These are representative sample records from Science.gov related to your search topic.
For comprehensive and current results, perform a real-time search at Science.gov.
1

IEEE Pervasive Computing (Revised) Cardiovascular Monitoring Using Earphones and a Mobile Device  

E-print Network

catastrophes and treatment therapies of chronic disease. Resting heart rate, one of the simplest cardiovascular) for cardiovascular disease [1]. In particular, the association between accelerated resting heart rate and mortalityIEEE Pervasive Computing (Revised) 1 Cardiovascular Monitoring Using Earphones and a Mobile Device

2

76 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 2014 IEEE Smartphones Editor: Roy Want n Google n roywant@acm.org  

E-print Network

76 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 © 2014 IEEE Smartphones-power? Power is energy per unit time. Ultimately, we judge a smartphone's energy con- sumption based on its, a typical smartphone battery is based on Lithium-ion technology, with a capacity of approximately 2

Cortes, Corinna

3

Published by the IEEE CS 1536-1268/12/$31.00 2012 IEEE PERVASIVE computing 7 Smartphones Editor: Roy Want Google roywant@acm.org  

E-print Network

Published by the IEEE CS 1536-1268/12/$31.00 © 2012 IEEE PERVASIVE computing 7 Smartphones Editor: Roy Want Google roywant@acm.org As smartphones get smarter by uti- lizing new intelligence-being, help us navi- gate through our day, and intervene on our behalf. Here, we present various smartphone

Campbell, Andrew T.

4

1536-1268/03/$17.00 2003 IEEE Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 19 Editor: Thad E. Starner Georgia Institute of Technology thad@cc.gatech.edu  

E-print Network

1536-1268/03/$17.00 © 2003 IEEE Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 19 that are as usable as possible by as many people as possible, regard- less of age, ability, or situation.1 Not only, and display mechanisms while maintaining an awareness of his or her preferences and characteristics. A key r

Starner, Thad E.

5

Toward autonomic pervasive computing  

Microsoft Academic Search

The Autonomic Pervasive Computing can simplify the complexity of the configuration, maintenance and management of pervasive environments such as smart spaces. The Pervasive Computing is a paradigm where the information processes are distributed in the environment components, bringing processes more closer to the information context. On the other hand, the Autonomic Computing allows to simplify the complexity caused by the

Charles Gouin-vallerand; Bessam Abdulrazak; Sylvain Giroux; Mounir Mokhtari

2008-01-01

6

56 PERVASIVE computing Published by the IEEE Computer Society 1536-1268/07/$25.00 2007 IEEE Physical, Social, and  

E-print Network

. At the same time, cheap, small, and easy-to-deploy recording technologies are quickly emerging throughout public spaces. In many ways, these technologies are pervasive computing realized. Understanding how people deal with audio and video recording is therefore a good way to explore how people might adopt

Hayes, Gillian R.

7

T H E S M A R T P H O N E 68 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE  

E-print Network

T H E S M A R T P H O N E 68 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 © 2006 IEEE Supporting Context-Aware Media Recommendations for Smart Phones E quipped with network these methods1­3 or incorporate situational context information, such as location and time.4 For more

Madiraju, Praveen

8

2 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$25.00 2009 IEEE C r o s s -r e a l i t y  

E-print Network

2 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$25.00 2009 IEEE C r o s s - r e to sup- port through-walls collaboration, in which users in an intelligent meeting room can work in real between all parties. We use augmented reality (AR), the registration of projected computer

Thomas, Bruce

9

Towards Pervasive Computing @ NIST  

E-print Network

Towards Pervasive Computing @ NIST Alden Dima Kevin Mills #12;Something fundamental is brewing... z of widely accepted standards for service discovery, APIs, interoperability, pico-cellular wireless networks of E- commerce services z Standardization of APIs z Better reference implementations z Interoperability

10

32 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/04/$20.00 2004 IEEE U B I Q U I T O U S S Y S T E M S O F T W A R E  

E-print Network

32 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/04/$20.00 © 2004 IEEE U- cations in such environments must be context aware so that they can adapt to rapidly chang- ing conditions in developing context-aware applications. For example: Rachel wishes to contact her friend Joey, so she

Dong, Jin Song

11

Electronic Textiles: A Platform for Pervasive DIANA MARCULESCU, MEMBER, IEEE, RADU MARCULESCU, MEMBER, IEEE,  

E-print Network

Electronic Textiles: A Platform for Pervasive Computing DIANA MARCULESCU, MEMBER, IEEE, RADU years later, the link between textiles and computing is more realistic than ever. In this paper, we look at the synergistic relationship between textiles and computing and identify the need for their "integration" using

12

Pervasive Computing: Vision and Challenges  

E-print Network

This paper discusses the challenges in computer systems research posed by the emerging field of pervasive computing. It first examines the relationship of this new field to its predecessors: distributed systems and mobile computing. It then identifies four new research thrusts: effective use of smart spaces, invisibility, localized scalability, and masking uneven conditioning. Next, it sketches a couple of hypothetical pervasive computing scenarios, and uses them to identify key capabilities missing from today's systems. The paper closes with a discussion of the research necessary to develop these capabilities.

M. Satyanarayanan

2001-01-01

13

Pervasive computing: vision and challenges  

Microsoft Academic Search

This article discusses the challenges in computer systems research posed by the emerging field of pervasive computing. It first examines the relationship of this new field to its predecessors: distributed systems and mobile computing. It then identifies four new research thrusts: effective use of smart spaces, invisibility, localized scalability, and masking uneven conditioning. Next, it sketches a couple of hypothetical

M. Satyanarayanan

2001-01-01

14

White Paper Relevance and Cognition for Pervasive Computation at Scale  

E-print Network

White Paper Relevance and Cognition for Pervasive Computation at Scale Ioannis Stavrakakis, IEEE Computation at Scale (PeCS) stem from the strong human/social/behavioral dimension associated with networked the content. A consequence of increased participation is the infinite scale of content that may result

Stavrakakis, Ioannis

15

Security in Pervasive Computing  

Microsoft Academic Search

\\u000a The audience of SPC 2003 needs no introduction to the Mark Weiser vision of ubiquitous computing: the etymological meaning\\u000a of computing present or found everywhere is not to be taken in the narrow sense of a computer on every desk but rather\\u000a in that of embedding computing and communication capabilities into all the everyday objects that surround us.\\u000a \\u000a \\u000a Various embodiments

Frank Stajano

2003-01-01

16

Challenges: an application model for pervasive computing  

Microsoft Academic Search

The way mobile computing devices and applications are developed, deployed and used today does not meet the expectations of the user community and falls far short of the potential for pervasive computing. This paper challenges the mobile computing community by questioning the roles of devices, applications, and a user's environment. A vision of pervasive computing is described, along with attributes

Guruduth Banavar; James Beck; Eugene Gluzberg; Jonathan Munson; Jeremy B. Sussman; Deborra J. Zukowski

2000-01-01

17

Self-healing for autonomic pervasive computing  

Microsoft Academic Search

Self-healing is one of the main challenges to growing autonomic pervasive computing. Fault detection and recovery are the main steps of self-healing. Due to the characteristics of pervasive computing the self-healing becomes difficult. In this paper, the challenges of self-healing have been addressed and an approach to develop a self-healing service for autonomic pervasive computing is presented. The self-healing service

Shameem Ahmed; Sheikh Iqbal Ahamed; Moushumi Sharmin; Munirul M. Haque

2007-01-01

18

Pervasive computing: Past, present and future  

Microsoft Academic Search

The paradigm of pervasive computing describes ubiquitous computing environments that provide anytime and anywhere access to information services while making the presence of the system invisible to the user. Pervasive computing envisioned by Mark Weiser emerged at the conjunction of research and development in a number of areas which include embedded and devices and systems, wireless communications, and distributed, mobile

Stan Kurkovsky

2007-01-01

19

User Experience in the Pervasive Computing Age  

Microsoft Academic Search

The pervasive computing age will provide easier and more satisfying ways for people to interact with their world. As a result, the ways we interact with people, information, organizations, processes, devices, appliances, places, and everyday things will change. We describe four aspects of living in the pervasive computing age from a user experience perspective: life networks will make it easy

Jim Spohrer; Mitch Stein

2000-01-01

20

Challenges: environmental design for pervasive computing systems  

Microsoft Academic Search

We argue that pervasive computing offers not only tremendous opportunities and exciting research challenges but also possible negative environmental impacts, particularly in terms of physical waste and energy consumption. These environmental impacts will come under increasing government and consumer scrutiny, and like other disciplines (e.g. architecture, transportation), pervasive computing will have to adapt accordingly. Further, we argue that software-related issues

Ravi Jain; John Wullert II

2002-01-01

21

Ontologies in a Pervasive Computing Environment  

Microsoft Academic Search

Ontologies are entering widespread use in many areas such as knowledge and content manage- ment, electronic commerce and the Semantic Web. In this paper we show how the use of on- tologies has helped us overcome some important problems in the development of pervasive com- puting environments. We have integrated on- tologies and Semantic Web technology into our Pervasive Computing

Anand Ranganathan; Robert E. McGrath; Roy H. Campbell; M. Dennis Mickunas

2003-01-01

22

Towards database administration in pervasive computing environment  

Microsoft Academic Search

This paper presents a context-aware tool for remote database administration that is executed in mobile devices, MDBA (mobile database administrator). The MDBA enables database administrators (DBAs) to perform their tasks by automatically identifying databases and the wireless communication structure of a given mobile computational environment. The proposed tool has properties, which integrate features of mobile computation pervasive computation paradigms and

Fernando Siqueira; Angelo Brayner

2005-01-01

23

Architecturing Conflict Handling of Pervasive Computing Resources  

E-print Network

Architecturing Conflict Handling of Pervasive Computing Resources Henner Jakob1 , Charles Consel1 to conflict in their usage of shared resources, e.g., controlling doors for security and fire evacuation computing resources. This approach covers the software devel- opment lifecycle and consists of enriching

Paris-Sud XI, Universit de

24

90 PERVASIVE computing 1536-1268/02/$17.00 2002 IEEE Forty years ago, when batch pro-  

E-print Network

would go on to invent multitasking, hypertext, the mouse, the Internet, and many other mechanisms a diary of his every- day actions: "About 85 percent of my `thinking' time was actually spent get- ting, Licklider wanted to augment the thought process such that "human brains and comput- ing machines

Starner, Thad E.

25

Pervasive Social Computing: Augmenting Five Facets of Human Intelligence  

Microsoft Academic Search

Pervasive Social Computing is a novel collective paradigm, derived from pervasive computing, social media, social networking, social signal processing, etc. This paper reviews Pervasive Social Computing as an integrated computing environment, which promises to augment five facets of human intelligence in physical environment awareness, behavior awareness, community awareness, interaction awareness, and content awareness. Reviews of related studies are given and

Jiehan Zhou; Junzhao Sun; Kumaripaba Athukorala; Dinesh Wijekoon

2010-01-01

26

Context-Aware Pervasive Computing at Large: Three Example Applications  

E-print Network

: the situation What is a context-aware pervasive computing system? A system that can respond intelligentlyContext-Aware Pervasive Computing at Large: Three Example Applications Seng W. Loke Department;Context-Awareness in Pervasive Computing Started in Schilit's PhD thesis on context-awareness for mobile

Loke, Seng W. - Loke, Seng W.

27

Logistics Management System Design under Pervasive Computing Environment  

Microsoft Academic Search

Pervasive computing as the third mode of computing is being applied in all aspects of life. The paper has given out a new design of logistic by using products and theory of pervasive. Design of modern logistics management system, under using of pervasive computing environment, will make Logistics industry achieve greater efficiency and more relaxed management environment.

Tiening Wang; Nansong Hu

2010-01-01

28

Public Pervasive Computing: Making the Invisible Visible  

Microsoft Academic Search

The increasing deployment of pervasive computing technologies in urban environments has inspired researchers to explore the intersections between physical, social, and digital domains. The multidisciplinary Just-for-Us project is developing a mobile Web service designed to facilitate new forms of interaction by adapting content to the user's physical and social context. These trends have motivated researchers within the human-computer interaction (HCI)

Jesper Kjeldskov; Jeni Paay

2006-01-01

29

A New System Architecture for Pervasive Computing  

E-print Network

We present new system architecture, a distributed framework designed to support pervasive computing applications. We propose a new architecture consisting of a search engine and peripheral clients that addresses issues in scalability, data sharing, data transformation and inherent platform heterogeneity. Key features of our application are a type-aware data transport that is capable of extract data, and present data through handheld devices (PDA (personal digital assistant), mobiles, etc). Pervasive computing uses web technology, portable devices, wireless communications and nomadic or ubiquitous computing systems. The web and the simple standard HTTP protocol that it is based on, facilitate this kind of ubiquitous access. This can be implemented on a variety of devices - PDAs, laptops, information appliances such as digital cameras and printers. Mobile users get transparent access to resources outside their current environment. We discuss our system's architecture and its implementation. Through experimental...

Ismail, Anis; Ismail, Ziad

2011-01-01

30

Analytical techniques for debugging pervasive computing environments  

E-print Network

User level debugging of pervasive environments is important as it provides the ability to observe changes that occur in a pervasive environment and fix problems that result from these changes, especially since pervasive ...

Nigam, Atish, 1981-

2004-01-01

31

QoS-Based Design Process for Pervasive Computing Applications  

E-print Network

QoS-Based Design Process for Pervasive Computing Applications Christine Louberry LIUPPA IUT de the recurrent problem of QoS management in pervasive computing due to resource limits, context changes and users' requirements. We propose a QoS- driven design process allowing managing applications limits and particularities

32

Safety Enhancing Mechanisms for Pervasive Computing Systems in Intelligent Environments  

E-print Network

brought upon them by these same services? The extensive use of sensors and actuators allows pervasive computing systems to interpret and influence the physical world. They are capable of providing services assistance and convenience. Many pervasive computing systems are intimate [1], because they have extensive

Helal, Abdelsalam

33

Security in Pervasive Computing: Current Status and Open Issues  

Microsoft Academic Search

Million of wireless device users are ever on the move, be- coming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies. The wireless nature of these devices has fostered a new era of mobility. Thou- sands of pervasive devices are able to

Munirul M. Haque; Sheikh Iqbal Ahamed

2006-01-01

34

DiaSim: A Simulator for Pervasive Computing Applications  

E-print Network

that can be viewed as sensors (e.g., GPS and accelerometer) and actuators (e.g., displays and speakers detecting bluetooth components. As in the pervasive computing domain, embedded systems developers need to an

Paris-Sud XI, Université de

35

DiaSim: A Parameterized Simulator for Pervasive Computing Applications  

E-print Network

that can be viewed as sensors (e.g., microphones and buttons) and actuators (e.g., displays and speakers bluetooth components. As in the pervasive computing domain, embedded systems devel- opers need to anticipate

Paris-Sud XI, Université de

36

Project Aura: toward distraction-free pervasive computing  

Microsoft Academic Search

The most precious resource in a computer system is no longer its processor, memory, disk, or network, but rather human attention. Aura aims to minimize distractions on a user's attention, creating an environment that adapts to the user's context and needs. Aura is specifically intended for pervasive computing environments involving wireless communication, wearable or handheld computers, and smart spaces. Human

David Garlan; Daniel P. Siewiorek; Asim Smailagic; Peter Steenkiste

2002-01-01

37

Building Efficient Wireless Infrastructures for Pervasive Computing Environments  

ERIC Educational Resources Information Center

Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but

Sheng, Bo

2010-01-01

38

Field-Based Coordination for Pervasive Computing Applications  

Microsoft Academic Search

Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of information. By having appli- cation agents access in a dynamic and wireless way such distributed in- formation, it is possible to enforce a notable degree of context-awareness in applications, and increase the capabilities of

Marco Mamei; Franco Zambonelli

2007-01-01

39

Managing User-Centric Adaptive Services for Pervasive Computing  

Microsoft Academic Search

Pervasive computing environments need to exhibit highly adaptive behavior to meet the changing task requirements and operational context of visiting mobile users. However this must be balanced with the need of resource owners to meet their goals in administering how users use their resources. This presents challenges of how to manage adaptive systems and how such management should be exercised

David Lewis; Tony O'donnell; Kevin Feeney; Aoife Brady; Vincent Wade

2004-01-01

40

Mobile Geographic Information Services Challenges in Pervasive Computing Environment  

Microsoft Academic Search

Mobile Geographic Information Service concept and the necessaries to begin related research are proposed firstly. Then the discussion about the innovational research challenges of Mobile Geographic Information Services in pervasive computing environment are introduced, including Ubiquitous Positioning technologies, context modeling and adapting, next-generation GIS. The need and importance of many GIScience research topics see new challenges with Mobile Geographic Information

Lei Ye; Yushan Duan; Aishe Shui; Yuanfei Wang

2007-01-01

41

Extended Isotope Programming Model for Pervasive Computing Environment  

Microsoft Academic Search

Pervasive computing environment is high dynamic, and programs need to be enough intelligent to adapt to the dynamicity. Flexibility and adaptability are important features of programs in that environment. Our research team had proposed an Isotope Programming Model (IPM) to support developers in programming the environment. IPM mainly changes the traditional object-oriented approach that put all logic judgment of context

Zhang Junbin; Qi Yong; Hou Di; Xi Min

2008-01-01

42

Enabling Pervasive Computing with Smart Phones George Roussos  

E-print Network

to propose ways in which pervasive computing may benefit from this experience. A common thread throughout to the design of user interaction mechanisms that cater for individuals and groups in particular social contexts of mobile telephones or PDA-type smart-phones currently available should also be useful for similar devices

Roussos, George

43

A Stream Redirection Architecture for Pervasive Computing Environments  

E-print Network

. This is a useful capability for emerging pervasive computing environments such as MIT's Project Oxygen Miu (for taking the time to help me with Cricket), everyone in the Networks and Mobile Systems group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2 Related Work 13 2.1 Mobility

44

Pervasive computing goes the last hundred feet with RFID systems  

Microsoft Academic Search

I examine a class of pervasive computers: radio frequency identification tags. RFID tags turn everyday objects into network nodes that uplink IDs and status data to enterprise databases, storing new information as needed. They literally vanish into commonplace objects, offering efficiencies in handling, location, and condition tracking. However, some people caution that we must implement privacy and security features from

V. Stanford

2003-01-01

45

A Smart Meeting Room with Pervasive Computing Technologies  

Microsoft Academic Search

Usability of pervasive computing features along with the detection of a meeting is very effective for the users. In this paper, we present the design of a smart meeting room (SMR) that not only detect the starting and ending of a meeting but also provide the support of participant's context information, knowledge usability and ephemeral group communication. Our approach will

Shameem Ahmed; Moushumi Sharmin; Sheikh Iqbal Ahamed

2005-01-01

46

Time and Location in Sensor Networks Institute for Pervasive Computing  

E-print Network

is that physical time and location play a crucial role in sen- sor networks. To understand why this is true, let usTime and Location in Sensor Networks Kay R¨omer Institute for Pervasive Computing ETH Zurich roemer@inf.ethz.ch Abstract Due to the close coupling of sensor networks to the real world, physical time and location play

47

Pervasive Computing and Communication Technologies for U-Learning  

ERIC Educational Resources Information Center

The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or

Park, Young C.

2014-01-01

48

Rethinking Context for Pervasive Computing: Adaptive Shared Perspectives  

E-print Network

by myriad facets of the nearby physical and cyber environments. To fully characterize its situation--Mobile and pervasive computing applications de- pend on environmental awareness, not just of their own local system devices that represent users and their changing digital situations. These devices are integrated

Julien, Christine

49

Towards pervasive computing in health care A literature review  

PubMed Central

Background The evolving concepts of pervasive computing, ubiquitous computing and ambient intelligence are increasingly influencing health care and medicine. Summarizing published research, this literature review provides an overview of recent developments and implementations of pervasive computing systems in health care. It also highlights some of the experiences reported in deployment processes. Methods There is no clear definition of pervasive computing in the current literature. Thus specific inclusion criteria for selecting articles about relevant systems were developed. Searches were conducted in four scientific databases alongside manual journal searches for the period of 2002 to 2006. Articles included present prototypes, case studies and pilot studies, clinical trials and systems that are already in routine use. Results The searches identified 69 articles describing 67 different systems. In a quantitative analysis, these systems were categorized into project status, health care settings, user groups, improvement aims, and systems features (i.e., component types, data gathering, data transmission, systems functions). The focus is on the types of systems implemented, their frequency of occurrence and their characteristics. Qualitative analyses were performed of deployment issues, such as organizational and personnel issues, privacy and security issues, and financial issues. This paper provides a comprehensive access to the literature of the emerging field by addressing specific topics of application settings, systems features, and deployment experiences. Conclusion Both an overview and an analysis of the literature on a broad and heterogeneous range of systems are provided. Most systems are described in their prototype stages. Deployment issues, such as implications on organization or personnel, privacy concerns, or financial issues are mentioned rarely, though their solution is regarded as decisive in transferring promising systems to a stage of regular operation. There is a need for further research on the deployment of pervasive computing systems, including clinical studies, economic and social analyses, user studies, etc. PMID:18565221

Orwat, Carsten; Graefe, Andreas; Faulwasser, Timm

2008-01-01

50

Autonomic Computing for Pervasive ICT - A Whole-System Perspective  

NASA Astrophysics Data System (ADS)

Pervasive ICT [1] heralds a world full of vast numbers of devices and software entities that are able to communicate with one another. For devices, the communication will typically be via wireless networking technologies such as WiFi, Bluetooth, or 3G. A key challenge to realising the pervasive ICT vision, or at least to make it a truly useful vision, is the development of an associated set of technologies that will allow these underlying components to be assembled in real time, to provide useful applications and services. Initial progress towards this goal is proceeding under several initiatives such as Web Services, GRID computing, and peer-to-peer (P2P) computing. These areas in fact have many fundamental underlying concerns in common.

Shackleton, M.; Saffre, F.; Tateson, R.; Bonsma, E.; Roadknight, C.

51

Semantic Annotation for Web Service Processes in Pervasive Computing  

NASA Astrophysics Data System (ADS)

In this chapter, we propose a new approach to the discovery, the selection and the automated composition of distributed processes in a pervasive computing environment, described as semantic web services through a new semantic annotation. In our approach, we map a process in a pervasive computing environment into a state transition system (STS) and semantically annotate it with a minimal set of ontological descriptions. This novel approach allows us to separate reasoning about processes and reasoning about ontologies. As a consequence, we can perform a limited, but efficient and still useful semantic reasoning for verifying, discovering, selecting and composing web services at the process level. The key idea is to keep separate the procedural and the ontological descriptions and link them through semantic annotations. We define the formal framework, and propose a technique that can exploit simple reasoning mechanisms at the ontological level, integrated with effective reasoning mechanisms devised for procedural descriptions of web services.

di Pietro, Ivan; Pagliarecci, Francesco; Spalazzi, Luca

52

Towards Enhancing Undergraduate Pervasive Computing Skills: An Innovative Multi-Disciplinary Approach 1  

Microsoft Academic Search

Pervasive Computing is becoming more and more prevalent in our society. Rapid developments in wireless technologies and Sensor-network-based smart spaces are creating an urgent need for well trained Pervasive Computing Engineers. This NSF-funded project seeks to enhance our undergraduate computing skills by establishing a Wireless & Mobile Computing lab environment. Our project has the following innovations: (1) The establishment of

Fei Hu; Ankur Teredesai

53

2 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$26.00 2009 IEEE V I R T U A L M A C H I N E S  

E-print Network

a solid foundation for this still fast-growing area. The vision of "information at my finger- tips at any on the other path is an entirely new world in which mobile computing seamlessly augments users' cognitive, computer vision and graphics, machine learning, augmented re- ality, planning, and decision-making. By thus

Satyanarayanan, Mahadev "Satya"

54

Bond Computing Systems: a Biologically Inspired and High-level Dynamics Model for Pervasive Computing  

E-print Network

Bond Computing Systems: a Biologically Inspired and High-level Dynamics Model for Pervasive Computing Linmin Yang1 , Zhe Dang1 , and Oscar H. Ibarra2 1 School of Electrical Engineering and Computer Science Washington State University Pullman, WA 99164, USA 2 Department of Computer Science University

Dang, Zhe

55

Bond Computing Systems: a Biologically Inspired and High-level Dynamics Model for Pervasive Computing  

E-print Network

Bond Computing Systems: a Biologically Inspired and High-level Dynamics Model for Pervasive Computing Linmin Yang1 , Zhe Dang1 , and Oscar H. Ibarra2 1 School of Electrical Engineering and Computer of Computer Science University of California Santa Barbara, CA 93106, USA ibarra@cs.ucsb.edu Abstract

Dang, Zhe

56

MB++: An Integrated Architecture for Pervasive Computing and High-Performance Computing  

E-print Network

MB++: An Integrated Architecture for Pervasive Computing and High-Performance Computing David J. The transformation engine executes dataflow graphs of transformations on high-performance computing resources utilization of high-performance computing resources. A comprehensive solution requires not only facilities

Ramachandran, Umakishore

57

Volcano Monitoring: A Case Study in Pervasive Computing  

NASA Astrophysics Data System (ADS)

Recent advances in wireless sensor network technology have provided robust and reliable solutions for sophisticated pervasive computing applications such as inhospitable terrain environmental monitoring. We present a case study for developing a real-time pervasive computing system, called OASIS for optimized autonomous space in situ sensor-web, which combines ground assets (a sensor network) and space assets (NASAs earth observing (EO-1) satellite) to monitor volcanic activities at Mount St. Helens. OASISs primary goals are: to integrate complementary space and in situ ground sensors into an interactive and autonomous sensorweb, to optimize power and communication resource management of the sensorweb and to provide mechanisms for seamless and scalable fusion of future space and in situ components. The OASIS in situ ground sensor network development addresses issues related to power management, bandwidth management, quality of service management, topology and routing management, and test-bed design. The space segment development consists of EO-1 architectural enhancements, feedback of EO-1 data into the in situ component, command and control integration, data ingestion and dissemination and field demonstrations.

Peterson, Nina; Anusuya-Rangappa, Lohith; Shirazi, Behrooz A.; Song, Wenzhan; Huang, Renjie; Tran, Daniel; Chien, Steve; Lahusen, Rick

58

Published by the IEEE CS n 1536-1268/08/$25.00 2008 IEEE PERVASIVE computing Education & TrainingEditor: Scott F. Midkiff n Virginia Tech n midkiff@vt.edu  

E-print Network

& TrainingEditor: Scott F. Midkiff n Virginia Tech n midkiff@vt.edu As a field, computer science faces Tech and Bryn MawrCollegeandsponsoredbyMicro- soft Research (www.roboteducation. org). This article discusses the first-year results of a three-year project. InstItute for Personal robots In educat

Guzdial, Mark

59

80 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 2014 IEEE ConferencesEditor: Elizabeth Belding n UC Santa Barbara n ebelding@cs.ucsb.edu  

E-print Network

more information on ISWC 13, see this issue's Wearable Computing department). KEynotES: From AnImAtIon't satisfied by simple cartoon movies anymore but demand customized digital and physi- cal experiences that involve a variety of devices and social media integration. Challenges for the animation industry, however

60

Data-Centric Middleware for Context-Aware Pervasive Computing Guanling Chen  

E-print Network

if not carefully managed. To minimize user distraction the applications must be aware of and adapt to the situationData-Centric Middleware for Context-Aware Pervasive Computing Guanling Chen , Ming Li , and David and deploying context-aware pervasive-computing applications calls for distributed software infrastructures

Kotz, David

61

Collaborative editing within the pervasive collaborative computing environment  

SciTech Connect

Scientific collaborations are established for a wide variety of tasks for which several communication modes are necessary, including messaging, file-sharing, and collaborative editing. In this position paper, we describe our work on the Pervasive Collaborative Computing Environment (PCCE) which aims to facilitate scientific collaboration within widely distributed environments. The PCCE provides a persistent space in which collaborators can locate each other, exchange messages synchronously and asynchronously and archive conversations. Our current interest is in exploring research and development of shared editing systems with the goal of integrating this technology into the PCCE. We hope to inspire discussion of technology solutions for an integrated approach to synchronous and asynchronous communication and collaborative editing.

Perry, Marcia; Agarwal, Deb

2003-09-11

62

An Impregnable Lightweight Device Discovery (ILDD) Model for the Pervasive Computing Environment of Enterprise Applications  

Microsoft Academic Search

The worldwide use of handheld devices (personal digital assistants, cell phones, etc.) with wireless connectivity will reach 2.6 billion units this year and 4 billion by 2010. More specifically, these handheld devices have become an integral part of industrial applications. These devices form pervasive ad hoc wireless networks that aide in industry applications. However, pervasive computing is susceptible and vulnerable

Munirul M. Haque; Sheikh Iqbal Ahamed

2008-01-01

63

An Assessment Tool for Out of Classroom Learning using Pervasive Computing Technologies  

Microsoft Academic Search

Due to the promise and proliferation of portable low-cost lightweight devices and emergent short range, low-power wireless communication networks, pervasive computing has been evolved during the last few years. Here numerous, casually accessible, often invisible, frequently mobile or embedded devices are connected to an increasingly pervasive network structure. It leads providing support in versatile areas, which include but are not

Sheikh I. Ahamed; Moushumi Sharmin; Shameem Ahmed; Michael J. Havice; Suresh Anamanamuri

64

Today, there's an urgent need for well-trained pervasive computing engi-  

E-print Network

400), Principles of Wireless and Mobile Networks (CECS 500), and Pervasive Computing Architec- ture such as sensor database man- agement and sensor data mining. Com- puter engineering students can also learn about the integration of typical pervasive networks, including high-speed wireless local area networks (WLANs), mobile

Hu, Fei

65

IEEE Internet Computing Online  

NSDL National Science Digital Library

The Institute of Electrical and Electronics Engineers offers this webzine as a companion to its new bimonthly print magazine IEEE Internet Computing. The purpose of IC Online is to "address the Internet's widening impact on engineering practice and society." The January/February 1997 debut issue contains the full text of the print magazine, including an interview with George Gilder, and articles on Internet-enabled computer-aided design and agents on the web, among others. It also contains the Arachnoid Tourist, reviews of selected engineering-related Internet sites. Future issues of IC Online will contain "magazine excerpts and web-unique content." Print magazine subscription information is available at the site.

1997-01-01

66

IEEE Internet Computing Online  

NSDL National Science Digital Library

The Institute of Electrical and Electronics Engineers offers this webzine as a companion to its new bimonthly print magazine IEEE Internet Computing. The purpose of IC Online is to "address the Internet's widening impact on engineering practice and society." The January/February 1997 debut issue contains the full text of the print magazine, including an interview with George Gilder, and articles on Internet-enabled computer-aided design and agents on the web, among others. It also contains the Arachnoid Tourist, reviews of selected engineering-related Internet sites. Future issues of IC Online will contain "magazine excerpts and web-unique content." Print magazine subscription information is available at the site.

