These are representative sample records from Science.gov related to your search topic.
For comprehensive and current results, perform a real-time search at Science.gov.
1

28 PERVASIVE computing Published by the IEEE Computer Society 1536-1268/07/$25.00 2007 IEEE Pervasive Computing  

E-print Network

Pervasive Computing and Autism: Assisting Caregivers of Children with Special Needs C aring for children for children with autism often face numerous choices regarding types of therapies, doctors, and drug and diet result when caregivers don't see the effects of treatment immediately, perhaps because the changes

Hayes, Gillian R.

2

Published by the IEEE CS 1536-1268/12/$31.00 2012 IEEE PERVASIVE computing 7 Smartphones Editor: Roy Want Google roywant@acm.org  

E-print Network

Published by the IEEE CS 1536-1268/12/$31.00 © 2012 IEEE PERVASIVE computing 7 Smartphones Editor: Roy Want Google roywant@acm.org As smartphones get smarter by uti- lizing new intelligence-being, help us navi- gate through our day, and intervene on our behalf. Here, we present various smartphone

Campbell, Andrew T.

3

1536-1268/04/$20.00 2004 IEEE I Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 11 Editor: Thad E. Starner I Georgia Institute of Technology I thad@cc.gatech.edu  

E-print Network

1536-1268/04/$20.00 © 2004 IEEE I Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 11 Editor: Thad E. Starner I Georgia Institute of Technology I thad@cc.gatech.edu Wearable Computing ImagineCo's headquarters to discuss a possible cooperative venture. While there, BadCo's industrial espionage team uses

Starner, Thad E.

4

Electronic Textiles: A Platform for Pervasive DIANA MARCULESCU, MEMBER, IEEE, RADU MARCULESCU, MEMBER, IEEE,  

E-print Network

Electronic Textiles: A Platform for Pervasive Computing DIANA MARCULESCU, MEMBER, IEEE, RADU years later, the link between textiles and computing is more realistic than ever. In this paper, we look at the synergistic relationship between textiles and computing and identify the need for their "integration" using

5

Philosophy, privacy, and pervasive computing  

Microsoft Academic Search

Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the\\u000a development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons\\u000a in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked\\u000a computing, where everyday transactions

Diane P. Michelfelder

2010-01-01

6

Classifying Pervasive Games: On Pervasive Computing and Mixed Reality  

Microsoft Academic Search

Pervasive Games have become popular in recent years. Their ambitious goal is to bring the computer into the world in order to augment existing games or to even come up with hitherto impossible or unthought-of forms of entertainment. This paper reflects on the various approaches to define what Pervasive Games consist of, how they relate to playing and games, and

Steve Hinske; Matthias Lampe; Carsten Magerkurth; Carsten Rcker

7

Privacy in Pervasive Computing and Open Issues  

Microsoft Academic Search

Privacy appears as a major issue for pervasive computing applications. Several models have been proposed to address privacy challenges. Successful design requires awareness of the technology's users and that their desires and concerns are understood. This is difficult as few empirical researches exist about potential pervasive users that designers can use. Complicating design further is the fact that pervasive systems

Pankaj Bhaskar; Sheikh Iqbal Ahamed

2007-01-01

8

Dynamically reconfigurable middleware for pervasive computing DOMPC;.  

E-print Network

??Pervasive Computing is affected by resource constrained devices unreliable connection application diversity with different protocols and diverse standards This results in heterogeneous infrastructure among devices (more)

Nagaraja R

2014-01-01

9

Classifying Pervasive Games: On Pervasive Computing and Mixed Reality  

E-print Network

often playing (a game) is the common ground for the participants to come together in the real world the computer into the world in order to augment existing games or to even come up with hitherto impossible or unthought-of forms of entertainment. This paper reflects on the various approaches to define what Pervasive

10

Programming Secure and Robust Pervasive Computing Applications  

E-print Network

and demonstrate its utility for building context-aware, secure, fault-tolerant pervasive computing applications on the contextual information. A user's physical location has been one of the most prominent context information

Minnesota, University of

11

Emotions in Pervasive Computing Environments  

Microsoft Academic Search

The ability of an intelligent environment to connect and adapt to real internal sates, needs and behaviors' meaning of humans can be made possible by considering users' emotional states as contextual parameters. In this paper, we build on enactive psychology and investigate the incorporation of emotions in pervasive systems. We define emotions, and discuss the coding of emotional human markers

