been done on pervasive gaming and its potential applications towards specific domains. Pervasive games have been effective with regards to…

  16. Virtual and Augmented Reality Supported Simulators 48 November/December 2006 Published by the IEEE Computer Society 0272-1716/06/$20.00 2006 IEEE

    E-print Network

    Salisbury, Kenneth

    Virtual and Augmented Reality Supported Simulators 48 November/December 2006 Published by the IEEE an apprenticeship model: Resi- dents observe experienced surgeons in the operating room and eventually are deemed

  17. 92 1541-1672/13/$31.00 2013 IEEE iEEE iNTElliGENT SYSTEmS Published by the IEEE Computer Society

    E-print Network

    Murphy, Robert F.

    - agnose lymph-node diseases. AI has also been use- ful for computer-aided detection of conspicuous signs and produce patient-specific models and alarm thresh- olds. Decision trees and neural networks

  18. COVER FEATURE 39JANUARY 2012Published by the IEEE Computer Society0018-9162/12/$31.00 2012 IEEE

    E-print Network

    Cortes, Corinna

    . The user's stored data won't be corrupted. · Privacy. Private data won't be leaked to any unauthor- ized We propose a new cloud computing paradigm, data protection as a service (www.mydatacontrol.com). DPaaS is a suite of security primitives offered by a cloud platform, which enforces data security and privacy

  19. IEEE TRANSACTION ON COMPUTER AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 19, NO. 7, JULY 2000 819 though the proposed method is sound, it is not a complete method, i.e.,

    E-print Network

    Zhou, Hai

    IEEE TRANSACTION ON COMPUTER AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 19, NO. 7, JULY of large synthesized designs," in Proc. Int. Conf. Computer-Aided Design, 1993, pp. 534­537. [3] J. R for combinational equivalence checking," in Proc. Int. Conf. Computer-Aided Design, 1998, pp. 563­569. [5] , "Tight

  20. IEEE TRANSACTIONS ON MOBILE COMPUTING, TMC-2007-09-0291.R1 1 The Orphan Problem in ZigBee Wireless Networks

    E-print Network

    Tseng, Yu-Chee

    IEEE TRANSACTIONS ON MOBILE COMPUTING, TMC-2007-09-0291.R1 1 The Orphan Problem in ZigBee Wireless--ZigBee is a communication standard which is con- sidered to be suitable for wireless sensor networks. In ZigBee, a device of children of a device and the depth of the network. We observe that the ZigBee address assignment policy

  1. Activity-Driven Computing Infrastructure Pervasive Computing in Healthcare

    E-print Network

    Christensen, Henrik Bærbak

    infrastructure has been designed and developed in close cooperation with a large Danish hospital and is being, and where users move around while preserving their working environment. This paper describes our design evaluated in a hospital setting. 1 Introduction Within research and industry R&D there is a growing interest

  2. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 5, MAY 2008 831 Quadratic Statistical MAX Approximation for

    E-print Network

    Li, Xin

    /RF Integrated Circuits Xin Li, Member, IEEE, Yaping Zhan, Member, IEEE, and Lawrence T. Pileggi, Fellow, IEEE with Advanced Micro Devices, Austin, TX 78741 USA (e-mail: yaping.zhan@ amd.com). Digital Object Identifier 10

  3. PROCEEDINGS OFTHE IEEE, VOL. 55, NO. 11, NOVEMBER 19671801 algebraic systems" (translated by G. J. Tee), Computer Science Dept.,

    E-print Network

    McCalley, James D.

    Triangular Factorization WILLIAM F. TINNEY, SENIOR MEMBER, IEEE, AND JOHN W. WALKER, MEMBER,IEEE I Trans. Power and Apparatus, vol. 82, pp. 944-950, December 1963. I3O1 W. F. Tinney and J. W. Walker, nonlinear systems," SIAM Rev..vol. 7, pp. 376380,July 1965. [421 C. E. Treanor, "A method for the numerical

  4. IEEE TRANSACTIONS ON PLASMA SCIENCE, VOL. 30, NO. 3, JUNE 2002 1265 Advancements in Codes for Computer Aided

    E-print Network

    Valfells, Ágúst

    of Depressed Potentials and Tracking of Multiple Orders of Backscatter Amarjit Singh, Life Fellow, IEEE, Ágúst Valfells, Chuck B. Robey, Josh Goldstein, Murray J. Kolander, and Victor L. Granatstein, Life Fellow, IEEE on various geometrical and elec- trical parameters for megawatt continuous wave power gyrotrons. Index Terms

  5. Fingerprinting IEEE 802.15.4 Devices with Commodity Dartmouth Computer Science Technical Report TR2014-746 Revision 2

    E-print Network

    Keywords IEEE 802.15.4; ZigBee; wireless sensor networks; security 1. INTRODUCTION Wireless sensor networks of which will be IEEE 802.15.4 [4] and ZigBee [40] standards compli- ant. It is estimated that by 2015.15.4 and ZigBee devices. We have built a fingerprinting framework, codenamed Isotope, around commodity hard

  6. IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 49, NO. 10, OCTOBER 2002 1077 Model Intestinal Microflora In Computer

    E-print Network

    Wilkinson, Michael H.F.

    IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 49, NO. 10, OCTOBER 2002 1077 Model Intestinal Michael H.F. Wilkinson, Member, IEEE Abstract-- The ecology of the human intestinal microflora and its the development of a cellular automaton for simu- lation of the intestinal microflora. In this paper the design

  7. Pervasive refusal syndrome - A clinical challenge.

    PubMed

    Kaku, Sowmyashree Mayur; Kommu, John Vijay Sagar; Seshadri, Shekhar; Girimaji, Satish Chandra; Srinath, Shoba

    2015-10-01

    Pervasive refusal syndrome is described as a condition comprising varying degrees of refusal across several domains; social withdrawal; resistance to treatment and is potentially life threatening with no detectable organic cause. Female predominance, refusal to eat with low weight, body image distortion, depressive features, premorbid personality issues similar to eating disorders have been noted, with 67% cases having complete recovery. In this paper, we describe what is probably the first case reported from India, of a child, who presented with neuropsychiatric symptoms, and treated with electroconvulsive therapy along with medications, but, sadly had a fatal outcome. PMID:26275914

  8. C O V E R F E A T U R E 0018-9162/07/$25.00 2007 IEEE62 Computer Published by the IEEE Computer Society

    E-print Network

    Cybenko, George

    -level sensor events and high-level situational awareness. Database technologies, including extensions to data for extracting situational awareness from sensed data is therefore needed. During the past three years, we have," formally known as situational awareness. In the context of computer security, situational awareness

  9. ReseaRch FeaTURe computer46 Published by the IEEE Computer Society 0018-9162/09/$26.00 2009 IEEE

    E-print Network

    Nuseibeh, Bashar

    with reports of security incidents--confidentiality of information lost, integrity of assets dam- aged developers and users. While computer-based systems are indeed attacked, it is users and their assets in a system's security requirements until it is fix

  10. C O V E R F E A T U R E 0018-9162/06/$20.00 2006 IEEE74 Computer Published by the IEEE Computer Society

    E-print Network

    Markov, Igor

    computational problems--for example, factoring composite numbers or comparing an unknown image against a large of parallelism to complete before quantum states decohere. As candidate quantum technologies mature, the fea Tools #12;January 2006 75 Researchers in industry and government labs are exploring various aspects

  11. 36 September/October 2013 Copublished by the IEEE Computer and Reliability Societies 1540-7993/13/$31.00 2013 IEEE IDENTITY MANAGEMENT SYSTEMS

    E-print Network

    Schneider, Fred B.

    'tgivencontrolovertheirattributes'dissemi- nation, leading to privacy violations and identity theft. Over the past 15 years, identity management sys-7993/13/$31.00 © 2013 IEEE IDENTITY MANAGEMENT SYSTEMS Identity management systems store attributes associated choices found in these systems can help technical experts consulting on public policy relating to identity

  12. Evolving Content in the Galactic Arms Race Video Game In: Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG09). Piscataway, NJ:IEEE

    E-print Network

    Stanley, Kenneth O.

    Evolving Content in the Galactic Arms Race Video Game In: Proceedings of the IEEE Symposium Erin J. Hastings, Ratan K. Guha, and Kenneth O. Stanley Abstract-- Video game content includes. In most modern video games, the set of content shipped with the game is static and unchanging, or at best

  13. Towards a flexible middleware for context-aware pervasive and wearable systems.

    PubMed

    Muro, Marco; Amoretti, Michele; Zanichelli, Francesco; Conte, Gianni

    2012-11-01

    Ambient intelligence and wearable computing call for innovative hardware and software technologies, including a highly capable, flexible and efficient middleware, allowing for the reuse of existing pervasive applications when developing new ones. In the considered application domain, middleware should also support self-management, interoperability among different platforms, efficient communications, and context awareness. In the on-going "everything is networked" scenario scalability appears as a very important issue, for which the peer-to-peer (P2P) paradigm emerges as an appealing solution for connecting software components in an overlay network, allowing for efficient and balanced data distribution mechanisms. In this paper, we illustrate how all these concepts can be placed into a theoretical tool, called networked autonomic machine (NAM), implemented into a NAM-based middleware, and evaluated against practical problems of pervasive computing. PMID:22527692

  14. Dealing with pervasive transcription Torben Heick Jensen1

    E-print Network

    Schierup, Mikkel Heide

    1 Dealing with pervasive transcription Torben Heick Jensen1 , Alain Jacquier2 and Domenico Libri3 1. (2013). Dealing with pervasive transcription. Molecular Cell 52:473-484, which has been published-products of functional, or spurious, transcription events. Cells control the accumulation of many opportunistic

  15. Pervasive Random Beacon in the Internet for Covert Coordination

    E-print Network

    Chang, Ee-Chien

    Pervasive Random Beacon in the Internet for Covert Coordination Hui Huang Lee, Ee-Chien Chang,changec,chanmc}@comp.nus.edu.sg Abstract. A random beacon periodically outputs a random number and was introduced by Rabin[12] to secure remote transaction. We con- sider a random beacon that is pervasive in the sense that, it is available

  16. A Conceptual Architecture for Pervasive Advertising in Public Display Networks

    E-print Network

    A Conceptual Architecture for Pervasive Advertising in Public Display Networks Florian Alt, Stefan for pervasive advertising on public displays. It can help researchers and practitioners to inform the design with displays and it is not only large out- door advertisers anymore operating them. However, pub- lic displays

  17. Low Cost Intelligent Pervasive Location Tracking (iPLOT)

    E-print Network

    Low Cost Intelligent Pervasive Location Tracking (iPLOT) in All Environments for the Management. This task requires a multi-disciplinary approach combining communications systems design, digital signal, christened intelligent pervasive location tracking (iPLOT), with a particular reference to user and system

  18. The Rural Growth Revival In Nonmetropolitan America: Evidence of Pervasiveness.

    ERIC Educational Resources Information Center

    Lichter, Daniel T.; And Others

    The 1970's ushered in widespread population deconcentration, seen in the pervasive shift of the United States population down the size-of-place scale. To document population changes in various sized places in the country from 1950 to 1980 and to show the pervasiveness of urban-rural deconcentration in nonmetropolitan areas, researchers examined…

  19. Extending Mobile Devices with Spatially Arranged Gateways to Pervasive Services

    E-print Network

    in which the mobile device is used like a lens [1], Rekimoto's Navicam which used augmented reality techExtending Mobile Devices with Spatially Arranged Gateways to Pervasive Services Dominique Guinard - Portable devices Keywords Spontaneous mobile interactions, nomadic user interfaces, pervasive services

  20. IEEE JOURNAL OF OCEANIC ENGINEERING (TO APPEAR, 2008) 1 Multicarrier Communication over Underwater

    E-print Network

    Zhou, Shengli

    , IEEE, Milica Stojanovic, Member, IEEE, Lee Freitag, Member, IEEE, and Peter Willett, Fellow, IEEE- 02-6-0201 and N00014-07-1-0229. P. Willett is supported by the ONR grant N00014-07-1-0055. Part. Li, S. Zhou, and P. Willett are with Department of Electri- cal and Computer Engineering, University

  1. IEEE TRANSACTIONS ON SIGNAL PROCESSING (ACCEPTED) 1 Clustered Adaptation for Estimation of

    E-print Network

    Zhou, Shengli

    . Preisig, Member, IEEE, Krishna Pattipati, Fellow, IEEE, and Peter Willett, Fellow, IEEE Abstract. Willett was supported by ONR under grant N00014-10-10412. This work was presented in part at the IEEE.-H. Wang, S. Zhou, K. Pattipati and P. Willett are with the Department of Electrical and Computer

  2. ISCC 2015THE TWENTIETH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS JULY 6 -9, 2015, LARNACA, CYPRUS

    E-print Network

    Sekercioglu, Y. Ahmet

    AND QUALITY OF EXPERIENCE ECONOMIC AND REGULATORY ISSUES OPTICAL NETWORKING E-COMMERCE AND E-SERVICES FAULT GRID CLOUD COMPUTING INTERNET OF THE FUTURE BIO-INSPIRED COMPUTING IN COMMUNICA- TIONS COMMUNICATIONS

  3. IEEE Network July/August 20114 loud computing is a recent trend in information

    E-print Network

    Pallis, George

    a respected information source on foundational research and trends in cloud computing. The first article, and delivered. The key driving forces behind the emergence of cloud computing include the overcapacity of today of storage, and progressive improvements in networking technologies. Cloud computing opens new per- spectives

  4. p-Democracy a Pervasive Majority Rule

    NASA Astrophysics Data System (ADS)

    Antoniades, Kyriacos A.

    Today, group decision making in our democratic society uses the non-ranked method. What we need is an improved method that allows decision makers to indicate not only their chosen alternative, but also their order of preference by which all alternatives will be placed. We classify this as a particular Social Choice Function, where choice is a group decision-making methodology in an ideal democratic society that gives the expression of the will of the majority. We use the Eigenvector Function to obtain individual priorities of preferences and Borda's Function to obtain the Ranking or otherwise, the Group Choice. Our conclusions give rise to new directions for pervasive democracy with an innovative degenerative quantum scale to allow even for strong to very strong preferences.

  5. Simulating the pervasive fracture and fragmentation of materials and structures using randomly close-packed Voronoi tessellations.

    SciTech Connect

    Bishop, Joseph E.

    2008-09-01

    Under extreme loading conditions most often the extent of material and structural fracture is pervasive in the sense that a multitude of cracks are nucleating, propagating in arbitrary directions, coalescing, and branching. Pervasive fracture is a highly nonlinear process involving complex material constitutive behavior, material softening, localization, surface generation, and ubiquitous contact. Two primary applications in which pervasive fracture is encountered are (1) weapons effects on structures and (2) geomechanics of highly jointed and faulted reservoirs. A pure Lagrangian computational method based on randomly close-packed Voronoi tessellations is proposed as a rational approach for simulating the pervasive fracture of materials and structures. Each Voronoi cell is formulated as a finite element using the reproducing kernel method. Fracture surfaces are allowed to nucleate only at the intercell faces. The randomly seeded Voronoi cells provide an unbiased network for representing cracks. In this initial study two approaches for allowing the new surfaces to initiate are studied: (1) dynamic mesh connectivity and the instantaneous insertion of a cohesive traction when localization is detected, and (2) a discontinuous Galerkin approach in which the interelement tractions are an integral part of the variational formulation, but only become active once localization is detected. Pervasive fracture problems are extremely sensitive to initial conditions and system parameters. Dynamic problems exhibit a form of transient chaos. The primary numerical challenge for this class of problems is the demonstration of model objectivity and, in particular, the identification and demonstration of a measure of convergence for engineering quantities of interest.