67

IEEE Computer Society: http://computer.org Computer: http://computer.org/computer  

E-print Network

IEEE Computer Society: http://computer.org Computer: http://computer.org/computer computer@computer.org IEEE Computer Society Publications Office: +1 714 821 8380 COVER FEATURES GUEST EDITOR'S INTRODUCTION 28 Computational Photography--The Next Big Step Oliver Bimber Computational photography extends

Stanford University

68

Smart Classroom: Bringing Pervasive Computing into Distance Learning  

NASA Astrophysics Data System (ADS)

In recent years, distance learning has increasingly become one of themost important applications on the internet and is being discussed and studied by various universities, institutes and companies. The Web/Internet provides relatively easy ways to publish hyper-linked multimedia content for more audiences. Yet, we find that most of the courseware are simply shifted from textbook to HTML files. However, in ost cases the teacher's live instruction is very important for catching the attention and interest of the students. That's why Real-Time Interactive Virtual Classroom (RTIVC) always plays an indispensable role in distance learning, where teachers nd students located in different places can take part in the class synchronously through certain multimedia communication systems and obtain real-time and mediarich interactions using Pervasive Computing technologies [1]. The Classroom 2000 project [2] at GIT has been devoted to the automated capturing of the classroom experience. Likewise, the Smart Classroom project [3] at our institute is focused on Tele-education. Most currently deployed real-time Tele-education systems are desktop-based, in which the teacher's experience is totally different from teaching in a real classroom.

Shi, Yuanchun; Qin, Weijun; Suo, Yue; Xiao, Xin

69

Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions  

Microsoft Academic Search

Abstract Weexplore,the challenges and research directions in building models, protocols and architectures to support security in pervasive ,computing ,environments. We argue that to be successful, efforts to build these would have to recognize,from ,the onset ,that pervasive ,computing settings are complex ,socio-technical system and would thus,have ,to go ,beyond ,traditional system-centric approaches,to analyzing and designing security.

Roshan K. Thomas; Ravi S. Sandhu

2004-01-01

70

Wireless Adaptive Therapeutic TeleGaming in a Pervasive Computing Environment  

Microsoft Academic Search

\\u000a This chapter introduces a wireless, pervasive computing approach to adaptive therapeutic telegaming considered in the context\\u000a of near set theory. Near set theory provides a formal basis for observation, comparison and classification of perceptual granules.\\u000a A perceptual granule is defined by a collection of objects that are graspable by the senses or by the mind. In the proposed pervasive computing

James F. Peters; Tony Szturm; Maciej Borkowski; Dan Lockery; Sheela Ramanna; Barbara Shay

2009-01-01

71

The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing  

Microsoft Academic Search

In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the all-or-nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the all-or-nothing anti-theft policy is to chain devices together in friendly networks so that any device will only work when it can see all of its

Jakob Illeborg Pagter; Michael stergaard Pedersen

2007-01-01

72

RFID in Pervasive Computing: State-of-the-art and Outlook  

E-print Network

RFID in Pervasive Computing: State-of-the-art and Outlook George Roussos School of Computer Science Department of Computer Science University of Bath Bath BA2 7AY, UK April 7, 2008 Abstract rfid has already successful technologies in the history of computing. Beyond doubt, rfid is an effective automatic iden

Roussos, George

73

Pervasive and Mobile Computing 8 (2012) 82102 Contents lists available at SciVerse ScienceDirect  

E-print Network

Pervasive and Mobile Computing 8 (2012) 82­102 Contents lists available at SciVerse ScienceDirect Pervasive and Mobile Computing journal homepage: www.elsevier.com/locate/pmc Fast track article, United States b Computer Science & Engineering, University of Washington, Seattle, WA 98195, United

Fogarty, James A.

74

Pervasive Computing at Scale: Transforming the State of the Art Diane J. Cook Sajal K. Das  

E-print Network

social networking media are becoming fairly commonplace. These visible successes are built on mature of users, including those of mobile phones and social media. Sponsored by the US National Science techniques, cloud computing and social networking paradigms have enabled us to create pervasive computing

Cook, Diane J.

75

Mobile Agents for Pervasive Computing Using a Novel Method of Message Passing  

E-print Network

Mobile Agents for Pervasive Computing Using a Novel Method of Message Passing David Levine, Renjith devices throughout an individual's working and living environment. Mobile agents are software entities that can migrate between servers or mobile agent environments of the network accomplishing various tasks

Záruba, Gergely

76

Self-Organizing Overlay Knowledge Networks for Future Pervasive Computing Applications  

Microsoft Academic Search

The mass deployment of sensors and pervasive computing systems expected in the next few years, will require novel approaches to program and gather information from such systems. Suitable approaches will be general purpose, independent of a specific scenario and sensor deployment, and able to adapt autonomically to different scales and to a number of unforeseen circumstances. This chapter focuses on

Nicola Bicocchi; Marco Mamei; Franco Zambonelli

77

A Taxonomy-Driven Approach to Visually Prototyping Pervasive Computing Applications  

E-print Network

A Taxonomy-Driven Approach to Visually Prototyping Pervasive Computing Applications Zoe Drey1 environment into a visual pro- gramming language. A taxonomy describes the relevant entities of a given to taxonomical information. We have implemented a visual environment to develop taxonomies and orchestration

Paris-Sud XI, Universit de

78

ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications  

Microsoft Academic Search

To ensure smooth functioning of numerous handheld de- vices anywhere anytime, the importance of self-healing mechanism cannot be overlooked. Incorporation of effi- cient fault detection and recovery in device itself is the quest for long but there is no existing self-healing scheme for devices running in pervasive computing environments that can be claimed as the ultimate solution. Moreover, the highest

Shameem Ahmed; Moushumi Sharmin; Sheikh Iqbal Ahamed

2007-01-01

79

SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) inPervasive Computing Environments  

Microsoft Academic Search

To facilitate thousands of hand held device users' lookup for services anywhere anytime, the importance of a resource discovery scheme in pervasive computing environments cannot be overlooked. The incorporation of security, adaptability, fault tolerance, and efficiency features is the quest for long but there is no existing resource discovery scheme that can be claimed as \\

Moushumi Sharmin; Shameem Ahmed; Sheikh Iqbal Ahamed

2005-01-01

80

SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment  

Microsoft Academic Search

SSRD is a secure resource discovery model for devices running in a pervasive computing environment. SSRD is based on a lightweight trust model. SSRD+ is an extension of the existing SSRD model. In SSRD+, we enhance the trust model by adding dynamic trust relationship and also specifying behavioral characteristics that determine the level of trust among devices. We also add

Moushumi Sharmin; Sheikh Iqbal Ahamed; Shameem Ahmed; Haifeng Li

2006-01-01

81

An Adaptive Lightweight Trust Reliant Secure Resource Discovery for Pervasive Computing Environments  

Microsoft Academic Search

A secure resource discovery model for devices running in pervasive computing environments has become significant. Due to the constrained nature of these devices, the need for a model that allows discovery and sharing of resources without putting much overhead on the operation of devices is needed. The dependency on fixed powerful machines for ensuring security is not desired and also

Moushumi Sharmin; Shameem Ahmed; Sheikh Iqbal Ahamed

2006-01-01

82

Maintaining Privacy in Pervasive Computing Enabling Acceptance of Sensor-based Services  

Microsoft Academic Search

\\u000a During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship\\u000a to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the\\u000a information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists

A. Soppera; T. Burbridge

2006-01-01

83

Creating Innovative Solutions for Future Hotel Rooms with Intelligent Multimedia and Pervasive Computing  

NASA Astrophysics Data System (ADS)

Pervasive computing and intelligent multimedia technologies are becoming increasingly important to the modern way of living. However, many of their potential applications have not been fully realized yet. This chapter explores how innovative applications can be developed to meet the needs of the next generation hotels. Futuristic hotel rooms aim to be more than home-away-from-home, and as a consequence, offer tremendous opportunities for developing innovative applications of pervasive computing and intelligent multimedia. Next generation hotels will make increased use of technology products to attract new customers. High end TV screens, changeable room ambiance, biometric guest recognition, and electronic check-in facilities are some of the features already being implemented by some hotels. Entirely futuristic hotels in the sea, the stratosphere or the outer space, are also being proposed. All of these provide many novel opportunities for developing innovative solutions using intelligent multimedia and ubiquitous computing.

Sharda, Nalin K.

84

Object Technology for Ambient Intelligence and Pervasive Computing: Language Constructs and Infrastructures  

Microsoft Academic Search

This report summarizes the main activities held during the second workshop on object-technology for Ambient Intelligence and\\u000a Pervasive Computing held at ECOOP 2006. The workshop covered topics varying from low-level considerations such as garbage\\u000a collection and object migration, via programming language infrastructure such as reflection and context-oriented programming,\\u000a to engineering applications using maturing techniques such as aspects.

Holger Mgge; Pascal Cherrier; Wolfgang De Meuter; ric Tanter

2006-01-01

85

A Framework for QoS-aware Web Service Composition in Pervasive Computing Environments  

Microsoft Academic Search

By adopting standard-based protocols, service components from different providers can be conveniently integrated into a composite service regardless of their locations, platforms and\\/or hardware speeds. This paper presents a framework to facilitate dynamic service composition, selection and adaptation of QoS-aware Web services towards pervasive computing. Considering both functional and QoS characteristics of Web services, this framework intends to generate the

Zhi-yong ChenI; Qing Yao

2008-01-01

86

MAKING USE OF SERENDIPITY: A NEW DIRECTION FOR PERVASIVE COMPUTING FROM A SOCIOLOGICAL VIEW  

Microsoft Academic Search

Everyday, a person can have numerous opportunities to connect with strangers or acquaintances around him\\/her. In this paper, we demonstrate how pervasive computing can help a person connect with others by initiating communication, and how (s)he can take advantage of these connections. We envision a future mobile information space (called the MobiSpace) that is constructed based on ad hoc collaborative

Chao-Ming Teng; Hao-hua Chu; Jane Yung-jen Hsu

2004-01-01

87

48 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE C O N T E X T -A W A R E C O M P U T I N G  

E-print Network

O N T E X T - A W A R E C O M P U T I N G Context-Aware Artifacts: Two Development Approaches O ne of the most exciting and impor- tant recent developments in con- text-aware computing is to make everyday appliances, devices, and objects context aware. A context- aware artifact uses sensors to perceive

Loke, Seng W. - Loke, Seng W.

88

Delegation, Arbitration and High-Level Service Discovery as Key Elements of a Software Infrastructure for Pervasive Computing  

E-print Network

The dream of pervasive computing is slowly becoming a reality. A number of projects around the world are constantly contributing ideas and solutions that are bound to change the way we interact with our environments and ...

Gajos, Krzysztof

2003-06-01

89

2010 IEEE Computer Society Student Competition System Competition  

E-print Network

2010 IEEE Computer Society Student Competition System Competition The IEEE Computer Society is launching a new design competition competition because it cuts across traditional boundaries by combining architecture with program design

Kostic, Milivoje M.

90

2 1541-1672/06/$20.00 2006 IEEE IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society  

E-print Network

of the first order to the field of machine ethics. The long history of science and technology is rife2 1541-1672/06/$20.00 2006 IEEE IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society M a c h i n e E t h i c s Computational Models of Ethical Reasoning: Challenges, Initial Steps

McLaren, Bruce Martin

91

Identity-Based Inter-domain Authentication Scheme in Pervasive Computing Environments  

NASA Astrophysics Data System (ADS)

An Identity-based signature scheme is proposed based on additive elliptic curve group. The verification result of the signature is a constant with respect to the signer's identifier. Then an inter-domain authentication scheme is constructed by combining the proposed signature scheme. During the authentication, a user constructs the signature of timestamp as authentication proof, which realizes secure inter-domain authentication and user anonymity. It is showed that the proposed scheme has superiority in both security and efficiency, and is more suitable for pervasive computing.

Huo, Shi-Wei; Luo, Chang-Yuan; Xin, Hong-Zhi

92

IEEE Network September/October 20134 n order to provide rich mobile pervasive services to  

E-print Network

applications demand- ed by users. Recently, mobile cloud computing (MCC) technologies for mobile devices have categories: New mobile cloud computing architectures Computation offloading for mobile cloud computing, "Mobile Cloud Computing Service Models: A User-Cen- tric Approach," by Huang et al., which reviews diverse

Chen, Min

93

Optimal Resource Allocation for Pervasive Health Monitoring Systems  

E-print Network

Optimal Resource Allocation for Pervasive Health Monitoring Systems with Body Sensor Networks Yifeng He, Member, IEEE, Wenwu Zhu, Fellow, IEEE, and Ling Guan, Fellow, IEEE Abstract--Pervasive health monitoring is an eHealth service, which plays an important role in prevention and early detection of diseases

Chen, Ing-Ray

94

10 Published by the IEEE Computer Society 1089-7801/10/$26.00 2010 IEEE IEEE INTERNET COMPUTING GuestEditors'Introduction  

E-print Network

and technical challenges inherent to this "Internet of Things," of which privacy is the most compelling10 Published by the IEEE Computer Society 1089-7801/10/$26.00 © 2010 IEEE IEEE INTERNET COMPUTING GuestEditors'Introduction Internet Predictions Vinton G. Cerf Google Munindar P. Singh North Carolina

95

IEEE INTERNET COMPUTING 1089-7801/05/$20.00 2005 IEEE Published by the IEEE Computer Society JULY AUGUST 2005 5 From the Editor in Chief...  

E-print Network

Networked IEEE INTERNET COMPUTING 1089-7801/05/$20.00 © 2005 IEEE Published by the IEEE Computer- ing speed and flexibility." In modern terms, a memex was a desk-like personal workstation through to augment human cognitive processes. This has since been so incor- porated into the intellectual fabric

Filman, Robert E.

96

MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments  

Microsoft Academic Search

,ABSTRACT With the tremendous ,increase in the use of mobile ,handheld ,and wearable devices, the pervasive computing arena is becoming stronger and more ,powerful ,day by day. Despite having various physical constraints, many of the functionalities enjoyed by resource-rich mobile devices have been incorporated in these tiny devices. That is why ,different fields of research ,have ,been developed, this,area. There

Moushumi Sharmin; Shameem Ahmed; Sheikh Iqbal Ahamed

2006-01-01

97

Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile Phones  

Microsoft Academic Search

Passive RFID technology and unobtrusive Bluetooth- enabled active tags are means to augment products and everyday objects with information technology invisible to human users. This paper analyzes general interaction pat- terns in such pervasive computing settings where informa- tion about the user's context is derived by a combination of active and passive tags present in the user's environment. The concept

Frank Siegemund; Christian Fler

2003-01-01

98

Published by the IEEE CS n 1536-1268/08/$25.00 2008 IEEE PERVASIVE computing 13 G u e s t e d i t o r s ' i n t r o d u c t i o n  

E-print Network

t o r s ' i n t r o d u c t i o n T hese days, "hacking" and "hack- ers" are often viewed negatively or criminal intent. However, hacking's older definitions are quite different: interacting with a computer, and even (in many circles) laudatory. Some associate hacking with (usually) harm- less technical stunts

Heidemann, John

99

Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-based Services  

NASA Astrophysics Data System (ADS)

During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists and science fiction writers. Today this subject has become of interest to business, government, and society. Governmental authorities exercise their power through the networked environment. Credit card databases maintain our credit history and decide whether we are allowed to rent a house or obtain a loan. Mobile telephones can locate us in real time so that we do not miss calls. Within another 10 years, all sorts of devices will be connected through the network. Our fridge, our food, together with our health information, may all be networked for the purpose of maintaining diet and well-being. The Internet will move from being an infrastructure to connect computers, to being an infrastructure to connect everything [2, 3].

Soppera, A.; Burbridge, T.

100

80 Published by the IEEE Computer Society 1089-7801/08/$25.00 2008 IEEE IEEE INTERNET COMPUTING Editor: Charles Petrie petrie@stanford.edu  

E-print Network

Peering 80 Published by the IEEE Computer Society 1089-7801/08/$25.00 © 2008 IEEE IEEE INTERNET and oppor- tunities -- and if the Internet could tell us. Future Scenarios To see this idea's potential or record company, just the Internet. They've organized their tour by renting from BandWiz, an Internet

Petrie, Charles

101

Wireless Adaptive Therapeutic TeleGaming in a Pervasive Computing Environment  

NASA Astrophysics Data System (ADS)

This chapter introduces a wireless, pervasive computing approach to adaptive therapeutic telegaming considered in the context of near set theory. Near set theory provides a formal basis for observation, comparison and classification of perceptual granules. A perceptual granule is defined by a collection of objects that are graspable by the senses or by the mind. In the proposed pervasive computing approach to telegaming, a handicapped person (e.g., stroke patient with limited hand, finger, arm function) plays a video game by interacting with familiar instrumented objects such as cups, cutlery, soccer balls, nozzles, screw top-lids, spoons, so that the technology that makes therapeutic exercise game-playing possible is largely invisible (Archives of Physical Medicine and Rehabilitation 89:2213-2217, 2008). The basic approach to adaptive learning (AL) in the proposed telegaming environment is ethology-inspired and is quite different from the traditional approach to reinforcement learning. In biologically-inspired learning, organisms learn to achieve some goal by durable modification of behaviours in response to signals from the environment resulting from specific experiences (Animal Behavior, 1995). The term adaptive is used here in an ethological sense, where learning by an organism results from modifying behaviour in response to perceived changes in the environment. To instill adaptivity in a video game, it is assumed that learning by a video game is episodic. During an episode, the behaviour of a player is measured indirectly by tracking the occurrence of gaming events such as a hit or a miss of a target (e.g., hitting a moving ball with a game paddle). An ethogram provides a record of behaviour feature values that provide a basis a functional registry for handicapped players for gaming adaptivity. An important practical application of adaptive gaming is therapeutic rehabilitation exercise carried out in parallel with playing action video games. Enjoyable and engaging interactive gaming will motivate patients to complete the rehabilitation process. Adaptivity is seen as a way to make action games more accessible to those who have physical and cognitive impairments. The telegaming system connects to the internet and implements a feed-and-forward mechanism that transmits gaming session tables after each gaming session to a remote registry accessible to therapists and researchers. The contribution of this chapter is the introduction of a framework for wireless telegaming useful in therapeutic rehabilitation.

Peters, James F.; Szturm, Tony; Borkowski, Maciej; Lockery, Dan; Ramanna, Sheela; Shay, Barbara

102

Locating Objects in Mobile Computing Evaggelia Pitoura, Member, IEEE Computer Society, and  

E-print Network

Locating Objects in Mobile Computing Evaggelia Pitoura, Member, IEEE Computer Society, and George Samaras, Member, IEEE Computer Society AbstractIn current distributed systems, the notion of mobility is emerging in many forms and applications. Mobility arises naturally in wireless computing since the location

Pitoura, Evaggelia

103

IEEE TRANSACTIONS ON MOBILE COMPUTING 1 Leveraging Smartphone Cameras for  

E-print Network

IEEE TRANSACTIONS ON MOBILE COMPUTING 1 Leveraging Smartphone Cameras for Collaborative Road, IEEE Abstract--Ubiquitous smartphones are increasingly becoming the dominant platform for collaborative sensing. Smartphones, with their ever richer set of sensors, are being used to enable collaborative driver

Martonosi, Margaret

104

IEEE Computer Society Digital Library News (DLN)  

NSDL National Science Digital Library

This newsletter, provided by the IEEE (Institute of Electrical and Electronics Engineers) Computer Society Task Force on Digital Libraries, and issued three times per year (June/July, October, and February), intends to be a "brief alerting/reporting service for those working in the diverse fields which comprise digital libraries." The first issue features a report on the Advances in Digital Libraries Conference, which took place in May, 1997. Pertinent site and electronic journal announcements, and a conference calendar are included. Submissions are encouraged. An archive of the newsletter is available at the above URL.

105

iCare Project: Adopting Pervasive and Persuasive Computing for Assisted Cognition  

E-print Network

physical living to enhance our everyday experiences at home. Specifically, the iCare research seeks of desirable physical and mental activities at home that are considered healthy, creative, productive behaviors, not just supports smart environments. Our current research focus is on adopting pervasive

Ouhyoung, Ming

106

A Sense of Security in Pervasive ComputingIs the Light on When the Refrigerator Door Is Closed?  

NASA Astrophysics Data System (ADS)

In this paper, we investigate how existing theoretical contributions on usable security can serve to guide the design of a specific system. We illustrate how going through this theoretically informed, concrete design process, also provides the basis for complementing existing theoretical contributions. The system we have designed is a system taking advantage of pervasive computing technology to offer hotel guests access to their personal, digital materials while in a hotel room. The design is based on two ideas novel to usable security, namely falsification and the singleton invariant..

Pagter, Jakob Illeborg; Petersen, Marianne Graves

107

Editor: Charles Petrie petrie@stanford.edu 2 Published by the IEEE Computer Society 1089-7801/14/$31.00 2014 IEEE IEEE INTERNET COMPUTING  

E-print Network

-7801/14/$31.00 © 2014 IEEE IEEE INTERNET COMPUTING N o, I'm not trying to apply the term "Inter- net of Things function, and is carried out by the Internet Assigned Num- bers Authority (IANA). Ok, is this a thing for Internet protocols, some of which include things like MIME types and TCP port numbers. Most importantly

Petrie, Charles

108

Editor: Charles Petrie petrie@stanford.edu 2 Published by the IEEE Computer Society 1089-7801/13/$31.00 2013 IEEE IEEE INTERNET COMPUTING  

E-print Network

-7801/13/$31.00 © 2013 IEEE IEEE INTERNET COMPUTING R ecently, a friend asked me to write about Bitcoin. This has always · University of St. Gallen IC-17-06-Peer.indd 2 13/09/13 7:17 PM #12;The Age of DIY NOVEMBER/DECEMBER 2013 3

Petrie, Charles

109

Pervasive and Mobile Computing 9 (2013) 881891 Contents lists available at ScienceDirect  

E-print Network

that smartphones and sensor nodes can communicate through some low power ra- dios, such as Bluetooth and IEEE 802 traces for opportunistic data collection in wireless sensor networks Xiuchao Wu, Kenneth N. Brown, Cormac sensor network Opportunistic data collection a b s t r a c t The increasing ubiquity of smartphones

Sreenan, Cormac J.

2013-01-01

110

The Gator Tech Smart House: A Programmable Pervasive Space  

Microsoft Academic Search

Research groups in both academia and industry have developed prototype systems to demonstrate the benefits of pervasive computing in various application domains. Unfortunately, many first-generation pervasive computing systems lack the ability to evolve as new technologies emerge or as an application domain matures. To address this limitation, the University of Florida's Mobile and Pervasive Computing Laboratory is developing programmable pervasive

Sumi Helal; William C. Mann; Hicham El-zabadani; Jeffrey King; Youssef Kaddoura; Erwin Jansen

2005-01-01

111

26 computer Published by the IEEE Computer Society 0018-9162/13/$31.00 2013 IEEE Gender diversity in ComputinG  

E-print Network

26 computer Published by the IEEE Computer Society 0018-9162/13/$31.00 2013 IEEE Gender diversity that are applied, and as a result, we pay an opportu- nity cost--a cost in products not built, in designs of technology-related majors. This differs significantly from the environment at smaller, #12;march 2013 27 more

Washington at Seattle, University of

112

Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science (FOCS'03) 0272-5428/03 $17.00 2003 IEEE  

E-print Network

Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science (FOCS'03) 0272 Science (FOCS'03) 0272-5428/03 $17.00 © 2003 IEEE #12;Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science (FOCS'03) 0272-5428/03 $17.00 © 2003 IEEE #12;Proceedings of the 44th Annual

Goldwasser, Shafi

113

In Proceedings of the 2008 NSF Next Generation Software Program Workshop, April 14, 2008. Abstract--Most pervasive computing technologies focus on  

E-print Network

-funded project, we instead focus on using computers to support user- centered "activities" that normally do activities, and ensuring robust operation. Our project focuses on the first two challenges. Index Terms--Pervasive computing, activities, home security, home automation. I. INTRODUCTION VER the past few years there has been

Garlan, David

114

Studying the Elusive Experience in Pervasive Games  

ERIC Educational Resources Information Center

Studying pervasive games is inherently difficult and different from studying computer or board games. This article builds upon the experiences of staging and studying several playful pervasive technology prototypes. It discusses the challenges and pitfalls of evaluating pervasive game prototypes and charts methods that have proven useful in

Stenros, Jaakko; Waern, Annika; Montola, Markus

2012-01-01

115

Pervasive Healthcare  

Microsoft Academic Search

The US healthcare industry is confronting a number of challenges, including skyrocketing costs, a growing incidence of medical errors, inadequate staffing, and lack of coverage in rural and underserved urban areas. Healthcare workers are under increasing pressure to provide better services to more people using limited financial and human resources. One proposed solution to the current crisis is pervasive healthcare.

Upkar Varshney

2003-01-01

116

10 PERVASIVE computing Published by the IEEE Computer Society 1536-1268/07/$25.00 2007 IEEE Data Management  

E-print Network

sensing exercise. Most sensor network re- searchers would probably agree that we have placed too much, through the CDC's PulseNet database). Medical patients, including those infected with zooanotic diseases monitor cardiac, respiratory, and other vital signs). Second, we would build a system that com- bines

Deshpande, Amol

117

1536-1268/07/$25.00 2007 IEEE Published by the IEEE Computer Society PERVASIVE computing 39 Underground  

E-print Network

a less instrumental account of city life. Ethnographic studies of existing relationships between urban--the ways in which a mobile technology might behave An ethnographic study and a design proposal study of an existing ur- ban mobility site--namely, Lon- don

Dourish,Paul

118

1APRIL 2009 Published by the IEEE Computer Society0018-9162/09/$25.00 2009 IEEE  

E-print Network

cannot emerge from blind, bottom-up processes. However, one study found that Wikipedia, with little1APRIL 2009 AI REDUX Published by the IEEE Computer Society0018-9162/09/$25.00 2009 IEEE various disciplines such as artificial intelligence, evolutionary computation, biorobotics, artificial

Bongard, Josh

119

Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology.  

PubMed

EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication and distributed computing technologies offered promising ways to bridge these chasms. In this paper, we report an attempt to develop a pervasive on-line EEG-BCI system using state-of-art technologies including multi-tier Fog and Cloud Computing, semantic Linked Data search, and adaptive prediction/classification models. To verify our approach, we implement a pilot system by employing wireless dry-electrode EEG headsets and MEMS motion sensors as the front-end devices, Android mobile phones as the personal user interfaces, compact personal computers as the near-end Fog Servers and the computer clusters hosted by the Taiwan National Center for High-performance Computing (NCHC) as the far-end Cloud Servers. We succeeded in conducting synchronous multi-modal global data streaming in March and then running a multi-player on-line EEG-BCI game in September, 2013. We are currently working with the ARL Translational Neuroscience Branch to use our system in real-life personal stress monitoring and the UCSD Movement Disorder Center to conduct in-home Parkinson's disease patient monitoring experiments. We shall proceed to develop the necessary BCI ontology and introduce automatic semantic annotation and progressive model refinement capability to our system. PMID:24917804

Zao, John K; Gan, Tchin-Tze; You, Chun-Kai; Chung, Cheng-En; Wang, Yu-Te; Rodrguez Mndez, Sergio Jos; Mullen, Tim; Yu, Chieh; Kothe, Christian; Hsiao, Ching-Teng; Chu, San-Liang; Shieh, Ce-Kuen; Jung, Tzyy-Ping

2014-01-01

120

IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 1 Detecting Depression Severity  

E-print Network

IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 1 Detecting Depression Severity from Vocal Prosody Ying the relation between vocal prosody and change in depression severity over time, 57 participants from a clinical trial for treatment of depression were evaluated at seven-week intervals using a semi

Cohn, Jeffrey F.

121

PicoJava Processor Core 60 0740-7475/00/$10.00 2000 IEEE IEEE Design & Test of Computers  

E-print Network

processing (DSP) processor cores available and used today, like the cores from ARM, LSI Logic, MotorolaPicoJava Processor Core 60 0740-7475/00/$10.00 2000 IEEE IEEE Design & Test of Computers Major. Networking applications like network processors, routers on chips and home gateways, portable products like

California at San Diego, University of

122

82 PERVASIVE computing 1536-1268/02/$17.00 2002 IEEE Today, mobile devices and gadgets  

E-print Network

. Refrigerators with Web pads, microwaves that download recipes, and stereo systems that mute when the phone rings Helal EDITOR'S INTRO #12;ular types of devices within a device cat- egory. Here, I introduce J2ME

Helal, Abdelsalam

123

Where the Grid meets the Physical World - Research Issues in Grid and Pervasive Computing  

Microsoft Academic Search

The digital world of Grid technologies meets the physical world through a variety of sensors, instruments and interfaces. The e-Science programme has increasingly become aware of the need to focus on this digital-physical interface of the grid, and the ubiquitous computing community is beginning to look towards the Grid for aspects of processing, data handling and access (for example, in

David De Roure; Tony Hey; Anne E. Trefethen

124

The iBICOOP middleware: Enablers and Services for Emerging Pervasive Computing Environments  

E-print Network

and services to interact with each other: home gateways, laptops, smartphones, UMPC, enterprise servers, Web/cloud computing services... While for a long time interactions have been mostly Web-centric, users now routinely engage in user- centric interactions such as content sharing and social net- working through mobile

Paris-Sud XI, Université de

125

From Grid to Pervasive Computing Where is the breakthrough of next IT boom?  

E-print Network

First Wave · Hardware, silicon chip · Lasted 10-15 years into the 90s · Silicon Valley · Open system-awareness and mobility ­ Case study: Context-aware infrastructure · Grid Computing ­ Service and open service

Sun, Xian-He

126

A framework for evaluating pervasive systems  

Microsoft Academic Search

Purpose A decade and a half after the debut of pervasive computing, a large number of prototypes, applications, and interaction interfaces have emerged. However, there is a lack of consensus about the best approaches to create such systems or how to evaluate them. To address these issues, this paper aims to develop a performance evaluation framework for pervasive computing

Hen-I Yang; Chao Chen; Bessam Abdulrazak; Sumi Helal

2010-01-01

127

Scaling the Web IEEE INTERNET COMPUTING 1089-7801/03/$17.002003 IEEE Published by the IEEE Computer Society MARCH APRIL 2003 83  

E-print Network

: C o: F E F G c: B f: E d: C H Directory cache (DC) Local directory (LD) d, e f n, o i, j, k l, m g by the IEEE Computer Society MARCH · APRIL 2003 83 Daniel A. Menascé · George Mason University · menasce

Menascé, Daniel A.