Nevin Vunka Jungum; Eric Laurent

2009-01-01

12

Self-healing for Autonomic Pervasive Computing  

NASA Astrophysics Data System (ADS)

To ensure smooth functioning of numerous handheld devices anywhere anytime, the importance of a self-healing mechanism cannot be overlooked. This is one of the main challenges to growing autonomic pervasive computing. Incorporation of efficient fault detection and recovery in the device itself is the ultimate quest but there is no existing selfhealing scheme for devices running in autonomic pervasive computing environments that can be claimed as the ultimate solution. Moreover, the highest degree of transparency, security and privacy should also be maintained. In this book chapter, an approach to develop a self-healing service for autonomic pervasive computing is presented. The self-healing service has been developed and integrated into the middleware named MARKS+ (Middleware Adaptability for Resource discovery, Knowledge usability, and Self-healing). The self-healing approach has been evaluated on a test bed of PDAs. An application has been developed by using the service. The evaluation results are also presented in this book chapter.

Ahmed, Shameem; Ahamed, Sheikh I.; Sharmin, Moushumi; Hasan, Chowdhury S.

13

Pervasive computing and wireless optical network technology  

NASA Astrophysics Data System (ADS)

For reaching the destination that user can operate simply to complete complicated work with high quality in time, elements for pervasive computing should be integrated into an active system. Embedded, nomandic, adaptive and broadband intelligent services will be necessary in the system. The novel Intelligent Pervasive Computing Technologies (IPCT) make those services including high speed services and low speed services etc be provided well. The crucial component parts are the Backbone Mobile Managing technologies (BMM), the Access Mobile Managing technologies (AMM), The Supplementary Independent Mobile Managing Technologies (SIMMT) and so forth. Wireless optical networks are necessities of implementing IPCT. Another key of running IPCT is to optimize the configuration, especially the logic. The pivot of operating is Wireless Optical Agent (WOA) and corresponding contributories. Experiments with simulation indicate IPCT bring high performances for pervasive computing.

Xue, Cai; Cai, Ran; Cai, Guishun; Zeng, Lang; Xue, Lin

2005-11-01

14

Pervasive Computing Goes to School  

ERIC Educational Resources Information Center

In 1991 Mark Weiser introduced the idea of ubiquitous computing: a world in which computers and associated technologies become invisible, and thus indistinguishable from everyday life. This invisible computing is accomplished by means of "embodied virtuality," the process of drawing computers into the physical world. Weiser proposed that

Plymale, William O.

2005-01-01

15

Will Pervasive Computing be Manageable?  

E-print Network

View Computers everywhere ­ embedded into fridges, washing machines, door locks, cars, furnitureCoMo video phone http://nooper.co.jp/showcase #12;OV2001: M. Sloman 7 Current Technology 2 Matchbox computer

Sloman, Morris

16

Pervasive Social Computing: Augmenting Five Facets of Human Intelligence  

Microsoft Academic Search

Pervasive Social Computing is a novel collective paradigm, derived from pervasive computing, social media, social networking, social signal processing, etc. This paper reviews Pervasive Social Computing as an integrated computing environment, which promises to augment five facets of human intelligence in physical environment awareness, behavior awareness, community awareness, interaction awareness, and content awareness. Reviews of related studies are given and

Jiehan Zhou; Junzhao Sun; Kumaripaba Athukorala; Dinesh Wijekoon

2010-01-01

17

Context-Aware Pervasive Computing at Large: Three Example Applications  

E-print Network

: the situation What is a context-aware pervasive computing system? A system that can respond intelligentlyContext-Aware Pervasive Computing at Large: Three Example Applications Seng W. Loke Department;Context-Awareness in Pervasive Computing Started in Schilit's PhD thesis on context-awareness for mobile

Loke, Seng W. - Loke, Seng W.

18

Analytical techniques for debugging pervasive computing environments  

E-print Network

User level debugging of pervasive environments is important as it provides the ability to observe changes that occur in a pervasive environment and fix problems that result from these changes, especially since pervasive ...

Nigam, Atish, 1981-

2004-01-01

19

IEEE Internet Computing Online  

NSDL National Science Digital Library

The Institute of Electrical and Electronics Engineers offers this webzine as a companion to its new bimonthly print magazine IEEE Internet Computing. The purpose of IC Online is to "address the Internet's widening impact on engineering practice and society." The January/February 1997 debut issue contains the full text of the print magazine, including an interview with George Gilder, and articles on Internet-enabled computer-aided design and agents on the web, among others. It also contains the Arachnoid Tourist, reviews of selected engineering-related Internet sites. Future issues of IC Online will contain "magazine excerpts and web-unique content." Print magazine subscription information is available at the site.