  6. IEEE TRANSACTIONS ON MOBILE COMPUTING 1 Road Network-Aware Spatial Alarms

    E-print Network

    Liu, Ling

    computations required in both computing alarm hibernation time and performing alarm checks at the server. Last to further increase the hibernation time of mobile clients and reduce the frequency of wakeups and alarm-based approaches, in terms of both the number of wakeups and the hibernation time at mobile clients and the number

  7. 308 IEEE TRANSACTIONS ON NETWORKING, VOL. 10, NO. 3, JUNE 2002 Hop Integrity in Computer Networks

    E-print Network

    Huang, Chin-Tser

    to computer . Thus, computer is flooded by pong messages that it had not requested. B. SYN Attack To establish, message replay, network protocol, router, security, smurf attack, SYN attack. I. INTRODUCTION MOST that the network can provide hop integrity, and thus overcome most denial-of-service attacks. These three proto

  8. 17th IEEE Pacific Rim International Symposium on Dependable Computing Pasadena, California, December 2011.

    E-print Network

    Tamir, Yuval

    machines (VMs) on a single physical computer. A single physical computer thus forms a virtual cluster of the workload of multiple physical systems as multiple virtual machines (VMs) on a smaller number of physical for physical clusters can be deployed, unmodified, on such a virtual cluster. The virtual machine monitor (VMM

  9. 0018-9162/00/$10.00 2000 IEEE2 Computer Generic Support

    E-print Network

    Cambridge, University of

    1980s, software designers introduced middleware platforms to support distributed computing systems and computers. Timely response to asynchronous events is crucial to such applications, but current platforms do not adequately meet this need. Another need of existing and emerging applications is the secure interoperability

  10. 2 IEEE TRANSACTIONS ON EDUCATION, VOL. 46, NO. 1, FEBRUARY 2003 Review of Computer Vision Education

    E-print Network

    Bebis, George

    to the broader field of image-related computation and relates to areas such as image processing, robot vision vision is a source of powerful tools for industry and other disciplines, including multimedia, robotics, manufacturing, medicine, and remote sensing. The potential practical benefits of computer vision systems

  11. CURRICULUM VITAE Xiaohua Jia, IEEE Fellow (Computer Society) and Chair Professor

    E-print Network

    Jia, Xiaohua

    SIGCOMM'13, Hong Kong, Aug 2013. · Co-Chair, The 8th International Conference on Wireless Algorithms Science, City University of Hong Kong csjia@cityu.edu.hk Qualifications 1987 ­ 1991. DSc, University Professor Dept of Computer Science, City University of Hong Kong 1991 ­ 1996, Lecturer Dept. of Computer

  12. 294 0740-7475/06/$20.00 2006 IEEE Copublished by the IEEE CS and the IEEE CASS IEEE Design & Test of Computers THE AMOUNT OF DATA required to test ICs is growing

    E-print Network

    Touba, Nur A.

    . Detecting such faults requires either test points or deterministic-pattern-embed- ding logic. Other issues Design & Test of Computers THE AMOUNT OF DATA required to test ICs is growing rapidly in each new and more faults. Moreover, achieving high test qual- ity in ever smaller geometries requires more test

  13. Examining the Criterion-Related Validity of the Pervasive Developmental Disorder Behavior Inventory

    ERIC Educational Resources Information Center

    McMorris, Carly A.; Perry, Adrienne

    2015-01-01

    The Pervasive Developmental Disorder Behavior Inventory is a questionnaire designed to aid in the diagnosis of pervasive developmental disorders or autism spectrum disorders. The Pervasive Developmental Disorder Behavior Inventory assesses adaptive and maladaptive behaviors associated with pervasive developmental disorders and provides an…

  14. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 3 2011-04-01 2010-04-01 true Tests of pervasive poverty... ENTERPRISE COMMUNITIES: ROUND ONE DESIGNATIONS Area Requirements § 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by...

  15. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 3 2011-04-01 2010-04-01 true Tests of pervasive poverty... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty is demonstrated by evidence that:...

  16. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Tests of pervasive poverty... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty is demonstrated by evidence that:...

  17. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Tests of pervasive poverty... ENTERPRISE COMMUNITIES: ROUND ONE DESIGNATIONS Area Requirements § 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by...

  18. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 3 2013-04-01 2013-04-01 false Tests of pervasive poverty... ENTERPRISE COMMUNITIES: ROUND ONE DESIGNATIONS Area Requirements § 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by...

  19. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 3 2014-04-01 2013-04-01 true Tests of pervasive poverty... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty is demonstrated by evidence that:...

  20. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 3 2013-04-01 2013-04-01 false Tests of pervasive poverty... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty is demonstrated by evidence that:...

  1. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 3 2014-04-01 2013-04-01 true Tests of pervasive poverty... ENTERPRISE COMMUNITIES: ROUND ONE DESIGNATIONS Area Requirements § 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by...

  2. 24 CFR 598.110 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 3 2012-04-01 2012-04-01 false Tests of pervasive poverty... TWO AND THREE DESIGNATIONS Eligibility Requirements § 598.110 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty is demonstrated by evidence that:...

  3. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 3 2012-04-01 2012-04-01 false Tests of pervasive poverty... ENTERPRISE COMMUNITIES: ROUND ONE DESIGNATIONS Area Requirements § 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be demonstrated by...

  4. Pervasive domestication of defective prophages by bacteria

    PubMed Central

    Bobay, Louis-Marie; Touchon, Marie; Rocha, Eduardo P. C.

    2014-01-01

    Integrated phages (prophages) are major contributors to the diversity of bacterial gene repertoires. Domestication of their components is thought to have endowed bacteria with molecular systems involved in secretion, defense, warfare, and gene transfer. However, the rates and mechanisms of domestication remain unknown. We used comparative genomics to study the evolution of prophages within the bacterial genome. We identified over 300 vertically inherited prophages within enterobacterial genomes. Some of these elements are very old and might predate the split between Escherichia coli and Salmonella enterica. The size distribution of prophage elements is bimodal, suggestive of rapid prophage inactivation followed by much slower genetic degradation. Accordingly, we observed a pervasive pattern of systematic counterselection of nonsynonymous mutations in prophage genes. Importantly, such patterns of purifying selection are observed not only on accessory regions but also in core phage genes, such as those encoding structural and lysis components. This suggests that bacterial hosts select for phage-associated functions. Several of these conserved prophages have gene repertoires compatible with described functions of adaptive prophage-derived elements such as bacteriocins, killer particles, gene transfer agents, or satellite prophages. We suggest that bacteria frequently domesticate their prophages. Most such domesticated elements end up deleted from the bacterial genome because they are replaced by analogous functions carried by new prophages. This puts the bacterial genome in a state of continuous flux of acquisition and loss of phage-derived adaptive genes. PMID:25092302

  5. PATHOS: Pervasive at Home Sleep Monitoring

    PubMed Central

    Obermiller, Ian; Ahamed, Sheikh I.

    2008-01-01

    Sleeping disorders affect a large percentage of the population, and many of them go undiagnosed each year because the method of diagnosis is to stay overnight at a sleep center. Because pervasive technologies have become so prevalent and affordable, sleep monitoring is no longer confined to a permanent installation, and can therefore be brought directly into the user home. We present a unique solution to the problem of home sleep monitoring that has the possibility to take the place of and expand on the data from a sleep center. PATHOS focuses not only on analyzing patterns during the night, but also on collecting data about the subject lifestyle that is relevant and important to the diagnosis of his/her sleep. PATHOS means “evoking emotion.” Here, we mean Pathos will help us to keep healthy: both mentally and physically. Our solution uses existing technology to keep down cost and is completely wireless in order to provide portability and be easily to customize. The daytime collection also utilizes existing technology and offers a wide range of input methods to suit any type of person. We also include an in-depth look at the hardware we used to implement and the software providing user interaction. Our system is not only a viable alternative to a sleep center, it also provides functions that a static, short-term solution cannot provide, allowing for a more accurate diagnosis and treatment. PMID:18437237

  6. New paradigms in telemedicine: ambient intelligence, wearable, pervasive and personalized.

    PubMed

    Rubel, Paul; Fayn, Jocelyne; Simon-Chautemps, Lucas; Atoui, Hussein; Ohlsson, Mattias; Telisson, David; Adami, Stefano; Arod, Sébastien; Forlini, Marie Claire; Malossi, Cesare; Placide, Joël; Ziliani, Gian Luca; Assanelli, Deodato; Chevalier, Philippe

    2004-01-01

    After decades of development of information systems dedicated to health professionals, there is an increasing demand for personalized and non-hospital based care. An especially critical domain is cardiology: almost two third of cardiac deaths occur out of hospital, and victims do not survive long enough to benefit from in-hospital treatments. We need to reduce the time before treatment. But symptoms are often interpreted wrongly. The only immediate diagnostic tool to assess the possibility of a cardiac event is the electrocardiogram (ECG). Event and transtelephonic ECG recorders are used to improve decision making but require setting up new infrastructures. The European EPI-MEDICS project has developed an intelligent Personal ECG Monitor (PEM) for the early detection of cardiac events. The PEM embeds advanced decision making techniques, generates different alarm levels and forwards alarm messages to the relevant care providers by means of new generation wireless communication. It is cost saving, involving care provider only if necessary and requiring no specific infrastructure. This solution is a typical example of pervasive computing and ambient intelligence that demonstrates how personalized, wearable, ubiquitous devices could improve healthcare. PMID:15718638

  7. Fuzzy reasoning of accident provenance in pervasive healthcare monitoring systems.

    PubMed

    Wang, Yongli; Hu, Xiaohua

    2013-11-01

    In pervasive healthcare monitoring environments, data provenance, as one metadata, can help people analyze the reasons for medical accidents that are generated by complex events. This reasoning processing often encounters inaccurate time and irreversible reasoning problems. How to solve the uncertain process and fuzzy transformation time presents many challenges to the study of data provenance. In this paper, we propose a backward derivation model with the provenance semantic, backward fuzzy time reasoning net (BFTRN), to solve these two problems. We design a backward reasoning algorithm motivated by time automation theory based on this model. With regard to given life-critical alarms and some constraints, it cannot only derive all evolution paths and the possibility distribution of paths from historical information, but also efficiently compute the value of fuzzy time function for each transition of lift-critical complex alarms in the healthcare monitoring system. We also analyze the properties of BFTRN model in this paper. Experiments on real dataset show that the proposed model is efficient. PMID:24240719

  8. Proceedings of the 2007 IEEE Symposium on Foundations of Computational Intelligence (FOCI 2007)

    E-print Network

    ) Random Hypergraph Models of Learning and Memory in Biomolecular Networks: Shorter-Term Adaptability vs it possible to understand the biological networks at the systems level. We aim to develop computational models hypergraph model called the hypernetworks. The hypernetwork architecture consists of a huge number

  9. IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 1 Music-induced emotions can be predicted from

    E-print Network

    Miranda, Eduardo Reck

    , such as joy, excitement, and fear [1]. Subsequently, music therapy may be used as a tool for treatment COMPUTING 2 Music therapy is a health intervention in which the music therapist uses music as a tool to help of depression music therapy has been reported to significantly improve mood when compared to standard care alone

  10. August 2005 IEEE Computational Intelligence Society 5 1917 Karl Steinbuch 2005

    E-print Network

    Hartenstein, Reiner

    Konrad Zuse (who developed a functioning pro- gram-controlled computing machine c.1936), Steinbuch has Medicine, the Konrad Adenauer Science Award, the Jakob Fugger Medal, and the Prime Minister's Merit Medal was director of development at the Stuttgart "Informatik-Werk" of Standard Electric Lorenz AG (SEL

  11. 0018-9162/00/$10.00 2000 IEEE44 Computer Toward Self-Healing

    E-print Network

    Amin, S. Massoud

    , these infrastructures have become more interdependent. The Internet, computer networks, and our digital economy have that an action in one part of one infrastructure network can rapidly create global effects by cascading. These characteristics, in turn, present unique challenges in modeling, prediction, simulation, cause

  12. SUBMISSION TO IEEE/ACM TRANSACTIONS ON NETWORKING 1 Computing the Types of the Relationships between

    E-print Network

    Erlebach, Thomas

    with a protocol called Border Gateway Protocol (BGP) [1]. Several authors (see, e.g., [2], [3]) have pointed out is with the Department of Computer Science at the University of Leicester, U.K. (e-mail: t.erlebach@mcs.le.ac.uk). A not capture all the shades of the possible commercial agreements and technical details that govern the traffic

  13. CIMSA 2005 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications

    E-print Network

    Mohaghegh, Shahab

    Virginia University Abstract ­ This paper introduces a new and novel methodology for fully data-driven best practices identification and analysis based on soft computing techniques. Using this new methodology "best that exist. Predictive analysis, on the other hand, takes the problem to a new level by developing

  14. IEEE TRANSACTIONS ON COMPUTERS 1 Co-Design Tradeoffs for High-Performance,

    E-print Network

    Batory, Don

    -specialized functionality without constituting wasted silicon. If only part of the chip can be powered at any given time are with The Department of Electrical and Computer Engineering, The University of Texas at Austin,Austin, Texas. E, The University of Texas at Austin, Austin, Texas E-mail:rvdg@cs.utexas.edu This research was partially sponsored

  15. IEEE International Conference on Embedded and Real-Time Computing Systems and Applications RTCSA 2015 Program

    E-print Network

    Cheung, Yiu-ming

    Session 2 (AAB203, Research Session 1 - Smartphones and Wearable Devices) 14:30-15:00 C2.1 Elastic Computation Middleware for Interactive Wearable Devices in Cyber-Physical Systems Chi-Sheng Daniel Shih, Yu-Hsin Wang, Chang-Min Yang,and Shao-Hao Chao 15:00-15:30 C2.2 Formal Analysis of Android Application Behavior

  16. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. , NO. , MONTH YEAR 1 An Efficient Approach to Non-dominated

    E-print Network

    Jin, Yaochu

    conflict with each other. For solving such multi-objective optimization problems (MOPs), a set of optimal@ieee.org. optimization methods are inefficient in solving MOPs, since they can typically find only one Pareto developed to tackle MOPs, e.g., PESA-II [1], NSGA-II [2], SPEA2 [3], and M-PAES [4], to name just a few

  17. 1306 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 57, NO. 6, JUNE 2010 Electronic Cleansing for Computed Tomography

    E-print Network

    van Vliet, Lucas J.

    1306 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 57, NO. 6, JUNE 2010 Electronic Cleansing-invariant method to determine material fractions in voxels near such T-junctions. The proposed electronic cleansing the width of the PSF. (b) Electronic cleansing replaces H with L. (c) Transfer function based on thresholds

  18. Boston University Computer Science Tech. Report No. 2003009, April 1, 2003. To appear in Proc. IEEE CVPR, June 2003.

    E-print Network

    Athitsos, Vassilis

    to estimate the 3D pose of a human hand in images and video sequences can be used in a wide range. IEEE CVPR, June 2003. Estimating 3D Hand Pose from a Cluttered Image Vassilis Athitsos and Stan three­dimensional hand configurations that best match an input image. Hand pose estimation is formulated

  19. 3498 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUST 2006 Simulation-Based Computation of Information Rates

    E-print Network

    Kavcic, Aleksandar

    3498 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUST 2006 Simulation International Symposium on Information Theory, Lausanne, Switzerland, June/July 2002; the 40th Annual Allerton Symposium on Information Theory, Yokohama, Japan, June/July 2003. D. M. Arnold was with the Department

  20. IEEE TRANSACTIONS ON ELECTRON DEVICES, VOL. 47, NO. 6, JUNE 2000 1273 A New Approach for Computing the Bandwidth

    E-print Network

    Hayat, Majeed M.