128

Mobility Helps Peer-to-Peer Security Srdjan CCapkun, Member, IEEE Computer Society,  

E-print Network

Mobility Helps Peer-to-Peer Security Srdjan CCapkun, Member, IEEE Computer Society, Jean-Pierre Hubaux, Senior Member, IEEE Computer Society, and Levente Buttyan Abstract--We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle

Levente, Buttyn

129

Mobility Helps Peer-to-Peer Security Srdjan CCapkun, Member, IEEE Computer Society,  

E-print Network

Mobility Helps Peer-to-Peer Security Srdjan CCapkun, Member, IEEE Computer Society, Jean-Pierre Hubaux, Senior Member, IEEE Computer Society, and Levente Buttyan Abstract--We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle

Capkun, Srdjan

130

Huntsville Chapter of the IEEE Computer Society (http://ewh.ieee.org/r3/huntsville/cs/), Department of Electrical and Computer Engineering (http://www.ece.uah.edu/), LaCASA Laboratory  

E-print Network

such as HDTV's, cell phones, and other appliances are requiring a balance between performance and energyHuntsville Chapter of the IEEE Computer Society (http://ewh.ieee.org/r3/huntsville/cs/), Department://www.ece.uah.edu/~lacasa/), and UAH Chapter of Eta Kappa Nu invite you to a research seminar featuring an IEEE Computer Society

Milenkovi, Aleksandar

131

2002 IEEE NSS/MIC pCT: Hartmut F.-W. Sadrozinski , SCIPP Towards Proton Computed Tomography  

E-print Network

2002 IEEE NSS/MIC pCT: Hartmut F.-W. Sadrozinski , SCIPP SCIPPSCIPP Towards Proton Computed Radiography MC Study #12;2002 IEEE NSS/MIC pCT: Hartmut F.-W. Sadrozinski , SCIPP SCIPPSCIPP Computed · reconstruct mass density () distribution instead of electron distribution #12;2002 IEEE NSS/MIC pCT: Hartmut F

California at Santa Cruz, University of

132

IEEE DESIGN & TEST OF COMPUTERS 0740-7475/96/$05.00 1996 IEEE Vol. 13, No. 1: SPRING 1996, pp. 26-35(Editorial Information: Address questions or comments about this article to  

E-print Network

IEEE DESIGN & TEST OF COMPUTERS 0740-7475/96/$05.00 1996 IEEE Vol. 13, No. 1: SPRING 1996, pp. 26. ________________________________________________________ IEEE DESIGN & TEST OF COMPUTERS 0740-7475/96/$05.00 1996 IEEE Vol. 13, No. 1: SPRING 1996, pp. 48 OF COMPUTERS 0740-7475/96/$05.00 1996 IEEE Vol. 13, No. 1: SPRING 1996, pp. 70-78(Editorial Information: Send

Aboulhamid, El Mostapha

133

January/February 2009 1541-1672/09/$25.00 2009 IEEE 27 Published by the IEEE Computer Society  

E-print Network

January/February 2009 1541-1672/09/$25.00 © 2009 IEEE 27 Published by the IEEE Computer Society S e m a n t i c S c i e n t i f i c K n o w l e d g e i n t e g r a t i o n Ontology Design for Scientific Theories That Make Probabilistic Predictions David Poole, University of British Columbia Clinton

Poole, David

134

Recent Advances in AI for Computational Sustainability AI and Sustainability Department, IEEE Intelligent Systems  

E-print Network

Recent Advances in AI for Computational Sustainability AI and Sustainability., "Computing and AI for a Sustainable Future," IEEE Intelligent Systems, vol. 27, no. 4, July/Aug 2012. Though research at the intersection of AI

Fisher, Douglas H.

135

Model-Driven.Development. for.Pervasive.Information. Systems  

Microsoft Academic Search

This chapter focuses on design methodologies for pervasive information systems (PIS). It aims to contribute to the efficiency and effectiveness of software development of ubiquitous services\\/applications supported on pervasive information systems. Pervasive information systems are comprised of conveniently orchestrated embed- ded or mobile computing devices that offer innovative ways to support existing and new business models. Those systems are characterized

136

A Framework for the design of privacy preserving pervasive healthcare  

Microsoft Academic Search

Privacy is an important aspect of pervasive and ubiquitous computing systems, and, in particular, pervasive healthcare. With reference to previous approaches on developing privacy sensitive pervasive healthcare applications, we detail a framework for the design of such systems that aims to minimise the impact of privacy on such systems. In reviewing previous approaches, we extract and combine common elements in

Simon Moncrieff; Svetha Venkatesh; Geoff West

2009-01-01

137

Tracy Kay Camp Biography (December 2012) Tracy Camp joined the Colorado School of Mines in 1998 and is a Full Professor of computer  

E-print Network

venues such as the ACM International Conference on Mobile Computing and Networking (12.3% acceptance rate, the Pervasive and Mobile Computing, Ad Hoc Networks, and Computer Communications. Dr. Camp was the elected and Networking (MobiCom), ACM's International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), IEEE

138

IEEE TRANSACTIONS ON EDUCATION, VOL. 54, NO. 2, MAY 2011 197 Integrating Embedded Computing Systems Into  

E-print Network

on in the curriculum that will prepare them for the demands of today's embedded world. But how should embedded systemsIEEE TRANSACTIONS ON EDUCATION, VOL. 54, NO. 2, MAY 2011 197 Integrating Embedded Computing Systems Into High School and Early Undergraduate Education Bridget Benson, Member, IEEE, Arash Arfaee, Choon Kim

Kastner, Ryan

139

IEEE Network January/February 200228 he events in the area of computer networks during the  

E-print Network

; and restricted and authenticated access to resources. 0890-8044/02/$17.00 2002 IEEE Projecting AdvancedIEEE Network January/February 200228 he events in the area of computer networks during the last few years reveal a significant trend toward open architecture nodes, the behavior of which can easily

Boutaba, Raouf

140

26 IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | NOVEMBER 2011 1556-603X/11/$26.002011IEEE European Centre for Soft Computing, SPAIN  

E-print Network

, European Centre for Soft Computing, SPAIN O. Cordn, European Centre for Soft Computing, SPAIN CITIC-UGR: Research Center on Information and Communication Technologies, University of Granada, 18014 Granada, SPAIN, SPAIN J. Santamara, University of Granada, SPAIN #12;NOVEMBER 2011 | IEEE COMPUTATIONAL INTELLIGENCE

Granada, Universidad de

141

Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Data Mining (CIDM 2007)  

E-print Network

Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Data Mining (CIDM 2007) iScore system, iScore, we make the follow- ing contributions to news filtering in a limited user environment: 1

Crdenas, Alfonso F.

142

Application Requirements for Middleware for Mobile and Pervasive Systems  

E-print Network

for generic ser- vices supporting mobile computing. In this paper we present a research agenda for fu- tureApplication Requirements for Middleware for Mobile and Pervasive Systems Kimmo Raatikainena Henrik of Computer Science, University of Helsinki, Finland bCenter for Pervasive Computing, University of Aarhus

Christensen, Henrik Brbak

143

20 March/April 2009 Published by the IEEE Computer Society 0272-1716/09/$25.00 2009 IEEE Serious Games  

E-print Network

20 March/April 2009 Published by the IEEE Computer Society 0272-1716/09/$25.00 © 2009 IEEE Serious Games Making Them Remember-- Emotional Virtual Characters with Memory Zerrin Kasap, Maher Ben Moussa games and cinema. Today, research into user in- teractivity has come to the fore- front. It's no longer

Bey, Isabelle

144

6 January/February 2013 Published by the IEEE Computer Society 0272-1716/13/$31.00 2013 IEEE Visualization Viewpoints  

E-print Network

at the intersection of visual- ization and ITSs. To explore this research space, we held the 2011 Workshop on Data Exploration on Interactive Surfaces (Dexis 2011; www.aviz.fr/ dexis2011). Here, we discuss this research space6 January/February 2013 Published by the IEEE Computer Society 0272-1716/13/$31.00 © 2013 IEEE

Hunt, Galen

145

Topological Landscapes: A Terrain Metaphor for Scientific Data Gunther H. Weber, Member, IEEE Computer Society, Peer-Timo Bremer, Member, IEEE  

E-print Network

of images. Furthermore, it is usually impractical to interactively explore the complete parameter space Computer Society, Peer-Timo Bremer, Member, IEEE and Valerio Pascucci, Member, IEEE Abstract exploration and detailed data analysis. Classical approaches providing a quick overview of data include

146

16 March/April 2013 Published by the IEEE Computer Society 0272-1716/13/$31.00 2013 IEEE Visualization Viewpoints  

E-print Network

at the intersection of visual- ization and ITSs. To explore this research space, we held the 2011 Workshop on Data Exploration on Interactive Surfaces (Dexis 2011; www.aviz.fr/ dexis2011). Here, we discuss this research space16 March/April 2013 Published by the IEEE Computer Society 0272-1716/13/$31.00 © 2013 IEEE

Isenberg, Petra

147

VECIMS 2004 IEEE International Conference on Virtual Environments, Human-Computer Interfaces, and Measurement Systems  

E-print Network

VECIMS 2004 ­ IEEE International Conference on Virtual Environments, Human-Computer Interfaces possible a closer interaction between humans and computers. This interaction depends on haptics, that is, the sense of touch given by computer technology. Virtual Reality environment is evolving towards more

Lee, WonSook

148

10 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/07/$25.00 2007 IEEE Psychotherapy  

E-print Network

Ubiquitous Psychotherapy T herapists commonly use cognitive behavioral therapy to treat anxiety, depression the therapist's presence outside the office, Handheld-based tools let therapists customize psychotherapy

Antunes, Pedro

149

Trust of Medical Devices, Applications, and Users in Pervasive Healthcare  

E-print Network

Trust of Medical Devices, Applications, and Users in Pervasive Healthcare Michael Clifford Computer to receive health care through the use of pervasive medical devices, sensors, and applications, even outside Descriptors J.3 [Life and Medical Sciences]: Health; C.2.0 [Computer- Communication Networks]: General

Bishop, Matt

150

Trust of Medical Devices, Applications, and Users in Pervasive Healthcare  

E-print Network

Trust of Medical Devices, Applications, and Users in Pervasive Healthcare Michael Clifford Computer to receive health care through the use of pervasive medical devices, sensors, and applications, even outside Descriptors J.3 [Life and Medical Sciences]: Health; C.2.0 [Computer­ Communication Networks]: General

Bishop, Matt

151

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN. VOL I NO 6 JUNE 1988 Computational-Geometry-Based Tool  

E-print Network

684 BEAVER: A JAMES IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN. VOL I NO 6 JUNE 1988 Computational-Geometry-Based Tool for Switchbox Routing Abstract-A new fast switchbox router, BEAVER, is presented. BEAVER combines and its priori- tized control of individual track and column usage to prevent routing conflicts. BEAVER

Batson, Alan

152

J. PERVASIVE COMPUT. & COMM. 3 (2), 2007. c EMERALD PUBLISHING LTD 1 Ontology Alignment as a Basis for Mobile Service  

E-print Network

for Mobile Service Integration and Invocation Jingshan Huang1 Jiangbo Dang Michael N. Huhns Computer Science, Mobile Service I. INTRODUCTION Mobile computing is becoming more widespread and in- creasingly important. Mobile portable devices already outnum- ber traditional desktop computers and are expected to deter- mine

Huang, Jingshan

153

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC), VOL. XX, NO. YY, MONTH 2012 1 Attacks and Defenses in the Data Plane of  

E-print Network

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC), VOL. XX, NO. YY, MONTH 2012 1 Attacks and Defenses in the Data Plane of Networks Danai Chasaki, Student Member, IEEE, and Tilman Wolf, Senior Member, IEEE Abstract--Security issues in computer networks have focused on attacks on end

Shenoy, Prashant

154

IEEE Computer Society Task Force on Cluster Computing  

NSDL National Science Digital Library

The TFCC is an international forum promoting cluster computing research and education. It participates in helping to set up and promote technical standards in this area. The Task Force is concerned with issues related to the design, analysis, development and implementation of cluster-based systems. Of particular interest are: cluster hardware technologies, distributed environments, application tools and utilities, as well as the development and optimisation of cluster-based applications.

155

Computer Controlled Test Systems. Introduction. A Course Based on the IEEE 488 Bus.  

ERIC Educational Resources Information Center

An introductory course in computer automated tests and measurement systems based on the International Test Instrument-Computer Interface Standard, the IEEE (Institute of Electrical and Electronics Engineers)-488, is presented in this study guide. This course is designed to: (1) introduce the electronics engineering technician to the functional

Herrmann, Eric J.

156

14-th IEEE International Conference on Peer-to-Peer Computing Fully Distributed Robust Singular Value  

E-print Network

of Szeged, Hungary MTA-SZTE Research Group on Artificial Intelligence, Hungary Institute for Computer14-th IEEE International Conference on Peer-to-Peer Computing Fully Distributed Robust Singular, and identifying topics in documents. The problem we tackle is implementing singular value decomposition (SVD

Jelasity, Márk

157

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Fracturing Rigid Materials  

E-print Network

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Fracturing Rigid Materials Zhaosheng Bao to fracturing (and denting) brittle materials. To avoid the computational burden imposed by the stringent time mesh upon which finite element analysis can be carried out to provide a stress map for fracture

Fedkiw, Ron

158

IEEE TRANSACTIONS ON NANOTECHNOLOGY, VOL. 00, NO. 00, 2011 1 On the Reliability of Computational Structures  

E-print Network

IEEE TRANSACTIONS ON NANOTECHNOLOGY, VOL. 00, NO. 00, 2011 1 On the Reliability of Computational that are hoped to have faster switching speeds, lower power consumption, and better scaling characteristics [1, and J. Liang are with the Department of Electrical and Computer Engineering at the University of Alberta

Han, Jie

159

OCTOBERDECEMBER 1998 0740-7475/98/$10.00 1998 IEEE 17 EMBEDDED SYSTEMS are computers in-  

E-print Network

OCTOBER­DECEMBER 1998 0740-7475/98/$10.00 © 1998 IEEE 17 EMBEDDED SYSTEMS are computers in systems has expanded rapidly since the introduction of the microproces- sor in 1971. The lure of embedded not perform as required. Embedded systems can contain a variety of computing devices, such as microcon

Al-Asaad, Hussain

160

IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 1 Scheduling Second Order Computational Load in  

E-print Network

load theory, master-slave paradigm, optimal sequence and arrange- ment, pattern recognition. IIEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 1 Scheduling Second Order Computational Load. Robertazzi, Fellow, IEEE, Young-Il Kim Abstract Scheduling divisible loads with the nonlinear computational

Robertazzi, Thomas G.

161

OBCOM2006 INT'L CONFERENCE ON MOBILE, UBIQUITOUS & PERVASIVE COMPUTING Information and Communication Technologies (ICT) are critical to  

E-print Network

-driven information and communication technologies, systems and products. Foreseeing importance and impact and Communication Technologies (ICT) are critical to India's future and underpin realization of the Vision 2020 to achieve the convergence of computing, communications and media technologies. Mobile computing and related

Melbourne, University of

162

IEEE Xplore  

NSDL National Science Digital Library

IEEE Xplore is an online delivery system providing full text access to technical literature in electrical engineering, computer science, and electronics. IEEE Xplore contains full text documents from IEEE journals, transactions, magazines, letters, conference proceedings, standards, and IEE (Institution of Electrical Engineers) publications.

163

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. X, NO. Y, MONTH YEAR PREPRINT 1 Analyzing Locomotion Synthesis with  

E-print Network

Analyzing Locomotion Synthesis with Feature-Based Motion Graphs Mentar Mahmudi, Student Member, IEEE and Marcelo Kallmann, Member, IEEE Abstract--We propose feature-based motion graphs for realistic locomotion improvements in comparison to traditional motion graph techniques. Index Terms--Computer Animation, Locomotion

Kallmann, Marcelo

164

IEEE TRANSACTIONS ON COMPUTERS, VOL. C-31, NO. 5, MAY 1982 The Extra Stage Cube: A Fault-Tolerant  

E-print Network

IEEE TRANSACTIONS ON COMPUTERS, VOL. C-31, NO. 5, MAY 1982 The Extra Stage Cube: A Fault, IEEE Abstract-The Extra Stage Cube (ESC) interconnection network, a fault-tolerant structure and a bypass capability for two stages. It is shown that the ESC provides fault tolerance for any single

165

IEEE T-CIAIG SPECIAL ISSUE ON COMPUTATIONAL AESTHETICS IN GAMES 1 Adapting Models of Visual Aesthetics  

E-print Network

IEEE T-CIAIG SPECIAL ISSUE ON COMPUTATIONAL AESTHETICS IN GAMES 1 Adapting Models of Visual Aesthetics for Personalized Content Creation Antonios Liapis, Georgios N. Yannakakis Member, IEEE, Julian generation with respect to visual aesthetics. The approach is based on a two-step adaptation procedure where

Togelius, Julian

166

Modelling inter-contact times in social pervasive networks  

Microsoft Academic Search

Thanks to the diffusion of mobile user devices (e.g. smartphones) with rich computing and networking capabilities, we are witnessing an increasing integration between the cyber world of devices and the physical world of users. In this perspective, a possible evolution of pervasive networking (hereafter referred to as social pervasive networks, SPNs) consists in closely mapping human social structures in the

Andrea Passarella; Marco Conti; Chiara Boldrini; Robin I. M. Dunbar

2011-01-01

167

PDB: Pervasive Debugging With Xen Alex Ho and Steven Hand  

E-print Network

PDB: Pervasive Debugging With Xen Alex Ho and Steven Hand Computer Laboratory Universitymode applications. In this paper we present the design and implementation of PDB, a pervasive debugger which of a distributed application in a sepa rate virtual environment atop the debugger, PDB can exer cise full control

Hand, Steven

168

PDB: Pervasive Debugging With Xen Alex Ho and Steven Hand  

E-print Network

PDB: Pervasive Debugging With Xen Alex Ho and Steven Hand Computer Laboratory University-mode applications. In this paper we present the design and implementation of PDB, a pervasive debugger which of a distributed application in a sepa- rate virtual environment atop the debugger, PDB can exer- cise full control

Hand, Steven

169

A Framework for Safe Composition of Heterogeneous SOA Services in a Pervasive Computing Environment with Resource Constraints  

ERIC Educational Resources Information Center

The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.

Reyes Alamo, Jose M.

2010-01-01

170

JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, VOL. 1, NO. 2, JUNE 2005 89 Blind Source Separation of Acoustic Signals  

E-print Network

, Fukushima 965-8580, Japan AND Brain Science Institute, RIKEN, Saitama 351-0198, Japan Email: sding@u-aizu.ac.jp ANDRZEJ CICHOCKI Brain Science Institute, RIKEN, Saitama 351-0198, Japan JIE HUANG AND DAMING WEI Department of Computer Software, The University of Aizu, Tsuruga, Ikki-machi, Aizu-Wakamatsu City, Fukushima

Vialatte, Franois

171

IEEE TRANSACTIONS ON SERVICES COMPUTING, 201X 1 Spot Transit: Cheaper Internet Transit  

E-print Network

IEEE TRANSACTIONS ON SERVICES COMPUTING, 201X 1 Spot Transit: Cheaper Internet Transit for Elastic Internet transit market, where transit is sold using the under-utilized backbone capacity at a lower price. The providers can improve profit by capitalizing the perishable capacity, and customers can buy transit

Li, Baochun

172

IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 1 Real-time Recognition of Affective States from  

E-print Network

IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 1 Real-time Recognition of Affective States from Non Abstract--This paper presents a new classification algorithm for real-time inference of affect from non simultaneously occurring affective states by recognising correlations between emotions and over 6000 functional

Robinson, Peter

173

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Image-Based Stained Glass  

E-print Network

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Image-Based Stained Glass Stephen Brooks of a work of stained glass. To this end, we develop a novel approach which involves image warping is first segmented. Each segment is subsequently transformed to match real segments of stained glass

Brooks, Stephen

174

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Creature Control in a Fluid Environment  

E-print Network

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Creature Control in a Fluid Environment--In this paper, we propose a method designed to allow creatures to actively respond to a fluid environment. We explore various objective functions in order to determine ways to direct the behavior of our creatures

Thrun, Sebastian

175

A Tutorial Proposal for the 2007 ACS/IEEE International Conference on Computer Systems and Applications  

E-print Network

A Tutorial Proposal for the 2007 ACS/IEEE International Conference on Computer Systems, Sharjah, United Arab Emirates e-mail: almualla@euc.ac.ae TARGETED AUDIENCE: This tutorial will appeal areas for research. The tutorial will start by introducing the fundamentals of video and the basic

176

Computational Intelligence Meets Game of Go @ IEEE WCCI 2012 Chang-Shing Lee1  

E-print Network

1 Computational Intelligence Meets Game of Go @ IEEE WCCI 2012 Chang-Shing Lee1 , Olivier Teytaud1 intelligence, the competition also observed physiological measurements for testing cognitive science as those involved in chess, in particular, more spatial reasoning, mental verbalization, and motor control

Paris-Sud XI, Universit de

177

IEEE CLUSTER COMPUTING AND THE GRID 2002 1 Latency Performance of SOAP Implementations  

E-print Network

IEEE CLUSTER COMPUTING AND THE GRID 2002 1 Latency Performance of SOAP Implementations Dan Davis Protocol (SOAP) operating over HTTP, and compares these results with the performance of JavaRMI, CORBA, HTTP, and with the TCP setup time. SOAP is an XML based protocol that supports RPC and message

Parashar, Manish

178

Symposium on Intelligent Embedded Systems (IES 2014) at IEEE Symposium Series in Computational Intelligence 2014  

E-print Network

Symposium on Intelligent Embedded Systems (IES 2014) at IEEE Symposium Series in Computational Intelligence 2014 http://ies14-ssci.deib.polimi.it/ Orlando, Florida, December 9 -12, 2014 Organizers Cesare (Italy) Daniele Caltabiano (Italy) Intelligent embedded systems, i.e., embedded processing systems

Alippi, Cesare

179

Appeared in Proc. of IEEE Computer Animation and Social Agents (CASA) 2004 Automatic Dynamic Expression Synthesis  

E-print Network

Appeared in Proc. of IEEE Computer Animation and Social Agents (CASA) 2004 Automatic Dynamic Expression Synthesis For Speech Animation Zhigang Deng Dept. of CS zdeng@usc.edu Murtaza Bulut Dept. of EE://graphics.usc.edu Abstract Although a large amount of research has been done in speech animation, both 2D and 3D, one

Shahabi, Cyrus

180

0018-9162/02/$17.00 2002 IEEE64 Computer Get Ready for  

E-print Network

, the Manifesto for Agile Software Development (http://www.agileAlliance.org), and in columns1,2 such as those methods. Although many of their advocates consider the agile and plan-driven software development methods0018-9162/02/$17.00 © 2002 IEEE64 Computer Get Ready for Agile Methods, with Care F aced

Tappert, Charles

181

Time-Varying BRDFs Bo Sun, Student Member, IEEE Computer Society, Kalyan Sunkavalli,  

E-print Network

Time-Varying BRDFs Bo Sun, Student Member, IEEE Computer Society, Kalyan Sunkavalli, Ravi list. Examples include aging of human skin, decaying of flora, corrosion of metals, weathering of surfaces, and aging of materials. In this paper, we focus on those that can be visually described by a time

Yang, Junfeng

182

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, MANUSCRIPT 1 Time-Varying BRDFs  

E-print Network

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, MANUSCRIPT 1 Time-Varying BRDFs Bo Sun include aging of human skin, decaying of flora, corrosion of metals, weathering of surfaces, and aging on physics- based techniques for simulating time-varying effects due to weathering and aging [6

O'Brien, James F.

183

110 IEEE REVIEWS IN BIOMEDICAL ENGINEERING, VOL. 2, 2009 Computational Models for Neuromuscular Function  

E-print Network

extrapolation, we point out that engineers tend to apply an inductive approach and Manuscript received September110 IEEE REVIEWS IN BIOMEDICAL ENGINEERING, VOL. 2, 2009 Computational Models for Neuromuscular of the world and skeletal anatomy, the physiological mechanisms that produce muscle force, and the neural

Valero-Cuevas, Francisco

184

IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 4, APRIL 1997 425 Parallel Signature Analysis Design  

E-print Network

structures that compact response from a single circuit output. Fig. 1. Parallel signature analysis. The finalIEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 4, APRIL 1997 425 Parallel Signature Analysis Design--This paper presents parallel signature design techniques that guarantee the aliasing probability to be less

Stanford University

185

Information Agents for Pervasive Sensor Networks  

Microsoft Academic Search

In this paper, we describe an information agent, that re- sides on a mobile computer or personal digital assistant (PDA), that can autonomously acquire sensor readings from pervasive sensor networks (deciding when and which sen- sor to acquire readings from at any time). Moreover, it can perform a range of information processing tasks including modelling the accuracy of the sensor

Alex Rogers; Mike Osborne; Sarvapali D. Ramchurn; Stephen Roberts; Nicholas R. Jennings

2008-01-01

186

Middleware for Pervasive Healthcare A White Paper  

E-print Network

a strong foundation for pervasive and mobile solutions in this setting. INTRODUCTION Distributed computing and services are available on the server, and more or less complex clients draw upon the services of the server perception of what constitutes the client. Traditionally, the client is a single application running

Christensen, Henrik Brbak

187

Personal Pervasive Environments: Practice and Experience  

PubMed Central

In this paper we present our experience designing and developing two different systems to enable personal pervasive computing environments, Plan B and the Octopus. These systems were fully implemented and have been used on a daily basis for years. Both are based on synthetic (virtual) file system interfaces and provide mechanisms to adapt to changes in the context and reconfigure the system to support pervasive applications. We also present the main differences between them, focusing on architectural and reconfiguration aspects. Finally, we analyze the pitfalls and successes of both systems and review the lessons we learned while designing, developing, and using them. PMID:22969340

Ballesteros, Francisco J.; Guardiola, Gorka; Soriano, Enrique

2012-01-01

188

Your Way Your Missions: A Location-Aware Pervasive Game Exploiting the Routes of Players  

Microsoft Academic Search

With the development of pervasive computing, location-aware pervasive games have proliferated quickly. To counter the inefficiency of information adaptation based on a location and a radius, this paper presents the design and implementation of Your Way Your Missions (YWYM), which is a location-aware pervasive game exploiting the routes of players. YWYM provides a Google Maps based tool for players to

Ling Chen; Gencai Chen; Steve Benford

2012-01-01

189

SPONSORED BY IEEE COMPUTER SOCIETY VISUALIZATION AND GRAPHICS TECHNICAL COMMITTEE IEEE Conference on Visual Analytics Science  

E-print Network

Proceedings Edited by Silvia Miksch Matt Ward #12;Copyright 2011 by the Institute of Electrical Drive Danvers, MA 01923 For other copying, reprint or republication permission, write to: IEEE in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect

190

Nominee for IEEE Computer Society President-Elect (2016 President)  

E-print Network

such as smart-phones, wearable devices, cloud servers, supercomputers, self-driving automobiles, and heavy be developed through collaboration. The success of IEEE's initiatives such as Cloud, Smart Grid, and Internet dissemination of our advanced technologies to non-professionals. The efforts will be also effective

Kasahara, Hironori

191

74 Published by the IEEE Computer Society 1089-7801/09/$26.00 2009 IEEE IEEE INTERNET COMPUTING InternetofThingsTrack  

E-print Network

to the real world is the Internet of Things,2 which connects such resources with everyday objects's based on the Internet of Things and its technologies. Their framework for integrating Web services-Essen Heinrich Hu?mann University of Munich Perci: Pervasive Service Interaction with the Internet of Things #12

192

A Conceptual Framework and Principles for Trusted Pervasive Health  

PubMed Central

Background Ubiquitous computing technology, sensor networks, wireless communication and the latest developments of the Internet have enabled the rise of a new conceptpervasive healthwhich takes place in an open, unsecure, and highly dynamic environment (ie, in the information space). To be successful, pervasive health requires implementable principles for privacy and trustworthiness. Objective This research has two interconnected objectives. The first is to define pervasive health as a system and to understand its trust and privacy challenges. The second goal is to build a conceptual model for pervasive health and use it to develop principles and polices which can make pervasive health trustworthy. Methods In this study, a five-step system analysis method is used. Pervasive health is defined using a metaphor of digital bubbles. A conceptual framework model focused on trustworthiness and privacy is then developed for pervasive health. On that model, principles and rules for trusted information management in pervasive health are defined. Results In the first phase of this study, a new definition of pervasive health was created. Using this model, differences between pervasive health and health care are stated. Reviewed publications demonstrate that the widely used principles of predefined and static trust cannot guarantee trustworthiness and privacy in pervasive health. Instead, such an environment requires personal dynamic and context-aware policies, awareness, and transparency. A conceptual framework model focused on information processing in pervasive health is developed. Using features of pervasive health and relations from the framework model, new principles for trusted pervasive health have been developed. The principles propose that personal health data should be under control of the data subject. The person shall have the right to verify the level of trust of any system which collects or processes his or her health information. Principles require that any stakeholder or system collecting or processing health data must support transparency and shall publish its trust and privacy attributes and even its domain specific policies. Conclusions The developed principles enable trustworthiness and guarantee privacy in pervasive health. The implementation of principles requires new infrastructural services such as trust verification and policy conflict resolution. After implementation, the accuracy and usability of principles should be analyzed. PMID:22481297

Blobel, Bernd Gerhard; Seppl, Antto Veikko; Sorvari, Hannu Olavi; Nyknen, Pirkko Anneli

2012-01-01

193

292 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 3, MARCH 1997 Parallel Computer Vision  

E-print Network

Computer Vision on a Reconfigurable Multiprocessor Network Suchendra M. Bhandarkar, Member, IEEE Computer suited for a number of problems in low- and intermediate-level computer vision such as the FFT, edge-level vision algorithms on a transputer- based prototype are presented. Index Terms--Reconfigurable multiring

Bhandarkar, Suchendra "Suchi" M.