1997-01-01

20

IEEE Internet Computing Online  

NSDL National Science Digital Library

The Institute of Electrical and Electronics Engineers offers this webzine as a companion to its new bimonthly print magazine IEEE Internet Computing. The purpose of IC Online is to "address the Internet's widening impact on engineering practice and society." The January/February 1997 debut issue contains the full text of the print magazine, including an interview with George Gilder, and articles on Internet-enabled computer-aided design and agents on the web, among others. It also contains the Arachnoid Tourist, reviews of selected engineering-related Internet sites. Future issues of IC Online will contain "magazine excerpts and web-unique content." Print magazine subscription information is available at the site.

2005-10-31

21

Opening Pervasive Computing to the Masses Using the SEAP Middleware  

Microsoft Academic Search

The increasing availability of sensing devices has made the possibility of context-aware pervasive computing ap- plications real. However, constructing this software requires extensive knowledge about the devices and specialized program- ming languages for interacting with them. While the nature of pervasive computing lends users to demand individualized ap- plications, complexities render programming embedded devices unapproachable. In this paper we introduce

Seth Holloway; Drew Stovall; Jorge Lara-garduno; Christine Julien

2009-01-01

22

12 PERVASIVE computing Published by the IEEE CS n 1536-1268/11/$26.00 2011 IEEE G u e s t e d i t o r s ' i n t r o d u c t i o n  

E-print Network

on automotive pervasive computing. As you will see, the automotive telematics community has moved well beyond the problems of connecting vehicles to each other and the infrastructure, and now the focus is turning to interactions between the vehicle and its occupants. In many ways, this evolution mirrors the transi- tion from

23

IEEE Computer Society: http://computer.org Computer: http://computer.org/computer  

E-print Network

IEEE Computer Society: http://computer.org Computer: http://computer.org/computer computer@computer.org IEEE Computer Society Publications Office: +1 714 821 8380 COVER FEATURES GUEST EDITOR'S INTRODUCTION 28 Computational Photography--The Next Big Step Oliver Bimber Computational photography extends

Stanford University

24

Embedding expression: Pervasive computing architecture for art and entertainment  

Microsoft Academic Search

Pervasive computings historical driver applications include environmental monitoring, safety and security, home and office productivity and guided experience of cultural activities. It also suggests and offers the means to achieve new types of expression in art and entertainment, which has not been a significant area of research despite its cultural and socio-economic importance and unique requirements. This paper discusses motivations

Jeff Burke; Jonathan Friedman; Eitan Mendelowitz; Mani B. Srivastava

2006-01-01

25

Privacy Enhanced Access Control in Pervasive Computing Environments  

E-print Network

Privacy Enhanced Access Control in Pervasive Computing Environments Kui Ren and Wenjing Lou Department of Electrical and Computer Engineering Worcester Polytechnic Institute, Worcester, MA 01609 Email: {kren, wjlou}@ece.wpi.edu Abstract-- Privacy and security are two important but seem- ingly contradict

Hou, Y. Thomas

26

IEEE Computer Society Board of Governor Nominee  

E-print Network

IEEE Computer Society Board of Governor Nominee Prof. Hironori Kasahara Waseda University, Tokyo statement The importance of computer technology has been increasing in lives due to the influence. However, most IT-related societies, including our IEEE Computer Society, have been facing problems like

Kasahara, Hironori

27

The Age of Pervasive Computing? Everything Smart, Everything Connected?  

Microsoft Academic Search

\\u000a Given the continuing technical progress in computing and communication, it seems that we are heading towards an all-encompassing\\u000a use of networks and computing power, a new era commonly termed Pervasive Computing. Its vision is grounded in the firm belief\\u000a amongst the scientific community that Moores Law (i.e. the observation that the computer power available on a chip approximately\\u000a doubles every

Friedemann Mattern

2003-01-01

28

Reconfigurable context-sensitive middleware for pervasive computing  

Microsoft Academic Search

Context-sensitive applications need data from sensors, devices, and user actions, and might need ad hoc communication support to dynamically discover new devices and engage in spontaneous information exchange. Reconfigurable Context-Sensitive Middleware facilitates the development and runtime operations of context-sensitive pervasive computing software.