    . INTRODUCTION THE DEMAND for gigabit-rate fiber communication systems and the rising popularity of fiber optical the Bandwidth Statistics of Avalanche Photodiodes Majeed M. Hayat, Senior Member, IEEE, and Guoquan Dong photodiodes (APD's) is introduced which relies on the direct knowledge of the statistics of the random

  1. IEEE TRANSACTIONS ON MOBILE COMPUTING, TMC-0278-1006.R1 1 Efficient Placement and Dispatch of Sensors

    E-print Network

    Tseng, Yu-Chee

    of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng, Senior Member, IEEE Abstract-- Sensor deployment is a critical issue because it affects the cost and detection capability of a wireless sensor network. In this work, we consider two related deployment problems: sensor placement

  2. IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 9, SEPTEMBER 1997 997 Node-covering, Error-correcting Codes

    E-print Network

    Mahapatra, Nihar R.

    R. Mahapatra, Member, IEEE Abstract--Structural fault tolerance (SFT) is the ability interconnection structure. In this paper, we focus on the design of SFT multiprocessors that have low switch tolerance. To achieve this, multiprocessors need to be designed with structural fault tolerance (SFT), which

  3. Scaling Heterogeneous Databases and the Design of Disco Appears in IEEE International Conference on Distributed Computing Systems (ICDCS) 1996

    E-print Network

    Tomasic, Anthony

    Scaling Heterogeneous Databases and the Design of Disco Appears in IEEE International Conference query languages and schemas. The Distributed In- formation Search COmponent (Disco)1 addresses) the distributed mediator architecture of Disco, (b) its query processing semantics, (c) the data model and its

  4. IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 6, JUNE 2004 1327 [9] G. H. Golub and C. F. Van Loan, Matrix Computations, 3rd

    E-print Network

    Siegel, Paul H.

    IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 6, JUNE 2004 1327 [9] G. H. Golub and C. F in Rayleigh flat fading," IEEE Trans. Inform. Theory, vol. 46, pp. 543­564, Mar. 2000. [11] B. M. Hochwald, T-time constellations," IEEE Trans. Inform. Theory, vol. 46, pp. 1962­1973, Sept. 2000. [12] B. L. Hughes, "Differential

  5. Ethical Responsibility Key to Computer Security.

    ERIC Educational Resources Information Center

    Lynn, M. Stuart

    1989-01-01

    The pervasiveness of powerful computers and computer networks has raised the specter of new forms of abuse and of concomitant ethical issues. Blurred boundaries, hackers, the Computer Worm, ethical issues, and implications for academic institutions are discussed. (MLW)

  6. IEEE/ACM TRANSACTIONS ON NETWORKING 1 Tracetree: A Scalable Mechanism to Discover

    E-print Network

    Almeroth, Kevin C.

    Topologies in the Internet Kamil Sarac, Member, IEEE and Kevin C. Almeroth, Senior Member, IEEE Abstract. An inference-based approach uses loss Kamil Sarac is with the Department of Computer Science, University

  7. A Hybrid CARV Architecture for Pervasive Computing Environments

    NASA Astrophysics Data System (ADS)

    Kim, Soongohn; Ko, Eung Nam

    This paper describes a hybrid CARV software architecture that is running on situation-aware middleware for a web based distance education system which has an object with a various information for each session. There are two approaches to software architecture on which distributed, collaborative applications are based. Those include CACV(Centralized-Abstraction and Centralized-View) and RARV(Replicated-Abstraction and Replicated-View). We propose an adaptive concurrency control QOS agent based on a hybrid software architecture which is adopting the advantage of CACV and RARV for situation-aware middleware.

  8. Developing Testing Techniques for Event-driven Pervasive Computing Applications

    E-print Network

    Memon, Atif M.

    ,18] that are now seen in cars, phones, dishwashers, washing machines, etc. A user interacts with complex underlying. device drivers [9], database applications [11], heterogeneous active agents [6], robot software [7

  9. Pervasive computing in play-based occupational therapy for children

    E-print Network

    Chi, Pei-Yu

    Embedding digital technology into playful activity can make play-based occupational therapy more effective. This study proposes two play-based activities to improve children's eating and tooth-brushing behavior.

  10. MARCH/APRIL 2004 Copublished by the IEEE CS and the AIP 1521-9615/04/$20.00 2004 IEEE 57 PERSPECTIVESPERSPECTIVES IN COMPUTATIONAL SCIENCE

    E-print Network

    Kadanoff, Leo P.

    PERSPECTIVESPERSPECTIVES IN COMPUTATIONAL SCIENCE Stand-alone modeling can serve the first purpose; the other two goals- est here is to provide an overview of the art and science of scientific computer simulation. The Best in thermodynamic equilibrium. This paper was cited in Computing in Science & Engineering (January/February 2000

  11. 1949-3045 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

    E-print Network

    Busso, Carlos

    is central to communication; it colors our interpretation of events and social interactions. Emotion COMPUTING, JULY 2014 1 UMEME: University of Michigan Emotional McGurk Effect Dataset Emily Mower Provost, Member, IEEE, Yuan Shangguan, Student Member, IEEE, Carlos Busso, Senior Member, IEEE Abstract--Emotion

  12. 1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

    E-print Network

    Shen, Xuemin "Sherman"

    , IEEE, and Xuemin (Sherman) Shen, Fellow, IEEE Abstract--Using cloud computing, individuals can store-keyword, Fine-grained, Cloud computing. ! 1 INTRODUCTION THE cloud computing treats computing as a utility information. This article has been accepted for publication in a future issue of this journal, but has

  13. "What Are You Viewing?" Exploring the Pervasive Social TV Experience

    NASA Astrophysics Data System (ADS)

    Schatz, Raimund; Baillie, Lynne; Fröhlich, Peter; Egger, Sebastian; Grechenig, Thomas

    The vision of pervasive TV foresees users engaging with interactive video services across a variety of contexts and user interfaces. Following this idea, this chapter extends traditional Social TV toward the notion of pervasive Social TV (PSTV) by including mobile viewing scenarios. We discuss social interaction enablers that integrate TV content consumption and communication in the context of two case studies that evaluate Social TV on mobile smartphones as well as the traditional set-top-box-based setup. We report on the impact of social features such as text-chat, audio-chat, and synchronized channel-choice on the end-user's media experience. By analyzing the commonalities and the differences between mobile and living-room Social TV that we found, we provide guidance on the design of pervasive Social TV systems as well as on future research issues.

  14. IEEE Wireless Communications April 200762 1536-1284/07/$20.00 2007 IEEE pilot Laptop

    E-print Network

    Atkinson, Robert C

    IEEE Wireless Communications · April 200762 1536-1284/07/$20.00 © 2007 IEEE m pilot Laptop Cell phone PAN User Internet 2/3G BS Satellite dish Television ComputerTelephone Home network ACCEPTED FROM of wireless processing devices. These devices will include wireless enabled laptops, PDAs, and smartphones

  15. Edge Detection with Embedded Confidence Peter Meer, Senior Member, IEEE, and Bogdan Georgescu, Student Member, IEEE

    E-print Network

    Edge Detection with Embedded Confidence Peter Meer, Senior Member, IEEE, and Bogdan Georgescu, Student Member, IEEE AbstractÐComputing the weighted average of the pixel values in a window is a basic three-step edge detection procedure: gradient estimation, nonmaxima suppression, hysteresis thresholding

  16. 18 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/05/$20.00 2005 IEEE E N E R G Y H A R V E S T I N G & C O N S E R V A T I O N

    E-print Network

    Starner, Thad E.

    the electronics mostly inactive. Exploiting renew- able energy resources in the device's environment, however renewed inter- est as low-power electronics, wireless standards, and miniaturization conspire to populate scat- tered throughout today's urban land- scape, we might consider background radio signals

  17. 14 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/05/$20.00 2005 IEEE G U E S T E D I T O R S ' I N T R O D U C T I O N

    E-print Network

    Chen, Yuanzhu Peter

    Most users can attest--from their experience with mobile phones, portable media recorders, and portable is to limit the degree to which these optimizations distract users and to limit the amount of user attention in hardware components (for example, in processor speed, memory density, and network bandwidth

  18. Configurable dynamic privacy for pervasive sensor networks

    E-print Network

    Gong, Nan-Wei

    2009-01-01

    Ubiquitous computing sensor networks have greatly augmented the functionality of interactive media systems by adding the ability to capture and store activity-related information. Analyzing the information recorded from ...

  19. IEEE Annals of the History of Computing 1058-6180/01/$10.00 2001 IEEE 1 In one inquiry it was found that a successful

    E-print Network

    Ensmenger, Nathan

    the ranks of the female "human computers" who had participated in wartime manual computation projects. Most, however, were erstwhile engineers and scientists recruited from military and scientific hardware develop scrutiny had not yet been established. Those scientists who left "respectable" disciplines

  20. Designing an Immersive and Entertaining Pervasive Gameplay Experience with Spheros as Game and Interface

    E-print Network

    Sharlin, Ehud

    Designing an Immersive and Entertaining Pervasive Gameplay Experience with Spheros as Game an immersive experience. Author Keywords Sphero; robotic ball; pervasive gaming; controllers; natural mappings; immersion; gaming experience ACM Classification Keywords H.5.0. Information interfaces and presentation (e

  1. CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications

    E-print Network

    Liu, Xiaodong

    of the successful research directions in software engineering, software product line research could contributeCANDEL: Product Line Based Dynamic Context Management for Pervasive Applications Zakwan Jaroucheh the context as a dynamic product line composed of context primitives (CPs). Frame based software product line

  2. Injury Treatment among Children with Autism or Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    McDermott, Suzanne; Zhou, Li; Mann, Joshua

    2008-01-01

    This study examined the differences in the frequency and type of injury for children with autism and pervasive developmental disorder (PDD) compared with typically developing peers, when both groups are insured by Medicaid. The relative rate (RR) of emergency/hospital treatment of injury for children with autism or PDD compared to controls was…

  3. Data Quality and Query Cost in Pervasive Sensing Systems 1

    E-print Network

    Kurose, Jim

    Data Quality and Query Cost in Pervasive Sensing Systems 1 David J. Yates a Erich M. Nahum b James, Massachusetts 02452, USA bIBM T.J. Watson Research Center, 19 Skyline Drive, Hawthorne, New York 10532, USA c in which the sensed d

  4. Early Symptoms and Recognition of Pervasive Developmental Disorders in Germany

    ERIC Educational Resources Information Center

    Noterdaeme, Michele; Hutzelmeyer-Nickels, Anna

    2010-01-01

    Pervasive developmental disorders are characterised by the presence of abnormalities in social interaction and communication as well as repetitive patterns of behaviours. Although early symptoms of the disorder often appear during the first two years of life, its diagnosis is often delayed. The purpose of this study is to analyse the delay between…

  5. Vascular Pattern Analysis towards Pervasive Palm Vein Authentication

    E-print Network

    Vascular Pattern Analysis towards Pervasive Palm Vein Authentication Debnath Bhattacharyya Palm Vein Authentication of an individual. Near­Infrared Image of Palm Vein pattern is taken and passed of veins in the palm of a person being authenticated with a pattern stored in a database. Keywords

  6. Vascular Pattern Analysis towards Pervasive Palm Vein Authentication

    E-print Network

    Vascular Pattern Analysis towards Pervasive Palm Vein Authentication Debnath Bhattacharyya Palm Vein Authentication of an individual. Near-Infrared Image of Palm Vein pattern is taken and passed of veins in the palm of a person being authenticated with a pattern stored in a database. Keywords

  7. Prevalence of Pervasive Developmental Disorders in Two Canadian Provinces

    ERIC Educational Resources Information Center

    Ouellette-Kuntz, Helene; Coo, Helen; Yu, C. T.; Chudley, Albert E.; Noonan, Andrea; Breitenbach, Marlene; Ramji, Nasreen; Prosick, Talia; Bedard, Angela; Holden, Jeanette J. A.

    2006-01-01

    Although it is generally accepted that the proportion of children diagnosed with pervasive developmental disorders (PDDs) has increased in the past two decades, there is no consensus on the prevalence of these conditions. The accompanying large rise in demand for services, together with uncertainty regarding the extent to which the observed…

  8. Learning Relevance from Natural Eye Movements in Pervasive Interfaces

    E-print Network

    Kaski, Samuel

    Learning Relevance from Natural Eye Movements in Pervasive Interfaces Melih Kandemir1 Samuel Kaski1 of the following idea: Could a system learn to use the user's natural eye movements to infer relevance of real in mobile proactive setups. We measured the eye movements of the users while they were ex- ploring

  9. The Anatomy of Pervasive Self Care Services George Roussos

    E-print Network

    Roussos, George

    The Anatomy of Pervasive Self Care Services George Roussos Birkbeck College University of London g.roussos@birkbeck.ac.uk Abstract Self Care is a recent initiative by the Department of Health in the UK that aims to treat patients, it places the point-of-care in the community and often at the patients' own home. In this paper we discuss

  10. Distributed video game streaming system for pervasive gaming

    E-print Network

    Eisert, Peter

    graphics rendering, the game output is locally rendered at the server and streamed as H.264/AVC videoDistributed video game streaming system for pervasive gaming A. Jurgelionis1 , F. Bellotti2 , A. De video game streaming system. Newly developed streaming protocols and system architectures enable

  11. Chapter XX: Pervasive Sensing and Monitoring for Situational Awareness

    E-print Network

    and processes which can then be used to gain situational awareness of the activities in the instrumented spaceChapter XX: Pervasive Sensing and Monitoring for Situational Awareness. Situational awareness, in a broad sense, refers to a continuum of knowledge that captures the current state

  12. Controlling access to pervasive information in the "Solar" system

    E-print Network

    Kotz, David

    Controlling access to pervasive information in the "Solar" system Kazuhiro Minami and David Kotz. We describe our approach in terms of a specific context-dissemination frame- work, the Solar system into the event streams desired by the applications. Our Solar system, described in a companion paper [4], is one

  13. Pervasive Learning Games: Explorations of Hybrid Educational Gamescapes

    ERIC Educational Resources Information Center

    Thomas, Siobhan

    2006-01-01

    Pervasive gaming has tremendous potential as a learning tool and represents an interesting development in the field of video games and education. The literature surrounding video games and education is vast: For more than 20 years, educationalists have been discussing the potential that exists for the application of video games to learning.…

  14. SECURE AGENT-BASED MANAGEMENT FOR PERVASIVE ENVIRONMENTS G. Navarro, J.A. Ortega-Ruiz, J. Garcia and S. Robles

    E-print Network

    Garcia-Alfaro, Joaquin

    computing scenario may consists of a wide range of devices interconnected through ad-hoc net- works. One the integration with other technolo- gies. Results of our work can be easily applied to existing pervasive, laptops, PDAs, and mo- bile phones, to refrigerators, heaters, coffee machines, or toasters. Furthermore

  15. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 1 2011-01-01 2011-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be reasonably distributed throughout the entire nominated...

  16. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 1 2014-01-01 2014-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be reasonably distributed throughout the entire nominated...

  17. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 1 2012-01-01 2012-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be reasonably distributed throughout the entire nominated...

  18. 7 CFR 25.102 - Pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 1 2013-01-01 2013-01-01 false Pervasive poverty, unemployment and general distress... ENTERPRISE COMMUNITIES Area Requirements § 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be reasonably distributed throughout the entire nominated...