194

Pervasive Developmental Disorders in Girls  

Microsoft Academic Search

Pervasive developmental disorders are a group of conditions sharing as their common features impairment in social reciprocity,\\u000a developmental disturbances affecting communication, and manifestation of restricted and repetitive behaviors. Autism is the\\u000a prototypical pervasive developmental disorder, and others include Asperger's Disorder, Rett's Disorder, Childhood Disintegrative\\u000a Disorder, and Pervasive Developmental Disorder-Not Otherwise Specified (PDD-NOS). Critical to understanding these conditions\\u000a is appreciation of

Kathleen Koenig; Katherine D. Tsatsanis

195

2012 IEEE 4th International Conference on Cloud Computing Technology and Science 978-1-4673-4510-1/12/$31.00 2012 IEEE  

E-print Network

-1-4673-4510-1/12/$31.00 ©2012 IEEE 325 System Management to Comply with SLA Availability Guarantees in Cloud Computing Andres J the level of availability offered to a virtual machine during an SLA period in clouds with different: size, redundancy, and fault tolerance techniques. Finally, this paper proposes the use of the SLA

Nørvåg, Kjetil

196

IEEE TRANSACTIONS ON VISUALIZATION & COMPUTER GRAPHICS 1 A Deformable Surface Model for  

E-print Network

simulation ! 1 INTRODUCTION Water drops appear everywhere in our daily life, from wall panels when we take-Time Water Drop Animation Yizhong Zhang, Student Member, IEEE, Huamin Wang, Member, IEEE Shuai Wang, Member, IEEE, Yiying Tong, Member, IEEE, and Kun Zhou, Member, IEEE Abstract--A water drop behaves differently

197

0018-9162/05/$20.00 2005 IEEE70 Computer C O V E R F E A T U R E  

E-print Network

and interpreting particular US gov- ernment regulations have become easier in recent years. For example, Business.gov0018-9162/05/$20.00 2005 IEEE70 Computer C O V E R F E A T U R E Published by the IEEE Computer and reconcile multiple authoritative sources. For example, US companies frequently must com- ply

Stanford University

198

Player Feedback Evaluation: Indicating Mass Public Potential for Pervasive Games  

Microsoft Academic Search

Player feedback data was collected for the pervasive game Meet Your Heartbeat Twin, an event-type LBS (Location-Based Service)\\u000a game including affective computing through the players live heartbeats. Correlation analysis of the data demonstrates broad\\u000a client profile for pervasive games, covering age, gender and hobbies. The data also shows that Urban Games are clearly a novel\\u000a experience; they are not an

Ivo Flammer; Chen Yan; Wolf Ka; August Flammer; Jean-paul Cheung; Romain Pellerin

2009-01-01

199

Pervasive Advertising Jrg Mller1  

E-print Network

, and does not manipulate us. These advertisements strike a balance between being calm when we do not needPervasive Advertising Jörg Müller1 , Florian Alt2 , Daniel Michelis3 1 Deutsche Telekom technologies leave the labs, they are starting to be used for the purpose of advertising. Pervasive Advertising

200

Plasmas: Diversity, pervasiveness and potential  

SciTech Connect

When considered inclusively, plasma science and technology encompass immense diversity, pervasiveness and potential: diversity through numerous topical areas (see list of nearly 200 in Table II); pervasiveness with examples covering the full range of energy, time and spatial scale; and potential through innumerable current and future applications.

Eastman, Timothy E.

1998-01-01

201

Large Scale Mobile and Pervasive Augmented Reality Games  

Microsoft Academic Search

Ubiquitous or pervasive computing is a new kind of computing, where specialized elements of hardware and software will have such high level of deployment that their use will be fully integrated with the environment. Augmented reality extends reality with virtual elements but tries to place the computer in a relatively unobtrusive, assistive role. To our knowledge, there is no specialized

PedroMiguel F. M. Ferreira; J. M. Orvalho; F. Boavida

2005-01-01

202

A SPATIO-LUDIC RHETORIC: SERIOUS PERVASIVE GAME DESIGN FOR SENTIENT ARCHITECTURES  

Microsoft Academic Search

Serious pervasive games (SPGs) focus on non-entertainment purposes such as learning, whilst applying interface, wireless, sensor, and positioning technologies to allow for hybrid - simultaneously physical and virtual - experiences across varying contexts. Thus, with the omnipresence of always-on pervasive computing based services as well as computer integrated buildings that appeal to us and make us \\

Steffen P. Walz

203

Dynamic Algorithms for Self-Deployment and Self-Configuration of Pervasive Service Components  

Microsoft Academic Search

Pervasive services have attracted numerous attentions from both industries and academia. Its very high adaptability demand makes autonomic computing (AC), and in particular, personal autonomic computing (PAC), an ideal enabling technology. Some generic AC framework has been proposed in the literature but without considering the dynamic deployment and re-configuration of pervasive service components in a self-controlled manner. This paper makes

Shumao Ou; Dongsheng Liu; Kun Yang

2009-01-01

204

80 Published by the IEEE Computer Society 1089-7801/09/$26.00 2009 IEEE IEEE INTERNET COMPUTING utside of computer science, semantics is the  

E-print Network

we mean when we talk, as well as ontology (what there is to know) and episte- mology (how we know it different represen- tations make a computational difference. That's what makes what we do engineering/science. It's All Just Syntax, Isn't It? That's what skeptics say when we try to apply the concept

Petrie, Charles

205

162 IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 2, NO. 3, SEPTEMBER 2010 Game Bot Detection via Avatar Trajectory Analysis  

E-print Network

, such as the use of game bots, have become more serious. Game bots are automated programs, with or without162 IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 2, NO. 3, SEPTEMBER 2010 Game Bot Detection via Avatar Trajectory Analysis Hsing-Kuo Pao, Kuan-Ta Chen, Member, IEEE, and Hong

Chen, Sheng-Wei

206

A survey on nature-inspired metaphors for pervasive service ecosystems  

Microsoft Academic Search

Purpose Emerging pervasive computing scenarios require open service frameworks promoting situated and self-adaptive behaviors, and supporting diversity in services and long-term evolvability. This suggests adopting a nature-inspired approach, where pervasive services are modeled and deployed as autonomous individuals in an ecosystem of other services, data sources, and pervasive devices. However, there are many possibly nature-inspired metaphors that can be

Franco Zambonelli; Mirko Viroli

2011-01-01

207

Pervasive information infrastructures for industrial informatics - an application to emergency response management  

Microsoft Academic Search

This work proves the technical feasibility of creating pervasive computing infrastructures using multi-agent systems which interact with heterogeneous non-agent systems. Our main contribution is the development of a pervasive environment which enhances the interaction between heterogeneous systems by using standardized protocols for communications between software agents bridging the non-agent systems within the pervasive framework. Using the proposed framework developers would

E. M. Tognalli; Mihaela Ulieru

2005-01-01

208

IEEE TRANSACTIONS ON COMPUTERS, AUGUST 1974 Property 8  

E-print Network

, "Dynamic storage allocation system,"Commun. Ass. Comput. Mach., yol. 11, pp. 297-305, May 1968. [3] P. J, and J. D. Ullman, "Principles of optimalgage replacement," J. Ass. Comput. Mach., vol. 18, pp. 80-93, [5] P. J. Denning, "The working set model for program behavior,"Commun. Ass. Comput. Mach., vol. 11, pp

Stanford University

209

Ubiquitous Monitoring and Human Behaviour in Intelligent Pervasive Spaces  

Microsoft Academic Search

we are soon approaching the pervasive-era of computing, where computers are embedded into objects and the environment in order to provide new services to users. Significant levels of data are required in order for these services to function as intended, and it is this collection of data which we refer to as ubiquitous monitoring. Existing monitoring techniques have often been

Stuart Moran; Keiichi Nakata

2009-01-01

210

Software Aspects of IEEE Floating-Point Computations for Numerical Applications in High Energy Physics  

ScienceCinema

Floating-point computations are at the heart of much of the computing done in high energy physics. The correctness, speed and accuracy of these computations are of paramount importance. The lack of any of these characteristics can mean the difference between new, exciting physics and an embarrassing correction. This talk will examine practical aspects of IEEE 754-2008 floating-point arithmetic as encountered in HEP applications. After describing the basic features of IEEE floating-point arithmetic, the presentation will cover: common hardware implementations (SSE, x87) techniques for improving the accuracy of summation, multiplication and data interchange compiler options for gcc and icc affecting floating-point operations hazards to be avoided About the speaker Jeffrey M Arnold is a Senior Software Engineer in the Intel Compiler and Languages group at Intel Corporation. He has been part of the Digital->Compaq->Intel compiler organization for nearly 20 years; part of that time, he worked on both low- and high-level math libraries. Prior to that, he was in the VMS Engineering organization at Digital Equipment Corporation. In the late 1980s, Jeff spent 2 years at CERN as part of the CERN/Digital Joint Project. In 2008, he returned to CERN to spent 10 weeks working with CERN/openlab. Since that time, he has returned to CERN multiple times to teach at openlab workshops and consult with various LHC experiments. Jeff received his Ph.D. in physics from Case Western Reserve University.

None

2011-10-06

211

Software Aspects of IEEE Floating-Point Computations for Numerical Applications in High Energy Physics  

SciTech Connect

Floating-point computations are at the heart of much of the computing done in high energy physics. The correctness, speed and accuracy of these computations are of paramount importance. The lack of any of these characteristics can mean the difference between new, exciting physics and an embarrassing correction. This talk will examine practical aspects of IEEE 754-2008 floating-point arithmetic as encountered in HEP applications. After describing the basic features of IEEE floating-point arithmetic, the presentation will cover: common hardware implementations (SSE, x87) techniques for improving the accuracy of summation, multiplication and data interchange compiler options for gcc and icc affecting floating-point operations hazards to be avoided About the speaker Jeffrey M Arnold is a Senior Software Engineer in the Intel Compiler and Languages group at Intel Corporation. He has been part of the Digital->Compaq->Intel compiler organization for nearly 20 years; part of that time, he worked on both low- and high-level math libraries. Prior to that, he was in the VMS Engineering organization at Digital Equipment Corporation. In the late 1980s, Jeff spent 2 years at CERN as part of the CERN/Digital Joint Project. In 2008, he returned to CERN to spent 10 weeks working with CERN/openlab. Since that time, he has returned to CERN multiple times to teach at openlab workshops and consult with various LHC experiments. Jeff received his Ph.D. in physics from Case Western Reserve University.

None

2010-05-11

212

IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 3, MARCH 1997 353 Causal Ordering in Distributed Mobile Systems  

E-print Network

of research in mobile com- puting: from designing communication protocols [1], [8], [18] to providing fault Mobile Systems Sridhar Alagar and S. Venkatesan, Member, IEEE Abstract--There is a growing trend in using mobile computing environment for several applications, and it is important that the mobile systems

Venkatesan, S.

213

13-th IEEE International Conference on Peer-to-Peer Computing Information Propagation in the Bitcoin Network  

E-print Network

13-th IEEE International Conference on Peer-to-Peer Computing Information Propagation in the Bitcoin Network Christian Decker, Roger Wattenhofer ETH Zurich, Switzerland cdecker currencies does not rely on a centralized authority. Instead Bit- coin relies on a network of volunteers

214

IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2009 Learning sign language by watching TV (using weakly aligned subtitles)  

E-print Network

IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2009 Learning sign language of this work is to automatically learn a large number of British Sign Language (BSL) signs from TV broadcasts the text order; it is noisy because subtitles can be signed in different ways, and because the occurrence

Kim, Tae-Kyun

215

To appear in IEEE Transactions on Visualization and Computer Graphics Order of Magnitude Markers: An Empirical Study on Large  

E-print Network

To appear in IEEE Transactions on Visualization and Computer Graphics Order of Magnitude Markers: An Empirical Study on Large Magnitude Number Detection Rita Borgo, Joel Dearden, and Mark W. Jones 0 80000, and Order Of Magnitude Markers (OOMMs). Abstract--In this paper we introduce Order of Magnitude Markers

Jones, Mark W.

216

1014 IEEE TRANSACTIONS ON MAGNETICS, VOL. 44, NO. 6, JUNE 2008 Formal Sensitivity Computation of Magnetic Moment Method  

E-print Network

of Magnetic Moment Method H. L. Rakotoarison1, V. Ardon2, O. Chadebec1, B. Delinchant1, S. Guerin1, and J formally sensitivities of the magnetic moment method. This numerical method is known to be very accurate1014 IEEE TRANSACTIONS ON MAGNETICS, VOL. 44, NO. 6, JUNE 2008 Formal Sensitivity Computation

Boyer, Edmond

217

IEEE TRANSACTIONS ON COMPUTERS , VOL.XXXX, NO.XXX, XXXX 2010 1 Exploiting Heterogeneity in P2P Video  

E-print Network

IEEE TRANSACTIONS ON COMPUTERS , VOL.XXXX, NO.XXX, XXXX 2010 1 Exploiting Heterogeneity in P2P--In this paper we investigate the impact of peer bandwidth heterogeneity on the performance of a mesh based P2P system for live streaming. We show that bandwidth heterogeneity constitutes an important resource for P2P

218

1120 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 5, OCTOBER 2009 Frankenstein's PSO: A Composite Particle Swarm  

E-print Network

1120 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 5, OCTOBER 2009 Frankenstein's PSO this composite algorithm Frankenstein's PSO in an analogy to the popular character of Mary Shelley's novel. Frankenstein's PSO performance evaluation shows that by integrating components in novel ways effective

Birattari, Mauro

219

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, VOL. XX, NO. X, XXXX 20XX 1 Big Data Opportunities and Challenges  

E-print Network

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, VOL. XX, NO. X, XXXX 20XX 1 Big Data Opportunities, and Graham J. Williams Abstract--"Big Data" as a term has been among the biggest trends of the last three and perspectives of the authors relating to the new opportunities and challenges brought forth by the big data

Jin, Yaochu

220

Introduction to the IEEE Transactions on Cloud Computing  

E-print Network

to as Infrastructure as a Service (IaaS) and the applications as Software as a Service (SaaS). An environment used (SLA) backed performance and uptime promises for their services. Cloud computing delivers

Buyya, Rajkumar

221

Distributed Path Planning for Robots in Dynamic Environments Using a Pervasive Embedded Network  

Microsoft Academic Search

We investigate the application of a low-cost, pervasively distributed network to plan paths for mobile robots in en- vironments with dynamic obstacles. We consider a hetero- geneous system composed of small, embedded, immobile, possibly sensor-less, communication nodes and larger mo- bile robots equipped with sensors and manipulators. The embedded network serves as a pervasive communication and computation fabric, while the

Keith J. O'Hara; Tucker R. Balch

2004-01-01

222

An innovative content-based indexing technique with linear response suitable for pervasive environments  

Microsoft Academic Search

In the world of pervasive computing the status of each device (idle or active) could be dynamically altered and multimedia content is added or removed dynamically. The traditional approaches that create static multimedia indices are inappropriate. To address this problem, a new technique for indexing multimedia content in pervasive environments, is proposed. This technique is based on an innovative algorithm

Constantinos Lalos; Anastasios Doulamis; Kleopatra Konstanteli; Pavlos Dellias; Theodora Varvarigou

2008-01-01

223

JOURNAL OF COMPUTER SYSTEMS, NETWORKS, AND COMMUNICATIONS, VOL. 1, NO. 1, APRIL 2010 1 Capacity Evaluation for IEEE 802.16e Mobile  

E-print Network

, and Abdel-Karim Tamimi, Student Member, IEEE Abstract--We present a simple analytical method for capac- ity. Jain, and A. Tamimi is with the Department of Computer Science and Engineering, Washington Univeristy

Jain, Raj

224

32 computer Published by the IEEE Computer Society 0018-9162/14/$31.00 2014 IEEE Cover Feature  

E-print Network

to an "Internet of Things," but supplying power to sustain this future is a growing burden. Tech- nological it likely that in the near future, small computers in urban areas will use ambient RF signals for both power that are rapidly multiplying. Aside from the ever-present smartphone, a growing set of computing devices has become

Hochberg, Michael

225

J. PERVASIVE COMPUT. & COMM. 1 (1), MARCH 2005. c TROUBADOR PUBLISHING LTD) 1 Ontology Alignment as a Basis for Mobile Service  

E-print Network

, Ontology Compatibility, Mobile Service I. INTRODUCTION Mobile computing is becoming more widespread and in- creasingly important. Mobile portable devices already outnum- ber traditional desktop computers and are expected to deter- mine the view of computers for future generations. However, mobile devices typically

Huhns, Michael N.

226

PLASTIC: Providing Lightweight & Adaptable Service Technology for Pervasive Information & Communication  

E-print Network

PLASTIC: Providing Lightweight & Adaptable Service Technology for Pervasive Information@tid.es Abstract The PLASTIC project adopts and revisits service- oriented computing for Beyond 3rd Generation (B3G. Specifically, PLASTIC introduces the PLASTIC platform to enable robust distributed lightweight services in B3G

Paris-Sud XI, Universit de

227

Pervasive Detection of Process Races in Deployed Systems  

E-print Network

Pervasive Detection of Process Races in Deployed Systems Oren Laadan, Nicolas Viennot, Chia of Computer Science Columbia University ABSTRACT Process races occur when multiple processes access shared study of real process races and the first system designed to detect them. Our study of hundreds of appli

Yang, Junfeng

228

Optimizing On-Demand Data Broadcast Scheduling in Pervasive Environments  

E-print Network

Optimizing On-Demand Data Broadcast Scheduling in Pervasive Environments Rinku Dewri, Indrakshi Ray, Indrajit Ray and Darrell Whitley Department of Computer Science Colorado State University Fort Collins, CO a challenging problem, but also identifies "optimal resource allocation" as one of the funda- mental research

Ray, Indrakshi

229

Promoting renewed domestic energy consumption patterns with pervasive learning games  

Microsoft Academic Search

Engaging computer games can have an impact on energy consumption patterns in the home. PowerAgent is a mobile pervasive game for Java-enabled mobile phones that has been designed to influence everyday activities and electricity usage patterns in the household. The game is connected to the household's automatic electricity meters reading equipment via the cell network and this setup enables us

Magnus Bng; Anton Gustafsson; Cecilia Katzeff

230

Verification Challenges Pervasive Information Flow  

E-print Network

Verification Challenges of Pervasive Information Flow Benjamin C. Pierce University of Pennsylvania/SAFE 2. Verification challenges Many challenges! #12;Questions welcome! (any time) #12;Vision #12;Clean-slate redesign of the HW / OS / PL stack Support at all levels for Memory safety Strong dynamic typing

Pierce, Benjamin C.

231

Trustworthiness of Pervasive Healthcare Folders  

E-print Network

and time constraints to access patient's healthcare folders. Cares provided at home to elderly or disabled. Healthcare information must be safely exchanged among practitioners to improve care coordinationChapter IX Trustworthiness of Pervasive Healthcare Folders Tristan Allard University of Versailles

Paris-Sud XI, Universit de

232

Enforcing Policies in Pervasive Environments  

Microsoft Academic Search

This paper presents an architecture and a proof of concept implementation of a security infrastructure for mobile devices in an infrastructure based pervasive en- vironment. The security infrastructure primarily consists of two parts, the policy engine and the policy enforce- ment mechanism. Each mobile device within a perva- sive environment is equipped with its own policy en- forcement mechanism and

Anand Patwardhan; Vlad Korolev; Lalana Kagal; Anupam Joshi

2004-01-01

233

Pervasive Developmental Disorders: Indian Scene  

Microsoft Academic Search

Pervasive developmental disorders (PDDs) are characterized by slow, limited and atypical developmental processes with onset in the early years of life. The condition leads on to disabilities in virtually all the psychological and behavioral sectors with prominent disturbances in social, communicative and cognitive spheres. PDDs include the prototypic Childhood autism, Rett's syndrome, Childhood Disintegrative Disorder (CDD), Asperger's syndrome and Atypical

Savita Malhotra; Ashis Vikas

234

Understanding Pervasive Games through Gameplay Design Patterns  

Microsoft Academic Search

This paper reports on a cluster analysis of pervasive games through a bottom-up approach based upon 120 game examples. The basis for the clustering algorithm relies on the identification of pervasive gameplay design patterns for each game from a set of 75 possible patterns. The resulting hierarchy presents a view of the design space of pervasive games, and details of

Staffan Bjrk; Johan Peitz

2007-01-01

235

Consumers and Pervasive Retail Panos Kourouthanasis  

E-print Network

concentrated towards consumer perceptions of pervasive commerce systems. In this article we present the front-generation pervasive retail system. Our initial motivation for the development of a retail system using pervasive evaluation of the system indicated thatalthough indeed efficient in addressing the problems it was designed

Roussos, George

236

Pervasive play for everyone using the weather  

Microsoft Academic Search

Casual and pervasive games are difficult to merge. It would be interesting to bring the advantages of pervasive play to the mass market to which casual games are designed for. In this article, a merge of pervasive and casual is proposed through the influence of real weather in the games. A framework that integrates a Weather Module, which retrieves and

Sofia Reis; Teresa Romo; Nuno Correia

2010-01-01

237

Digital Forensics 30 COPublished by the ieee COmPuter and reliability sOCieties 1540-7993/09/$25.00 2009 ieee marCh/aPril 2009  

E-print Network

as automobiles, cell phones, and TVs). In addition to the individual de- vices, computers are ubiquitous in ourDigital Forensics 30 COPublished by the ieee COmPuter and reliability sOCieties 1540 tools are often effective at recover- ing data from storage media. They can typically iden- tify

Bishop, Matt

238

In Proceedings of Eleventh Working Conference on Reverse Engineering, Delft, The Netherlands, November 2004, pp. 161-171. Copyright 2004, IEEE Computer Society Press.  

E-print Network

, November 2004, pp. 161-171. © Copyright 2004, IEEE Computer Society Press. Imposing Order on Program on itself to create a different variant before propagation. Metamorphic computer viruses thwart current anti from zero form of a virus, and not the original version. 1. Introduction A metamorphic computer virus

Lakhotia, Arun

239

0-7803-9508-5/05/$20.00 2005 IEEE Empirical study design in the area of High-Performance Computing (HPC)  

E-print Network

0-7803-9508-5/05/$20.00 ©2005 IEEE Empirical study design in the area of High-Performance Computing}@fc-md.umd.edu carver@cse.msstate.edu {lorin, basili}@cs.umd.edu Abstract The development of High-Performance Computing. Specifically, we present an analysis of the domain of High-Performance Computing for the aspects that would

Carver, Jeffrey C.

240

In Proceedings of the IEEE Symposia on Human-Centric Computing Languages and Environments, pp. 2-10. First Steps in Programming: A Rationale for Attention  

E-print Network

of Computer Programming" [30], it was assumed that serious users of computers would be programmers), and bIn Proceedings of the IEEE Symposia on Human-Centric Computing Languages and Environments, pp. 2-10. First Steps in Programming: A Rationale for Attention Investment Models Alan F. Blackwell University

Blackwell, Alan

241

Pervasive Home Environments  

NASA Astrophysics Data System (ADS)

An increasing number of computers and other equipment, such as games consoles and multimedia appliances for the home, have networking capability. The rapid growth of broadband in the home is also fuelling the demand for people to network their homes. In the near future we will see a number of market sectors trying to 'own' the home by providing gateways either from the traditional ISP or from games and other service providers. The consumer is bombarded with attractive advertising to acquire the latest technological advances, but is left with a plethora of different appliances, which have a bewildering range of requirements and features in terms of networking, user interface, and higher-level communications protocols. In many cases, these are proprietary, preventing interworking. Such technical and usability anarchy confuses the consumer and could ultimately suppress market adoption.

Bull, P.; Limb, R.; Payne, R.

242

2 1541-1672/12/$31.00 2012 IEEE Ieee InTeLLIGenT SySTeMS Published by the IEEE Computer Society  

E-print Network

, zeng@email.arizona.edu Situation Awareness and Cognitive Modeling Mieczyslaw M. Kokar, Northeastern just some of the situation awareness scenarios discussed at the 2nd IEEE Conference on Cognitive im- proving situation awareness (SA) which would in the end support better understanding

Kokar, Mieczyslaw M.

243

User-Controllable Security and Privacy for Pervasive Computing Jason Cornwell, Ian Fette, Gary Hsieh, Madhu Prabaker, Jinghai Rao, Karen Tang, Kami Vaniea,  

E-print Network

-based application for access control. We also draw out some themes we have learned thus far for user computing scenarios, and then draw out themes that we have learned thus far. Our three applications are: 1 applications, including a contextual instant messenger, a people finder application, and a phone

Sadeh, Norman M.

244

Pervasive developmental disorders and psychosis  

Microsoft Academic Search

Pervasive developmental disorders (PDDs) and infantile schizophrenia were initially thought to be the same condition, but\\u000a distinct differences were described in later research. However, attempts to identify psychosis in individuals with PDDs continue\\u000a to be challenging and controversial. The two disorders share many similar features, including perceptual abnormalities, thought\\u000a disorder, catatonia, and deficiencies in reality testing. Progress has been made

Jean Starling; David Dossetor

2009-01-01

245

92 Published by the IEEE Computer Society 1089-7801/09/$25.00 2009 IEEE IEEE INTERNET COMPUTING Editor: Munindar P. Singh singh@ncsu.edu  

E-print Network

COMPUTING Editor: Munindar P. Singh singh@ncsu.edu Shengru Tu shengru@cs.uno.edu I n a peer-to-peer (P2P the network and other peers' resources. However, in many P2P networks, a considerable portion of peers are reluctant to share resources. Thus, P2P networks' primary expectation -- peers' implicit or explicit

Ulusoy, zgr

246

16 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/04/$20.00 2004 IEEE F I R S T R E S P O N S E  

E-print Network

with medical care sensor networks raised many exciting opportunities and challenges. The CodeBlue infrastructure Integrating a range of wireless devices with varying capabilities into medical, disaster re pathways between vital sign sensors and receiving devices--for example, a PDA that an emergency medical

Chen, Yiling

247

1536-1268/05/$20.00 2005 IEEE Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 51 T H E S M A R T P H O N E  

E-print Network

and have clues about the current situation. On the other, their various usage contexts will likely benefit- bile phones using Symbian OS (www.symbian. com) and the Nokia Series 60 Smartphone plat- form (www it to the user's environment when appropriate. The context thus becomes a resource for social interaction

Toivonen, Hannu

248

24 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/04/$20.00 2004 IEEE F I R S T R E S P O N S E  

E-print Network

and attacks on the World Trade Center are unforgettable events in which humans were ill-equipped to re- spond I R S T R E S P O N S E Robot and Sensor Networks for First Responders T he Oklahoma City bombing information--that is, information about the location and properties of physical objects in the real world. Our

Singh, Sanjiv

249

Published in IEEE Pervasive Computing, Mobile and Ubiquitous Systems. Volume 2, No.3, pp 62-71. July-September 2003.  

E-print Network

DA, Bluetooth, and, more recently, impulse radio, or ultrawideband signaling2,3 tar- get the short microphones and speakers. The Digital Voices project explores device com- munications using audible sound.4

Lopes, Cristina Videira

250

52 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 15, NO. 1, JANUARY 2005 On the Use of Computable Features for Film  

E-print Network

On the Use of Computable Features for Film Classification Zeeshan Rasheed, Yaser Sheikh, Student Member, IEEE films into genres, based only on computable visual cues. We view the work as a step toward high-level semantic film inter- pretation, currently using low-level video features and knowledge of ubiquitous

Treuille, Adrien

251

Application-Domain-Driven System Design for Pervasive Video Processing  

Microsoft Academic Search

Pervasive video processing in future Ambient Intelligence environments sets new challenges in embedded system design. In particular,\\u000a very high performance requirements have to be combined with the constraints of deeply embedded systems, frequently changing\\u000a operating modes, and low-cost, high-volume production. By leveraging upon the key properties of the application domain, we\\u000a devised a computation model, a hardware template, and a

Zbigniew Chamski; Marc Duranton; Albert Cohen; Christine Eisenbeis; Paul Feautrier; Daniela Genius

252

On Designing a Pervasive Mobile Learning Platform  

ERIC Educational Resources Information Center

This article presents the features, design and architecture of the Myst pervasive game platform that has been applied in creating pervasive mobile learning games in various contexts such as science festivals and museums in Finland. Based on our experiences with the development, we draw a set of design principles for creating successfully a

Laine, Teemu H.; Vinni, Mikko; Sedano, Carolina Islas; Joy, Mike

2010-01-01

253

Institute of Electrical and Electronics Engineers (IEEE) Careers for Electrical Engineers and Computer Scientists  

NSDL National Science Digital Library

The Institute of Electrical and Electronic Engineers (IEEE) Careers Website is an excellent jobs resource. Sections provided include Engineering Careers, Finding a Job, Career Planning, Salaries and Compensation, and Employer Database, among a host of others.

254

Challenges in Securing the Interface Between the Cloud and Pervasive Systems  

SciTech Connect

Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources and issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.

Lagesse, Brent J [ORNL] [ORNL

2011-01-01

255

Electronic textiles: a platform for pervasive computing  

Microsoft Academic Search

Abstract: this paper, welook at the synergistic relationship between textiles and computingand identify the need for their "integration" using tools providedby an emerging new field of research that combines the strengthsand capabilities of electronics and textiles into one: electronictextiles, or e-textiles. E-textiles, also called smart fabrics, havenot only "wearable" capabilities like any other garment, butManuscript received March 1, 2003; revised

DIANA MARCULESCU; RADU MARCULESCU; NICHOLAS H. ZAMORA; PRADEEP K. KHOSLA; Jayaraman Jung; L. Weber; K. Cottet; Grzyb; Troster; Nakad

2003-01-01

256

Advertising in a pervasive computing environment  

Microsoft Academic Search

The advent of the internet has revolutionized the field of advertising by providing a whole new path for reaching potential customers. Studies show that online advertising is, on the whole, extremely effective and that consumer acceptance of online advertising is comparable to traditional media[7][8]. One of the reasons for the high effectiveness of online advertising is that users interact with

Anand Ranganathan; Roy H. Campbell

2002-01-01

257

Proceedings of the IEEE Computer Society conference on computer vision and pattern recognition  

SciTech Connect

This book presents the papers given at a conference on image processing and pattern recognition. Topics considered at the conference included stereovision, vision applications, parallel processing, algorithms, artificial intelligence, structure from motion, three-dimensional shape representation, array processors, industrial vision systems, computer architecture, homogeneous multiprocessors, shape from texture, and optimal likelihood generators for edge detection under Gaussian additive noise.

Not Available

1986-01-01

258

Digital Object Identifier 10.1109/MCI.2012.2188599 This is one of the two flagship biennial international meetings sponsored by the IEEE Computational Intelligence Society promoting allThis is one of the two flagship biennial international meetings sponso  

E-print Network

and Identity Management, David Zhang, Hong Kong; Qinghan Xiao, Canada; Fabio Scotti, Italy. CICA 2013, IEEE; Jagannathan Sarangapani, USA; Huaguang Zhang, China. ALIFE 2013, IEEE Symposium on Artificial Life, Hussein Symposium on Computational Intelligence in Control and Automation, Xiao-Jun Zeng, UK. CIVI 2013, IEEE

Mayer, Helmut A.