S. S. Yau; F. Karim; Yu Wang; Bin Wang; S. K. S. Gupta

2002-01-01

29

Impress: Towards Next-Generation Ubiquitous and Pervasive Computing Systems  

Microsoft Academic Search

Research in pervasive and ubiquitous computing has resulted in a number of prototype systems developed and implemented in isolation. If this research area is to have impact, the next generation of research prototypes must move beyond single laboratories and isolated, independent software frameworks. Future sys- tems must not only inter-work and inter-operate, but should enable more rapid prototyping and incorporation

James P. Black; Hao Chen

30

Pervasive Computing and Communication Technologies for U-Learning  

ERIC Educational Resources Information Center

The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or

Park, Young C.

2014-01-01

31

LASER POINTERS AS INTERACTION DEVICES FOR COLLABORATIVE PERVASIVE COMPUTING  

E-print Network

LASER POINTERS AS INTERACTION DEVICES FOR COLLABORATIVE PERVASIVE COMPUTING Andriy Pavlovych1 environments. The system uses laser pointers as interaction devices and employs a video camera to detect where each laser pointer is pointing. Time-division multiplexing together with a wireless link affords

Stürzlinger, Wolfgang

32

SOLAR: BUILDING A CONTEXT FUSION NETWORK FOR PERVASIVE COMPUTING  

E-print Network

SOLAR: BUILDING A CONTEXT FUSION NETWORK FOR PERVASIVE COMPUTING Dartmouth Technical Report TR2004 of Graduate Studies #12;c Copyright by Guanling Chen 2004 #12;Abstract of the Dissertation SOLAR: BUILDING- textual data. In this dissertation, we present a Context Fusion Network (CFN), called Solar, which

33

Delivering interactive multimedia services in dynamic pervasive computing environments  

Microsoft Academic Search

This paper introduces a distributed system for next generation multimedia support in dynamically changing pervasive computing environments. The overall goal is to enhance the experience of mobile users by intelligently adapting the way a service is presented, in particular by adapting the way the user receives multimedia content from the service and how he interacts with the service. The system

Cristian Hesselman; Ishan Vaishnavi; Mathieu Boussard; Ralf Kernchen; Stefan Meissner; Antonietta Spedalieri; Albert Sinfreu; Christian Rck

2008-01-01

34

End-of-life impacts of pervasive computing  

Microsoft Academic Search

RFID technology is one of the forerunners of pervasive computing, and as such is expected to play an important role in many applications of daily life, especially in the form of smart labels. However, market investigations and a material analysis of a smart label shows that the use of smart labels does not considerably affect the recycling or disposal of

P. Krauchi; P. A. Wager; M. Eugster; G. Grossmann; L. Hilty

2005-01-01

35

An Adaptive Sensor Mining Framework for Pervasive Computing Applications  

NASA Astrophysics Data System (ADS)

Analyzing sensor data in pervasive computing applications brings unique challenges to the KDD community. The challenge is heightened when the underlying data source is dynamic and the patterns change. We introduce a new adaptive mining framework that detects patterns in sensor data, and more importantly, adapts to the changes in the underlying model. In our framework, the frequent and periodic patterns of data are first discovered by the Frequent and Periodic Pattern Miner (FPPM) algorithm; and then any changes in the discovered patterns over the lifetime of the system are discovered by the Pattern Adaptation Miner (PAM) algorithm, in order to adapt to the changing environment. This framework also captures vital context information present in pervasive computing applications, such as the startup triggers and temporal information. In this paper, we present a description of our mining framework and validate the approach using data collected in the CASAS smart home testbed.

Rashidi, Parisa; Cook, Diane J.

36

Adaptive Offloading Inference for Delivering Applications in Pervasive Computing Environments  

Microsoft Academic Search

Pervasive computing allows a user to access an ap- plication on heterogeneous devices continuously and con- sistently. However, it is challenging to deliver complex applications on resource-constrained mobile devices, such as cell phones and PDAs. Different approaches, such as application-based or system-based adaptations, have been proposed to address the problem. However, existing solutions often require degrading application fidelity. We believe

Xiaohui Gu; Klara Nahrstedt; Alan Messer; Ira Greenberg; Dejan S. Milojicic

2003-01-01

37

Adaptive Offloading Inference for Delivering Applications in Pervasive Computing Environments  