  19. A comparison of three rounding algorithms for IEEE oating-point multiplication.

    E-print Network

    Seidel, Peter-Michael

    1 A comparison of three rounding algorithms for IEEE oating-point multiplication. Guy Even and Peter-M. Seidel Abstract| A new IEEE compliant oating-point round- ing algorithm for computing., and 16 logic levels in the algorithm of Yu and Zyner. Keywords| oating-point arithmetic, IEEE 754

  20. Chun Jiao, Dongming Wang, Hongbing Lu*, Member, IEEE, Zhu Zhang, Jerome Z. Liang, Fellow, IEEE AbstractLow-dose protocol for computed tomography (CT)

    E-print Network

    Abstract­Low-dose protocol for computed tomography (CT) scans has been gradually used in clinics to lower degraded image quality) impairs diagnostic accuracy. This work explores a multiscale approach to reduce non-stationary Gaussian noise in low-dose CT sinograms by wavelet analysis. To explore the noise property in wavelet

  1. 66 PERVASIVEcomputing Published by the IEEE CS n 1536-1268/08/$25.002008IEEE Editor:ShaniMurraynsmurray@computer.org

    E-print Network

    :ShaniMurraynsmurray@computer.org User Innovation and Hacking Eric von Hippel and Joseph A. Paradiso In the introduction to this special issue on hacking, the guest editors describe the true hacker as "an individual who can achieve miracles--often via hacking--to serve their own needs. Who are users? Users, as we define the term, are firms

  2. Online Gaming 18 COPublished by the ieee COmPuter and reliability sOCieties 1540-7993/09/$25.00 2009 ieee may/June 2009

    E-print Network

    Kruegel, Christopher

    into developing their next big title. The market leader alone--Blizzard Enter- tainment's World of Warcraft (Wo to Blizzard, and any violations result in temporary or permanent account bans. However, the Warden has several bot writers, and it runs on the client's computer, which is completely out of Blizzard's control

  3. Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components

    PubMed Central

    Fragopoulos, Anastasios; Gialelis, John; Serpanos, Dimitrios

    2009-01-01

    Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers. PMID:19132095

  4. 1788 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 10, OCTOBER 2008 General Methodology for Soft-Error-Aware

    E-print Network

    Potkonjak, Miodrag

    , OCTOBER 2008 General Methodology for Soft-Error-Aware Power Optimization Using Gate Sizing Foad Dabiri rate constraints. Index Terms--Gate sizing, logic synthesis, optimization, power, soft error (SE). I, Member, IEEE, and Majid Sarrafzadeh, Fellow, IEEE Abstract--Power consumption has emerged as the premier

  5. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 19, NO. 9, SEPTEMBER 2000 999 Crosstalk-Driven Interconnect Optimization by

    E-print Network

    Chang, Yao-Wen

    -Ru Jiang, Yao-Wen Chang, Member, IEEE, and Jing-Yang Jou, Member, IEEE Abstract--Noise, as well as area, delay, and power, is one of the most important concerns in the design of deep submicrometer in- tegrated of within 1% error on a SUN Sparc Ultra-I workstation. Index Terms--Deep submicrometer, gate sizing

  6. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...the Environmental Assessment of Personal Computer Products. 52.223-16 Section...the Environmental Assessment of Personal Computer Products. As prescribed in 23.705...the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

  7. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...the Environmental Assessment of Personal Computer Products. 52.223-16 Section...the Environmental Assessment of Personal Computer Products. As prescribed in 23.705...the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

  8. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...the Environmental Assessment of Personal Computer Products. 52.223-16 Section...the Environmental Assessment of Personal Computer Products. As prescribed in 23.706...the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

  9. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...the Environmental Assessment of Personal Computer Products. 52.223-16 Section...the Environmental Assessment of Personal Computer Products. As prescribed in 23.705...the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

  10. A Theory of Network Localization James Aspnes, Tolga Eren, Member, IEEE, David K. Goldenberg, Student Member, IEEE,

    E-print Network

    or in the presence of obstructions such as dense vegetation, buildings, or mountains blocking the direct view computing, algorithm/protocol design and analysis, architectures, theory of computation, analysis is a fundamental building block of many emerging computing/networking paradigms. For example, in pervasive

  11. Foundations and Trends R HumanComputer Interaction

    E-print Network

    Hayes, Gillian R.

    .1 The Opportunity of Pervasive Healthcare 4 1.2 The Healthcare Model and Contemporary Computer Technology in Healthcare 7 1.3 Conclusion 14 2 Pervasive Computing for Hospital Care 16 2.1 Context-Aware Services.2 Social Connectedness and Communication Support 43 3.3 Assisted Navigation and Wayfinding Support 45 #12

  12. IEEE Communications Magazine Call for Papers

    E-print Network

    Fu, Xiaoming

    ://mc.manuscriptcentral.com/commagieee) by the deadline. Submit articles to the "March 2015/Mobile Cloud Computing" category. Important DatesIEEE Communications Magazine Call for Papers Feature Topic on Mobile Cloud Computing Mobile Cloud Computing refers to an infrastructure where both the data storage and the data processing occur

  13. Supporting People with Dementia Using Pervasive Healthcare Technologies

    NASA Astrophysics Data System (ADS)

    Mulvenna, Maurice D.; Nugent, Chris D.; Moelaert, Ferial; Craig, David; Dröes, Rose-Marie; Bengtsson, Johan E.

    In this chapter, an introduction is provided into pervasive healthcare technology, specifically as the use of information and communications technology in support of European policies, primarily inclusion. The focus of the chapter, and indeed the book, is on how such technologies can support people suffering from debilitating diseases including Alzheimer's. The work describes a research project called COGKNOW, comprising a multidisciplinary research consortium of scientists from across Europe, and relates some of the early achievements of the group from some very different perspectives, including technical, clinical, ethical, and of course how the needs of people with dementia and their carers can be harnessed in the development process to produce pervasive healthcare technology and services that are valued by all the stakeholders in the process.

  14. The pervasive role of biological cohesion in bedform development

    PubMed Central

    Malarkey, Jonathan; Baas, Jaco H.; Hope, Julie A.; Aspden, Rebecca J.; Parsons, Daniel R.; Peakall, Jeff; Paterson, David M.; Schindler, Robert J.; Ye, Leiping; Lichtman, Ian D.; Bass, Sarah J.; Davies, Alan G.; Manning, Andrew J.; Thorne, Peter D.

    2015-01-01

    Sediment fluxes in aquatic environments are crucially dependent on bedform dynamics. However, sediment-flux predictions rely almost completely on clean-sand studies, despite most environments being composed of mixtures of non-cohesive sands, physically cohesive muds and biologically cohesive extracellular polymeric substances (EPS) generated by microorganisms. EPS associated with surficial biofilms are known to stabilize sediment and increase erosion thresholds. Here we present experimental data showing that the pervasive distribution of low levels of EPS throughout the sediment, rather than the high surficial levels of EPS in biofilms, is the key control on bedform dynamics. The development time for bedforms increases by up to two orders of magnitude for extremely small quantities of pervasively distributed EPS. This effect is far stronger than for physical cohesion, because EPS inhibit sand grains from moving independently. The results highlight that present bedform predictors are overly simplistic, and the associated sediment transport processes require re-assessment for the influence of EPS. PMID:25656496

  15. The pervasive role of biological cohesion in bedform development

    NASA Astrophysics Data System (ADS)

    Malarkey, Jonathan; Baas, Jaco H.; Hope, Julie A.; Aspden, Rebecca J.; Parsons, Daniel R.; Peakall, Jeff; Paterson, David M.; Schindler, Robert J.; Ye, Leiping; Lichtman, Ian D.; Bass, Sarah J.; Davies, Alan G.; Manning, Andrew J.; Thorne, Peter D.

    2015-02-01

    Sediment fluxes in aquatic environments are crucially dependent on bedform dynamics. However, sediment-flux predictions rely almost completely on clean-sand studies, despite most environments being composed of mixtures of non-cohesive sands, physically cohesive muds and biologically cohesive extracellular polymeric substances (EPS) generated by microorganisms. EPS associated with surficial biofilms are known to stabilize sediment and increase erosion thresholds. Here we present experimental data showing that the pervasive distribution of low levels of EPS throughout the sediment, rather than the high surficial levels of EPS in biofilms, is the key control on bedform dynamics. The development time for bedforms increases by up to two orders of magnitude for extremely small quantities of pervasively distributed EPS. This effect is far stronger than for physical cohesion, because EPS inhibit sand grains from moving independently. The results highlight that present bedform predictors are overly simplistic, and the associated sediment transport processes require re-assessment for the influence of EPS.

  16. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. 5, NO. 1, MARCH 1999 1 Acquiring a Radiance Distribution to Superimpose

    E-print Network

    Tokyo, University of

    --computer graphics, computer vision, augmented reality, illu- mination distribution measurement, omni illumination models to be used for augmented reality systems. Pioneering work in this field was proposed in the fields of both computer graph- ics and computer vision research. The synthesized world called augmented

  17. Pervasive refusal syndrome among asylum-seeking children.

    PubMed

    Von Folsach, Liv Lyngå; Montgomery, Edith

    2006-07-01

    A number of asylum-seeking children in Sweden have developed a pervasive loss of function associated with profound social withdrawal. The syndrome is called Depressive Devitalization. The aim of this study was to identify possible aetiological factors, outline the similarities between Depressive Devitalization and Pervasive Refusal Syndrome and to explore possible differential diagnoses. The research was based on a literature study. Databases searched included PsychINFO, Medline, Pub med, COCHRANE and PILOTS. Possible aetiological factors identified included: Children having a perfectionist, ambitious and conscientious premorbid personality, psychiatric problems of children and parents, and traumatic events. Symptoms between the two syndromes differed only in pattern of refusal and neurological symptoms. None of the differential diagnoses explored could account for all features. The individual impact of aetiological factors requires further investigation. Children might previously have been diagnosed with a number of differential diagnoses, though none of these accounts for all symptoms seen in the syndromes. Depressive Devitalization and Pervasive Refusal Syndrome are suggested to be subgroups of the same refusal syndrome. PMID:17080781

  18. Pervasive and Non-Pervasive Conduct Problems in a Clinic Sample Aged 4-8 Years: Child, Family and Day-Care/School Factors

    ERIC Educational Resources Information Center

    Drugli, May Britt; Larsson, Bo; Clifford, Graham; Fossum, Sturla

    2007-01-01

    Differences between pervasive (home and day-care/school) versus non-pervasive (home only) conduct problems were examined in regard to various child, parent/family, and day-care/school characteristics in an outpatient clinic sample of 120 children aged 4-8 years. All children scored above the 90th percentile on the Eyberg Child Behavior Inventory…

  19. To appear in Empirical Evaluation Techniques in Computer Vision, K.W. Bowyer and P.J. Phillips, eds, IEEE Computer Society Press, Los Alamitos, CA, 1998.

    E-print Network

    Bowyer, Kevin W.

    To appear in Empirical Evaluation Techniques in Computer Vision, K.W. Bowyer and P.J. Phillips, eds of Computer Vision Algorithms Kevin W. Bowyer1 and P. Jonathon Phillips2 1 Department of Computer Science of Standards and Technology Gaithersburg, MD 20899, USA jonathon@nist.gov 1: Introduction Computer vision

  20. 964 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 2, FEBRUARY 2014 Rewriting Codes for Flash Memories

    E-print Network

    Yaakobi, Eitan

    964 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 2, FEBRUARY 2014 Rewriting Codes at the 2008 IEEE Inter- national Symposium on Information Theory [19], the 2008 Annual Allerton Conference on Communication, Control and Computing [20], and the 2009 IEEE International Symposium on Information Theory [15

  1. IEEE SIGNAL PROCESSING LETTERS, VOL. 20, NO. 9, SEPTEMBER 2013 861 One-Bit Decentralized Detection With a

    E-print Network

    . Romano, Member, IEEE, P. Salvo Rossi, Senior Member, IEEE, and P. Willett, Fellow, IEEE Abstract.it; gianmarco.romano@unina2.it; pierluigi.salvorossi@unina2.it). P. Willett is with the Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT 06269 USA (e-mail: willett

  2. 162 IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 2, NO. 3, SEPTEMBER 2010 Game Bot Detection via Avatar Trajectory Analysis

    E-print Network

    Chen, Sheng-Wei

    Game Bot Detection via Avatar Trajectory Analysis Hsing-Kuo Pao, Kuan-Ta Chen, Member, IEEE, and Hong is generalizable to any game in which avatars' movements are controlled by the players directly. Through real

  3. This paper, copyright the IEEE, appears in IEEE Symposium on Security and Privacy 2004. IEEE Computer Society Press, May 2004. This paper previously appeared as Johns Hopkins University Information Security

    E-print Network

    Perrig, Adrian

    U.S. federal funds now available to replace outdated punch-card and mechanical voting systems, USA. E- mail: rubin@cs.jhu.edu. URL: http://www.avirubin.com. §Dept. of Computer Science, Rice University, 3121 Duncan Hall, 6100 Main Street, Houston, Texas 77005, USA. E-mail: dwallach@cs.rice.edu. URL

  4. Proceedings of the The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems (MASCOTS'04)

    E-print Network

    Gribaudo, Marco

    , Analysis, and Simulation of Computer and Telecommunications Systems (MASCOTS'04) 1526-7539/04 $20.00 © 2004, Analysis, and Simulation of Computer and Telecommunications Systems (MASCOTS'04) 1526-7539/04 $20.00 © 2004, Analysis, and Simulation of Computer and Telecommunications Systems (MASCOTS'04) 1526-7539/04 $20.00 © 2004

  5. Optical Computing

    NASA Astrophysics Data System (ADS)

    Neff, John A.

    1985-02-01

    High data rate optical computing is a major emerging technology, driven by an ever-increasing need for the processing of information. The current volume of technical literature on this subject attests to its new prominence as a computing technology complementary to digital electronic computers. The papers in this special issue of Optical Engineering, together with those published in a recent IEEE Proceedings (July 1984), represent a comprehensive cross section of current research interests in optical computing.

  6. ALiCE: A Java-based Grid Computing System

    E-print Network

    Teo, Yong Meng

    A computational grid is a hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities. This talk is divided into three parts. Firstly, ...

  7. Technology-based intervention to help persons with minimally conscious state and pervasive motor disabilities perform environmentally relevant adaptive behavior.

    PubMed

    Lancioni, Giulio E; Singh, Nirbhay N; O'Reilly, Mark F; Sigafoos, Jeff; Olivetti Belardinelli, Marta

    2012-08-01

    Persons with a diagnosis of minimally conscious state and pervasive motor disabilities tend to be passive and isolated. A way to help them improve their adaptive behavior (relate to their environment) involves the use of intervention packages combining assistive technology with motivational strategies. The types of assistive technology included in those packages may consist of (a) microswitches allowing direct access to environmental stimuli, (b) combinations of microswitches and voice output communication devices (VOCAs) allowing stimulus access and calls for caregivers' attention, respectively, and (c) computer presentations of stimulus options and microswitches allowing choice among those options and access to them. PMID:22806668

  8. 3188 IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, VOL. 57, NO. 12, DECEMBER 2009 An Analytical Approach to Computer-

    E-print Network

    Wu, Ke-Li

    An Analytical Approach to Computer- Aided Diagnosis and Tuning of Lossy Microwave Coupled Resonator Filters Meng. The approach is very useful for computer aided tuning of a microwave bandpass filter. The concept of phase) of a microwave-coupled res- onator filter has drawn a great deal of attention in recent years. One major scheme

  9. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 11, NO. 2, APRIL 2007 265 Intrinsic Motivation Systems for Autonomous

    E-print Network

    Meeden, Lisa A.