259

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 1, NO. 2, JUNE 2009 1 Rapid and Reliable Adaptation of  

E-print Network

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 1, NO. 2, JUNE 2009 1 Rapid and Reliable Adaptation of Video Game AI Sander Bakkes, Pieter Spronck, and Jaap van den Herik Abstract--Current approaches to adaptive game AI typically require numerous trials to learn effective behaviour (i.e., game

Spronck, Pieter

260

IEEE Symposium on Computer Based Medical Systems (CBMS'2002), Maribor (Slovenia). Symbolic Exposition of Medical Data-Sets: A Data Mining  

E-print Network

In 15th IEEE Symposium on Computer Based Medical Systems (CBMS'2002), Maribor (Slovenia). Symbolic Exposition of Medical Data-Sets: A Data Mining Workbench to Inductively Derive Data-Defining Symbolic Rules, Malaysia Abstract The application of data mining techniques upon medical data is certainly beneficial

Abidi, Syed Sibte Raza

261

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. X, NO. X, MM 20XX 1 Efficient All Top-k Computation  

E-print Network

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. X, NO. X, MM 20XX 1 Efficient All Top-k Computation A unified solution for all top-k, reverse top-k and top-m influential queries Shen Ge, Leong Hou U of multiple top-k queries finds application in systems, where there is a heavy workload of ranking queries (e

Mamoulis, Nikos

262

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 26, NO. 8, AUGUST 2007 1445 Optimal Jumper Insertion for Antenna Avoidance  

E-print Network

. Antenna rules are commonly enforced as upper bounds on the antenna ratio in the design rules [6IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 26, NO. 8, AUGUST 2007 1445 Optimal Jumper Insertion for Antenna Avoidance Considering Antenna Charge Sharing Jia

Zhou, Hai

263

Proceedings of 12th IEEE International Conference on Computer Communications and Networks (ICCCN), 2003 Effect of TCP on Self-Similarity of Network Traffic  

E-print Network

Proceedings of 12th IEEE International Conference on Computer Communications and Networks (ICCCN), 2003 1 Effect of TCP on Self-Similarity of Network Traffic Nawaporn Wisitpongphan, Jon M. Peha Carnegie Markovian models such as the Poisson process. In this work, we simulate a simple network with a full

Peha, Jon M.

264

1712 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 24, NO. 11, NOVEMBER 2005 Power Modeling and Characteristics of Field  

E-print Network

1712 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 24, NO. 11. Gate-level netlists back-annotated with postlayout capacitances and delays are generated and cycle implemented in a Xilinx XC4003A FPGA with the same adder implemented in a fully customized complementary metal

Chen, Deming

265

IEEE TRANSACTIONS ON COMPUTERS, VOL. c-33, NO. 6, JUNE 1984 [5] W. C. Carter, "The ubiquitous parity bit," in Proc. 12th Annu. Int. Symp.  

E-print Network

IEEE TRANSACTIONS ON COMPUTERS, VOL. c-33, NO. 6, JUNE 1984 [5] W. C. Carter, "The ubiquitous Cliffs, NJ: Prentice-Hall, 1984. [14] J. Savir, G. Ditlow, and P. H. Bardell, "Random pattern testability 28-30, 1983, pp. 222-226. [17] L. -T. Wang, "A new condensed linear feedback shift register designed

Stanford University

266

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS AND CONTROL INSTRUMENTATION, VOL. JECI-14, NO. 1, APRIL 1967 A Study of the Applications of Analog Computers  

E-print Network

1967 A Study of the Applications of Analog Computers V. P. KODALI, MEMBER, IEEE Abstract-An electronic, the study of analogs is, to a large extent, a mathematical study. It is apparent that different devices, the analogs of many hydraulic, pneumatic, mechanical, and electrical or electronic phenomena exist in other

Leach Jr.,W. Marshall

267

Metrics for Human Driving of Multiple Robots Dan R. Olsen Jr, Member IEEE Computer Society, Stephen Bart Wood, and Jonathan Turner  

E-print Network

Metrics for Human Driving of Multiple Robots Dan R. Olsen Jr, Member IEEE Computer Society, Stephen Bart Wood, and Jonathan Turner Abstract--A goal of human-robot interaction is to expand the capability of human beings so that they can control multiple robots simultaneously. This provides leverage for human

Olsen Jr., Dan R.

268

Dynamic privacy management in pervasive sensor networks  

E-print Network

This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a ...

Gong, Nan-wei

269

Per Viz: Painkillers for Pervasive Application Debugging  

E-print Network

Debugging pervasive applications is difficult due to their distributed, asynchronous, and dynamic nature. To help ease the debugging process, we propose PerViz, a developer-targeted tool that enhances system visibility ...

Pham, Hubert

270

Original Research Pervasive Cognitive Impairment in Acute  

E-print Network

Original Research Pervasive Cognitive Impairment in Acute Rehabilitation Inpatients Without Brain: To establish feasibility for the hypothesis that patients in acute rehabilitation who are hospitalized rehabilitation hospital without known cerebral disease and normal community-dwelling persons. Setting: Acute

Chatterjee, Anjan

271

Future pervasive wireless communications Air interface challenges  

Microsoft Academic Search

Future pervasive communication systems requirements for highly performing, flexibly deployable and cost\\/energy-efficient services and applications are expected to revolutionize the way we design, optimize and use wireless networks. From a cellular perspective, the emphasis is placed on achieving ubiquitous and reliable real-time data communications at cell-edge, as articulated in ITU's IMT-Advanced requirements. From a pervasive systems perspective, the vision of

Angeliki Alexiou; Jim Womack; Yi Wang

2010-01-01

272

ALPH: a domain-specific language for crosscutting pervasive healthcare concerns  

Microsoft Academic Search

Pervasive healthcare is an advancing discipline that applies ubiquitous computing features to applications deployed in the healthcare domain. In these applications, ubiquitous computing concerns and health informatics concerns are entwined with base functionality resulting in significant, complex crosscutting code. Domainspecific languages (DSLs) can reduce development effort by providing higher level programming abstractions for domain-specific functionality. We introduce ALPH (Aspect Language

Jennifer Munnelly; Siobhn Clarke

2007-01-01

273

Fingerprinting IEEE 802.15.4 Devices with Commodity Dartmouth Computer Science Technical Report TR2014-746  

E-print Network

-Communication Networks]: Network Architecture and Design--Wireless communication Keywords IEEE 802.15.4; ZigBee; wireless (RFIC) devices will be deployed by 2017 [29], the majority of which will be IEEE 802.15.4 [4] and ZigBee identification, specifically for IEEE 802.15.4 and ZigBee devices. We have built a fingerprinting framework

274

472 IEEE TRANSACTIONS ON COMPUTERS, VOL. 47, NO. 4, APRIL 1998 Brief Contributions  

E-print Network

Briozzo, Member, IEEE Abstract--The paper provides a sensitivity analysis to measure the loss in accuracy, coefficients, internal values, and outputs. The sensitivity analysis can be used to measure the loss the hardware compactness, in terms of silicon area, and the loss in accuracy at the device output caused

Alippi, Cesare

275

IEEE SIGNAL PROCESSING MAGAZINE [128] MAY 2010 his article argues that future generations of computer-  

E-print Network

IEEE SIGNAL PROCESSING MAGAZINE [128] MAY 2010 T his article argues that future generations. The second part of the article therefore attempts to demonstrate that the essential benefits of the POMDP potential for short- and long- term adaptation. The article concludes by noting that while the challenges

Young, Steve

276

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, MANUSCRIPT ID 1 The Five W's for Information Visualization  

E-print Network

, coordinated and multiple views, focus and context, health informatics, electronic medical record (EMR the application of the Five W's to health informatics. We find that most current health care informatics systems's for Information Visualization with Application to Healthcare Informatics Zhiyuan Zhang, Student Member, IEEE, Bing

Mueller, Klaus

277

2 PERVASIVE computing Published by the IEEE CS n 1536-1268/11/$26.00 2011 IEEE P e r v a s i v e r e ta i l  

E-print Network

opportunities for spending money. This study proposes a phone-based system to sense physical shopping activities cost, and continu- ous mobile sensing. Previous researchers used human shadowing or video-based.) We describe the design, prototypes, and evaluation of a phone-based shopping tracker to detect how

Ouhyoung, Ming

278

46 PERVASIVE computing Published by the IEEE CS n 1536-1268/12/$31.00 2012 IEEE F e a t u r e : S u S ta i n a b i l i t y  

E-print Network

: S u S ta i n a b i l i t y Groupenergytable: an interactive tabletop for energy Conservation P of giving indi- viduals feedback on mobile phones to encourage green behavior1 and physical fit- ness.2 (For in which small groups consume shared energyresourcesarefairlycommon--forexample, in a household or small

Anderson, Richard

279

Published by the IEEE CS n 1536-1268/10/$26.00 2010 IEEE PERVASIVE computing 37 C O N N E C T E D Y O U T H  

E-print Network

years: 93 percent of US teens go online, 73 percent use social network- ing sites,1 75 percent own a cell phone, and 66 percent use text messaging2 (see Figure 1). Children under 12 are one of the fastest

Hayes, Gillian R.

280

0018-9162/12/$31.00 2012 IEEE Published by the IEEE Computer Society MAY 2012 15 Technology news  

E-print Network

William Dally, who is also chief scientist and senior vice presi- dent of research at GPU maker Nvidia, and this is getting worse with every generation," said Dally. Computer scientist s from Microsoft Research

Wang, Deli

281

New tricks with old sensors: Pervasive Technologies for Novel Applications  

NASA Astrophysics Data System (ADS)

Sensors are interleaved into society, instrumenting considerable aspects of our lives without our comprehension. Sensors such as the MEMS accelerometer have transitioned from their original domains to applications that they were never conceived for: from games controllers to contextually rotating the screen on your smartphone. Further advances in technologies such as pervasive computing and networked embedded sensing are enabling new applications and smart devices which utilise sensors in new ways. In this presentation I will highlight new trends, applications and research in these fields, and show how "simple" sensors are being used in larger connected systems - from assistive technologies to distributed monitoring.

Merrett, Geoff

2013-06-01

282

478 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 19, NO. 2, MARCH 2004 A Unified Approach to Solving the Harmonic  

E-print Network

, Leon M. Tolbert, Senior Member, IEEE, Keith J. McKenzie, Student Member, IEEE, and Zhong Du, Student Member, IEEE Abstract--A method is presented to compute the switching an- gles in a multilevel converter

Tolbert, Leon M.

283

IEEE TRANSACTIONS ON MOBILE COMPUTING, TMC-2007-09-0291.R1 1 The Orphan Problem in ZigBee Wireless Networks  

E-print Network

IEEE TRANSACTIONS ON MOBILE COMPUTING, TMC-2007-09-0291.R1 1 The Orphan Problem in ZigBee Wireless--ZigBee is a communication standard which is con- sidered to be suitable for wireless sensor networks. In ZigBee, a device of children of a device and the depth of the network. We observe that the ZigBee address assignment policy

Tseng, Yu-Chee

284

68 1541-1672/09/$26.00 2009 IEEE IEEE INtEllIgENt systEMs Published by the IEEE Computer Society  

E-print Network

-analysis research. For instance, Nano Mapper (http://nanomapper. eller.arizona.edu) is a knowledge mapping system management. Each essay presents an innovative research frame- work, computational methods, and se- lected at the University of Arizona's AI Lab.1 The study was based on academic nanotechnology papers published

Indiana University

285

24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2010 CFR

...2010-04-01 false Tests of pervasive poverty, unemployment and general distress...Requirements 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be...

2010-04-01

286

A Real Little Game: The Performance of Belief in Pervasive Play  

Microsoft Academic Search

Ubiquitous computing and mobile network technologies have fueled a recent proliferation of opportunities for digitally-enabled play in everyday spaces. In this paper, I examine how players negotiate the boundary between these pervasive games and real life. I trace the emergence of what I call \\

Jane McGonigal

287

Healthcare Aide: Towards a Virtual Assistant for Doctors Using Pervasive Middleware  

Microsoft Academic Search

The advancement of available, portable, low cost handheld devices (PDAs, cell phones, etc.), bluetooth, and WiFi has resulted in the users' mobility at unprecedented levels. As these devices can communicate with one another, the combined capabilities can be leveraged to form a useful new set of tools. Presently, pervasive computing is being extended into the sophisticated healthcare sector with the

Moushumi Sharmin; Shameem Ahmed; Ahmed J. Khan; Munirul M. Haque

2006-01-01

288

Body Sensor Network - A Wireless Sensor Platform for Pervasive Healthcare Monitoring  

Microsoft Academic Search

With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In addition to providing continuous monitoring and analysis of physiological parameters, the recently proposed Body Sensor Networks (BSN) incorporate context aware sensing for increased sensitivity and specificity. To facilitate research and development in BSN and multi-sensor data fusion, a BSN

Benny P. L. Lo; Surapa Thiemjarus; Rachel King; Guang-Zhong Yang

289

Pervasive Restart In MOOSE-based Applications  

SciTech Connect

Multiphysics applications are inherently complicated. Solving for multiple, interacting physical phenomena involves the solution of multiple equations, and each equation has its own data dependencies. Feeding the correct data to these equations at exactly the right time requires extensive effort in software design. In an ideal world, multiphysics applications always run to completion and produce correct answers. Unfortunately, in reality, there can be many reasons why a simulation might fail: power outage, system failure, exceeding a runtime allotment on a supercomputer, failure of the solver to converge, etc. A failure after many hours spent computing can be a significant setback for a project. Therefore, the ability to continue a solve from the point of failure, rather than starting again from scratch, is an essential component of any high-quality simulation tool. This process of continuation is commonly termed restart in the computational community. While the concept of restarting an application sounds ideal, the aforementioned complexities and data dependencies present in multiphysics applications make its implementation decidedly non-trivial. A running multiphysics calculation accumulates an enormous amount of state: current time, solution history, material properties, status of mechanical contact, etc. This state data comes in many different forms, including scalar, tensor, vector, and arbitrary, application-specific data types. To be able to restart an application, you must be able to both store and retrieve this data, effectively recreating the state of the application before the failure. When utilizing the Multiphysics Object Oriented Simulation Environment (MOOSE) framework developed at Idaho National Laboratory, this state data is stored both internally within the framework itself (such as solution vectors and the current time) and within the applications that use the framework. In order to implement restart in MOOSE-based applications, the total state of the system (both within the framework and without) must be stored and retrieved. To this end, the MOOSE team has implemented a pervasive restart capability which allows any object within MOOSE (or within a MOOSE-based application) to be declared as state data, and handles the storage and retrieval of said data.

Derek Gaston; Cody Permann; David Andrs; John Peterson; Andrew Slaughter; Jason Miller

2014-01-01

290

The Ambient Computational Environments Architecture for Reliable, Secure,  

E-print Network

The Ambient Computational Environments Architecture for Reliable, Secure, and Pervasive Computing challenge. The ACE - Ambient Computational Environments - architecture aims at high- scale and seamless

Kansas, University of

291

Semantic Pervasive Advertising Lorenzo Carrara1  

E-print Network

Introduction Advertising is a form of business marketing communication which produces awareness of an audience moment. Cost. Advertising campaigns have a considerable economical impact on businesses. A single 30Semantic Pervasive Advertising Lorenzo Carrara1 , Giorgio Orsi2 , and Letizia Tanca3 1 Cubica S

Orsi, Giorgio

292

Requesting Pervasive Services by Touching RFID Tags  

Microsoft Academic Search

We suggest a general framework for requesting pervasive services by touching RFID tags. The tags conne ct the physical and digital environments. Visual symbols c ommunicate to users the objects that can be touched and the services that can be activated. When a user touches such a symbol with a mobile phone, the data stored in the tag and other

Jukka Riekki; Timo Salminen; Ismo Alakrpp

2006-01-01

293

Autism Spectrum Disorders (Pervasive Developmental Disorders)  

ERIC Educational Resources Information Center

This booklet focuses on classic autism, pervasive developmental disorder not otherwise specified (PDD-NOS), and Asperger syndrome, with brief descriptions of Rett syndrome and childhood disintegrative disorder. The booklet describes possible indicators of autism spectrum disorders (ASD), their diagnosis, available aids, treatment options, adults

Strock, Margaret

2007-01-01

294

School refusal in pervasive developmental disorders  

Microsoft Academic Search

Of 135 autistic and\\/or mentally retarded youngsters, 30 with pervasive developmental disorders and 2 with nonautistic mental retardation showed school refusal according to its modified definition. School refusal was significantly more frequent in other PDDs than in nonautistic mental retardation. The intellectual level was significantly higher in PDD children with school refusal than those without it. A certain level of

Hiroshi Kurita

1991-01-01

295

Communication Issues in Pervasive Healthcare Systems and  

E-print Network

Chapter 10 Communication Issues in Pervasive Healthcare Systems and Applications Demosthenes provides a systematic analysis of the communication technologies used in healthcare and homecare, their applications and the utilization of the mobile technologies in the healthcare sector by using in addition case

Vouyioukas, Demosthenes

296

54 Computer Published by the IEEE Computer Society 0018-9162/08/$25.002008IEEE C O V E R F E A T U R E  

E-print Network

R E Harnessing Digital Evolution N early 150 years ago, Charles Darwin explained how evolution at the dawn of evolution in another world: the world of computing. There, evolution helps humans solve complex-widening variety of problems. As the "Evolution in a Computer" sidebar shows, evolutionary computa- tion methods

297

54 Computer Published by the IEEE Computer Society 0018-9162/08/$25.00 2008 IEEE C O V E R F E A T U R E  

E-print Network

A T U R E Harnessing Digital Evolution N early 150 years ago, Charles Darwin explained how evolution at the dawn of evolution in another world: the world of computing. There, evolution helps humans solve complex-widening variety of problems. As the "Evolution in a Computer" sidebar shows, evolutionary computa- tion methods

298

Enable Pervasive Healthcare through Continuous Remote Health Monitoring  

E-print Network

to enable high-quality pervasive healthcare services to users with low delivery delay and reduced costs. We will be approximately 50 [2]. A rise in global aging demands an increased focus on preparing a pervasive healthcare1 Enable Pervasive Healthcare through Continuous Remote Health Monitoring Xiaohui Liang, Xu Li

Shen, Xuemin "Sherman"

299

Fingerprinting IEEE 802.15.4 Devices with Commodity Dartmouth Computer Science Technical Report TR2014-746 Revision 2  

E-print Network

Keywords IEEE 802.15.4; ZigBee; wireless sensor networks; security 1. INTRODUCTION Wireless sensor networks of which will be IEEE 802.15.4 [4] and ZigBee [40] standards compli- ant. It is estimated that by 2015.15.4 and ZigBee devices. We have built a fingerprinting framework, codenamed Isotope, around commodity hard

300

In Proc. of the 5th IEEE International Conference on Cluster Computing (Cluster 2003), Hong Kong, Dec. 1-4, 2003. Towards Load Balancing Support for I/O-Intensive Parallel  

E-print Network

of Workstations Xiao Qin Hong Jiang Yifeng Zhu David R. Swanson Department of Computer Science and EngineeringIn Proc. of the 5th IEEE International Conference on Cluster Computing (Cluster 2003), Hong Kong effective than non-preemptive migration policies. Zhang et al. [22] focused on load sharing policies that c

Zhu, Yifeng

301

Proceedings of the 3rd IEEE Workshop on Applications of Computer Vision, Dec. 2-4, 1996, Sarasota, Florida, pp. 181-186. Pose Estimation of Artificial Knee Implants in Fluoroscopy Images Using A  

E-print Network

1 Proceedings of the 3rd IEEE Workshop on Applications of Computer Vision, Dec. 2-4, 1996, Sarasota, Florida, pp. 181-186. Pose Estimation of Artificial Knee Implants in Fluoroscopy Images Using A Template the position and orientation (pose) of artificial knee implants from X-ray fluoroscopy images using computer

Hoff, William A.

302

Evolving Content in the Galactic Arms Race Video Game In: Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG09). Piscataway, NJ:IEEE  

E-print Network

Evolving Content in the Galactic Arms Race Video Game In: Proceedings of the IEEE Symposium Erin J. Hastings, Ratan K. Guha, and Kenneth O. Stanley Abstract-- Video game content includes. In most modern video games, the set of content shipped with the game is static and unchanging, or at best

Stanley, Kenneth O.

303

36 September/October 2013 Copublished by the IEEE Computer and Reliability Societies 1540-7993/13/$31.00 2013 IEEE IDENTITY MANAGEMENT SYSTEMS  

E-print Network

'tgivencontrolovertheirattributes'dissemi- nation, leading to privacy violations and identity theft. Over the past 15 years, identity management sys-7993/13/$31.00 2013 IEEE IDENTITY MANAGEMENT SYSTEMS Identity management systems store attributes associated choices found in these systems can help technical experts consulting on public policy relating to identity

Schneider, Fred B.

304

0018-9162/07/$25.00 2007 IEEE36 Computer Published by the IEEE Computer Society C O V E R F E A T U R E  

E-print Network

biol- ogy, and sensor networks, for example--are pushing existing technology to the limits and into new curriculum. In industry, trained electrical engi- neers routinely design software architectures, and trained to enter directly into the life sciences or nanoengineering.1 At the same time, computer technology has

Henzinger, Thomas A.

305

0018-9162/07/$25.00 2007 IEEE32 Computer Published by the IEEE Computer Society C O V E R F E A T U R E  

E-print Network

biol- ogy, and sensor networks, for example--are pushing existing technology to the limits and into new curriculum. In industry, trained electrical engi- neers routinely design software architectures, and trained to enter directly into the life sciences or nanoengineering.1 At the same time, computer technology has

Sifakis, Joseph

306

C O V E R F E A T U R E 0018-9162/06/$20.00 2006 IEEE30 Computer Published by the IEEE Computer Society  

E-print Network

of the vision system that uses it. French philosopher Michel Foucault explored at great length the psychological, field of view, dynamic range, and depth. Each of the cameras presented here can be viewed as exploring be difficult. However, the computational module knows everything it needs to know about the optics. Hence

Nayar, Shree K.

307

C O V E R F E A T U R E 0018-9162/07/$25.00 2007 IEEE62 Computer Published by the IEEE Computer Society  

E-print Network

-level sensor events and high-level situational awareness. Database technologies, including extensions to data for extracting situational awareness from sensed data is therefore needed. During the past three years, we have," formally known as situational awareness. In the context of computer security, situational awareness

Cybenko, George

308

1804 IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 37, NO. 12, DECEMBER 2002 A Low-Power Multiplying DLL for Low-Jitter  

E-print Network

-Rad, Member, IEEE, William Dally, Fellow, IEEE, Hiok-Tiaq Ng, Member, IEEE, Ramesh Senthinathan, M.-J. Edward., Milpitas, CA 95035 USA. W. Dally is with Computer Systems Laboratory, Stanford University, Stan- ford, CA

Lee, Thomas H.

309

Pervasive Healthcare and Wireless Health Monitoring  

Microsoft Academic Search

Abstract With an increasingly mobile,society and,the worldwide deployment of mobile and wireless networks, the wireless infrastructure can support many,current and emerging,healthcare applications. This could fulfill the vision of Pervasive Healthcare or healthcare to anyone, anytime, and anywhere by removing locational, time and other restraints while increasing both the coverage and the quality. In this paper, we present applications and require-

Upkar Varshney

2007-01-01

310

International Standard ISO/IEC 8802-11: 1999(E) ANSI/IEEE Std 802.11, 1999 Edition (R2003)  

E-print Network

International Standard ISO/IEC 8802-11: 1999(E) ANSI/IEEE Std 802.11, 1999 Edition (R2003 Layer (PHY) Specifications Sponsor LAN MAN Standards Committee of the IEEE Computer Society Reaffirmed 12 June 2003 IEEE-SA Standards Board #12;iv Copyright © 1999 IEEE. All rights reserved. ANSI/IEEE Std

Scarano, Vittorio

311

Joint Computer Science Department and Electrical and Computer Engineering Department Special Seminar Sponsored by ISTeC  

E-print Network

Joint Computer Science Department and Electrical and Computer Engineering Security Professor of Computer Science (College of Science) Tue., Sept. 16 IEEE, ACM, NSA and NIST such as the IEEE Computer Society's Technical

312

Overseas Training Event for IEEE participating Universities of Pakistan Institution of Electrical & Electronics Engineers (IEEE) has been offering its topoftheline product, IEEE  

E-print Network

Overseas Training Event for IEEE participating Universities of Pakistan Institution institution of Pakistan in the fields of engineering and computer sciences got the access to premier of Pakistan are subscribing to IEEE Xplore. IEEE has keenly observed this trend among the Pakistani

Siddiqi, Sajjad Ahmed

313

1228 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 7, JULY 2008 NTUplace3: An Analytical Placer for Large-Scale  

E-print Network

and Density Constraints Tung-Chieh Chen, Student Member, IEEE, Zhe-Wei Jiang, Student Member, IEEE, Tien-Chang Hsu, Hsin-Chen Chen, Student Member, IEEE, and Yao-Wen Chang, Member, IEEE Abstract--In addition. This paper was recommended by Associate Editor C. J. Alpert. T.-C. Chen is with the Graduate Institute

Chang, Yao-Wen

314

19IEEE Network July/August 2010 loud computing has been envisioned as the next-  

E-print Network

maintenance, and so on [2]. While cloud computing makes these advantages more appealing than ever, it also threats to data integrity. Outages and security breaches of noteworthy cloud services appear from time of Technology Abstract Cloud computing is the long dreamed vision of computing as a utility, where data owners

Hou, Y. Thomas

315

Adaptive User Profiles in Pervasive Advertising Environments  

NASA Astrophysics Data System (ADS)

Nowadays modern advertising environments try to provide more efficient ads by targeting costumers based on their interests. Various approaches exist today as to how information about the users' interests can be gathered. Users can deliberately and explicitly provide this information or user's shopping behaviors can be analyzed implicitly. We implemented an advertising platform to simulate an advertising environment and present adaptive profiles, which let users setup profiles based on a self-assessment, and enhance those profiles with information about their real shopping behavior as well as about their activity intensity. Additionally, we explain how pervasive technologies such as Bluetooth can be used to create a profile anonymously and unobtrusively.

Alt, Florian; Balz, Moritz; Kristes, Stefanie; Shirazi, Alireza Sahami; Mennenh, Julian; Schmidt, Albrecht; Schrder, Hendrik; Goedicke, Michael

316

CAMPUS NEWSCAMPUS NEWS an Information Networkan Information Network for Pervasive Universitiesfor Pervasive Universities  

E-print Network

Universitiesfor Pervasive Universities Ulrich FurbachUlrich Furbach Markus MaronMarkus Maron Kevin ReadKevin Read. Dr. Troitzsch, Prof. Dr. von Kortzfleisch, Prof. Dr. Walsh, Prof. Dr. Wimmer, Prof. Dr. Zöbel Kontaktdaten der Verfasser Ulrich Furbach, Markus Maron, Kevin Read Institut für Informatik Fachbereich

Maron, Markus

317

Towards a flexible middleware for context-aware pervasive and wearable systems.  

PubMed

Ambient intelligence and wearable computing call for innovative hardware and software technologies, including a highly capable, flexible and efficient middleware, allowing for the reuse of existing pervasive applications when developing new ones. In the considered application domain, middleware should also support self-management, interoperability among different platforms, efficient communications, and context awareness. In the on-going "everything is networked" scenario scalability appears as a very important issue, for which the peer-to-peer (P2P) paradigm emerges as an appealing solution for connecting software components in an overlay network, allowing for efficient and balanced data distribution mechanisms. In this paper, we illustrate how all these concepts can be placed into a theoretical tool, called networked autonomic machine (NAM), implemented into a NAM-based middleware, and evaluated against practical problems of pervasive computing. PMID:22527692

Muro, Marco; Amoretti, Michele; Zanichelli, Francesco; Conte, Gianni

2012-11-01

318

J. Davis and X. Chen, "Calibrating pan-tilt cameras in wide-area surveillance networks," IEEE International Conference on Computer Vision, 2003. Calibrating pan-tilt cameras in wide-area surveillance networks  

E-print Network

J. Davis and X. Chen, "Calibrating pan-tilt cameras in wide-area surveillance networks," IEEE International Conference on Computer Vision, 2003. Calibrating pan-tilt cameras in wide-area surveillance-area surveillance systems. It is necessary to cali- brate these cameras in relation to one another in order

Stanford University

319

Pervasive Sensing to Model Political Opinions in Face-to-Face Networks  

Microsoft Academic Search

Exposure and adoption of opinions in social networks are important questions in education, business, and government. We de- scribe a novel application of pervasive computing based on using mobile phone sensors to measure and model the face-to-face interactions and subsequent opinion changes amongst undergraduates, during the 2008 US presidential election campaign. We nd that self-reported political discussants have characteristic interaction

Anmol Madan; Katayoun Farrahi; Daniel Gatica-Perez

2011-01-01

320

3rd IEEE E-Science and Grid Computing, Bangalore, December 2007 An Integrated Portal for  

E-print Network

E-Science and Grid Computing, Bangalore, December 2007 "Ubiquitous Computing & Monitoring System receive ultra large oil tankers ­ 20,000 oil producing wells, around 4K offshore · New deep sea well: ­ Petroleum engineering application scenarios (reservoir simulations, seismic analysis, well

Allen, Gabrielle

321

Dynamic Privacy Management in Pervasive Sensor Networks  

NASA Astrophysics Data System (ADS)

This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a potentially invasive sensor network (with high resolution video, audio, and motion tracking capabilities) featuring different interactive applications that created incentive for accepting this network as an extension of people's daily social space. A user study was then conducted to evaluate several privacy management approaches - an active badge system for both online and on-site control, on/off power switches for physically disabling the hardware, and touch screen input control. Results from a user study indicated that an active badge for on-site privacy control is the most preferable method among all provided options. We present a set of results that yield insight into the privacy/benefit tradeoff from various sensing capabilities in pervasive sensor networks and how privacy settings and user behavior relate in these environments.

Gong, Nan-Wei; Laibowitz, Mathew; Paradiso, Joseph A.

322

An integrated multi-sensing framework for pervasive healthcare monitoring  

Microsoft Academic Search

Pervasive healthcare provides an effective solution for monitoring the wellbeing of elderly, quantifying post-operative patient recovery and monitoring the progression of neurodegenerative diseases such as Parkinson's. However, developing functional pervasive systems is a complex task that entails the creation of appropriate sensing platforms, integration of versatile technologies for data stream management and development of elaborate data analysis techniques. This paper

M. ElHelw; J. Pansiot; D. McIlwraith; R. Ali; B. Lo; L. Atallah

2009-01-01

323

Pervasive Healthcare Overview A Personal Perspective (May 2007)  

Microsoft Academic Search

The latest outstanding advances in mobile network technologies, wireless communications and medical sensors are propelling a new and exciting research for 21 st century pervasive healthcare systems. Such systems have the capacity to provide health services for patients regardless of time and place. The aim of this paper is to overview the state of the art pervasive healthcare technologies by

Sabrina Nefti

324

Pervasive, Persuasive Health: Some Challenges Sean A. Munson  

E-print Network

for screening or other infrequent behaviors (e.g., the Health Belief Model [16]), the pervasive heathPervasive, Persuasive Health: Some Challenges Sean A. Munson School of Information, University maintaining healthy routines and habits they have developed. Keywords- health, wellness, persuasion, single

Munson, Sean A.