Microsoft Academic Search

Pervasive computing allows a user to access an ap- plication on heterogeneous devices continuously and con- sistently. However, it is challenging to deliver complex applications on resource-constrained mobile devices, such as cell phones and PDAs. Different approaches, such as application-based or system-based adaptations, have been proposed to address the problem. However, existing solutions often require degrading application fidelity. We believe

Xiaohui Guy; Klara Nahrstedt; Alan Messer; Ira Greenberg; Dejan Milojicic

38

14 1541-1672/09/$25.00 2009 IEEE IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society  

E-print Network

14 1541-1672/09/$25.00 © 2009 IEEE IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society Vladimir Gorodetsky, St. Petersburg Institute for Informatics and Automation Pericles A. Mitkas, Aristotle University of Thessaloniki Agents and Data Mining #12;MaY/JuNE 2009 www.computer.org/intelligent 15

Cao, Longbing

39

Introduction to the IEEE Transactions on Cloud Computing  

E-print Network

Introduction to the IEEE Transactions on Cloud Computing Rajkumar Buyya Welcome to the IEEE Transactions on Cloud Computing (TCC). It is my privilege and honor to serve as the inaugural Editor-in-Chief of TCC. I would like to thank the IEEE and the world-wide Cloud Computing community for giving me

Buyya, Rajkumar

40

48 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE C O N T E X T -A W A R E C O M P U T I N G  

E-print Network

O N T E X T - A W A R E C O M P U T I N G Context-Aware Artifacts: Two Development Approaches O ne of the most exciting and impor- tant recent developments in con- text-aware computing is to make everyday appliances, devices, and objects context aware. A context- aware artifact uses sensors to perceive

Loke, Seng W. - Loke, Seng W.

41

Collaborative editing within the pervasive collaborative computing environment  

SciTech Connect

Scientific collaborations are established for a wide variety of tasks for which several communication modes are necessary, including messaging, file-sharing, and collaborative editing. In this position paper, we describe our work on the Pervasive Collaborative Computing Environment (PCCE) which aims to facilitate scientific collaboration within widely distributed environments. The PCCE provides a persistent space in which collaborators can locate each other, exchange messages synchronously and asynchronously and archive conversations. Our current interest is in exploring research and development of shared editing systems with the goal of integrating this technology into the PCCE. We hope to inspire discussion of technology solutions for an integrated approach to synchronous and asynchronous communication and collaborative editing.

Perry, Marcia; Agarwal, Deb

2003-09-11

42

Energy Management for Mobile Devices through Computation Outsourcing within Pervasive Smart Spaces  

Microsoft Academic Search

In this work we explore the opportunity Pervasive Spaces could provide as supplemental energy sources. We utilize the nature of pervasive smart spaces to outsource computation that would normally be performed on a mobile device to a surrogate server within the smart space. The decision to outsource a computation depends on whether its energy cost on the device is larger

Ahmed A. ABUKMAIL

43

Data-Centric Middleware for Context-Aware Pervasive Computing Guanling Chen  

E-print Network

if not carefully managed. To minimize user distraction the applications must be aware of and adapt to the situationData-Centric Middleware for Context-Aware Pervasive Computing Guanling Chen , Ming Li , and David and deploying context-aware pervasive-computing applications calls for distributed software infrastructures

Kotz, David

44

SmartExhibition: Case Study of Integrating RFID with Wireless Sensor Network for Pervasive Computing  

Microsoft Academic Search

The RFID is considered to provide an efficient solution to merge physical world with virtual space for pervasive computing. The wireless sensor network (WSN) is also a feasible and cost-effective candidate for the context sensing in the pervasive computing. We propose a smart space named SmartExhibtion as an scenario where the RFID is integrated to the sensor network and describe

Ting Zhang; Yuanxin Ouyang; Yuheng Liu

2008-01-01

45

Model-driven engineering of planning and optimisation algorithms for pervasive computing environments  

Microsoft Academic Search

This paper presents a model-driven approach to developing pervasive computing applications that exploits design- time information to support the engineering of planning and optimisation algorithms that reflect the presence of uncertainty, dynamism and complexity in the application domain. In par- ticular the task of generating code to implement planning and optimisation algorithms in pervasive computing domains is addressed. We present

Anthony Harrington; Vinny Cahill

2011-01-01

46

10 Published by the IEEE Computer Society 1089-7801/10/$26.00 2010 IEEE IEEE INTERNET COMPUTING GuestEditors'Introduction  