    EU R&D Contract IST-2003-1940. P.-Y. Oudeyer is with the Sony Computer Science Laboratory, Paris 6, rue Amyot 75005, Paris, France (e-mail: oudeyer@csl.sony.fr). F. Kaplan is with CRAFT. Hafner is with the Sony Computer Science Laboratory Paris, Amyot 75005, Paris, France (e-mail: hafner@csl.sony

  10. Published by the IEEE CS n 1536-1268/11/$26.00 2011 IEEE PERVASIVE computing 11 G U E S T E D I T O R S ' I N T R O D U C T I O N

    E-print Network

    Cafarella, Michael J.

    control. More crucially, energy con servation concerns will pull our hands off the dial as envi ronments regulate themselves to balance occupant comfort against energy use. Networks of smart loads will vary safely scale up nuclear fission plants and eventually learn how to harness nuclear fusion practically

  11. Published by the IEEE CS n 1536-1268/10/$26.00 2010 IEEE PERVASIVE computing 71 W E A R A B L E C O M P U T I N G A N D H E A L T H C A R E

    E-print Network

    Sarpeshkar, Rahul

    , these systems should be unobtrusive, robust, and inexpensive. We've designed a wearable tag that can monitor signals, for heart monitoring--that is, PCG instead of EKG. PCG has three advantages over EKG. First) and the other down. The downward-facing mi- crophone monitors heart sounds; the upward- facing one is usually

  12. 2 PERVASIVE computing Published by the IEEE CS n 1536-1268/13/$31.00 2013 IEEE U n d e r s ta n d i n g a n d C h a n g i n g B e h av i o r

    E-print Network

    Mascolo, Cecilia

    i n g a n d C h a n g i n g B e h av i o r smartphones for Large-scale Behavior Change interventions A s smartphones proliferate throughout society, so too does the opportunity to leverage these devices to study's daily lives has two primary cata- lysts. First, device manufacturers are quickly developing smartphones

  13. 2 PERVASIVE computing Published by the IEEE CS n 1536-1268/11/$26.00 2011 IEEE L a r g e -S c a L e O p p O r t u n i S t i c S e n S i n g

    E-print Network

    Greenberg, Albert

    a L e O p p O r t u n i S t i c S e n S i n g a tale of One city: using cellular network Data. Traditional studies of city dynamics are time-consuming and expensive, entailing tech- niques such as surveys about new trends only when a detailed census is released. In contrast, cellular networks must know

  14. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 23, NO. 6, JUNE 2004 987 Computational Forensic Techniques for Intellectual

    E-print Network

    Wong, Jennifer L.

    2004 987 Computational Forensic Techniques for Intellectual Property Protection Jennifer L. Wong, Darko Kirovski, and Miodrag Potkonjak Abstract--Computational forensic engineering (CFE) aims to identify on watermarking content or designs, the generic CFE methodology analyzes the statistics of certain features

  15. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 939 Computation Cost Comparison of Finding Both IP3 and Its

    E-print Network

    Cong, Jason "Jingsheng"

    Computation Cost Comparison of Finding Both IP3 and Its Adjoint Sensitivity for the Example Circuits Type for obtaining IP3 as described in [7], the result is a very efficient technique for finding both IP3 and its of Type of Harmonic Proposed Speed-Up Circuit Computation Balance Method Time (s) Time (s) Common IP3 8

  16. Proceedings of the 2003 IEEE Workshop on Information Assurance

    E-print Network

    Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West. We describe workshops intended to help educators new to the area of Information Assurance Assurance educators. Index terms ­ Information Assurance, Education I. INTRODUCTION Computer and network

  17. IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 46, NO. 2, FEBRUARY 1999 213 A Computational Model for Tracking Subsurface

    E-print Network

    Frey, Pascal

    preoperative com- puted tomography (CT) and magnetic resonance (MR) images with instrument locations of computed tomography (CT) and magnetic resonance (MR) scanning, along with the advent of low-cost high

  18. Evaluation of IEEE 754 Floating-Point Arithmetic Compliance Across a Wide Range of Heterogeneous

    E-print Network

    Taufer, Michela

    @miners.utep.edu Michela Taufer University of Delaware Computer & Inf. Sciences Dept. taufer the employment of multiple computers in scientific research, this problem is an important one. Accordingly and their handling, including non-numbers (NaNs), are also specified by IEEE 754. Despite the fact that IEEE 754

  19. G U E S T E D I T O R ' S I N T R O D U C T I O N 0018-9162/06/$20.00 2006 IEEE30 Computer Published by the IEEE Computer Society

    E-print Network

    Zyda, Michael

    driving problems for this field. With basic research budget lines diminishing for defense and space to revitalize and increase interest in computer science. Defense and NASA used to provide some of the larger Arts, and most of DARPA's funding is for applied, defense-focused applications, not for research

  20. 0018-9162/07/$25.00 2007 IEEE30 Computer Published by the IEEE Computer Society F R O M T H E A R E A E D I T O R

    E-print Network

    Ramakrishnan, Naren

    a com- munity's past search experience: "people with queries similar to yours visited these pages articles, and blogs now devoted to showcasing the search business and search wars. Since our last coverage of search in Computer's October 2005 issue, many more incarnations of search have materialized. This special

  1. ANeural Network Based Vehicle Classification System for Pervasive Smart Road Security

    E-print Network

    ANeural Network Based Vehicle Classification System for Pervasive Smart Road Security Naixue Xiong the I215 freeway in Salt Lake City, USA. This information will be used to predict future roadway needs services. Traffic management and smart information systems, for pervasive smart road security, depend

  2. A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security

    E-print Network

    A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security Naixue Xiong the I215 freeway in Salt Lake City, USA. This information will be used to predict future roadway needs services. Traffic management and smart information systems, for pervasive smart road security, depend

  3. Configurable Dynamic Privacy for Pervasive Sensor Networks Nan-Wei Gong

    E-print Network

    Privacy for Pervasive Sensor Networks by Nan-Wei Gong Submitted to the Program in Media Arts and Sciences media content and social communication. With these increased capabilities, serious concerns which create, there currently exists no real data about privacy in pervasive media networks and most studies that have been made

  4. Using Instructional Pervasive Game for School Children's Cultural Learning

    ERIC Educational Resources Information Center

    Chen, Cheng-Ping; Shih, Ju-Ling; Ma, Yi-Chun

    2014-01-01

    In the past ten years, mobile learning (m-learning) has created a new learning environment that enables learners, through active learning aids. Instructional pervasive gaming (IPG) seems to be an innovative way introduced to enhance m-learning. This study employed a theoretical IPG model to construct a cultural-based pervasive game. Individual and…

  5. DTT: A Distributed Trust Toolkit for Pervasive Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska, and Matthew Wright

    E-print Network

    Pennycook, Steve

    their execution on a variety of platforms and networks. In addition to the adaptability and extensibility provided into pervasive systems through interoperability and incremental deployment. Pervasive applications using the DTT

  6. The molecular basis of cognitive deficits in pervasive developmental disorders

    PubMed Central

    Bhattacharya, Aditi; Klann, Eric

    2012-01-01

    Persons with pervasive developmental disorders (PDD) exhibit a range of cognitive deficits that hamper their quality of life, including difficulties involving communication, sociability, and perspective-taking. In recent years, a variety of studies in mice that model genetic syndromes with a high risk of PDD have provided insights into the underlying molecular mechanisms associated with these disorders. What is less appreciated is how the molecular anomalies affect neuronal and circuit function to give rise to the cognitive deficits associated with PDD. In this review, we describe genetic mutations that cause PDD and discuss how they alter fundamental social and cognitive processes. We then describe efforts to correct cognitive impairments associated with these disorders and identify areas of further inquiry in the search for molecular targets for therapeutics for PDD. PMID:22904374

  7. Psychological interventions in pervasive developmental disorder: An overview

    PubMed Central

    Poddar, Shuvabrata; Hameed, Noufal T.; Pandey, Jyoti Mishra; Mitra, Sayantanava; Mukherjee, Urbi

    2014-01-01

    Pervasive developmental disorders (PDDs) are characterized by several impairments in the domains of social communication, social interaction and expression of social attachment, and other aspects of development like symbolic play. As the role of drugs in treating these impairments is extremely limited, a variety of psychological interventions have been developed to deal with them. Some of these have strong empirical support, while others are relatively new and hence controversial. Though it may prove to be a daunting task to begin with, the final reward of being able to improve the life of a child with PDD is enormous and hugely satisfying. Therefore, knowledge of these psychological interventions is important for a mental health professional, in order to be effective in the profession. Present paper presents an overview of these techniques in the management of PDD. PMID:25788797

  8. 866 IEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 51, NO. 3, JUNE 2004 Conceptual Design of a Proton Computed

    E-print Network

    performed using X-ray computed tomography (xCT). However, the accuracy of xCT for proton treatment planning Identifier 10.1109/TNS.2004.829392 TABLE I DESIGN SPECIFICATIONS FOR A pCT SCANNER FOR THERAPEUTIC. The design specifications of a pCT scanner for applications in proton therapy are presented in Table I

  9. Appeared in: IEEE Distributed Systems Online, Vol. 1, No. 3, Oct. 2000 http://computer.org/dsonline/

    E-print Network

    Buyya, Rajkumar

    ://computer.org/dsonline/ 1 Teaching Parallel Programming on Clusters Parallel Programming--Techniques and Applications Using Wilkinson and Michael Allen, which he used to teach programming clusters using message-passing concepts discusses basic parallel-programming techniques as a natural extension to sequential programming

  10. To appear in Proc. IEEE Int. Conf. Computer Vision and Pattern Recognition, 2005 1 Higher-Order Image Statistics for

    E-print Network

    and Ross T. Whitaker UUCS-05-005 School of Computing University of Utah Salt Lake City, UT 84112, USA assumptions about the properties of the signal and/or degradation. Therefore, these methods typically lack- matically discovers the statistical properties of the signal and can thereby restore a wide spectrum

  11. To appear in Proc. IEEE Int. Conf. Computer Vision and Pattern Recognition, 2005 1 HigherOrder Image Statistics for

    E-print Network

    and Ross T. Whitaker UUCS­05­005 School of Computing University of Utah Salt Lake City, UT 84112, USA assumptions about the properties of the signal and/or degradation. Therefore, these methods typically lack­ matically discovers the statistical properties of the signal and can thereby restore a wide spectrum

  12. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 3, JUNE 2009 477 Towards the Validation of Plagiarism Detection Tools

    E-print Network

    Alfonseca, Manuel

    of Plagiarism Detection Tools by Means of Grammar Evolution Manuel Cebrián, Manuel Alfonseca, and Alfonso Ortega Abstract--Student plagiarism is a major problem in universi- ties worldwide. In this paper, we focus on plagiarism in answers to computer programming assignments, where students mix and/or modify one or more

  13. To appear in IEEE Trans. on Computer Aided Design, Vol. 31, No. 10, Oct. 2012. Energy-Efficient Datacenters

    E-print Network

    Pedram, Massoud

    and distribution, complex weather modeling and prediction, to manufacturing, transportation, entertainment and forecasting in almost every sector of society and the economy. The increased use of "cloud" computing and Saa. Electricity consumption of datacenters is among the fastest growing sources of global electricity

  14. (In IEEE International Conference on ComputerAided Design (ICCAD), 1995) Efficient Validity Checking for Processor Verification \\Lambda

    E-print Network

    Dill, David L.

    Checking for Processor Verification \\Lambda Robert B. Jones , David L. Dill Computer Systems Laboratory be automatically verified. Burch and Dill [BD94b] proposed a new method for verifying microprocessor control requires that individual bits be modeled explicitly. Burch and Dill's verification method has two phases

  15. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 1 Accelerating Architectural Simulation Via

    E-print Network

    Franchetti, Franz

    Franchetti Abstract--In computer architecture research and develop- ment, simulation is a powerful way of reduction. In addition to identifying the simi- larities and differences of state-of-the-art approaches, we. As one of the most prevalent methodolo- gies for addressing this problem, architectural simulation has

  16. Proceedings of the 3rd IEEE Workshop on Mobile Computing Systems and Applications, Monterey, CA, December 2000

    E-print Network

    Satyanarayanan, Mahadev "Satya"

    a graphics computation that operates on a 3-D model in a mobile augmented reality application. The latency of those found at the heart of augmented reality ap- plications. We can also predict the energy consumption, and to the spe- cific input data on which it operates. We are able to predict the CPU consumption of a complex

  17. IEEE TRANSCATIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2012 1 TransCut: Interactive Rendering of Translucent Cutouts

    E-print Network

    Zhou, Kun

    of Translucent Cutouts Dongping Li Xin Sun Zhong Ren Stephen Lin Yiying Tong Baining Guo Kun Zhou Zhejiang changes in topological structure of dynamic objects. The entire multi-resolution DE solver is highly and films [6]. The main challenge lies in the expensive light transport computations that need

  18. Withdrawal Study of Memantine in Pediatric Patients With Autism, Asperger's Disorder, or Pervasive Developmental Disorder Not Otherwise Specified Previously Treated With Memantine

    ClinicalTrials.gov

    2013-10-31

    Autism Spectrum Disorder (ASD); Autism; Autistic Disorder; Asperger's Disorder; Asperger's; Pediatric Autism; Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS); Pervasive Child Development Disorder

  19. 414 IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 43, NO. 2, FEBRUARY 2008 A Sub-Picosecond Resolution 0.51.5 GHz

    E-print Network

    Moon, Un-Ku

    , IEEE, Gu-Yeon Wei, Member, IEEE, and Un-Ku Moon, Senior Member, IEEE Abstract--A digital Electronics Ltd. P. K. Hanumolu and U. Moon are with the School of Electrial Engineering and Computer Science by an input digital word . It is important to note that the resolution of the DPC is of paramount importance

  20. 1560 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 52, NO. 9, SEPTEMBER 2007 Large-Population Cost-Coupled LQG Problems With

    E-print Network

    Huang, Minyi

    Minyi Huang, Member, IEEE, Peter E. Caines, Fellow, IEEE, and Roland P. Malhamé, Member, IEEE Abstract, and the system evolution is as- sociated with complex interactions among its constituent parts or subsystems, Canada (e-mail: mhuang@math.carleton.ca). P. E. Caines is with the Department of Electrical and Computer

  1. 0018-9162/04/$17.00 2004 IEEE4 Computer C O V E R F E A T U R E

    E-print Network

    to neighboring towns. Although some villagers do use the phone occasionally, most still travel sometimes days on the IEEE 802.11, or WiFi, standard are perhaps the most DakNet provides extraordinarily low-cost digital driving the standardization and proliferation of WiFi in the developed world have resulted in fea- tures

  2. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. 1, NO. 4, DECEMBER 1995 343 An Adaptive Octree for Efficient Ray Tracing

    E-print Network

    Whang, Kyu-Young

    -R: An Adaptive Octree for Efficient Ray Tracing Kyu-Young Whang, Senior Member, IEEE, Ju-Won Song, Ji-Woong Chang, Ji-Yun Kim, Wan-Sup Cho, Chong-Mok Park, and 11-Yeol Song Abstract-Ray tracing requires many ray tracing. The algorithm for constructing the Octree-R first estimates the num- ber of ray

  3. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 19, NO. 1, JANUARY 2000 83 Equivalent Elmore Delay for RLC Trees

    E-print Network

    Friedman, Eby G.