325

RESTful Integration of Heterogeneous Devices in Pervasive Environments  

E-print Network

representation formats) make it a suitable architecture style for integration in pervasive environmentsRESTful Integration of Heterogeneous Devices in Pervasive Environments Daniel Romero1 , Gabriel and more home devices are equipped with advanced compu- tational capabilities to improve the user

Boyer, Edmond

326

A pervasive architectural framework for providing remote medical treatment  

Microsoft Academic Search

The proliferation of mobile devices has led to their integration into a huge number of assistive environments where they perform a key role. Pervasive environments, built over wireless infrastructures, introduce new possibilities in the healthcare sector realizing the anytime-anywhere access to medical information paradigm. Towards this direction pervasive technology can be deployed in assistive environments, such as home monitoring for

Dimitris Vassis; Petros Belsis; Christos Skourlas; Grammati E. Pantziou

2008-01-01

327

RESTful Integration of Heterogeneous Devices in Pervasive Environments  

E-print Network

) make it a suitable architecture style for integration in pervasive environments. Furthermore, while ourRESTful Integration of Heterogeneous Devices in Pervasive Environments Daniel Romero1 , Gabriel and more home devices are equipped with advanced compu- tational capabilities to improve the user

Boyer, Edmond

328

Minimizing the Pervasiveness of Women's Personal Experiences of Gender Discrimination  

ERIC Educational Resources Information Center

Given the Rejection-Identification Model (Branscombe, Schmitt, & Harvey, 1999), which shows that perceiving discrimination to be pervasive is a negative experience, it was suggested that there would be conditions under which women would instead minimize the pervasiveness of discrimination. Study 1 (N= 91) showed that when women envisioned

Foster, Mindi D.; Jackson, Lydia C.; Hartmann, Ryan; Woulfe, Shannon

2004-01-01

329

216 IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 13, NO. 2, MARCH 2005 Elimination of Harmonics in a Multilevel Converter  

E-print Network

. Chiasson, Senior Member, IEEE, Leon M. Tolbert, Senior Member, IEEE, Keith J. McKenzie, Student Member, IEEE, and Zhong Du, Student Member, IEEE Abstract--A method is presented to compute the switching the method of resultants from elimination theory. A difficulty with this approach is that when

Tolbert, Leon M.

330

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Temporal Partitioning of Communication Resources  

E-print Network

Terms-- System architectures, real-time and embedded systems, system integration and implementation, fault-tolerance, computer network performance, distributed architectures, infras- tructure protection I. INTRODUCTION In application domains with large distributed embedded com- puter systems, such as the avionic

331

702 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 12, NO. 6, DECEMBER 2008 Biogeography-Based Optimization  

E-print Network

of biological neurons inspired the development of artificial neural networks, this paper considers optimization. SGA Stud genetic algorithm. SIV Suitability index variable. SVD Singular value decomposition logic, particle swarm optimization (PSO), and other areas of computer intelligence. Mathematical models

Simon, Dan

332

Enabling Applications in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt, Vincent Matossian and Manish Parashar  

E-print Network

as a result of context and content based local behaviors. In this paper we also present the design, prototype application where computational models use stream- ing information from video broadband sensors embeddedEnabling Applications in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt

Parashar, Manish

333

Simulating the pervasive fracture and fragmentation of materials and structures using randomly close-packed Voronoi tessellations.  

SciTech Connect

Under extreme loading conditions most often the extent of material and structural fracture is pervasive in the sense that a multitude of cracks are nucleating, propagating in arbitrary directions, coalescing, and branching. Pervasive fracture is a highly nonlinear process involving complex material constitutive behavior, material softening, localization, surface generation, and ubiquitous contact. Two primary applications in which pervasive fracture is encountered are (1) weapons effects on structures and (2) geomechanics of highly jointed and faulted reservoirs. A pure Lagrangian computational method based on randomly close-packed Voronoi tessellations is proposed as a rational approach for simulating the pervasive fracture of materials and structures. Each Voronoi cell is formulated as a finite element using the reproducing kernel method. Fracture surfaces are allowed to nucleate only at the intercell faces. The randomly seeded Voronoi cells provide an unbiased network for representing cracks. In this initial study two approaches for allowing the new surfaces to initiate are studied: (1) dynamic mesh connectivity and the instantaneous insertion of a cohesive traction when localization is detected, and (2) a discontinuous Galerkin approach in which the interelement tractions are an integral part of the variational formulation, but only become active once localization is detected. Pervasive fracture problems are extremely sensitive to initial conditions and system parameters. Dynamic problems exhibit a form of transient chaos. The primary numerical challenge for this class of problems is the demonstration of model objectivity and, in particular, the identification and demonstration of a measure of convergence for engineering quantities of interest.

Bishop, Joseph E.

2008-09-01

334

1224 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 28, NO. 8, AUGUST 2009 A Universal Placement Technique of Compressed  

E-print Network

Decompression Xiaoke Qin, Student Member, IEEE, and Prabhat Mishra, Senior Member, IEEE Abstract two directions: effi- cient compression with slow decompression, or fast decompression at the cost to support parallel decompression without sacrificing the compression efficiency. The proposed technique

Mishra, Prabhat

335

Appears in IEEE Conf. on Computer Vision and Pattern Recognition, Anchorage, 2008. Privacy Preserving Crowd Monitoring  

E-print Network

all types of environments. This could have many goals, e.g. security, resource management, or adver for computer vision for two reasons: 1) the perception of compromised privacy is particularly strong tracking of individuals. These are problems where all the information required to perform the task can

Vasconcelos, Nuno M.

336

SUBMITTED TO IEEE TRANSACTIONS ON COMPUTERS 1 iAware: Making Live Migration of Virtual  

E-print Network

-level-agreement (SLA) demanded by cloud applications, this paper proposes iAware, a lightweight interference-aware VM-world Infrastructure-as-a- Service (IaaS) cloud platforms [1], such as Amazon Elas- tic Compute Cloud (EC2) [2], take statistically guaranteeing the service-level-agreement (SLA) in terms of throughput, delays, and the successful

Li, Baochun

337

IEEE Conference on Computer Vision and Pattern Recognition, June, 1996. A Common Framework for Curve Evolution,  

E-print Network

in Computer Vision and has been ap- plied to a wide variety of problems such as smoothing of shapes, shape solutions obtained retain sharp discontinuities or "shocks", thus providing sharp demarcation of object boundaries. 1. Introduction In recent years, curve evolution has been applied to a wide variety of problems

Shah, Jayant M.

338

August 2005 IEEE Computational Intelligence Society 5 1917 Karl Steinbuch 2005  

E-print Network

Konrad Zuse (who developed a functioning pro- gram-controlled computing machine c.1936), Steinbuch has Medicine, the Konrad Adenauer Science Award, the Jakob Fugger Medal, and the Prime Minister's Merit Medal was director of development at the Stuttgart "Informatik-Werk" of Standard Electric Lorenz AG (SEL

Hartenstein, Reiner

339

360 IEEE TRANSACTIONS ON EDUCATION, VOL. 52, NO. 3, AUGUST 2009 Motivating Computer Engineering Freshmen Through  

E-print Network

their foundational, basic science, and general education coursework. At the University of California, Santa Barbara, puzzling problem, teaching-research links. I. INTRODUCTION F RESHMAN seminars, which are being offered August 05, 2009. The author is with the Department of Electrical and Computer Engineering, University

Liebling, Michael

340

Proceedings of the IEEE conference on computer vision and pattern recognition  

SciTech Connect

This book presents the papers given at a conference on image processing, pattern recognition, and robotic vision. Topics considered at the conference included expert systems, artificial intelligence, knowledge bases, computerized simulation, computer architecture, vision models and texture, algorithms, parallel algorithms, data processing, circuit theory, array processors, and distributed data processing, and data-flow processing.

Not Available

1985-01-01

341

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Dynamic Simulation of Articulated Rigid Bodies  

E-print Network

molecular dy- namics, robotics, machine assembly, human motion, and computer graphics for video games to their new positions, instead of correcting them after the fact when it can be difficult to incorporate the effects of contact and collision. A post-stabilization technique is used for momentum and angular momentum

Thrun, Sebastian

342

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 2, APRIL 2009 229 Multiobjective Groundwater Management  

E-print Network

Groundwater Management Using Evolutionary Algorithms Tobias Siegfried, Stefan Bleuler, Marco Laumanns, Member of groundwater resources is of crucial importance for regions where freshwater supply is nat- urally limited. Long-term planning of groundwater usage requires computer-based decision support tools: on the one hand

Zitzler, Eckart

343

1306 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 57, NO. 6, JUNE 2010 Electronic Cleansing for Computed Tomography  

E-print Network

1306 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 57, NO. 6, JUNE 2010 Electronic Cleansing-invariant method to determine material fractions in voxels near such T-junctions. The proposed electronic cleansing the width of the PSF. (b) Electronic cleansing replaces H with L. (c) Transfer function based on thresholds

van Vliet, Lucas J.

344

IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 9, SEPTEMBER 1997 997 Node-covering, Error-correcting Codes  

E-print Network

R. Mahapatra, Member, IEEE Abstract--Structural fault tolerance (SFT) is the ability interconnection structure. In this paper, we focus on the design of SFT multiprocessors that have low switch tolerance. To achieve this, multiprocessors need to be designed with structural fault tolerance (SFT), which

Mahapatra, Nihar R.

345

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. X, NO. X, XXXX 200X 1 Interactive Mesh Cutting Using Constrained  

E-print Network

, flexible, and effective as well. The experimental examples show that the proposed cutting method is fast Mesh Cutting Using Constrained Random Walks Juyong Zhang, Jianmin Zheng, and Jianfei Cai, Senior Member, IEEE Abstract--This paper considers the problem of interactively finding the cutting contour to extract

Cai, Jianfei

346

1536-1268/02/$17.00 2002 IEEE PERVASIVE computing 59 R E A C H I N G W E I S E R ' S V I S I O N  

E-print Network

's direction based on exchanges between neighboring nodes. As we have marched technology forward, we are now- face-, application-, software-, and device-level design challenges associated with realizing Weiser, vibration, heat, light, moisture, pressure, ultrasound, radio, magnetic, and many more exotic modes

Sukhatme, Gaurav S.

347

Ubiquitous computing in sports: A review and analysis  

Microsoft Academic Search

Ubiquitous (pervasive) computing is a term for a synergetic use of sensing, communication and computing. Pervasive use of computing has seen a rapid increase in the current decade. This development has propagated in applied sport science and everyday life.The work presents a survey of recent developments in sport and leisure with emphasis on technology and computational techniques. A detailed analysis

Arnold Baca; Peter Dabnichki; Mario Heller; Philipp Kornfeind

2009-01-01

348

IEEE TRANSACTIONS ON BIOMEDICAL CIRCUITS AND SYSTEMS, VOL. 3, NO. 6, DECEMBER 2009 361 Special Issue on Selected Papers  

E-print Network

it is compatible with pervasive RF tech- nology. The paper A Wireless Integrated Circuit for 100-Channel Charge-Balanced, and power delivery, respectively. The paper A Cantilever Sensor With an Integrated Optical ReadoutIEEE TRANSACTIONS ON BIOMEDICAL CIRCUITS AND SYSTEMS, VOL. 3, NO. 6, DECEMBER 2009 361 Special

Bhattacharyya, Shuvra S.

349

366 PROCEEDINGS OF THE IEEE, VOL. 85, NO. 3, MARCH 1997, PP. 366390 Design of Embedded Systems: Formal Models,  

E-print Network

366 PROCEEDINGS OF THE IEEE, VOL. 85, NO. 3, MARCH 1997, PP. 366­390 Design of Embedded Systems to these problems that have been taken. I. INTRODUCTION Reactive real-time embedded systems are pervasive systems. More specifically, we are interested in reactive embedded systems. Reactive systems are those

350

Ethical Responsibility Key to Computer Security.  

ERIC Educational Resources Information Center

The pervasiveness of powerful computers and computer networks has raised the specter of new forms of abuse and of concomitant ethical issues. Blurred boundaries, hackers, the Computer Worm, ethical issues, and implications for academic institutions are discussed. (MLW)

Lynn, M. Stuart

1989-01-01

351

What Are You Viewing? Exploring the Pervasive Social TV Experience  

Microsoft Academic Search

\\u000a The vision of pervasive TV foresees users engaging with interactive video services across a variety of contexts and user interfaces.\\u000a Following this idea, this chapter extends traditional Social TV toward the notion of pervasive Social TV (PSTV) by including\\u000a mobile viewing scenarios. We discuss social interaction enablers that integrate TV content consumption and communication in\\u000a the context of two case

Raimund Schatz; Lynne Baillie; Peter Frhlich; Sebastian Egger; Thomas Grechenig

352

Pervasive domestication of defective prophages by bacteria  

PubMed Central

Integrated phages (prophages) are major contributors to the diversity of bacterial gene repertoires. Domestication of their components is thought to have endowed bacteria with molecular systems involved in secretion, defense, warfare, and gene transfer. However, the rates and mechanisms of domestication remain unknown. We used comparative genomics to study the evolution of prophages within the bacterial genome. We identified over 300 vertically inherited prophages within enterobacterial genomes. Some of these elements are very old and might predate the split between Escherichia coli and Salmonella enterica. The size distribution of prophage elements is bimodal, suggestive of rapid prophage inactivation followed by much slower genetic degradation. Accordingly, we observed a pervasive pattern of systematic counterselection of nonsynonymous mutations in prophage genes. Importantly, such patterns of purifying selection are observed not only on accessory regions but also in core phage genes, such as those encoding structural and lysis components. This suggests that bacterial hosts select for phage-associated functions. Several of these conserved prophages have gene repertoires compatible with described functions of adaptive prophage-derived elements such as bacteriocins, killer particles, gene transfer agents, or satellite prophages. We suggest that bacteria frequently domesticate their prophages. Most such domesticated elements end up deleted from the bacterial genome because they are replaced by analogous functions carried by new prophages. This puts the bacterial genome in a state of continuous flux of acquisition and loss of phage-derived adaptive genes. PMID:25092302

Bobay, Louis-Marie; Touchon, Marie; Rocha, Eduardo P. C.

2014-01-01

353

Pervasive Transcription of a Herpesvirus Genome Generates Functionally Important RNAs  

PubMed Central

ABSTRACT Pervasive transcription is observed in a wide range of organisms, including humans, mice, and viruses, but the functional significance of the resulting transcripts remains uncertain. Current genetic approaches are often limited by their emphasis on protein-coding open reading frames (ORFs). We previously identified extensive pervasive transcription from the murine gammaherpesvirus 68 (MHV68) genome outside known ORFs and antisense to known genes (termed expressed genomic regions [EGRs]). Similar antisense transcripts have been identified in many other herpesviruses, including Kaposis sarcoma-associated herpesvirus and human and murine cytomegalovirus. Despite their prevalence, whether these RNAs have any functional importance in the viral life cycle is unknown, and one interpretation is that these are merely noise generated by functionally unimportant transcriptional events. To determine whether pervasive transcription of a herpesvirus genome generates RNA molecules that are functionally important, we used a strand-specific functional approach to target transcripts from thirteen EGRs in MHV68. We found that targeting transcripts from six EGRs reduced viral protein expression, proving that pervasive transcription can generate functionally important RNAs. We characterized transcripts emanating from EGRs 26 and 27 in detail using several methods, including RNA sequencing, and identified several novel polyadenylated transcripts that were enriched in the nuclei of infected cells. These data provide the first evidence of the functional importance of regions of pervasive transcription emanating from MHV68 EGRs. Therefore, studies utilizing mutation of a herpesvirus genome must account for possible effects on RNAs generated by pervasive transcription. PMID:24618256

Canny, Susan P.; Reese, Tiffany A.; Johnson, L. Steven; Zhang, Xin; Kambal, Amal; Duan, Erning; Liu, Catherine Y.; Virgin, Herbert W.

2014-01-01

354

IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 11, NO. 3, MAY 2003 345 Control of a Multilevel Converter  

E-print Network

, IEEE, Keith J. McKenzie, Student Member, IEEE, and Zhong Du, Student Member, IEEE Abstract--In this work, a method is given to compute the switching angles in a multilevel converter to produce high for some of these proposed schemes. In this work, a method is given to compute the switching

Tolbert, Leon M.

355

IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 5, MAY 2012 1407 Particle Filters for Joint Timing and Carrier  

E-print Network

A. Nasir, Student Member, IEEE, Salman Durrani, Senior Member, IEEE, and Rodney A. Kennedy, Fellow and Computer Science, The Australian National University, Australia (e-mail: {ali.nasir, salman.durrani, rodney

Durrani, Salman

356

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 40. NO 8. AUGUST 1992 1901 METEOR: A Constraint-Based FIR Filter Design  

E-print Network

-Based FIR Filter Design Program Kenneth Steiglitz, Fellow, IEEE, Thomas W. Parks, Fellow, IEEE, and James F. Steiglitz is with the Department of Computer Science, Princeton Uni- versity, Princeton, NJ 08544-2087. T. W

Steiglitz, Kenneth

357

338 IEEE TRANSACTIONS ON BIOMEDICAL CIRCUITS AND SYSTEMS, VOL. 7, NO. 3, JUNE 2013 CMOS Neurotransmitter Microarray: 96-Channel  

E-print Network

, Student Member, IEEE, Hamed Mazhab-Jafari, Student Member, IEEE, Lian Leng, Axel Guenther, and Roman Genov. H. Mazhab-Jafari and R. Genov are with the Department of Electrical and Computer Engineering

Genov, Roman

358

Examining the criterion-related validity of the Pervasive Developmental Disorder Behavior Inventory.  

PubMed

The Pervasive Developmental Disorder Behavior Inventory is a questionnaire designed to aid in the diagnosis of pervasive developmental disorders or autism spectrum disorders. The Pervasive Developmental Disorder Behavior Inventory assesses adaptive and maladaptive behaviors associated with pervasive developmental disorders and provides an age-standardized Autism Composite score. In previous research, the Pervasive Developmental Disorder Behavior Inventory has demonstrated moderate to strong reliability and validity. This study aimed to replicate and extend previous research by investigating the criterion-related validity of the Pervasive Developmental Disorder Behavior Inventory. Data from 40 children were analyzed in relation to other measures. The Pervasive Developmental Disorder Behavior Inventory adaptive scores were moderately correlated with cognitive and adaptive behavior scores as expected. However, no significant correlations were found between the maladaptive and Autism Composite scores of the Pervasive Developmental Disorder Behavior Inventory and the Childhood Autism Rating Scale. Results lead to concerns regarding the validity of some scores of the Pervasive Developmental Disorder Behavior Inventory. PMID:24463433

McMorris, Carly A; Perry, Adrienne

2015-04-01

359

Handheld Face Identi cation Technology in a Pervasive Computing Environment ?  

E-print Network

, Purdy Ho 2 , Bernd Heisele 3 , Tomaso Poggio 4 , Ken Steele 1 , and Anant Agarwal 1 1 Massachusetts fecoder, steele, agarwalg@lcs.mit.edu 2 Hewlett Packard Corporation, Cambridge, MA USA purdy ho@hp.com 3

Mohri, Mehryar

360

The Augmented Knight's Castle Integrating Mobile and Pervasive Computing  

E-print Network

is an essential part of the childhood. Besides being a recreational amusement and pure fun, playing also serves multimedia content to them. The ideal entertainment experience then comes from the combination of physical and visual and tactile feedback to a traditional toy playset, we created an entertaining and exciting

361

Improving the Effectiveness of Medical Treatment with Pervasive Computing  

E-print Network

, Switzerland {floerkem|siegemun}@inf.ethz.ch 1 Vision Hippocrates, the father of medicine, already realized a challenge more than twenty centuries after Hippocrates. When Sullivan et al. [4] studied the cost

362

A Spatiotemporal Model for Ephemeral Data in Pervasive Computing Networks  

E-print Network

Michel, 1Christine Julien, 2Jamie Payton, and 3Gruia-Catalin Roman 1University of Texas at Austin, 2, and 3Gruia-Catalin Roman 1University of Texas at Austin, 2University of North Carolina at Charlotte, 3; time passes, devices and their users are constantly in motion, social patterns evolve, data is moved

Julien, Christine

363

Intelligent Buildings and pervasive computing - research perspectives and discussions  

Microsoft Academic Search

Intelligent Buildings have been the subject of research and commercial interest for more than two decades. The different perspectives range from monitoring and controlling energy consumption over interactive rooms supporting work in offices and leisure in the home, to buildings providing information to by-passers in plazas and urban environments. This paper puts forward the hypothesis that the coming decade will

Kaj Grnbk; Morten Kyng

364

MOBILE AND UBIQUITOUS SYSTEMS www.computer.org/pervasive  

E-print Network

is a collectivist soci- ety, inherently prone to group orientations toward tasks (see www.geert-hofstede.com/hofstede scenarios are common in India for many reasons. According to Geert Hof- stede's cultural indices, India

Parikh, Tapan S.

365

Pervasive computing in play-based occupational therapy for children  

E-print Network

Embedding digital technology into playful activity can make play-based occupational therapy more effective. This study proposes two play-based activities to improve children's eating and tooth-brushing behavior.

Chi, Pei-Yu

366

Indoor Location Systems for Pervasive Computing Joshua A. Tauber  

E-print Network

particularly on the Ad Hoc Lo- cation System (AHLoS), RADAR, Cricket, Cricket Compass, and Active Bats. Finally- tems including the ad hoc location system (AHLoS), RADAR, Cricket, Cricket Compass, and Active Bats. We

367

Indoor Location Systems for Pervasive Computing Joshua A. Tauber  

E-print Network

particularly on the Ad Hoc Lo- cation System (AHLoS), RADAR, Cricket, Cricket Compass, and Active Bats. Finally of existing sys- tems including the ad hoc location system (AHLoS), RADAR, Cricket, Cricket Compass

368

62 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/03/$17.00 2003 IEEE C O M M U N I C A T I O N D E V I C E S  

E-print Network

for pur- poses other than traditional desktop work. Efforts such as IrDA, Bluetooth, and, more recently and speakers. The Digital Voices project explores device com- munications using audible sound.4 (The "Sound

369

Law School Experience in Pervasive Electronic Communications.  

ERIC Educational Resources Information Center

Installation of a schoolwide local area computer network at Chicago-Kent College of Law (Illinois) is described. Uses of electronic mail within a course on computer law are described. Additional social, administrative, and research uses of electronic mail are noted as are positive effects and emerging problems (e.g., burdens on recipients and

Shiels, Rosemary

1994-01-01

370

"What Are You Viewing?" Exploring the Pervasive Social TV Experience  

NASA Astrophysics Data System (ADS)

The vision of pervasive TV foresees users engaging with interactive video services across a variety of contexts and user interfaces. Following this idea, this chapter extends traditional Social TV toward the notion of pervasive Social TV (PSTV) by including mobile viewing scenarios. We discuss social interaction enablers that integrate TV content consumption and communication in the context of two case studies that evaluate Social TV on mobile smartphones as well as the traditional set-top-box-based setup. We report on the impact of social features such as text-chat, audio-chat, and synchronized channel-choice on the end-user's media experience. By analyzing the commonalities and the differences between mobile and living-room Social TV that we found, we provide guidance on the design of pervasive Social TV systems as well as on future research issues.

Schatz, Raimund; Baillie, Lynne; Frhlich, Peter; Egger, Sebastian; Grechenig, Thomas

371

Pervasive transcription: illuminating the dark matter of bacterial transcriptomes.  

PubMed

The conventional view of transcription posits that mRNAs are generated from the coding DNA strand and are delineated by gene boundaries; however, recent reports have mapped transcription start sites to unexpected locations in bacterial genomes, including the non-coding strand. The resultant RNAs were previously dismissed as artefacts, but models that describe such events as 'pervasive transcription' are now gaining support. In this Opinion article, we discuss our current understanding of pervasive transcription, its genetic origin and its regulation. On the basis of existing observations, we propose that RNAs that result from pervasive transcription are more than 'transcriptional noise' and have important functions in gene regulation and genome evolution. PMID:25069631

Wade, Joseph T; Grainger, David C

2014-09-01

372

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. , NO. 1 GRIP: Global Routing via Integer Programming  

E-print Network

: Global Routing via Integer Programming Tai-Hsuan Wu, Student Member, IEEE, Azadeh Davoodi, Member, IEEE, and Jeffrey T. Linderoth Abstract--This work introduces GRIP, a global routing tech- nique via integer. To make an integer-programming- based approach applicable for today's large-scale global routing instances

Davoodi, Azadeh

373

66 PERVASIVEcomputing Published by the IEEE CS n 1536-1268/08/$25.002008IEEE Editor:ShaniMurraynsmurray@computer.org  

E-print Network

:ShaniMurraynsmurray@computer.org User Innovation and Hacking Eric von Hippel and Joseph A. Paradiso In the introduction to this special issue on hacking, the guest editors describe the true hacker as "an individual who can achieve miracles--often via hacking--to serve their own needs. Who are users? Users, as we define the term, are firms

374

IEEE Annals of the History of Computing 1058-6180/01/$10.00 2001 IEEE 1 In one inquiry it was found that a successful  

E-print Network

for the uncharted waters of computing faced self-doubt, profes- sional uncertainty, and even ridicule. The physi by the general public.4 In 1967, the US Civil Service Commission declared data-processing personnel contributed to an ongoing debate that caused turf wars, labor shortages, and varied approaches to professional

Ensmenger, Nathan

375

MeshNetworking JULY/AUGUST 2008 1089-7801/08/$25.00 2008 IEEE Published by the IEEE Computer Society 37  

E-print Network

proprietary protocols, assuming that IP was too resource-intensive to be scaled down to operate a very different set of appli- cations than do WPAN technologies such as Bluetooth, which eliminate memory and compute power. These constraints led many LoWPAN vendors to embrace proprietary protocols

California at Berkeley, University of

376

Pervasive transcription of a herpesvirus genome generates functionally important RNAs.  

PubMed

Pervasive transcription is observed in a wide range of organisms, including humans, mice, and viruses, but the functional significance of the resulting transcripts remains uncertain. Current genetic approaches are often limited by their emphasis on protein-coding open reading frames (ORFs). We previously identified extensive pervasive transcription from the murine gammaherpesvirus 68 (MHV68) genome outside known ORFs and antisense to known genes (termed expressed genomic regions [EGRs]). Similar antisense transcripts have been identified in many other herpesviruses, including Kaposi's sarcoma-associated herpesvirus and human and murine cytomegalovirus. Despite their prevalence, whether these RNAs have any functional importance in the viral life cycle is unknown, and one interpretation is that these are merely "noise" generated by functionally unimportant transcriptional events. To determine whether pervasive transcription of a herpesvirus genome generates RNA molecules that are functionally important, we used a strand-specific functional approach to target transcripts from thirteen EGRs in MHV68. We found that targeting transcripts from six EGRs reduced viral protein expression, proving that pervasive transcription can generate functionally important RNAs. We characterized transcripts emanating from EGRs 26 and 27 in detail using several methods, including RNA sequencing, and identified several novel polyadenylated transcripts that were enriched in the nuclei of infected cells. These data provide the first evidence of the functional importance of regions of pervasive transcription emanating from MHV68 EGRs. Therefore, studies utilizing mutation of a herpesvirus genome must account for possible effects on RNAs generated by pervasive transcription. IMPORTANCE The fact that pervasive transcription produces functionally important RNAs has profound implications for design and interpretation of genetic studies in herpesviruses, since such studies often involve mutating both strands of the genome. This is a common potential problem; for example, a conservative estimate is that there are an additional 73,000 nucleotides transcribed antisense to annotated ORFs from the 119,450-bp MHV68 genome. Recognizing the importance of considering the function of each strand of the viral genome independently, we used strand-specific approaches to identify six regions of the genome encoding transcripts that promoted viral protein expression. For two of these regions, we mapped novel transcripts and determined that targeting transcripts from these regions reduced viral replication and the expression of other viral genes. This is the first description of a function for these RNAs and suggests that novel transcripts emanating from regions of pervasive transcription are critical for the viral life cycle. PMID:24618256

Canny, Susan P; Reese, Tiffany A; Johnson, L Steven; Zhang, Xin; Kambal, Amal; Duan, Erning; Liu, Catherine Y; Virgin, Herbert W

2014-01-01

377

IEEE Builds Better Young Professionals  

E-print Network

in North America, Europe, Asia and the Middle East (US News and World Report 2011, Times Higher Education Using engineering, science, computing & leadership skills US$10,000 prize Free trip to IEEE Honors in US · 97 of the Top 100 Technical Universities Worldwide Government · Defense research and aerospace

378

Configurable dynamic privacy for pervasive sensor networks  

E-print Network

Ubiquitous computing sensor networks have greatly augmented the functionality of interactive media systems by adding the ability to capture and store activity-related information. Analyzing the information recorded from ...

Gong, Nan-Wei

2009-01-01

379

IEEE Communications Magazine Call for Papers  

E-print Network

; Security, privacy and virus/malware issues in mobile cloud computing Mobile cloud enabled BringIEEE Communications Magazine Call for Papers Feature Topic on Mobile Cloud Computing Mobile Cloud Computing refers to an infrastructure where both the data storage and the data processing occur

Fu, Xiaoming

380

48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.  

Code of Federal Regulations, 2011 CFR

...the Environmental Assessment of Personal Computer Products. 52.223-16 Section...the Environmental Assessment of Personal Computer Products. As prescribed in 23.705...the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

2011-10-01

381

48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.  

Code of Federal Regulations, 2012 CFR

...the Environmental Assessment of Personal Computer Products. 52.223-16 Section...the Environmental Assessment of Personal Computer Products. As prescribed in 23.705...the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

2012-10-01

382

48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.  

Code of Federal Regulations, 2013 CFR

...the Environmental Assessment of Personal Computer Products. 52.223-16 Section...the Environmental Assessment of Personal Computer Products. As prescribed in 23.705...the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

2013-10-01

383

48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.  