E-print Network

and technical challenges inherent to this "Internet of Things," of which privacy is the most compelling10 Published by the IEEE Computer Society 1089-7801/10/$26.00 © 2010 IEEE IEEE INTERNET COMPUTING GuestEditors'Introduction Internet Predictions Vinton G. Cerf Google Munindar P. Singh North Carolina

47

An Impregnable Lightweight Device Discovery (ILDD) Model for the Pervasive Computing Environment of Enterprise Applications  

Microsoft Academic Search

The worldwide use of handheld devices (personal digital assistants, cell phones, etc.) with wireless connectivity will reach 2.6 billion units this year and 4 billion by 2010. More specifically, these handheld devices have become an integral part of industrial applications. These devices form pervasive ad hoc wireless networks that aide in industry applications. However, pervasive computing is susceptible and vulnerable

Munirul M. Haque; Sheikh Iqbal Ahamed

2008-01-01

48

Smart Classroom: Bringing Pervasive Computing into Distance Learning  

NASA Astrophysics Data System (ADS)

In recent years, distance learning has increasingly become one of themost important applications on the internet and is being discussed and studied by various universities, institutes and companies. The Web/Internet provides relatively easy ways to publish hyper-linked multimedia content for more audiences. Yet, we find that most of the courseware are simply shifted from textbook to HTML files. However, in ost cases the teacher's live instruction is very important for catching the attention and interest of the students. That's why Real-Time Interactive Virtual Classroom (RTIVC) always plays an indispensable role in distance learning, where teachers nd students located in different places can take part in the class synchronously through certain multimedia communication systems and obtain real-time and mediarich interactions using Pervasive Computing technologies [1]. The Classroom 2000 project [2] at GIT has been devoted to the automated capturing of the classroom experience. Likewise, the Smart Classroom project [3] at our institute is focused on Tele-education. Most currently deployed real-time Tele-education systems are desktop-based, in which the teacher's experience is totally different from teaching in a real classroom.

Shi, Yuanchun; Qin, Weijun; Suo, Yue; Xiao, Xin

49

30 Published by the IEEE Computer Society 1089-7801/09/$25.00 2009 IEEE IEEE INTERNET COMPUTING nternet technologies enable us to  

E-print Network

the Asynchronous Learning Networks Participatory Ex- amination approach (or APE) utiliz- ing Internet technologies Participatory Exams pus blended courses. We created and designed APE to facilitate deep learning for distanceE-Learning 30 Published by the IEEE Computer Society 1089-7801/09/$25.00 © 2009 IEEE IEEE INTERNET

Bieber, Michael

50

Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions  

Microsoft Academic Search

Abstract Weexplore,the challenges and research directions in building models, protocols and architectures to support security in pervasive ,computing ,environments. We argue that to be successful, efforts to build these would have to recognize,from ,the onset ,that pervasive ,computing settings are complex ,socio-technical system and would thus,have ,to go ,beyond ,traditional system-centric approaches,to analyzing and designing security.

Roshan K. Thomas; Ravi S. Sandhu

2004-01-01

51

Wireless Adaptive Therapeutic TeleGaming in a Pervasive Computing Environment  

Microsoft Academic Search

\\u000a This chapter introduces a wireless, pervasive computing approach to adaptive therapeutic telegaming considered in the context\\u000a of near set theory. Near set theory provides a formal basis for observation, comparison and classification of perceptual granules.\\u000a A perceptual granule is defined by a collection of objects that are graspable by the senses or by the mind. In the proposed pervasive computing

James F. Peters; Tony Szturm; Maciej Borkowski; Dan Lockery; Sheela Ramanna; Barbara Shay

2009-01-01

52

Model-driven engineering of planning and optimisation algorithms for pervasive computing environments  

Microsoft Academic Search

This paper presents a model-driven approach to developing pervasive computing applications that exploits design-time information to support the engineering of planning and optimisation algorithms that reflect the presence of uncertainty, dynamism and complexity in the application domain. In particular, the task of generating code to implement planning and optimisation algorithms in pervasive computing domains is addressed.We present a layered domain

Anthony Harrington; Vinny Cahill

53

Adaptive Offloading Inference for Delivering Applications in Pervasive Computing Environments  

E-print Network

Xiaohui Gu ¡ , Klara Nahrstedt, Alan Messer ¢ , Ira Greenberg £ , Dejan Milojicic ¤ Abstract Pervasive to adapt to both application execution patterns and resource fluctuations. Using the Fuzzy Control model-making problems during runtime offload- ing: (1) timely triggering of adaptive offloading, and (2) intelligent