    , JANUARY 2000 83 Equivalent Elmore Delay for RLC Trees Yehea I. Ismail, Eby G. Friedman, Fellow, IEEE time of signals in an tree are presented. These solutions have the same accuracy characteristics of the Elmore delay for trees and preserves the simplicity and recursive characteristics of the Elmore delay

  4. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. 4, NO. 1, JANUARY-MARCH 1998 1 Calibration-Free Augmented Reality

    E-print Network

    Toronto, University of

    Calibration-Free Augmented Reality Kiriakos N. Kutulakos, Member, IEEE, and James R. Vallino, Student Member. In this article, we describe a new approach to video- based augmented reality that avoids both requirements. Experimental results on two augmented reality systems, one monitor-based and one head-mounted, demonstrate

  5. IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, VOL. 56, NO. 4, APRIL 2008 1009 Corrections to "Computational Modeling Evidence of a

    E-print Network

    Taflove, Allen

    nonlinearity in the cellular sodium ion channel," IEEE Trans. Microw. Theory Tech., vol. 52, no. 8, pp. 2040 With Living Cells: Microwave Nonlinearity in the Cellular Sodium Ion Channel" Nikolay S. Stoykov, Joseph W evi- dence of microwave nonlinearity in the cellular sodium ion channel. In that study, we adapted

  6. 2015 IEEE 5th International Conference on Electronics Information and Emergency Communication

    E-print Network

    Tam, Vincent W. L.

    communications (3) Big Data and Intelligent Computing (4) Electronics Information and Communication Engineering: Emergency Communications Communication Engineering Emergency communication Computer Networks and Data2015 IEEE 5th International Conference on Electronics Information and Emergency Communication May

  7. Technical Chapter IEEE IMS/CAS/COMMSOC (Florianpolis/South)

    E-print Network

    Hanazaki, Natalia

    /South) invites you to the lecture Unobtrusive Smart Sensing and Pervasive Computing for Healthcare by Prof of healthcare, are searching for sustainable solutions to prevent increase expenditure on healthcare related and deployment of a seemingly invisible infrastructure of various wired and/or wireless communication networks

  8. Midair Displays: Concept and First Experiences with Free-Floating Pervasive Displays

    E-print Network

    the potential and fea- sibility of the concept and provides early insights. Keywords Midair Displays, Pervasive situation such as a fire or earthquake, statically deployed displays may become unusable due to power outage

  9. Quantitative Analysis of the Human Airway Microbial Ecology Reveals a Pervasive Signature for Cystic Fibrosis

    E-print Network

    Quake, Stephen R.

    Quantitative Analysis of the Human Airway Microbial Ecology Reveals a Pervasive Signature individuals, we identified diverse microbial communities in the healthy samples, contravening conventional the CF patients revealed significant differences in microbial ecology, including differential

  10. Pervasive Sound Sensing: A Weakly Supervised Training Approach.

    PubMed

    Kelly, Daniel; Caulfield, Brian

    2016-01-01

    Modern smartphones present an ideal device for pervasive sensing of human behavior. Microphones have the potential to reveal key information about a person's behavior. However, they have been utilized to a significantly lesser extent than other smartphone sensors in the context of human behavior sensing. We postulate that, in order for microphones to be useful in behavior sensing applications, the analysis techniques must be flexible and allow easy modification of the types of sounds to be sensed. A simplification of the training data collection process could allow a more flexible sound classification framework. We hypothesize that detailed training, a prerequisite for the majority of sound sensing techniques, is not necessary and that a significantly less detailed and time consuming data collection process can be carried out, allowing even a nonexpert to conduct the collection, labeling, and training process. To test this hypothesis, we implement a diverse density-based multiple instance learning framework, to identify a target sound, and a bag trimming algorithm, which, using the target sound, automatically segments weakly labeled sound clips to construct an accurate training set. Experiments reveal that our hypothesis is a valid one and results show that classifiers, trained using the automatically segmented training sets, were able to accurately classify unseen sound samples with accuracies comparable to supervised classifiers, achieving an average F -measure of 0.969 and 0.87 for two weakly supervised datasets. PMID:25675471

  11. Unique transposon landscapes are pervasive across Drosophila melanogaster genomes.

    PubMed

    Rahman, Reazur; Chirn, Gung-Wei; Kanodia, Abhay; Sytnikova, Yuliya A; Brembs, Björn; Bergman, Casey M; Lau, Nelson C

    2015-12-15

    To understand how transposon landscapes (TLs) vary across animal genomes, we describe a new method called the Transposon Insertion and Depletion AnaLyzer (TIDAL) and a database of >300 TLs in Drosophila melanogaster (TIDAL-Fly). Our analysis reveals pervasive TL diversity across cell lines and fly strains, even for identically named sub-strains from different laboratories such as the ISO1 strain used for the reference genome sequence. On average, >500 novel insertions exist in every lab strain, inbred strains of the Drosophila Genetic Reference Panel (DGRP), and fly isolates in the Drosophila Genome Nexus (DGN). A minority (<25%) of transposon families comprise the majority (>70%) of TL diversity across fly strains. A sharp contrast between insertion and depletion patterns indicates that many transposons are unique to the ISO1 reference genome sequence. Although TL diversity from fly strains reaches asymptotic limits with increasing sequencing depth, rampant TL diversity causes unsaturated detection of TLs in pools of flies. Finally, we show novel transposon insertions negatively correlate with Piwi-interacting RNA (piRNA) levels for most transposon families, except for the highly-abundant roo retrotransposon. Our study provides a useful resource for Drosophila geneticists to understand how transposons create extensive genomic diversity in fly cell lines and strains. PMID:26578579

  12. Sex hormones have pervasive effects on thymic epithelial cells.

    PubMed

    Dumont-Lagacé, Maude; St-Pierre, Charles; Perreault, Claude

    2015-01-01

    The goal of our study was to evaluate at the systems-level, the effect of sex hormones on thymic epithelial cells (TECs). To this end, we sequenced the transcriptome of cortical and medullary TECs (cTECs and mTECs) from three groups of 6 month-old mice: males, females and males castrated at four weeks of age. In parallel, we analyzed variations in the size of TEC subsets in those three groups between 1 and 12 months of age. We report that sex hormones have pervasive effects on the transcriptome of TECs. These effects were exquisitely TEC-subset specific. Sexual dimorphism was particularly conspicuous in cTECs. Male cTECs displayed low proliferation rates that correlated with low expression of Foxn1 and its main targets. Furthermore, male cTECs expressed relatively low levels of genes instrumental in thymocyte expansion (e.g., Dll4) and positive selection (Psmb11 and Ctsl). Nevertheless, cTECs were more abundant in males than females. Accumulation of cTECs in males correlated with differential expression of genes regulating cell survival in cTECs and cell differentiation in mTECs. The sexual dimorphism of TECs highlighted here may be mechanistically linked to the well-recognized sex differences in susceptibility to infections and autoimmune diseases. PMID:26250469

  13. Video summarization and personalization for pervasive mobile devices

    NASA Astrophysics Data System (ADS)

    Tseng, Belle L.; Lin, Ching-Yung; Smith, John R.

    2001-12-01

    We have designed and implemented a video semantic summarization system, which includes an MPEG-7 compliant annotation interface, a semantic summarization middleware, a real-time MPEG-1/2 video transcoder on PCs, and an application interface on color/black-and-white Palm-OS PDAs. We designed a video annotation tool, VideoAnn, to annotate semantic labels associated with video shots. Videos are first segmentated into shots based on their visual-audio characteristics. They are played back using an interactive interface, which facilitate and fasten the annotation process. Users can annotate the video content with the units of temporal shots or spatial regions. The annotated results are stored in the MPEG-7 XML format. We also designed and implemented a video transmission system, Universal Tuner, for wireless video streaming. This system transcodes MPEG-1/2 videos or live TV broadcasting videos to the BW or indexed color Palm OS devices. In our system, the complexity of multimedia compression and decompression algorithms is adaptively partitioned between the encoder and decoder. In the client end, users can access the summarized video based on their preferences, time, keywords, as well as the transmission bandwidth and the remaining battery power on the pervasive devices.

  14. Sex hormones have pervasive effects on thymic epithelial cells

    PubMed Central

    Dumont-Lagacé, Maude; St-Pierre, Charles; Perreault, Claude

    2015-01-01

    The goal of our study was to evaluate at the systems-level, the effect of sex hormones on thymic epithelial cells (TECs). To this end, we sequenced the transcriptome of cortical and medullary TECs (cTECs and mTECs) from three groups of 6 month-old mice: males, females and males castrated at four weeks of age. In parallel, we analyzed variations in the size of TEC subsets in those three groups between 1 and 12 months of age. We report that sex hormones have pervasive effects on the transcriptome of TECs. These effects were exquisitely TEC-subset specific. Sexual dimorphism was particularly conspicuous in cTECs. Male cTECs displayed low proliferation rates that correlated with low expression of Foxn1 and its main targets. Furthermore, male cTECs expressed relatively low levels of genes instrumental in thymocyte expansion (e.g., Dll4) and positive selection (Psmb11 and Ctsl). Nevertheless, cTECs were more abundant in males than females. Accumulation of cTECs in males correlated with differential expression of genes regulating cell survival in cTECs and cell differentiation in mTECs. The sexual dimorphism of TECs highlighted here may be mechanistically linked to the well-recognized sex differences in susceptibility to infections and autoimmune diseases. PMID:26250469

  15. Unique transposon landscapes are pervasive across Drosophila melanogaster genomes

    PubMed Central

    Rahman, Reazur; Chirn, Gung-wei; Kanodia, Abhay; Sytnikova, Yuliya A.; Brembs, Björn; Bergman, Casey M.; Lau, Nelson C.

    2015-01-01

    To understand how transposon landscapes (TLs) vary across animal genomes, we describe a new method called the Transposon Insertion and Depletion AnaLyzer (TIDAL) and a database of >300 TLs in Drosophila melanogaster (TIDAL-Fly). Our analysis reveals pervasive TL diversity across cell lines and fly strains, even for identically named sub-strains from different laboratories such as the ISO1 strain used for the reference genome sequence. On average, >500 novel insertions exist in every lab strain, inbred strains of the Drosophila Genetic Reference Panel (DGRP), and fly isolates in the Drosophila Genome Nexus (DGN). A minority (<25%) of transposon families comprise the majority (>70%) of TL diversity across fly strains. A sharp contrast between insertion and depletion patterns indicates that many transposons are unique to the ISO1 reference genome sequence. Although TL diversity from fly strains reaches asymptotic limits with increasing sequencing depth, rampant TL diversity causes unsaturated detection of TLs in pools of flies. Finally, we show novel transposon insertions negatively correlate with Piwi-interacting RNA (piRNA) levels for most transposon families, except for the highly-abundant roo retrotransposon. Our study provides a useful resource for Drosophila geneticists to understand how transposons create extensive genomic diversity in fly cell lines and strains. PMID:26578579

  16. 390 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 27, NO. 1, FEBRUARY 2012 Scalable Newton-Krylov Solver

    E-print Network

    Vuik, Kees

    . INTRODUCTION THE power flow, or load flow, computation is the most important network computation in power390 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 27, NO. 1, FEBRUARY 2012 Scalable Newton-Krylov Solver for Very Large Power Flow Problems Reijer Idema, Student Member, IEEE, Domenico J. P. Lahaye, Cornelis Vuik

  17. IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 9, SEPTEMBER 2007 3171 Multiscale Poisson Intensity and Density Estimation

    E-print Network

    Willett, Rebecca

    Intensity and Density Estimation Rebecca M. Willett, Member, IEEE, and Robert D. Nowak, Senior Member, IEEE. Willett is with the Department of Electrical and Computer Engineering, Duke University, Durham, NC 27708 USA (e-mail: willett@duke.edu). R. D. Nowak is with the Department of Electrical and Computer Engi

  18. Hundert Jahre Zukunft Visionen zum Computer-und Informationszeitalter

    E-print Network

    Institut für Pervasive Computing, ETH Zürich Le futur n'est plus ce qu'il était Paul Valéry Kurzfassung Abwasch und servieren Kaffee. Nur das Web, E-Commerce, Such- maschinen, SMS, Spielkonsolen, Blogs, Ebay

  19. Pervasive Learning--Using Games to Tear down the Classroom Walls

    ERIC Educational Resources Information Center

    Pløhn, Trygve

    2014-01-01

    Pervasive gaming is a new and emerging gaming genre where the physical and social aspects of the real world are integrated into the game and blends into the player's everyday life. Given the nature of pervasive games, it may be possible to use that type of game as a tool to support learning in a university course by providing a gameplay where…

  20. IEEE TRANSACTIONS ON COMMUNICATIONS (TO APPEAR) 1 Performance Analysis on an MAP Fine Timing

    E-print Network

    Zhou, Shengli

    Tian, Senior Member, IEEE, and Peter Willett, Fellow, IEEE Abstract-- In this paper we develop a fine. C. R. Berger, S. Zhou, and Peter Willett are supported by ONR grant N00014-07-1-0429. S. Zhou. Willett are with the Department of Electrical and Computer Engineering, University of Connecticut, 371

  1. Measuring Design-level Cohesion James M. Bieman, Senior Member, IEEE

    E-print Network

    Bieman, James M.

    Measuring Design-level Cohesion James M. Bieman, Senior Member, IEEE Department of Computer Science-42-860-6380 Appeared in IEEE Trans. Software Engineering, 242:111 124, February 1998. Abstract Cohesion was rst of implementations that would be created from a given design. Unfortunately, cohesion, as originally de ned, could

  2. Slovak High School Students' Attitudes toward Computers

    ERIC Educational Resources Information Center

    Kubiatko, Milan; Halakova, Zuzana; Nagyova, Sona; Nagy, Tibor

    2011-01-01

    The pervasive involvement of information and communication technologies and computers in our daily lives influences changes of attitude toward computers. We focused on finding these ecological effects in the differences in computer attitudes as a function of gender and age. A questionnaire with 34 Likert-type items was used in our research. The…

  3. Assessing Evidence for a Pervasive Alteration in Tropical Tree Communities

    PubMed Central

    Chave, Jérôme; Condit, Richard; Muller-Landau, Helene C; Thomas, Sean C; Ashton, Peter S; Bunyavejchewin, Sarayudh; Co, Leonardo L; Dattaraja, Handanakere S; Davies, Stuart J; Esufali, Shameema; Ewango, Corneille E. N; Feeley, Kenneth J; Foster, Robin B; Gunatilleke, Nimal; Gunatilleke, Savitri; Hall, Pamela; Hart, Terese B; Hernández, Consuelo; Hubbell, Stephen P; Itoh, Akira; Kiratiprayoon, Somboon; LaFrankie, James V; Loo de Lao, Suzanne; Makana, Jean-Rémy; Noor, Md. Nur Supardi; Kassim, Abdul Rahman; Samper, Cristián; Sukumar, Raman; Suresh, Hebbalalu S; Tan, Sylvester; Thompson, Jill; Tongco, Ma. Dolores C; Valencia, Renato; Vallejo, Martha; Villa, Gorky; Yamakura, Takuo; Zimmerman, Jess K; Losos, Elizabeth C

    2008-01-01

    In Amazonian tropical forests, recent studies have reported increases in aboveground biomass and in primary productivity, as well as shifts in plant species composition favouring fast-growing species over slow-growing ones. This pervasive alteration of mature tropical forests was attributed to global environmental change, such as an increase in atmospheric CO2 concentration, nutrient deposition, temperature, drought frequency, and/or irradiance. We used standardized, repeated measurements of over 2 million trees in ten large (16–52 ha each) forest plots on three continents to evaluate the generality of these findings across tropical forests. Aboveground biomass increased at seven of our ten plots, significantly so at four plots, and showed a large decrease at a single plot. Carbon accumulation pooled across sites was significant (+0.24 MgC ha?1 y?1, 95% confidence intervals [0.07, 0.39] MgC ha?1 y?1), but lower than reported previously for Amazonia. At three sites for which we had data for multiple census intervals, we found no concerted increase in biomass gain, in conflict with the increased productivity hypothesis. Over all ten plots, the fastest-growing quartile of species gained biomass (+0.33 [0.09, 0.55] % y?1) compared with the tree community as a whole (+0.15 % y?1); however, this significant trend was due to a single plot. Biomass of slow-growing species increased significantly when calculated over all plots (+0.21 [0.02, 0.37] % y?1), and in half of our plots when calculated individually. Our results do not support the hypothesis that fast-growing species are consistently increasing in dominance in tropical tree communities. Instead, they suggest that our plots may be simultaneously recovering from past disturbances and affected by changes in resource availability. More long-term studies are necessary to clarify the contribution of global change to the functioning of tropical forests. PMID:18318600