Code of Federal Regulations, 2010 CFR

...the Environmental Assessment of Personal Computer Products. 52.223-16 Section...the Environmental Assessment of Personal Computer Products. As prescribed in 23.706...the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

2010-10-01

384

IEEE: Power Electronics Society (PELS)  

NSDL National Science Digital Library

IEEE's Power Electronics Society (PELS) "helps in the development and effective application of power electronics technology." Power electronics is definted as "the application of electronic circuits to energy conversion," which is used "everywhere you look," including in computers automobiles, telecommunications, space systems and satellites motors, lighting, and alternative energy. The PELS newsletter is available free online, but the bimonthly series of peer-reviewed papers (the IEEE Transactions on Power Electronics) is for members only. The website also provide some background information on the main areas of power electronics research and states that volunteers will respond to questions about power electronics. Information on PESL conferences and workshops is also provided.

385

How Pervasive Are Relative Age Effects in Secondary School Education?  

ERIC Educational Resources Information Center

Relative age effects (RAEs; R. H. Barnsley, A. H. Thompson, & P. E. Barnsley, 1985) convey school attainment (dis)advantages depending on whether one is relatively older or younger within annually age-grouped cohorts. In the present study, the authors examined the pervasiveness of RAEs by examining (a) attainment in 4 secondary school subjects,

Cobley, Stephen; McKenna, Jim; Baker, Joeseph; Wattie, Nick

2009-01-01

386

How Pervasive Are Relative Age Effects in Secondary School Education?  

Microsoft Academic Search

Relative age effects (RAEs; R. H. Barnsley, A. H. Thompson, & P. E. Barnsley, 1985) convey school attainment (dis)advantages depending on whether one is relatively older or younger within annually age-grouped cohorts. In the present study, the authors examined the pervasiveness of RAEs by examining (a) attainment in 4 secondary school subjects, (b) attainment consistency across subjects, (c) pupils enrolled

Stephen Cobley; Jim McKenna; Joeseph Baker; Nick Wattie

2009-01-01

387

Player Perception of Context Information Utilization in Pervasive Mobile Games  

Microsoft Academic Search

Pervasive games combine real world and virtual game elements in game design. A player might need to find WiFi hot spots, move to different locations based on mobile network cell IDs, or to do certain tasks at different times of the day. These are just few examples how the real world elements can be utilized in game design. The possibilities

Janne Paavilainen; Hannu Korhonen; Hannamari Saarenp; Jussi Holopainen

2009-01-01

388

Pervasive Learning Games: Explorations of Hybrid Educational Gamescapes  

ERIC Educational Resources Information Center

Pervasive gaming has tremendous potential as a learning tool and represents an interesting development in the field of video games and education. The literature surrounding video games and education is vast: For more than 20 years, educationalists have been discussing the potential that exists for the application of video games to learning.

Thomas, Siobhan

2006-01-01

389

Brave New World: Pervasive Insecurity of Embedded Network Devices  

E-print Network

Brave New World: Pervasive Insecurity of Embedded Network Devices Ang Cui, Yingbo Song, Pratap V and together form our world-wide com- munication infrastructure. Widely deployed and often misconfigured of a vulnerability assessment of embedded network devices within the world's largest ISPs and civilian networks

Yang, Junfeng

390

A component based architecture for distributed, pervasive gaming applications  

Microsoft Academic Search

In this paper, we describe a component based architecture for developing distributed, pervasive games that integrate tangible and graphical user interface components. We first discuss some of the interface components we have developed and then present a coordination infrastructure called Pegasus that allows flexibly coupling and reconfiguring components during runtime. On top of Pegasus we have created a language for

Carsten Magerkurth; Timo Engelke; Daniel H. Grollman

2006-01-01

391

Distributed video game streaming system for pervasive gaming  

E-print Network

Distributed video game streaming system for pervasive gaming A. Jurgelionis1 , F. Bellotti2 , A. De video game streaming system. Newly developed streaming protocols and system architectures enable that the Games@Large system is capable of running video games of different genres, also including First Person

Eisert, Peter

392

User-centered development of a pervasive healthcare application  

E-print Network

User-centered development of a pervasive healthcare application Andreas Butz University of Munich on and can hold ad- ditional paper, such as printouts of laboratory results inside of them. With the rise, or replaced by standardized entries. With the globally increasing cost pressure in the health sector

393

RESTful Integration of Heterogeneous Devices in Pervasive Environments  

E-print Network

RESTful Integration of Heterogeneous Devices in Pervasive Environments Daniel Romero1 , Gabriel and more home devices are equipped with advanced compu- tational capabilities to improve the user the architecture of home monitoring systems by focusing on data and events that are produced and triggered by home

Eliassen, Frank

394

Automatic negotiated integration of services in pervasive environments  

Microsoft Academic Search

The development of many highly dynamic environments, like pervasive environments, modified the behavior of users and consequently, their expectations from systems and applications used in these environments. Thus, a user equipped with a laptop can connect to different places, and, each time, like to use his applications integrating the func- tionalities offered by the physically or logically close envi- ronment.

Noha Ibrahim; INRIA ARES; INSA Lyon

2005-01-01

395

Behavioral and Educational Approaches to The Pervasive Developmental Disorders  

Microsoft Academic Search

Our understanding of the pervasive developmental disorders (PDDs) has radically altered in the past 40 years. The initial recognition that these are biologically based conditions (Rimland, 1964), and rejection of the psychoanalytic concept of parental blame as an explanatory mechanism (Bettelheim, 1967), created an intellectual context in which behavioral and educational interventions could take root. Beginning with demonstrations by Ferster

Sandra L. Harris

396

Policy Based Control of Context Aware Pervasive Services  

E-print Network

Policy Based Control of Context Aware Pervasive Services Evi Syukur1 and Seng Wai Loke2 1 School awareness is important if we want to give a mobile user autonomous, responsive and attentive services issues regarding location modeling, system design and implementation of simple awareness scenarios

Loke, Seng W. - Loke, Seng W.

397

Co morbid Psychiatric Disorders in Pervasive Developmental Disorders  

Microsoft Academic Search

Background: From a theoretical point of view, the issue of diagnosing co-morbidity in Pervasive Developmental Disorder (PDD) is controversial, with some researchers favouring the practice and others questioning it. From the clinical point of view, however, it is perhaps a useful practice, as specific strategies can be directed towards alleviation of these disorders once they are identified. Some recent studies

S. R. Girimaji; S. T. Biju; S. Srinath; S. P. Seshadri

398

Handedness and Cognitive Functions in Pervasive Developmental Disorders.  

ERIC Educational Resources Information Center

Performance on a battery of cognitive measures was analyzed in terms of hand preference for 62 children (5-17 years old) with Pervasive Developmental Disorders including autism. There was a clear (though nonsignificant) trend on all tests for left-handers to have higher scores than right-handers. Mixed-hand preference Ss demonstrated the lowest

Fein, Deborah; And Others

1985-01-01

399

Pervasive Technology in Distributed Healthcare: Simultaneous Assessment of Multiple Individuals  

Microsoft Academic Search

The current paradigm of clinic-focused healthcare is challenged by growing numbers of aging baby boomers and the concomitant cost of managing chronic health conditions. We have begun investigating an alternative to clinic-based health assessments, in which pervasive technologies are used to enable continuous monitoring and assessment of patients in a variety of settings outside of hospitals. There are many outstanding

Tamara L. Hayes; Misha Pavel; Andre Adami; Nicole Larimer; Ann Tsay

2006-01-01

400

Fragmented Visuospatial Processing in Children with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

Children diagnosed with Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS) and Asperger Syndrome (AS) may be characterised by a similar perceptual focus on details as children with autistic disorder (AD). This was tested by analysing their performance in a visuoperceptual task [the Children's Embedded Figure Test (CEFT)] and a

Schlooz, Wim A. J. M.; Hulstijn, Wouter; van den Broek, Pieter J. A.; van der Pijll, Angela C. A. M.; Gabreels, Fons; van der Gaag, Rutger J.; Rotteveel, Jan J.

2006-01-01

401

Chapter XX: Pervasive Sensing and Monitoring for Situational Awareness  

E-print Network

Chapter XX: Pervasive Sensing and Monitoring for Situational Awareness and processes which can then be used to gain situational awareness of the activities in the instrumented space. Situational awareness, in a broad sense, refers to a continuum of knowledge that captures the current state

402

Broadband UHF RFID/Sensor Modules for Pervasive Cognition Applications  

E-print Network

Broadband UHF RFID/Sensor Modules for Pervasive Cognition Applications Amin Rida#1 , Symeon.nikolaou@frederick.ac.cy Abstract-- In this paper, two inkjet-printed broadband antennas on flexible and organic substrates namely paper and Liquid Crystal Polymer (LCP) for the UHF Radio Frequency Identification (RFID) and sensing

Tentzeris, Manos

403

Injury Treatment among Children with Autism or Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

This study examined the differences in the frequency and type of injury for children with autism and pervasive developmental disorder (PDD) compared with typically developing peers, when both groups are insured by Medicaid. The relative rate (RR) of emergency/hospital treatment of injury for children with autism or PDD compared to controls was

McDermott, Suzanne; Zhou, Li; Mann, Joshua

2008-01-01

404

The Anatomy of Pervasive Self Care Services George Roussos  

E-print Network

case management. The proposed architecture aims to introduce a generic reference model for the delivery of pervasive healthcare services that can help reduced the considerable amount of duplication in current work for this group, especially the elderly and those with more than one condition, has traditionally been reactive

Roussos, George

405

ADHD Symptom Subtypes in Children with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

Objective: Compares DSM-IV ADHD subtypes in large samples of 3-to-5 and 6-to-12 year old children with pervasive developmental disorder (PDD) vs. nonPDD clinic referrals. Method: Parents and teachers completed a DSM-IV-referenced rating scale. Results: ADHD subtypes were clearly differentiated from the nonADHD group and showed a differential

Gadow, Kenneth D.; DeVincent, Carla J.; Pomeroy, John

2006-01-01

406

Pervasive Uncertainty in Second Modernity: an Empirical Test  

Microsoft Academic Search

Recent discussion of social change implies that, for a number of reasons, to do with globalisation, shifts in family life styles and labour markets, more critical attitudes toward the authority of officials and experts and greater awareness of possibilities and options, social life is more strongly affected by a sense of uncertainty. It also implies that uncertainty is pervasive and

Peter Taylor-Gooby

2005-01-01

407

Processing Capacity in Children and Adolescents with Pervasive Developmental Disorders  

Microsoft Academic Search

This study sought to investigate whether the abnormally small P3 amplitudes observed in pervasive developmental disorder (PDD) are related to differences in processing capacity. PDD children and adolescents and their control groups participated in the study. Visual probe stimuli were presented during an auditory task with two levels of difficulty. Event-related potentials (ERP) were measured from 62 electrodes during task

Marco R. Hoeksma; Chantal Kemner; Marinus N. Verbaten; Herman van Engeland

2004-01-01

408

Handedness and cognitive functions in Pervasive Developmental disorders  

Microsoft Academic Search

This paper is concerned with what abnormal handedness in Pervasive Developmental Disorders (PDD) reveals about the presence, lateralization, and severity of cerebral dysfunction in this population. From previous work, it was predicted that left-handedness would be elevated in the sample and that mixed-handedness subjects should be more impaired than those with established hand dominance. A battery of cognitive and motor

Deborah Fein; Lynn Waterhouse; Dorothy Lucci; Bruce Pennington; Margaret Humes

1985-01-01

409

Is Rett syndrome a subtype of pervasive developmental disorders?  

Microsoft Academic Search

The author reviews the issue on whether Rett syndrome (RS) is a subtype of pervasive developmental disorders (PDDs). More than 200 articles of RS have been published in the last 10 years. Internal and external validities of RS have been established by several independent studies. There remains the question whether RS presents clinical features that meet the total criteria for

Luke Y. Tsai

1992-01-01

410

Affect comprehension in children with pervasive developmental disorders  

Microsoft Academic Search

Affect comprehension was studied in children with pervasive developmental disorders (PDD) and normal children matched for mental age. Three matching tasks were used: matching objects (a nonsocial control task), matching faces, and matching affects. The three tasks were developed to be of equal difficulty for normal children. Children were also tested for comprehension and expression of affect terms. The PDD

Mark Braverman; Deborah Fein; Dorothy Lucci; Lynn Waterhouse

1989-01-01

411

Brief report: Neuroanatomic observations of the brain in pervasive developmental disorders  

Microsoft Academic Search

TheDiagnostic and Statistical Manual of Mental Disorders, Fourth Edition (DSM-IV; American Psychiatric Association, 1994) defines Pervasive Developmental Disorders (PDD) as those syndromes which are characterized by severe and pervasive impairment of reciprocal social skills, communication, or the presence of stereotyped interests and activities. Included under PDD are Autism, Rett's disorder, childhood disintegrative disorder, Asperger's Disorder, and Pervasive Developmental Disorder Not

Margaret L. Bauman

1996-01-01

412

Open Urban Computing Testbed  

Microsoft Academic Search

We present a unique urban computing testbed for studying the utilization of ubiquitous computing technology in the public urban space of a city center. The testbed comprises of a wide range of pervasive computing infrastructure and different middleware resources. We demonstrate the applicability and benefits of the testbed in evaluating technology pilots and prototyping new ubiquitous services in real-world urban

Timo Ojala; Hannu Kukka; Tommi Heikkinen; Tomas Lindn; Marko Jurmu; Fabio Kruger; Szymon Sasin; Simo Hosio; Pauli Nrhi

2010-01-01

413

June 2004 45 0272-1708/04/$20.002004IEEE  

E-print Network

access a simulation process in a remote server. The simulation engine in the server could be MATLAB users through the network. Most Web-based laboratories use MATLAB as the computational engineJune 2004 45 0272-1708/04/$20.002004IEEE IEEE Control Systems Magazine T he World Wide Web has

Cheng, Harry H.

414

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, ACCEPTED FOR PUBLICATION 1 Information Flow Control for  

E-print Network

Control for Secure Cloud Computing Jean Bacon, Fellow, IEEE, David Eyers, Member, IEEE, Thomas F. J to identify opportunities for using IFC within a cloud computing context. Since IFC security is linked of cloud computing solutions will be severely curtailed. The problem of cloud security is challenging due

Cambridge, University of

415

From Proc. IEEE Conference on Control Applications, Hartford, Connecticut, October 1997 c IEEE MATLAB Tools for Linear and Nonlinear System  

E-print Network

From Proc. IEEE Conference on Control Applications, Hartford, Connecticut, October 1997 c IEEE MATLAB Tools for Linear and Nonlinear System Stability Theorem Implementation James H. Taylor & Cheney Chan Department of Electrical and Computer Engineering University of New Brunswick PO Box 4400

Taylor, James H.

416

IEEE TRANSACTIONS ON NETWORKING, VOL. 10, NO. 2, APRIL 2002 1 The Impact of Multicast Layering on Network  

E-print Network

on Network Fairness Dan Rubenstein, Member, IEEE, Jim Kurose, Fellow, IEEE, and Don Towsley, Fellow, IEEE@ee.columbia.edu). J. Kurose and D. Towsley are with the Department of Computer Science, Uni- versity of Massachusetts, Amherst, MA, 01003 (e-mail: kurose@cs.umass.edu, towsley@cs.umass.edu). is a formal study that examines

417

Computer Science Department, Western Ontario NSF/IEEE TCPP Proposal November 20111 Curriculum Initiative on Parallel and Distributed Computing at the  

E-print Network

the on-going integration of high-performance computing courses in the undergrad- uate curriculum for High Performance Computing which used to be an introductory course to C-UNIX programming and which performance computers. [www.sharcnet.ca/] 2 Integration Plans. As many other computer science departments, we

Moreno Maza, Marc

418

IEEE Global History Network  

NSDL National Science Digital Library

The Institute of Electrical and Electronics Engineers (IEEE) is an industry organization, and its Global History Network (GHN) is a wiki that "fosters the creation of narratives that not only document the history engineering practice but also explain when, how and why these myriad of technologies developed as they did." The homepage of the website for GHN has an "innovation map" and an "interactive timeline", as well as eight rotating featured concepts prominently displayed near the top of the homepage. Visitors should definitely check out the "Innovation Map", which shows what events happened, where, and when, such as the industrialization and commercialization of photovoltaic cells in Japan in 1959. The eight rotating featured concepts have included "Ancient Computers", "Cryptography", and "Memristors" which are resistors with memory. The menu across the top of any page contains the guts of the site, including "Oral Histories" of the most prominent people in the profession, "IEEE Stars", peer-reviewed articles, and "Topic Articles" which has "broad articles on a specific topic" which IEEE members and invited guests can create or modify.

419

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2006 211 Microfluidics-Based Biochips: Technology  

E-print Network

, FEBRUARY 2006 211 Microfluidics-Based Biochips: Technology Issues, Implementation Platforms, and Design, Fellow, IEEE Abstract--Microfluidics-based biochips are soon expected to revolutionize clinical diagnosis microfluidics offers a scalable system architecture and dynamic reconfigurability; groups of unit cells

Chakrabarty, Krishnendu

420

The pervasive role of biological cohesion in bedform development  

PubMed Central

Sediment fluxes in aquatic environments are crucially dependent on bedform dynamics. However, sediment-flux predictions rely almost completely on clean-sand studies, despite most environments being composed of mixtures of non-cohesive sands, physically cohesive muds and biologically cohesive extracellular polymeric substances (EPS) generated by microorganisms. EPS associated with surficial biofilms are known to stabilize sediment and increase erosion thresholds. Here we present experimental data showing that the pervasive distribution of low levels of EPS throughout the sediment, rather than the high surficial levels of EPS in biofilms, is the key control on bedform dynamics. The development time for bedforms increases by up to two orders of magnitude for extremely small quantities of pervasively distributed EPS. This effect is far stronger than for physical cohesion, because EPS inhibit sand grains from moving independently. The results highlight that present bedform predictors are overly simplistic, and the associated sediment transport processes require re-assessment for the influence of EPS. PMID:25656496

Malarkey, Jonathan; Baas, Jaco H.; Hope, Julie A.; Aspden, Rebecca J.; Parsons, Daniel R.; Peakall, Jeff; Paterson, David M.; Schindler, Robert J.; Ye, Leiping; Lichtman, Ian D.; Bass, Sarah J.; Davies, Alan G.; Manning, Andrew J.; Thorne, Peter D.

2015-01-01

421

The pervasive role of biological cohesion in bedform development  

NASA Astrophysics Data System (ADS)

Sediment fluxes in aquatic environments are crucially dependent on bedform dynamics. However, sediment-flux predictions rely almost completely on clean-sand studies, despite most environments being composed of mixtures of non-cohesive sands, physically cohesive muds and biologically cohesive extracellular polymeric substances (EPS) generated by microorganisms. EPS associated with surficial biofilms are known to stabilize sediment and increase erosion thresholds. Here we present experimental data showing that the pervasive distribution of low levels of EPS throughout the sediment, rather than the high surficial levels of EPS in biofilms, is the key control on bedform dynamics. The development time for bedforms increases by up to two orders of magnitude for extremely small quantities of pervasively distributed EPS. This effect is far stronger than for physical cohesion, because EPS inhibit sand grains from moving independently. The results highlight that present bedform predictors are overly simplistic, and the associated sediment transport processes require re-assessment for the influence of EPS.

Malarkey, Jonathan; Baas, Jaco H.; Hope, Julie A.; Aspden, Rebecca J.; Parsons, Daniel R.; Peakall, Jeff; Paterson, David M.; Schindler, Robert J.; Ye, Leiping; Lichtman, Ian D.; Bass, Sarah J.; Davies, Alan G.; Manning, Andrew J.; Thorne, Peter D.

2015-02-01

422

Supporting People with Dementia Using Pervasive Healthcare Technologies  

NASA Astrophysics Data System (ADS)

In this chapter, an introduction is provided into pervasive healthcare technology, specifically as the use of information and communications technology in support of European policies, primarily inclusion. The focus of the chapter, and indeed the book, is on how such technologies can support people suffering from debilitating diseases including Alzheimer's. The work describes a research project called COGKNOW, comprising a multidisciplinary research consortium of scientists from across Europe, and relates some of the early achievements of the group from some very different perspectives, including technical, clinical, ethical, and of course how the needs of people with dementia and their carers can be harnessed in the development process to produce pervasive healthcare technology and services that are valued by all the stakeholders in the process.

Mulvenna, Maurice D.; Nugent, Chris D.; Moelaert, Ferial; Craig, David; Dres, Rose-Marie; Bengtsson, Johan E.

423

The pervasive role of biological cohesion in bedform development.  

PubMed

Sediment fluxes in aquatic environments are crucially dependent on bedform dynamics. However, sediment-flux predictions rely almost completely on clean-sand studies, despite most environments being composed of mixtures of non-cohesive sands, physically cohesive muds and biologically cohesive extracellular polymeric substances (EPS) generated by microorganisms. EPS associated with surficial biofilms are known to stabilize sediment and increase erosion thresholds. Here we present experimental data showing that the pervasive distribution of low levels of EPS throughout the sediment, rather than the high surficial levels of EPS in biofilms, is the key control on bedform dynamics. The development time for bedforms increases by up to two orders of magnitude for extremely small quantities of pervasively distributed EPS. This effect is far stronger than for physical cohesion, because EPS inhibit sand grains from moving independently. The results highlight that present bedform predictors are overly simplistic, and the associated sediment transport processes require re-assessment for the influence of EPS. PMID:25656496

Malarkey, Jonathan; Baas, Jaco H; Hope, Julie A; Aspden, Rebecca J; Parsons, Daniel R; Peakall, Jeff; Paterson, David M; Schindler, Robert J; Ye, Leiping; Lichtman, Ian D; Bass, Sarah J; Davies, Alan G; Manning, Andrew J; Thorne, Peter D

2015-01-01

424

IEEE History Center  

NSDL National Science Digital Library

The Institute of Electrical and Electronics Engineers (IEEE) History Center functions "to preserve, research and promote the history of information and electrical technologies." There are many resources on the center's Web site that provide an excellent perspective into some of the original breakthroughs in electrical design and the more recent advancements in computer technology. Historical articles and list of frequently asked questions are given on the site, as well as many transcripts of interviews with influential people of the industry. A Milestones section highlights 45 of the most groundbreaking achievements around the world. Every day, a new electrical engineering-related anniversary is presented on the homepage.

425

Bipolar Disorders in Mentally Retarded Persons With Pervasive Developmental Disorders  

Microsoft Academic Search

To examine clinical features of mentally retarded patients with pervasive developmental disorders (PDD) with a comorbid bipolar disorder, 23 PDD patients (mean age = 23.5 years, SD = 4.2) with an episode satisfying modified DSM-IV criteria for manic\\/hypomanic episode (PDD-B), and 23 age, sex, diagnosis, and retardation matched control PDD patients without a mood episode (PDD-C) were compared on 26

Hiroshi Kurita; Hirokazu Osada; Kaoru Shimizu; Hisateru Tachimori

2004-01-01

426

P2P M-commerce in pervasive environments  

Microsoft Academic Search

Pervasive environments are characterized by the presence of wireless devices ranging from sensors to mobile PDA-phones to laptops. Peer-to-Peer (P2P) information sharing in such environments presents a tremendous opportunity for people and devices to exchange information such as music, pictures, documents and stock tickers with peers. Information that has a monetary value introduces a whole new set of problems for

Sasikanth Avancha; Peter D'Souza; Filip Perich; Anupam Joshi; Yelena Yesha

2002-01-01

427

Sleep Patterns of Children with Pervasive Developmental Disorders  

Microsoft Academic Search

Data on sleep behavior were gathered on 100 children with pervasive developmental disorders (PDD), ages 211 years, using sleep diaries, the Children's Sleep Habits Questionnaire (CSHQ), and the Parenting Events Questionnaire. Two time periods were sampled to assess short-term stability of sleepwake patterns. Before data collection, slightly more than half of the parents, when queried, reported a sleep problem in

Ryan D. Honomichl; Beth L. Goodlin-Jones; Melissa Burnham; Erika Gaylor; Thomas F. Anders

2002-01-01

428

Fragmented Visuospatial Processing in Children with Pervasive Developmental Disorder  

Microsoft Academic Search

Children diagnosed with Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS) and Asperger Syndrome (AS) may\\u000a be characterised by a similar perceptual focus on details as children with autistic disorder (AD). This was tested by analysing\\u000a their performance in a visuoperceptual task [the Childrens Embedded Figure Test (CEFT)] and a graphic reproduction task [the\\u000a Rey Complex Figure Task (Rey CFT)]. Control

Wim A. J. M. Schlooz; Wouter Hulstijn; Pieter J. A. van den Broek; Angela C. A. M. van der Pijll; Fons Gabrels; Rutger J. van der Gaag; Jan J. Rotteveel

2006-01-01

429

Prevalence of Pervasive Developmental Disorder in Downs Syndrome  

Microsoft Academic Search

The frequencies of pervasive developmental disorder (PDD) in Downs syndrome (DS) have been reported from 1% to 11%. However,\\u000a it is not clear if the frequency of this co-occurrence is higher or lower than in other mental retardations. We study a large\\u000a sample of DS population, finding a PDD frequency of 15.6%, with 5.58% of autism (eight males and two

Rosane Lowenthal; Cristiane S. Paula; Jose S. Schwartzman; Dcio Brunoni; Marcos Tomanik Mercadante

2007-01-01

430

Life events and depression in children with pervasive developmental disorders  

Microsoft Academic Search

To determine the role of life events in the occurrence of depression in children with pervasive developmental disorders (PDD), we compared 11 patients (DSM-III-R; 9 male; 2 female; Mage: 11.0 years; Mfull-scale IQ: 75.3) with PDD and depression, with an age- and sex- matched control group of patients with PDD without depression (DSM-III-R; 9 male; 2 female; Mage: 9.8 years;

Mohammad Ghaziuddin; Norman Alessi; John F. Greden

1995-01-01

431

Injury Treatment among Children with Autism or Pervasive Developmental Disorder  

Microsoft Academic Search

This study examined the differences in the frequency and type of injury for children with autism and pervasive developmental\\u000a disorder (PDD) compared with typically developing peers, when both groups are insured by Medicaid. The relative rate (RR)\\u000a of emergency\\/hospital treatment of injury for children with autism or PDD compared to controls was 1.20 [95% Confidence Interval\\u000a (CI) 1.041.39] after controlling

Suzanne McDermott; Li Zhou; Joshua Mann

2008-01-01

432

Pervasive and Non-Pervasive Conduct Problems in a Clinic Sample Aged 4-8 Years: Child, Family and Day-Care/School Factors  

ERIC Educational Resources Information Center

Differences between pervasive (home and day-care/school) versus non-pervasive (home only) conduct problems were examined in regard to various child, parent/family, and day-care/school characteristics in an outpatient clinic sample of 120 children aged 4-8 years. All children scored above the 90th percentile on the Eyberg Child Behavior Inventory

Drugli, May Britt; Larsson, Bo; Clifford, Graham; Fossum, Sturla

2007-01-01

433

IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABILITATION ENGINEERING, VOL. 21, NO. 1, JANUARY 2013 1 Computationally Efficient Neural Feature Extraction  

E-print Network

Computationally Efficient Neural Feature Extraction for Spike Sorting in Implantable High-Density Recording sorting. It is important to identify, extract, and transmit appropriate features that allow accurate spike sorting while using minimum computational resources. This paper de- scribes a new set of spike sorting

Mason, Andrew

434

ALiCE: A Java-based Grid Computing System  

E-print Network

A computational grid is a hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities. This talk is divided into three parts. Firstly, ...

Teo, Yong Meng

435

IEEE TRANSACTIONS ON NANOTECHNOLOGY, VOL. 10, NO. 3, MAY 2011 439 Intrinsic Performance Variability in Aligned  

E-print Network

in Aligned Array CNFETs Shuaib Salamat, Student Member, IEEE, Xinning Ho, John A. Rogers, Fellow, IEEE computational resources and Motorola Corporation. The work of S. Salamat and M. A. Alam was supported by Associate Editor C. Zhou. S. Salamat and M. A. Alam are with Network for Computational Nan- otechnology

Rogers, John A.

436

Appears in the Proceedings of the 7 IEEE Intnl. Symposium on High Performance Distributed Computing (HPDC 1998)1  

E-print Network

Network High Bandwidth Long Haul Links (T1 / T3 / OC-3) IBM SP-2 Multistage Interconnection Network (40 MB/s) (155 Mb/s) (10 Mb/s) Workstations Site 1 Figure 1. A typical metacomputing system. computers

Liu, Pangfeng

437

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 3, JUNE 2009 477 Towards the Validation of Plagiarism Detection Tools  

E-print Network

, the essence of its consideration remains up-to-date. Manuscript received May 14, 2008; revised August 11, 2008 and computer assignments, although cases in art degrees have also been reported [23, p. 4]. In this paper, we

Alfonseca, Manuel

438

Safer Science: Computer Safety in the Lab  

NSDL National Science Digital Library

Today, it is common to find desktops, laptops, netbooks, and specialized handheld devices in the science lab, and the internet is often used for research and collaboration between learners. The pervasive use of computer technology in high school labs toda

Ken Roy

2010-11-01

439

IEEE Copyright Statement: Copyright IEEE.  

E-print Network

.00 Optimal Charge Control of Plug-In Hybrid Electric Vehicles in Deregulated Electricity Markets Rotering, N Coordination of Wind Power and Price-Responsive Demand-- Part II: Case Studies Ilic, M.D. ; Le Xie ; Jhi transmission network: a game theory approach." IEEE Transactions on Power Systems, Volume 21, Issue 1, Feb

Ilic, Marija D.

440

Work in progress - computer architecture meets ubiquitous computing  

Microsoft Academic Search

Computer architecture has been a core topic in computer science since the 1950s. It is taught in most universities offering CS degrees and features in IEEE CS\\/ACM computing curricula. Interest in computer architecture has fallen. The number of innovative books on computer architecture has declined, as well as the number of papers on computer architecture education. This work in progress

Alan Clements; Middlesbrough TS

2009-01-01

441

Effectiveness of N,N-Dimethylglycine in Autism and Pervasive Developmental Disorder  

Microsoft Academic Search

N,N-dimethylglycine, a dietary supplement, has been reported to be beneficial in children with autism and pervasive developmental disorder. We examined the effectiveness of dimethylglycine in children with autism and pervasive developmental disorder in a double-blind, placebo-controlled study. Thirty-seven children between 3 and 11 years of age with a diagnosis of autism and\\/or pervasive developmental disorder were gender and age matched

Janet K. Kern; Van S. Miller; Lawrence Cauller; Roger Kendall; Jyutika Mehta; Mary Dodd

2001-01-01

442

1077-2626/13/$31.00 2013 IEEE Published by the IEEE Computer Society Accepted for publication by IEEE. 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, includ  

E-print Network

in the physical world outside the visualization system, such as when using locomotion to inspect a large scale promote ex- ternal cognition and visual thinking [11], and humans developed a rich set of skills representations has been shown to be a key component of external cognition [35, 18, 36, 46]. Computers immensely

Paris-Sud XI, Université de

443

1077-2626/13/$31.00 2013 IEEE Published by the IEEE Computer Society Accepted for publication by IEEE. 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, includ  

E-print Network

.g. pelvic bone) from 2D X-ray images. For that purpose, shape and density of a tetrahedral mesh are varied like computed tomography (CT) or magnetic resonance imaging (MRI), traditional 2D X-ray projections (in the following only called X-ray images or X-rays) are widely used for diagnosis or treatment planning

Andrzejak, Artur

444

Published by the IEEE CS n 1536-1268/11/$26.00 2011 IEEE PERVASIVE computing 45 L a r g e -S c a L e O p p O r t u n i S t i c S e n S i n g  

E-print Network

a L e O p p O r t u n i S t i c S e n S i n g exploiting Social networks for Large-Scale Human in everyday use. This progress is accelerated by the development of smartphones as a viable sensing platform by leveraging social net- works. The CoCo framework significantly low- ers the amount of training data required

Campbell, Andrew T.