Nahrstedt, Klara

54

Adaptive Offloading Inference for Delivering Applications in Pervasive Computing Environments  

E-print Network

Xiaohui Gu , Klara Nahrstedt, Alan Messer , Ira Greenberg§ , Dejan Milojicic¶ In Proceedings of IEEE to adapt to both application execution patterns and resource fluctuations. Using the Fuzzy Control model-making problems during runtime offload- ing: (1) timely triggering of adaptive offloading, and (2) intelligent

Nahrstedt, Klara

55

Investigating the next generation mobile wireless technology to deliver a pervasive mobile pervasive computing environment  

E-print Network

of Computing Science University of Newcastle upon Tyne, NE1 7RU, UK Tel +44 191-222-8223 Fax +44-191-222-8232 alan.tully@ncl.ac.uk Professor P.T. Blythe Transport Operations Research Group University of Newcastle will be a major research issue of the next decade. The ability to monitor, sense, manage and communicate

Newcastle upon Tyne, University of

56

Published by the IEEE CS n 1536-1268/08/$25.00 2008 IEEE PERVASIVE computing 13 G u e s t e d i t o r s ' i n t r o d u c t i o n  

E-print Network

or criminal intent. However, hacking's older definitions are quite different: interacting with a computer television. A source of inspiration Hacking is also a cultural phenomenon that inspired many of us to become

Heidemann, John

57

A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing  

E-print Network

. Ahamed1 , Moushumi Sharmin2 , and Shameem Ahmed2 1 Marquette University, Milwaukee, Wisconsin, USA 2 other directly or via another mobile device, and are responsible for performing computations infrastructure- less pervasive computing area, which leads to the dependency on other devices for resources

Madiraju, Praveen

58

Combining amorphous computing and reactive agent-based systems: a paradigm for pervasive intelligence?  

Microsoft Academic Search

This paper is intended to provide insight on the upheaval that the advent of computing systems based on pervasive computing will represent. We show, after an introduction to this concept, why the traditional rules of design, validation, control and deployment nowadays used in the industry are not adapted anymore to these new systems. We then show that the multi-agent systems

David Servat; Alexis Drogoul

2002-01-01

59

TRANSPARENT SHAPING OF EXISTING SOFTWARE TO SUPPORT PERVASIVE AND AUTONOMIC COMPUTING  

E-print Network

must balance several conflicting concerns, including quality-of-service, security, fault As the computing and communication infrastructure continues to expand and diversify, the need for adaptability in software is growing. Adaptability is especially important to pervasive computing, which promises anywhere

Sadjadi, S. Masoud

60

Editor: Charles Petrie petrie@stanford.edu 2 Published by the IEEE Computer Society 1089-7801/14/$31.00 2014 IEEE IEEE INTERNET COMPUTING  

E-print Network

-7801/14/$31.00 © 2014 IEEE IEEE INTERNET COMPUTING N o, I'm not trying to apply the term "Inter- net of Things function, and is carried out by the Internet Assigned Num- bers Authority (IANA). Ok, is this a thing for Internet protocols, some of which include things like MIME types and TCP port numbers. Most importantly

Petrie, Charles

61

SocialComputingintheBlogosphere 30 Published by the IEEE Computer Society 1089-7801/10/$26.00 2010 IEEE IEEE INTERNET COMPUTING  

E-print Network

states that "Nothing in this Act shall be construed as permitting the censorship of the Internet."1-7801/10/$26.00 © 2010 IEEE IEEE INTERNET COMPUTING T he value of any piece of informa- tion depends on its relevance the Malaysian press is tightly controlled, the government has officially encouraged Internet- based enterprises

Kokar, Mieczyslaw M.

62

The SocioEconomic Impact of Pervasive Computing Intelligent Spaces and the Organisation of Business  

Microsoft Academic Search

\\u000a This chapter is based on work carriedout for the Eurescom project PI302 PROFIT (Potential Profit Opportunities in the Future\\u000a Ambient Intelligence World). The vision driving iSpaces is described in many different ways, e.g. ubiquitous computing [1], pervasive computing [2], ambient intelligence [3]. Based largely on expected developments in information and communications technology, it has three main aspects:\\u000a \\u000a \\u000a \\u000a \\u000a \\u000a \\u000a \\u000a pervasive

M H Lyons; R Ellis; J M M Potter; D A M Holm; R Venousiou

63

Physicalnet: A Generic Framework for Managing and Programming Across Pervasive Computing Networks  

E-print Network

pervasive computing environments. These environments consist of a wide spectrum of devices from very minimal in one house would result in the alarms raised in another nearby house. To achieve this potential of these solutions are heavyweight in memory and execution time and do not adequately address minimal capacity

Stankovic, John A.