  4. Genome-wide activities of Polycomb complexes control pervasive transcription.

    PubMed

    Lee, Hun-Goo; Kahn, Tatyana G; Simcox, Amanda; Schwartz, Yuri B; Pirrotta, Vincenzo

    2015-08-01

    Polycomb group (PcG) complexes PRC1 and PRC2 are well known for silencing specific developmental genes. PRC2 is a methyltransferase targeting histone H3K27 and producing H3K27me3, essential for stable silencing. Less well known but quantitatively much more important is the genome-wide role of PRC2 that dimethylates ?70% of total H3K27. We show that H3K27me2 occurs in inverse proportion to transcriptional activity in most non-PcG target genes and intergenic regions and is governed by opposing roaming activities of PRC2 and complexes containing the H3K27 demethylase UTX. Surprisingly, loss of H3K27me2 results in global transcriptional derepression proportionally greatest in silent or weakly transcribed intergenic and genic regions and accompanied by an increase of H3K27ac and H3K4me1. H3K27me2 therefore sets a threshold that prevents random, unscheduled transcription all over the genome and even limits the activity of highly transcribed genes. PRC1-type complexes also have global roles. Unexpectedly, we find a pervasive distribution of histone H2A ubiquitylated at lysine 118 (H2AK118ub) outside of canonical PcG target regions, dependent on the RING/Sce subunit of PRC1-type complexes. We show, however, that H2AK118ub does not mediate the global PRC2 activity or the global repression and is predominantly produced by a new complex involving L(3)73Ah, a homolog of mammalian PCGF3. PMID:25986499

  5. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ASME TRANSACTIONS ON MECHATRONICS 1

    E-print Network

    Wood, Robert

    , Member, IEEE, Kyu-Jin Cho, Member, IEEE, Robert J. Wood, Daniela Rus, Fellow, IEEE, and Sangbae Kim-mail: sangok@mit.edu; sangbae@mit.edu). C. D. Onal and D. Rus are with the Computer Science and Artificial In

  6. IEEE Computer SocietyIEEE Computer Society 191, 110, 30,

    E-print Network

    Kasahara, Hironori

    .PC, 1 #12;2013228 2 2013228 #12; 2009 2011 NEC KDDI , API:143 2006 09 NEDO 200609 NEDO 15 (12 NEC ) (12:,,NEC, ,) 200002 IT21 NEDO (APC) HPC,,,,JIPDEC 3 #12; 2011413, 2011513 2009 / * *1 ,, ,NEC, , , ,, , CO CO2 ,, GCS 4 #12;GCS OSCAR ) OSCAROSCAR

  7. 3/15/2014 IEEE Xplore: Communications Surveys & Tutorials, IEEE -(Popular) http://ieeexplore.ieee.org/xpl/topAccessedArticles.jsp?punumber=9739 1/3

    E-print Network

    Chen, Min

    3/15/2014 IEEE Xplore: Communications Surveys & Tutorials, IEEE - (Popular) http://ieeexplore.ieee.org/xpl/topAccessedArticles.jsp: Communications Surveys & Tutorials, IEEE - (Popular) http://ieeexplore.ieee.org/xpl/topAccessedArticles.jsp

  8. IEEE Computer Society 1986 , 1988

    E-print Network

    Kasahara, Hironori

    , 110, 30, 138, 154, 39 WebTV 467 OSCAR,,API 1 #12; / * *1 ,, ,NEC, , , , CO2 Manycore Chip 3 ., , NEC KDDI / OS API 143 GCS #12;2011.11.1 M9000 SR16000 4 #12;2012.4.2 5 #12; 2009 2011 NEC KDDI , API:143 200609 NEDO 15RPX API6 200507 NEDO

  9. IEEE Computer Society 1986 , 1988

    E-print Network

    Kasahara, Hironori

    , 110, 30, 138, 154, 39 WebTV 467 1 GCS2012/11/26 #12; 2009 2011 NEC KDDI , API:143 200609 NEDO 15RPX API6 200507 NEDO & "" API,,,,, 4RP, 8RP2 2 200406 NEDO () () 200006 STARC (12:,,NEC, ,) 200002 IT21 NEDO (APC) HPC,,,,JIPDEC 2012/11/26 2 #12; / * *1 ,, ,NEC, , , , CO2

  10. IEEE Computer Society 1986 , 1988

    E-print Network

    Kasahara, Hironori

    .11,27PFLOPS,8.2MW Sequoia,2012.06, 20PFLOPS, 7.9MW Z #12;ILLIAC IV, Univ. Illinois at Urbana Year Total Cores Rmax Rpeak Effecie ncy (%) Power Mflops /Watt Proc. Proc. MH z OS Core s Sequoia Blue.04 Power BQC 16C 1.600GHz Power PC 1600Linux 16 Nov. 2012, No.1 IBM BG/Q(Sequoia),20PFLOPS #12;14 #12

  11. Novel pervasive scenarios for home management: the Butlers architecture.

    PubMed

    Denti, Enrico

    2014-01-01

    Many efforts today aim to energy saving, promoting the user's awareness and virtuous behavior in a sustainability perspective. Our houses, appliances, energy meters and devices are becoming smarter and connected, domotics is increasing possibilities in house automation and control, and ambient intelligence and assisted living are bringing attention onto people's needs from different viewpoints. Our assumption is that considering these aspects together allows for novel intriguing possibilities. To this end, in this paper we combine home energy management with domotics, coordination technologies, intelligent agents, ambient intelligence, ubiquitous technologies and gamification to devise novel scenarios, where energy monitoring and management is just the basic brick of a much wider and comprehensive home management system. The aim is to control home appliances well beyond energy consumption, combining home comfort, appliance scheduling, safety constraints, etc. with dynamically-changeable users' preferences, goals and priorities. At the same time, usability and attractiveness are seen as key success factors: so, the intriguing technologies available in most houses and smart devices are exploited to make the system configuration and use simpler, entertaining and attractive for users. These aspects are also integrated with ubiquitous and pervasive technologies, geo-localization, social networks and communities to provide enhanced functionalities and support smarter application scenarios, hereby further strengthening technology acceptation and diffusion. Accordingly, we first analyse the system requirements and define a reference multi-layer architectural model - the Butlers architecture - that specifies seven layers of functionalities, correlating the requirements, the corresponding technologies and the consequent value-added for users in each layer. Then, we outline a set of notable scenarios of increasing functionalities and complexity, discuss the structure of the corresponding system patterns in terms of the proposed architecture, and make this concrete by presenting some comprehensive interaction examples as comic strip stories. Next, we discuss the implementation requirements and how they can be met with the available technologies, discuss a possible architecture, refine it in the concrete case of the TuCSoN coordination technology, present a subsystem prototype and discuss its properties in the Butlers perspective. PMID:24555169

  12. A Longitudinal Investigation of the Effects of Computer Anxiety on Performance in a Computing-Intensive Environment

    ERIC Educational Resources Information Center

    Buche, Mari W.; Davis, Larry R.; Vician, Chelley

    2007-01-01

    Computers are pervasive in business and education, and it would be easy to assume that all individuals embrace technology. However, evidence shows that roughly 30 to 40 percent of individuals experience some level of computer anxiety. Many academic programs involve computing-intensive courses, but the actual effects of this exposure on computer…

  13. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 28, NO. 1, JANUARY 2009 111 Test-Length and TAM Optimization for Wafer-Level

    E-print Network

    Chakrabarty, Krishnendu

    , JANUARY 2009 111 Test-Length and TAM Optimization for Wafer-Level Reduced Pin-Count Testing of Core-Based SoCs Sudarshan Bahukudumbi, Student Member, IEEE, and Krishnendu Chakrabarty, Fellow, IEEE Abstract--Wafer-level testing (wafer sort) is used in the semi- conductor industry to reduce packaging and test cost. However

  14. Examining pervasive technology practices in schools : a mental models approach

    E-print Network

    Vaikakul, Savalai, 1976-

    2005-01-01

    Studies of computers and education have failed to account for the relevance and importance of tacit assumptions and unquestioned expectations that underlie educational technology practices. A major premise of this dissertation ...

  15. Light-Weight Cryptography for Ubiquitous Computing

    E-print Network

    Paar, Christof

    Light-Weight Cryptography for Ubiquitous Computing Securing Cyberspace Workshop IV: Special purpose hardware for cryptography ­ Attacks and Applications University of California at Los Angeles, December 4-Weight Asymmetric Cryptography #12;Securing Pervasive Computing Contents 1. Security in Embedded Systems 2. Light

  16. Exploratory and Confirmatory Factor Analyses of the Pervasive Developmental Disorders Rating Scale for Young Children with Autistic Disorder

    ERIC Educational Resources Information Center

    Eaves, Ronald C.; Williams, Thomas O., Jr.

    2006-01-01

    In this study, the authors examined the construct validity of the Pervasive Developmental Disorder Rating Scale (PDDRS; R. C. Eaves, 1993), which is a screening instrument used to identify individuals with autistic disorder and other pervasive developmental disorders. The PDDRS is purported to measure 3 factors--arousal, affect, and…

  17. IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 1, JANUARY 2009 109 DiversityMultiplexing Tradeoff in ISI Channels

    E-print Network

    Tse, David

    ­Multiplexing Tradeoff in ISI Channels Leonard H. Grokop, Member, IEEE, and David N. C. Tse, Senior Member, IEEE Abstract--The optimal diversity­multiplexing tradeoff curve for the intersymbol interference (ISI) channel is computed, intersymbol interference (ISI), max- imum-likelihood sequence estimation , minimum mean-square- error (MMSE

  18. 2778 IEEE PHOTONICS TECHNOLOGY LETTERS, VOL. 17, NO. 12, DECEMBER 2005 A Wide-Band Photonic Packet Injection Control

    E-print Network

    Bergman, Keren

    A. Small, Student Member, IEEE, and Keren Bergman, Member, IEEE Abstract--The implementation communications bandwidth demands and minimal latency requirements of next-generation high-performance computing@ee.columbia.edu; bergman@ee.columbia.edu). Digital Object Identifier 10.1109/LPT.2005.859165 Feed-forward dynamically

  19. 1472 IEEE TRANSACTIONS ON MAGNETICS, VOL. 36, NO. 4, JULY 2000 High Order Differential Form-Based Elements for the

    E-print Network

    Ida, Nathan

    -Based Elements for the Computation of Electromagnetic Field Z. Ren, Senior Member, IEEE, and N. Ida, Senior Member, IEEE Abstract--The Whitney elements, discrete spaces based on differential forms, have proven gives a general description of high order -form (nodal, edge, facet and volume) elements. Their function

  20. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 10, OCTOBER 2006 1877 Adaptive Defense Against Various Network Attacks

    E-print Network

    Zou, Cliff C.

    adaptive defense system de- signs for defending against two major network attacks: SYN flood DDoS attackS), Internet worm, SYN flood. I. INTRODUCTION CURRENT Internet and computers are constantly under various Defense Against Various Network Attacks Cliff C. Zou, Member, IEEE, Nick Duffield, Fellow, IEEE, Don

  1. IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL. 5, NO. 4, AUGUST 2011 725 Distributed Principal Subspace Estimation

    E-print Network

    Manton, Jonathan

    , Fellow, IEEE, and Jonathan H. Manton, Senior Member, IEEE Abstract--Motivated by applications in multi of Electrical and Computer Engineering, University of California, Davis CA 95616 USA ( e-mail: llli@uc- davis.edu; ascaglione@ucdavis.edu). J.H. Manton is with the Department of Electrical and Electronic Engi- neering

  2. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, SUBMITTED 2011, ACCEPTED 2013 1 Iterative Discovery of Multiple Alternative

    E-print Network

    Jordan, Michael I.

    . Dy, Member, IEEE, and Michael I. Jordan, Fellow, IEEE Abstract--Complex data can be grouped, Boston, MA 02115. E-mail: dniu@ece.neu.edu, jdy@ece.neu.edu · M. I. Jordan is with the Computer Science Division and Department of Statistics, University of California, Berkeley, CA 94720. Email: jordan

  3. IEEE COMMUNICATIONS LETTERS, VOL. 7, NO. 5, MAY 2003 207 The Cramer-Rao Bound for Phase Estimation From

    E-print Network

    Steendam, Heidi

    From Coded Linearly Modulated Signals Nele Noels, Student Member, IEEE, Heidi Steendam, Member, IEEE of the marginal a posteriori probabilities (APPs) of the coded symbols. For a wide range of classical codes (block codes, convolutional codes, and trellis-coded modulation), these marginal APPs can be computed

  4. 2168-7161 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

    E-print Network

    Pedram, Massoud

    .2015.2474369, IEEE Transactions on Cloud Computing Hierarchical SLA-Driven Resource Management for Peak and complexity of the decision making in the resource management of the cloud computing systems. Considering SLA management scheme compared to previous work is demonstrated using a comprehensive cloud computing simulation

  5. Decoupling algorithms from the organization of computation for high performance image processing

    E-print Network

    Ragan-Kelley, Jonathan Millard

    2014-01-01

    Future graphics and imaging applications-from self-driving cards, to 4D light field cameras, to pervasive sensing-demand orders of magnitude more computation than we currently have. This thesis argues that the efficiency ...

  6. This article was processed using the LaTEX macro package with LLNCS style 25. Proceedings of the 27th ACM/IEEE Design Automation Conference. IEEE Computer Soci-

    E-print Network

    Grumberg, Orna

    about programs. In K. R. Apt, editor, Logics and Models of Concurrent Systems, volume 13 of NATO ASI series. Series F, Computer and system sciences. Springer-Verlag, 1984. 43. J.P. Quielle and J. Sifakis

  7. Electrocortical Reflections of Face and Gaze Processing in Children with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Kemner, C.; Schuller, A-M.; Van Engeland, H.

    2006-01-01

    Background: Children with pervasive developmental disorder (PDD) show behavioral abnormalities in gaze and face processing, but recent studies have indicated that normal activation of face-specific brain areas in response to faces is possible in this group. It is not clear whether the brain activity related to gaze processing is also normal in…

  8. On Facebook, Most Ties are Weak The emergence of pervasive socio-technical networks brings new

    E-print Network

    Ferrara, Emilio

    On Facebook, Most Ties are Weak Abstract The emergence of pervasive socio-technical networks brings's theory can be extended to online social networks like Facebook, suggesting to use interaction data requires knowledge of the topology of the social network, e.g., who is friend with whom on Facebook. Our

  9. Curiosity, Interest and Engagement in Technology-Pervasive Learning Environments: A New Research Agenda

    ERIC Educational Resources Information Center

    Arnone, Marilyn P.; Small, Ruth V.; Chauncey, Sarah A.; McKenna, H. Patricia

    2011-01-01

    This paper identifies the need for developing new ways to study curiosity in the context of today's pervasive technologies and unprecedented information access. Curiosity is defined in this paper in a way which incorporates the concomitant constructs of interest and engagement. A theoretical model for curiosity, interest and engagement in new…

  10. Pervasive Internet Access by Vehicles through Satellite Receive-only Terminals

    E-print Network

    Zou, Cliff C.