445

Published by the IEEE CS n 1536-1268/13/$31.00 2013 IEEE PERVASIVE computing 17 T r a c k i n g a n d S e n S i n g i n T h e W i l d  

E-print Network

Sensors P edestrian dead-reckoning (PDR) using foot-mounted inertial mea- surement units (IMUs is walking with steps of Shoe-mounted inertial sensors offer a convenient way to track pedestrians a n d S e n S i n g i n T h e W i l d Tutorial: implementing a Pedestrian Tracker Using inertial

Hazas, Mike

446

Published by the IEEE CS n 1536-1268/11/$26.00 2011 IEEE PERVASIVE computing 11 G U E S T E D I T O R S ' I N T R O D U C T I O N  

E-print Network

safely scale up nuclear fission plants and eventually learn how to harness nuclear fusion practically T O R S ' I N T R O D U C T I O N T he future has crept into our dwellings, and it's looking highly loading the line at a given point in time, and isolate their power draws. In "Disaggregated EndUse Energy

Dutta, Prabal

447

34 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$25.00 2009 IEEE C r o s s -r e a l i t y e n v i r o n m e n t s  

E-print Network

, ETH Zurich devel- oped the DejaVu system,4 an event stream pro- cessing system that extends other CEP the Complex event processing (CEP) is an essential functionality for cross- reality environments. The DejaVu for cross-reality applications. the Dejavu system DejaVu targets a broad range of appli- cations, from

Tatbul, Nesime

448

IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, VOL. 41, NO. 1, JANUARY/FEBRUARY 2005 75 Elimination of Harmonics in a Multilevel Converter  

E-print Network

. Chiasson, Senior Member, IEEE, Zhong Du, Student Member, IEEE, and Keith J. McKenzie, Student Member, IEEE. Work was re- ported in [1] and [2] that presented a method to compute the switching angles for the H the method in [2] can be extendedfor the nonequalorvaryingdcsourcecase.Specifically,eliminatinghar- monics

Tolbert, Leon M.

449

[P 77b] D. Plaisted, New NPhard and NPcomplete polynomial and integer divisibility problems, Proc. 18 FOCS, IEEE, 1977, pp. 241253.  

E-print Network

. 18 FOCS, IEEE, 1977, pp. 241­253. [W 72] P. J. Weinberger, On Euclidean rings of algebraic integers on exponents, Proc. 31 FOCS, IEEE, 1990, pp. 840­846. [KT 88] E. Kaltofen, and B. Trager, Computing­ inators, Proc. 29 FOCS, IEEE, 1988, pp. 296­305. [KR 88] Karp, R. M., and Ramachandran, V. L., A Survey

Odlyzko, Andrew M.

450

IEEE Transactions on Computational Intelligence and AI in Games (Special Issue on Brain/Neuronal-Computer Games Interfaces and Interaction), 2013, in press.  

E-print Network

, the broader use of the P300 BCI in BCI-controlled video games is recommended. Index Terms--Brain computer [4], [5]. BCI-controlled games (primarily video games) constitute an area that may meet the interests

Kaplan, Alexander

451

Ileal-lymphoid-nodular hyperplasia, non-specific colitis, and pervasive developmental disorder in children  

E-print Network

Ileal-lymphoid-nodular hyperplasia, non-specific colitis, and pervasive developmental disorder intestinal abnormalities, ranging from lymphoid nodular hyperplasia to aphthoid ulceration. Histology showed

Chapman, Michael S.

452

Dexmedetomidine for sedation during electroencephalographic analysis in children with autism, pervasive developmental disorders, and seizure disorders  

Microsoft Academic Search

Study ObjectiveTo assess the efficacy of dexmedetomidine in providing sedation during electroencephalographic (EEG) analysis in children with autism, seizure disorders, or pervasive developmental disorders (PDDs).

Theresa Ray; Joseph D. Tobias

2008-01-01

453

2012 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops The Estrellita System  

E-print Network

) and Workshops The Estrellita System A Health Informatics Tool to Support Caregivers of Preterm Infants Sen H for delays in cognitive, motor, and other skills. In this demo, we describe a health informatics system we-preterm infants, prematurity, health informatics, capture and access, clinicians, pediatric informatics, mobile

Hayes, Gillian R.

454

Fluoxetine treatment of selective mutism in pervasive developmental disorder.  

PubMed

We report the successful treatment of selective mutism in a child with pervasive developmental disorder (PDD). There are several studies and case reports in which Fluoxetine has been reported effective in diminishing adult social anxiety and increasing speech in public settings. The literature is much smaller for children. The efficacy of fluoxetine supports the argument that selective mutism is a developmental equivalent of social anxiety disorder. To our knowledge this is the first description of successful treatment when the selective mutism is complicated by PDD. PMID:24941208

Silveira, Raza; Jainer, Ashok Kumar; Bates, Gordon

2004-01-01

455

ADHD Symptom Subtypes in Children with Pervasive Developmental Disorder  

Microsoft Academic Search

ObjectiveCompares DSM-IV ADHD subtypes in large samples of 3-to-5 and 6-to-12year old children with pervasive developmental disorder (PDD) vs. nonPDD clinic referrals.MethodParents and teachers completed a DSM-IV-referenced rating scale.ResultsADHD subtypes were clearly differentiated from the nonADHD group and showed a differential pattern of co-occurring psychiatric symptoms (more pronounced for teacher- than parent-defined subtypes and older than younger children) that was

Kenneth D. Gadow; Carla J. DeVincent; John Pomeroy

2006-01-01

456

IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 59, NO. 1, JANUARY 2012 35 A Multiscale Parallel Computing Architecture for  

E-print Network

Computing Architecture for Automated Segmentation of the Brain Connectome Sylvain Jaume , Kathleen Knobe billion connections and manually tracing the connectome of a mouse brain can only be achieved partially without any manual intervention. Index Terms--Brain anatomy, circuit connectome, computa- tional

Sylvain Jaume

457

IEEE Benelux EMBS Symposium December 6-7, 2007 ON THE DEVELOPMENT OF A BRAIN-COMPUTER INTERFACE  

E-print Network

SYSTEM USING HIGH-DENSITY MAGNETOENCEPHALOGRAM SIGNALS FOR REAL-TIME CONTROL OF A ROBOT ARM C.W. Hesse 1 and a robot arm in a motor imagery paradigm. Computationally efficient spatial filtering and time- frequency and therapeutic technologies for paralyzed patients, for prosthesis or orthosis control, and in movement

Heskes, Tom

458

Appears in IEEE International Conference on Computer Vision, Rio de Janeiro, Brazil, 2007 Bottomup saliency is a discriminant process  

E-print Network

for top­down processing (object recognition) [5]. The saliency of a given location of the visual field­up saliency is a discriminant process Dashan Gao Nuno Vasconcelos Department of Electrical and Computer by the interac­ tion of two complementary components: a bottom­up, fast, stimulus­driven mechanism, and a top­down

Vasconcelos, Nuno M.

459

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 9, NO. 6, DECEMBER 2005 615 Systematically Incorporating Domain-Specific  

E-print Network

from the traditional one that exploits knowledge of the opening, middle, and endgame stages. It is that the combination of diverse strategies is better than a single best one is included in the middle stage of the computer age, people have been eager to create an intelligent game program capable of defeating human

Cho, Sung-Bae

460

666 IEEE TRANSACTIONS ON COMPUTERS, VOL. 39, NO. 5, MAY 1990 Area-Time Optimal Adder Design  

E-print Network

with the Department of Electrical Engineering, San Jose State University, San Jose, CA 95192. C. D. Thompson of Electrical Engineering and Computer Science, University of California, Berkeley, CA 94720. She is now in Section VII. In Section VIII, we show that our method is general to cover a wide range of technologies

Thomborson, Clark

461

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2012 (AUTHORS' VERSION) 1 State of the `Art': A Taxonomy of Artistic  

E-print Network

of the `Art': A Taxonomy of Artistic Stylization Techniques for Images and Video Jan Eric Kyprianidis, John-photorealistic rendering (NPR), focusing on techniques for transforming 2D input (images and video) into artistically of higher level computer vision and NPR, illustrating the trends toward scene analysis to drive artistic

462

92 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 29, NO. 1, JANUARY 2010 Verification and Codesign of the Package and Die  

E-print Network

of state transitions is astronomical and searching the current space for the worst-case is a daunting task, OR 97124 USA (e-mail: eli.chiprout@intel.com). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TCAD.2009.2034563 current

Najm, Farid N.

463

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 8, AUGUST 2006 1475 Gate-Length Biasing for Runtime-Leakage Control  

E-print Network

and static (due to leakage currents) components. Leakage is becoming an ever-increasing compo- nent, AUGUST 2006 1475 Gate-Length Biasing for Runtime-Leakage Control Puneet Gupta, Student Member, IEEE Abstract--Leakage power has become one of the most critical design concerns for the system level chip

Kahng, Andrew B.

464

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 29, NO. 8, AUGUST 2010 1229 Timing Yield-Aware Color Reassignment and  

E-print Network

. Kahng, Fellow, IEEE Abstract--Double patterning lithography (DPL) is in current production for memory products, and is widely viewed as inevitable for logic products at the 32 nm node. DPL decomposes correlated CD variations. However, with DPL, adjacent features can have distinct mean CDs, and uncorrelated

Kahng, Andrew B.

465

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. , NO. , 2012 1 Dynamic Driver Supply Voltage Scaling for Organic  

E-print Network

Dynamic Driver Supply Voltage Scaling for Organic Light Emitting Diode Displays Donghwa Shin, Student, Fellow, IEEE Abstract--Organic light emitting diode (OLED) display is a self-illuminating device]. On the other hand, an organic light emitting diode (OLED) is self-illuminating using organic light emission

Pedram, Massoud

466

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 5, NO. 1, FEBRUARY 2001 27 Synthesis of Low-Power DSP Systems Using a  

E-print Network

of these techniques into the GA framework requires modification of the standard genetic operations. The primary-Power DSP Systems Using a Genetic Algorithm Marc S. Bright and Tughrul Arslan, Member, IEEE Abstract targeting dig- ital signal processing applications. The synthesis tool genetic algo- rithm for low

Arslan, Tughrul

467

1012 IEEE TRANSACTIONS ON ELECTROMAGNETIC COMPATIBILITY, VOL. 47, NO. 4, NOVEMBER 2005 removed. This permits the FDTD method to be used for computing the  

E-print Network

1012 IEEE TRANSACTIONS ON ELECTROMAGNETIC COMPATIBILITY, VOL. 47, NO. 4, NOVEMBER 2005 removed. Telecom., vol. 54, no. 5­6, pp. 297­ 310, 1999. [5] S. A. Cummer, "Modeling electromagnetic propagation are consideredandrepresentedby a chainof quadripolarmatrices: theinverter, the cables, and the induction motor. At last

Boyer, Edmond

468

in Proceedings of the Scalable High Performance Computing Conference, Knoxville, TN, IEEE, May, 1994, pp. 462-469 Computing the Pipelined Phase-Rotation FFT  

E-print Network

, 1994, pp. 462-469 Computing the Pipelined Phase-Rotation FFT David R. O'Hallaron, Peter J. Lieu L University 44983 Knoll Square Pittsburgh, PA 15213 Ashburn, Virginia 22011 Abstract The phase-rotation FFT is a new form of the FFT that replaces data movement with multiplications by constant phasor multipli- ers

Shewchuk, Jonathan

469

in Proceedings of the Scalable High Performance Computing Conference, Knoxville, TN, IEEE, May, 1994, pp. 462469 Computing the Pipelined PhaseRotation FFT  

E-print Network

, 1994, pp. 462­469 Computing the Pipelined Phase­Rotation FFT David R. O'Hallaron, Peter J. Lieu L University 44983 Knoll Square Pittsburgh, PA 15213 Ashburn, Virginia 22011 Abstract The phase­rotation FFT is a new form of the FFT that replaces data movement with multiplications by constant phasor multipli­ ers

Shewchuk, Jonathan

470

The Institute of Electrical and Electronics Engineers, Inc. (IEEE)  

NSDL National Science Digital Library

"The IEEE (Eye-triple-E) is a non-profit, technical professional association of more than 365,000 individual members in approximately 150countries. The full name is the "Institute of Electrical and Electronics Engineers, Inc., although the organization is most popularly known and referredto by the letters I-E-E-E.Through its members, the IEEE is a leading authority in technical areas ranging from computer engineering, biomedical technology and telecommunications, to electric power, aerospace engineering and consumer electronics, among others."Description courtesy of http://www.ieee.org/

471

Pervasive canopy dynamics produce short-term stability in a tropical rain forest landscape  

E-print Network

LETTER Pervasive canopy dynamics produce short-term stability in a tropical rain forest landscape in an old-growth tropical rain forest landscape. Pervasive local height changes figure prominently produce short-term stability in a tropical rain forest landscape. Keywords canopy gap, forest dynamics

Saleska, Scott

472

Using Instructional Pervasive Game for School Children's Cultural Learning  

ERIC Educational Resources Information Center

In the past ten years, mobile learning (m-learning) has created a new learning environment that enables learners, through active learning aids. Instructional pervasive gaming (IPG) seems to be an innovative way introduced to enhance m-learning. This study employed a theoretical IPG model to construct a cultural-based pervasive game. Individual and

Chen, Cheng-Ping; Shih, Ju-Ling; Ma, Yi-Chun

2014-01-01

473

Why Does Public Transport Not Arrive on Time? The Pervasiveness of Equal Headway Instability  

E-print Network

of the interplay between transport design and passenger behavior. Finally, we provide technological and socialWhy Does Public Transport Not Arrive on Time? The Pervasiveness of Equal Headway Instability Carlos´xico Abstract Background: The equal headway instability phenomenon is pervasive in public transport systems

Pineda, Luis

474

Tourette syndrome associated with pervasive developmental disorder: Is there an etiological relationship?  

Microsoft Academic Search

Early reports of cases of co-occurrence of Tourette syndrome (TS) and pervasive developmental disorder (PDD) suggested a rare and random association but also the possibility that the disorders may share common pathophysiological mechanisms. Subsequent reports speculated that the presence of TS or tics may be a marker for a benign form of PDD. In this paper three children with pervasive

Jeffrey Sverd

1988-01-01

475

EEG and MRI fi ndings and their relation with intellectual disability in pervasive developmental disorders  

Microsoft Academic Search

Background: The diagnostic category pervasive developmental disorders (PDDs) refer to a group of fi ve disorders: autism, Rett syndrome, childhood disintegrative disorder, Asperger syndrome, and pervasive developmental disorder not otherwise specifi ed (PDD-NOS). EEG abnormalities and seizures are considered much frequent in autistic subjects with comorbid intellectual disability (ID). In this study, we aimed to evaluate the EEG and MRI

zlem nal; zlem zcan; zgr ner; Melda Akcakin; Ayla Aysev; Glhis Deda

476

Genetic architecture of complex traits: Large phenotypic effects and pervasive epistasis  

E-print Network

Genetic architecture of complex traits: Large phenotypic effects and pervasive epistasis Haifeng distinct loci were found. Second, strong epistasis was found among the individual chromosomes. Specifically that strong, pervasive epistasis may reflect the presence of several phenotypically-buff- ered physiological

Broman, Karl W.

477

Wearable computers: no longer science fiction  

Microsoft Academic Search

By using devices carried on the body, wearable computers allow the exploration of the principles of pervasive computing immediately instead of waiting for the deployment of the ubiquitous infrastructure often associated with the field. However, wearable computers are often misunderstood, both in their research and application. I've been wearing a computer as part of my daily life since 1993, and

T. E. Starner

2002-01-01

478

Withdrawal Study of Memantine in Pediatric Patients With Autism, Asperger's Disorder, or Pervasive Developmental Disorder Not Otherwise Specified Previously Treated With Memantine  

ClinicalTrials.gov

Autism Spectrum Disorder (ASD); Autism; Autistic Disorder; Asperger's Disorder; Asperger's; Pediatric Autism; Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS); Pervasive Child Development Disorder

2013-10-31

479

IEEE TRANSACTIONS ON SYSTEMS MAN & CYBERNETICS, PART A 1 Keeping the Resident in the Loop: Adapting the  

E-print Network

. Cook is with the Department of Electrical Engineering and Computer Science,Washington State University the Smart Home to the User Parisa Rashidi, Member, IEEE, Diane J. Cook, Fellow, IEEE, Abstract computational intelligence techniques have been proposed to support the creation of smart homes, including

Cook, Diane J.

480

244 IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, VOL. 62, NO. 2, FEBRUARY 2014 A Generalized Coupling Matrix Extraction Technique  

E-print Network

://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TMTT.2013.2296744 Computer-aided tuning (CAT) technology for microwave244 IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, VOL. 62, NO. 2, FEBRUARY 2014 unloaded Q factors can be seen. Index Terms--Computer-aided tuning (CAT), coupling matrix, filters

Wu, Ke-Li

481

Performance evaluation of IEEE 802.11e  

Microsoft Academic Search

This paper presents an evaluation of the QoS enhancements to the IEEE 802.11 standard, named IEEE 802.11e, currently under specification. Both the enhanced distributed coordination function (EDCF) and hybrid coordination function (HCF) modes of medium access control (MAC) operation are analysed and compared with legacy distributed coordination function (DCF) and point coordination function (PCF). Performance evaluation is attained through computer

Antnio Grilo; Mrio Nunes

2002-01-01

482

Rate of first recorded diagnosis of autism and other pervasive developmental disorders in United Kingdom general practice, 1988 to 2001  

Microsoft Academic Search

BACKGROUND: There has been concern that the incidence of autism and other pervasive developmental disorders (PDDs) is increasing. Previous studies have been smaller, restricted to autism (excluding other pervasive developmental disorders such as Asperger's syndrome), included boys only, or have not been based on a national sample. We investigated time trends in the rates of diagnosis of pervasive developmental disorders.

Liam Smeeth; Claire Cook; Eric Fombonne; Lisa Heavey; Laura C Rodrigues; Peter G Smith; Andrew J Hall

2004-01-01

483

Human-computer interaction in ubiquitous computing environments  

Microsoft Academic Search

Purpose The purpose of this paper is to explore characteristics of human-computer interaction when the human body and its movements become input for interaction and interface control in pervasive computing settings. Design\\/methodology\\/approach The paper quantifies the performance of human movement based on Fitt's Law and discusses some of the human factors and technical considerations that arise in trying

Jemal H. Abawajy

2009-01-01

484

Psychological interventions in pervasive developmental disorder: An overview  

PubMed Central

Pervasive developmental disorders (PDDs) are characterized by several impairments in the domains of social communication, social interaction and expression of social attachment, and other aspects of development like symbolic play. As the role of drugs in treating these impairments is extremely limited, a variety of psychological interventions have been developed to deal with them. Some of these have strong empirical support, while others are relatively new and hence controversial. Though it may prove to be a daunting task to begin with, the final reward of being able to improve the life of a child with PDD is enormous and hugely satisfying. Therefore, knowledge of these psychological interventions is important for a mental health professional, in order to be effective in the profession. Present paper presents an overview of these techniques in the management of PDD. PMID:25788797

Poddar, Shuvabrata; Hameed, Noufal T.; Pandey, Jyoti Mishra; Mitra, Sayantanava; Mukherjee, Urbi

2014-01-01

485

Evaluation of IEEE 754 Floating-Point Arithmetic Compliance Across a Wide Range of Heterogeneous  

E-print Network

Evaluation of IEEE 754 Floating-Point Arithmetic Compliance Across a Wide Range of Heterogeneous@utep.edu ABSTRACT Scientific applications rely heavily on floating- point arithmetic and, therefore, are affected by the precision and implementation of floating- point operations. Although the computers we use are IEEE compliant

Taufer, Michela

486

2005 3rd IEEE International Conference on Industrial Informatics (INDIN) Network traffic model for industrial environment  

E-print Network

2005 3rd IEEE International Conference on Industrial Informatics (INDIN) Network traffic model for industrial environment Janusz Kolbuszl, Stanislaw Paszczynski2, Member, IEEE and Bogdan M. Wilamowski3)@wsiz.rzeszow.pl 3Bogdan M. Wilamowski, Department ofElectrical & Computer Engineering, Auburn University, Alabama

Wilamowski, Bogdan Maciej

487

Copyright2007IEEE.ReprintedfromIEEETransactionsonSoftwareEngineering,vol.34, no.2,MARCH/APRIL2008.  

E-print Network

on the Use of an Electronic Process Guide: A Longitudinal Case Study Torgeir Dingsøyr, Member, IEEE Computer electronic process guides. A common problem with such guides is that they are not used. Through a case study,permissiontoreprint/republishthismaterialforadvertisingorpromotional purposesorforcreatingnewcollectiveworksforresaleorredistributionmustbeobtained fromtheIEEEbywritingtopubspermissions@ieee.org. #12;The Impact of Employee Participation

Dingsøyr, Torgeir

488

SUBMITTED TO IEEE/ACM TRANSACTIONS ON NETWORKING 1 Benefits of Network Coding for Unicast Application  

E-print Network

Kurose, Fellow IEEE, Don Towsley, Fellow IEEE, Haixiang Wang Abstract--In this paper, we investigate Antipolis, France, email: gio- vanni.neglia@sophia.inria.fr. Jim Kurose and Don Towsley are with the Department of Computer Science, University of Massachusetts, Amherst, MA 01008, USA email: {kurose

Zhang, Xiaolan "Ellen"

489

Utilizing Embedded Semantics for User-Driven Design of Pervasive Environments  

NASA Astrophysics Data System (ADS)

The Web does not only offer an almost infinitive number of services and resources but can be also seen as a technology to combine different technological devices, like mobile phones, digital media solutions, intelligent household appliances, tablet PCs, and any other kind of computers, in order to create environments satisfying the need of users. However, due to the large amount of web resources and services as well as the variety and range of user needs, it is impossible to realize software solutions for all possible scenarios. In this paper, we present a user-driven approach towards designing and assembling pervasive environments, taking into consideration resources and services available on the Web and provided through computing devices. Based on semantics embedded in the web content, we explain the concept as well as important components of this user-driven environment design methodology and show a first prototype. Finally, the overall approach is critically discussed from the perspectives of programmers and web users on the basis of related work.

Soylu, Ahmet; Mdritscher, Felix; de Causmaecker, Patrick

490

IEEE Consumer Electronics Society Standards Architect, CSR  

E-print Network

IEEE Consumer Electronics Society Joe Decuir Standards Architect, CSR IEEE CES Distinguished Lecturer Future Directions Networking and Applications for Electric Vehicles #12;IEEE Consumer Electronics;IEEE Consumer Electronics Society 3 Other subjects addressed Keynote: Policy and Technology PEV Market

California at Davis, University of

491

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1  

E-print Network

Neglia, Member, IEEE, Jim Kurose, Fellow, IEEE, ACM, Don Towsley, Fellow, IEEE, ACM, and Haixiang Wang.neglia@sophia.inria.fr). J. Kurose and D. Towsley are with the Department of Computer Science, University of Massachusetts, Amherst, MA 01008 USA (e-mail: kurose@cs. umass.edu; towsley@cs.umass.edu). H. Wang

Kurose, Jim

492

Two Player Statistical Game with Higher Order Cumulants Jong-Ha Lee, Student Member, IEEE, Chang-Hee Won, Member, IEEE,  

E-print Network

Two Player Statistical Game with Higher Order Cumulants Jong-Ha Lee, Student Member, IEEE, Chang-Hee and Computer Engi- neering, Temple University, PA 19122, USA jong@temple.edu Chang-Hee Won is an associate

Won, Chang-Hee

493

Pervasive Recombination and Sympatric Genome Diversification Driven by Frequency-Dependent Selection in Borrelia burgdorferi, the Lyme Disease Bacterium  

PubMed Central

How genomic diversity within bacterial populations originates and is maintained in the presence of frequent recombination is a central problem in understanding bacterial evolution. Natural populations of Borrelia burgdorferi, the bacterial agent of Lyme disease, consist of diverse genomic groups co-infecting single individual vertebrate hosts and tick vectors. To understand mechanisms of sympatric genome differentiation in B. burgdorferi, we sequenced and compared 23 genomes representing major genomic groups in North America and Europe. Linkage analysis of >13,500 single-nucleotide polymorphisms revealed pervasive horizontal DNA exchanges. Although three times more frequent than point mutation, recombination is localized and weakly affects genome-wide linkage disequilibrium. We show by computer simulations that, while enhancing population fitness, recombination constrains neutral and adaptive divergence among sympatric genomes through periodic selective sweeps. In contrast, simulations of frequency-dependent selection with recombination produced the observed pattern of a large number of sympatric genomic groups associated with major sequence variations at the selected locus. We conclude that negative frequency-dependent selection targeting a small number of surface-antigen loci (ospC in particular) sufficiently explains the maintenance of sympatric genome diversity in B. burgdorferi without adaptive divergence. We suggest that pervasive recombination makes it less likely for local B. burgdorferi genomic groups to achieve host specialization. B. burgdorferi genomic groups in the northeastern United States are thus best viewed as constituting a single bacterial species, whose generalist nature is a key to its rapid spread and human virulence. PMID:21890743

Haven, James; Vargas, Levy C.; Mongodin, Emmanuel F.; Xue, Vincent; Hernandez, Yozen; Pagan, Pedro; Fraser-Liggett, Claire M.; Schutzer, Steven E.; Luft, Benjamin J.; Casjens, Sherwood R.; Qiu, Wei-Gang

2011-01-01

494

Pervasive recombination and sympatric genome diversification driven by frequency-dependent selection in Borrelia burgdorferi, the Lyme disease bacterium.  

PubMed

How genomic diversity within bacterial populations originates and is maintained in the presence of frequent recombination is a central problem in understanding bacterial evolution. Natural populations of Borrelia burgdorferi, the bacterial agent of Lyme disease, consist of diverse genomic groups co-infecting single individual vertebrate hosts and tick vectors. To understand mechanisms of sympatric genome differentiation in B. burgdorferi, we sequenced and compared 23 genomes representing major genomic groups in North America and Europe. Linkage analysis of >13,500 single-nucleotide polymorphisms revealed pervasive horizontal DNA exchanges. Although three times more frequent than point mutation, recombination is localized and weakly affects genome-wide linkage disequilibrium. We show by computer simulations that, while enhancing population fitness, recombination constrains neutral and adaptive divergence among sympatric genomes through periodic selective sweeps. In contrast, simulations of frequency-dependent selection with recombination produced the observed pattern of a large number of sympatric genomic groups associated with major sequence variations at the selected locus. We conclude that negative frequency-dependent selection targeting a small number of surface-antigen loci (ospC in particular) sufficiently explains the maintenance of sympatric genome diversity in B. burgdorferi without adaptive divergence. We suggest that pervasive recombination makes it less likely for local B. burgdorferi genomic groups to achieve host specialization. B. burgdorferi genomic groups in the northeastern United States are thus best viewed as constituting a single bacterial species, whose generalist nature is a key to its rapid spread and human virulence. PMID:21890743

Haven, James; Vargas, Levy C; Mongodin, Emmanuel F; Xue, Vincent; Hernandez, Yozen; Pagan, Pedro; Fraser-Liggett, Claire M; Schutzer, Steven E; Luft, Benjamin J; Casjens, Sherwood R; Qiu, Wei-Gang

2011-11-01

495

Using Verbal Scaffolding To Facilitate Conversational Participation and Language Acquisition in Children With Pervasive Developmental Disorders  

Microsoft Academic Search

In this article, a discourse based language intervention strategy for children with pervasive developmental disorders is described. Specifically, children with limited generative language are taught to make use of prior linguistic context to participate verbally in structured, interactive dialogues.

Diane M. Kirchner

1991-01-01

496

The Abuse of Power: The Pervasive Fallacy of Power Calculations for Data Analysis  

E-print Network

The Abuse of Power: The Pervasive Fallacy of Power Calculations for Data Analysis John M. HOENIG of Biostatistics and Medical Informatics, University of Wis- consin, Madison, WI 53792. Order of authorship

Newman, Michael C.

497

REXplorer: Using player-centered iterative design techniques for pervasive game development  

Microsoft Academic Search

REXplorer is a pervasive game that helps tourists explore the history of Regensburg, Germany. In the game, historically-based spir- its are stationed at points of interest throughout the city. Players use a special \\

Rafael Ballagas; P. Walz

498

A hummingbird with range Les Earnest, IEEE Life Member  

E-print Network

A hummingbird with range Les Earnest, IEEE Life Member January 1, 2009 Published subsequently for both the large computer and experimental robotic equipment. After the computer was installed we had was reaching out a long way to buzz us. Note that hummingbirds make a sound close to "umunhum". The Mt. Umunhum

Pratt, Vaughan

499

Pervasive Learning--Using Games to Tear down the Classroom Walls  

ERIC Educational Resources Information Center

Pervasive gaming is a new and emerging gaming genre where the physical and social aspects of the real world are integrated into the game and blends into the player's everyday life. Given the nature of pervasive games, it may be possible to use that type of game as a tool to support learning in a university course by providing a gameplay where

Plhn, Trygve

2014-01-01

500

EEG and MRI findings and their relation with intellectual disability in pervasive developmental disorders  

Microsoft Academic Search

BackgroundThe diagnostic category pervasive developmental disorders (PDDs) refer to a group of five disorders: autism, Rett syndrome,\\u000a childhood disintegrative disorder, Asperger syndrome, and pervasive developmental disorder not otherwise specified (PDD-NOS).\\u000a EEG abnormalities and seizures are considered much frequent in autistic subjects with comorbid intellectual disability (ID).\\u000a In this study, we aimed to evaluate the EEG and MRI findings and their

zlem nal; zlem zcan; zgr ner; Melda Akcakin; Ayla Aysev; Glhis Deda

2009-01-01