    Pervasive Internet Access by Vehicles through Satellite Receive-only Terminals Baber Aslam, Ping Florida Orlando, FL, USA {ababer, pwang, czou}@cs.ucf.edu Abstract--Ubiquitous Internet connectivity is very important in present environment. A lot of research has been done to extend Internet connectivity

  11. Promoting Social Skill Development in Children with Pervasive Developmental Disorders: A Feasibility and Efficacy Study

    ERIC Educational Resources Information Center

    Koenig, Kathleen; White, Susan Williams; Pachler, Maryellen; Lau, Monika; Lewis, Moira; Klin, Ami; Scahill, Lawrence

    2010-01-01

    A randomized controlled design was employed to evaluate a social skills intervention for children with pervasive developmental disorders. Aims included evaluating the acceptability of the program and gathering preliminary evidence on efficacy. Forty-four children, ages 8-11 years, were randomly assigned to treatment or wait list. Treatment…

  12. Prevalence of Gastrointestinal Disorders in Adult Clients with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Galli-Carminati, G.; Chauvet, I.; Deriaz, N.

    2006-01-01

    Background: In clients with pervasive developmental disorders (PDD), some authors have noticed the presence of gastrointestinal disorders and behavioural disorders. An augmented prevalence of different histological anomalies has also been reported. The aim of our study is to highlight the prevalence of gastrointestinal disorders in this adult with…

  13. Body Area Networks & Pervasive Health Monitoring Recent advances in microelectronics and wireless

    E-print Network

    , intelligent endoscope capsules, glucose monitors and eye pressure sensing systems. Similarly, wearable sensorsBody Area Networks & Pervasive Health Monitoring Recent advances in microelectronics and wireless the body. In addition, the wearable/implantable nodes can communicate to a controller device

  14. iGrocer-A Ubiquitous and Pervasive Smart Grocery Shopping System

    E-print Network

    Helal, Abdelsalam

    iGrocer- A Ubiquitous and Pervasive Smart Grocery Shopping System Sangeetha Shekar, Prashant Nair dimension to the way we shop, bank, and go about many of our everyday activities. iGrocer is a smart grocery shopping assistant, that re-defines grocery shopping. It is capable of maintaining nutrition profiles

  15. Facial Electromyographic Responses to Emotional Information from Faces and Voices in Individuals with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Magnee, Maurice J. C. M.; de Gelder, Beatrice; van Engeland, Herman; Kemner, Chantal

    2007-01-01

    Background: Despite extensive research, it is still debated whether impairments in social skills of individuals with pervasive developmental disorder (PDD) are related to specific deficits in the early processing of emotional information. We aimed to test both automatic processing of facial affect as well as the integration of auditory and visual…

  16. Brief Report: Representational Momentum for Dynamic Facial Expressions in Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Uono, Shota; Sato, Wataru; Toichi, Motomi

    2010-01-01

    Individuals with pervasive developmental disorder (PDD) have difficulty with social communication via emotional facial expressions, but behavioral studies involving static images have reported inconsistent findings about emotion recognition. We investigated whether dynamic presentation of facial expression would enhance subjective perception of…

  17. Quality of Life of Adults with Pervasive Developmental Disorders and Intellectual Disabilities

    ERIC Educational Resources Information Center

    Gerber, F.; Baud, M. A.; Giroud, M.; Carminati, G. Galli

    2008-01-01

    The purpose of this study was to observe quality of life (QoL) and global evolution of persons with Pervasive Developmental Disorders (PDD) in three different groups. Individualized programs for PDD were compared to traditional programs for intellectual disabilities. Behavioural disorders were repeatedly evaluated using the Aberrant Behaviour…

  18. An Integrated Regulatory Network Reveals Pervasive Cross-Regulation among Transcription and Splicing

    E-print Network

    Mandel-Gutfreund, Yael

    An Integrated Regulatory Network Reveals Pervasive Cross-Regulation among Transcription more connected by alternative splicing regulatory edges relative to the two other subgroups, while that splicing factors are the most regulated of the three regulatory groups and are subject to extensive

  19. Regression of Language and Non-Language Skills in Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Meilleur, A. -A. S.; Fombonne, E.

    2009-01-01

    Background: As part of the pervasive developmental disorders (PDD), there is a subgroup of individuals reported to have a different onset of symptom appearance consisting of an apparently normal early development, followed by a loss of verbal and/or non-verbal skills prior to 2 years of age. This study aims at comparing the symptomatology of…

  20. Detecting Subgroups in Children Diagnosed with Pervasive Developmental Disorder--Not Otherwise Specified

    ERIC Educational Resources Information Center

    Brennan, Laura; Barton, Marianne; Chen, Chi-Ming; Green, James; Fein, Deborah

    2015-01-01

    Hierarchical cluster analyses were used to detect three subgroups in a sample of children with pervasive developmental disorder--not otherwise specified (PDD-NOS) evaluated at ages 2 and 4. At age 2, Cluster 1 demonstrated few autism symptoms and high cognitive scores; 60% no longer met criteria for PDD at 4. Cluster 2 exhibited more autism…

  1. The Pervasiveness of 1/f Scaling in Speech Reflects the Metastable Basis of Cognition

    ERIC Educational Resources Information Center

    Kello, Christopher T.; Anderson, Gregory G.; Holden, John G.; Van Orden, Guy C.

    2008-01-01

    Human neural and behavioral activities have been reported to exhibit fractal dynamics known as "1/f noise," which is more aptly named "1/f scaling." Some argue that 1/f scaling is a general and pervasive property of the dynamical substrate from which cognitive functions are formed. Others argue that it is an idiosyncratic property of…

  2. A Blueprint for Pervasive Self-Care Infrastructures George Roussos Andy Marsh

    E-print Network

    Roussos, George

    A Blueprint for Pervasive Self-Care Infrastructures George Roussos Andy Marsh Birkbeck College, University of London g.roussos@bbk.ac.uk VMW Solutions Ltd a.marsh@vmwsolutions.com Abstract Self Care the point-of-care in the community and often at the patients' own home. In this paper we discuss

  3. Parent Perceptions of Time Spent Meaningfully by Young Adults with Pervasive Support Needs

    ERIC Educational Resources Information Center

    Rossetti, Zachary; Lehr, Donna; Lederer, Leslie; Pelerin, Dana; Huang, Shuoxi

    2015-01-01

    This article describes a qualitative study that examined how 23 young adults with pervasive support needs and limited functional communication spent their time and how their parents (n = 23) and direct support professionals (DSPs; n = 2) defined meaningfulness in relation to the young adults' experiences. Data were collected through…

  4. Pervasive Developmental Disorder Behavior in Adolescents with Intellectual Disability and Co-Occurring Somatic Chronic Diseases

    ERIC Educational Resources Information Center

    Oeseburg, B.; Groothoff, J. W.; Dijkstra, G. J.; Reijneveld, S. A.; Jansen, D. E. M. C.

    2010-01-01

    Evidence on the association between somatic chronic diseases in ID-adolescents and the full range of pervasive developmental disorder behavior (PDD behavior) is scarce. The aim of the present study is to assess the association between somatic chronic diseases in ID-adolescents and mild PDD behavior. We obtained data on 1044 ID-adolescents, aged…

  5. Sleep Correlates of Pervasive Developmental Disorders: A Review of the Literature

    ERIC Educational Resources Information Center

    Hollway, Jill A.; Aman, Michael G.

    2011-01-01

    Sleep disturbance is a significant problem in the general pediatric population, and it occurs even more frequently in children with pervasive developmental disorders (PDDs). Much time and energy have been spent examining the characteristics that predispose children to insomnia and it is likely that equivalent factors influence sleep in PDDs.…

  6. Gastrointestinal Symptoms in a Sample of Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Nikolov, Roumen N.; Bearss, Karen E.; Lettinga, Jelle; Erickson, Craig; Rodowski, Maria; Aman, Michael G.; McCracken, James T.; McDougle, Christopher J.; Tierney, Elaine; Vitiello, Benedetto; Arnold, L. Eugene; Shah, Bhavik; Posey, David J.; Ritz, Louise; Scahill, Lawrence

    2009-01-01

    Objective: To evaluate gastrointestinal (GI) problems in a large, well-characterized sample of children with pervasive developmental disorders (PDDs). Methods: One hundred seventy two children entering one of two trials conducted by the Research Units on Pediatric Psychopharmacology (RUPP) Autism Network were assessed comprehensively prior to…

  7. Children's Yale-Brown Obsessive Compulsive Scale Modified for Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Scahill, Lawrence; McDougle, Christopher J.; Williams, Susan K.; Dimitropoulos, Anastasia; Aman, Michael G.; McCracken, James T.; Tierney, Elaine; Arnold, L. Eugene; Cronin, Pegeen; Grados, Marco; Ghuman, Jaswinder; Koenig, Kathleen; Lam, Kristen S. L.; McGough, James; Posey, David J.; Ritz, Louise; Swiezy, Naomi B.; Vitiello, Benedetto

    2006-01-01

    Objective: To examine the psychometric properties of the Children's Yale-Brown Obsessive Compulsive Scales (CYBOCS) modified for pervasive developmental disorders (PDDs). Method: Raters from five Research Units on Pediatric Psychopharmacology (RUPP) Autism Network were trained to reliability. The modified scale (CYBOCS-PDD), which contains only…

  8. Pervasive Developmental Disorder: Client-Centered Approach. A Guide for Parents and Teachers.

    ERIC Educational Resources Information Center

    Stewart, Bonnie C.

    This guide to pervasive developmental disorder (PDD) or autistic spectrum disorder (ASD) first provides a review of the literature on defining characteristics of PDD/ASD, causes of PDD, and diagnosis of PDD. Review of intervention and treatment comprises the major portion of the paper. After briefly considering parent education, this section…

  9. CloudDrops: Stamp-sized Pervasive Displays for Situated Awareness of Web-based Information

    E-print Network

    - 1 - CloudDrops: Stamp-sized Pervasive Displays for Situated Awareness of Web, such that they can be situated at virtually any location. This opens up a physical design flexibility for awareness and how displays can be combined with physical artifacts to support situated awareness. We address

  10. Face Recognition in Children with a Pervasive Developmental Disorder Not Otherwise Specified.

    ERIC Educational Resources Information Center

    Serra, M.; Althaus, M.; de Sonneville, L. M. J.; Stant, A. D.; Jackson, A. E.; Minderaa, R. B.

    2003-01-01

    A study investigated the accuracy and speed of face recognition in 26 children (ages 7-10) with Pervasive Developmental Disorder Not Otherwise Specified. Subjects needed an amount of time to recognize the faces that almost equaled the time they needed to recognize abstract patterns that were difficult to distinguish. (Contains references.)…

  11. Validation of an Interview-Based Rating Scale Developed in Japan for Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Ito, Hiroyuki; Tani, Iori; Yukihiro, Ryoji; Adachi, Jun; Hara, Koichi; Ogasawara, Megumi; Inoue, Masahiko; Kamio, Yoko; Nakamura, Kazuhiko; Uchiyama, Tokio; Ichikawa, Hironobu; Sugiyama, Toshiro; Hagiwara, Taku; Tsujii, Masatsugu

    2012-01-01

    The pervasive developmental disorders (PDDs) Autism Society Japan Rating Scale (PARS), an interview-based instrument for evaluating PDDs, has been developed in Japan with the aim of providing a method that (1) can be used to evaluate PDD symptoms and related support needs and (2) is simpler and easier than the currently used "gold standard"…

  12. Using Virtual Reality Environment to Improve Joint Attention Associated with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Cheng, Yufang; Huang, Ruowen

    2012-01-01

    The focus of this study is using data glove to practice Joint attention skill in virtual reality environment for people with pervasive developmental disorder (PDD). The virtual reality environment provides a safe environment for PDD people. Especially, when they made errors during practice in virtual reality environment, there is no suffering or…

  13. Abnormalities on the Neurological Examination and EEG in Young Children with Pervasive Developmental Disorders

    ERIC Educational Resources Information Center

    Akshoomoff, Natacha; Farid, Nikdokht; Courchesne, Eric; Haas, Richard

    2007-01-01

    This study examined the nature and frequency of neurological and EEG abnormalities in 60 young children (ages 2-6 years) with pervasive developmental disorders. A number of standard neurological functions could not be adequately assessed due to the young age of the children and/or limited comprehension and cooperation. The most common neurological…

  14. Affective e-Learning: Using "Emotional" Data to Improve Learning in Pervasive Learning Environment

    ERIC Educational Resources Information Center

    Shen, Liping; Wang, Minjuan; Shen, Ruimin

    2009-01-01

    Using emotion detection technologies from biophysical signals, this study explored how emotion evolves during learning process and how emotion feedback could be used to improve learning experiences. This article also described a cutting-edge pervasive e-Learning platform used in a Shanghai online college and proposed an affective e-Learning model,…

  15. Is Pervasive Developmental Disorder Not Otherwise Specified Less Stable than Autistic Disorder? A Meta-Analysis

    ERIC Educational Resources Information Center

    Rondeau, Emelie; Klein, Leslie S.; Masse, Andre; Bodeau, Nicolas; Cohen, David; Guile, Jean-Marc

    2011-01-01

    We reviewed the stability of the diagnosis of pervasive developmental disorder not otherwise specified (PDD-NOS). A Medline search found eight studies reiterating a diagnostic assessment for PDD-NOS. The pooled group included 322 autistic disorder (AD) and 122 PDD-NOS cases. We used percentage of individuals with same diagnose at Times 1 and 2 as…

  16. Larger Brains in Medication Naive High-Functioning Subjects with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Palmen, Saskia J. M. C.; Pol, Hilleke E. Hulshoff; Kemner, Chantal; Schnack, Hugo G.; Janssen, Joost; Kahn, Rene S.; van Engeland, Herman

    2004-01-01

    Background: Are brain volumes of individuals with Pervasive Developmental Disorder (PDD) still enlarged in adolescence and adulthood, and if so, is this enlargement confined to the gray and/or the white matter and is it global or more prominent in specific brain regions. Methods: Brain MRI scans were made of 21 adolescents with PDD and 21 closely…

  17. Neutral versus Emotional Human Stimuli Processing in Children with Pervasive Developmental Disorders not Otherwise Specified

    ERIC Educational Resources Information Center

    Vannetzel, Leonard; Chaby, Laurence; Cautru, Fabienne; Cohen, David; Plaza, Monique

    2011-01-01

    Pervasive developmental disorder not otherwise specified (PDD-NOS) represents up to two-thirds of autism spectrum disorders; however, it is usually described in terms of the symptoms not shared by autism. The study explores processing of neutral and emotional human stimuli (by auditory, visual and multimodal channels) in children with PDD-NOS (n =…

  18. The Co-Occurrence of Nonaffective Psychosis and the Pervasive Developmental Disorders: A Systematic Review

    ERIC Educational Resources Information Center

    Padgett, Fiona E.; Miltsiou, Eleni; Tiffin, Paul A.

    2010-01-01

    Background: Pervasive developmental disorders (PDDs) were originally conceptualised as a form of ("infantile") psychosis. Recently, the disorders have been viewed as separate constructs. However, there is evidence of overlapping psychopathology, pathophysiology, and occurrence of the two syndromes. Methods: A historical overview is provided. A…

  19. ERPs and Eye Movements Reflect Atypical Visual Perception in Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Kemner, Chantal; van Engeland, Herman

    2006-01-01

    Many studies of eye tracking or event-related brain potentials (ERPs) in subjects with Pervasive Developmental Disorder (PDD) have yielded inconsistent results on attentional processing. However, recent studies have indicated that there are specific abnormalities in early processing that are probably related to perception. ERP amplitudes in…

  20. ExerLink -Enabling Pervasive Social Exergames with Heterogeneous Exercise Devices

    E-print Network

    ExerLink - Enabling Pervasive Social Exergames with Heterogeneous Exercise Devices Taiwoo Park envision that diverse social exercising games, or ex- ergames, will emerge, featuring much richer the potential of using heterogeneous exercise devices as game controllers for a multi-player social exergame; e