64

Mobile fighting crime device based on information technology by police cloud computing toward pervasive investigations  

Microsoft Academic Search

In this paper, we present the pervasive investigation crime (PIC) system in which this cloud scenario integrates the emerging cloud computing and the radio identification (RFID) technology. This cloud device can give a wider cloud resource including 2G, 3G and 4G cell phone resource that it is suitable for investigator enables to detection a misdeed or suspected vehicle and associated

Ke-Ren Chen; Hung-Jen Tsai

2011-01-01

65

A Taxonomy-Driven Approach to Visually Prototyping Pervasive Computing Applications  

E-print Network

A Taxonomy-Driven Approach to Visually Prototyping Pervasive Computing Applications Zo´e Drey1 environment into a visual pro- gramming language. A taxonomy describes the relevant entities of a given to taxonomical information. We have implemented a visual environment to develop taxonomies and orchestration

Paris-Sud XI, Université de

66

Security in Distributed, Grid, and Pervasive Computing Yang Xiao,(Eds.) pp. -  

E-print Network

and energy reserves of wireless sensor nodes while also securing them against attackers. All aspectsSecurity in Distributed, Grid, and Pervasive Computing Yang Xiao,(Eds.) pp. ­ - ­ c 2006 Auerbach Publications, CRC Press Chapter 17 Wireless Sensor Network Security: A Survey John Paul Walters, Zhengqiang

Shi, Weisong

67

Self-Routing in Pervasive Computing Environments using Smart Messages Cristian Borcea1  

E-print Network

Self-Routing in Pervasive Computing Environments using Smart Messages Cristian Borcea1 , Chalermek University of Maryland College Park, MD, 20742, USA iftode@cs.umd.edu Abstract Smart Messages (SMs This work is supportedin partby the NSF underthe ITR GrantNumber ANI-0121416 on a highway cooperating

Borcea, Cristian

68

myGander: A Mobile Interface and Distributed Search Engine for Pervasive Computing  

E-print Network

@uncc.edu, gcroman@unm.edu Abstract--Motivated by the growing amount of digitally- accessible information in our search information with spatiotemporal underpinnings without a priori indexing. Human users scenario. I. INTRODUCTION The envisioned pervasive computing spaces of the near future (e.g., the Internet

Julien, Christine

69

Methods for Policy Conflict Detection and Resolution in Pervasive Computing Environments  

E-print Network

]:Software Management. General Terms Design, Performance and Management. Keywords Policy, Conflict Detection, ConflictMethods for Policy Conflict Detection and Resolution in Pervasive Computing Environments Evi Syukur is to investigate several techniques that can be used to statically or dynamically detect and resolve conflicts

Loke, Seng W. - Loke, Seng W.

70

A History of the IEEE Computational Intelligence Society  

Microsoft Academic Search

The IEEE Computational Intelligence Society (CIS) focuses on computational and theoretical aspects of mimicking nature for problem solving. CIS core technologies include neural, fuzzy, and evolutionary computation, as well as hybrid intelligent systems that contain these and other related paradigms. The Society has its own history of transformation from the Neural Network Council to the Neural Network Society to the

Gary B. Fogel

2009-01-01

71

Editor: Charles Petrie petrie@stanford.edu 2 Published by the IEEE Computer Society 1089-7801/13/$31.00 2013 IEEE IEEE INTERNET COMPUTING  

E-print Network

-7801/13/$31.00 © 2013 IEEE IEEE INTERNET COMPUTING R ecently, a friend asked me to write about Bitcoin. This has always. They are somewhat more subject to hacking and you can't insure them. Lose your hard drive, lose your stash. I don-it-yourself (DIY) money enabled by novel uses of the Internet -- that is, you can now use the Internet to turn data

Petrie, Charles

72

A Clustering-based Location Privacy Protection Scheme for Pervasive Computing  

Microsoft Academic Search

In pervasive computing environments, Location- Based Services (LBSs) are\\u000abecoming increasingly important due to continuous advances in mobile networks\\u000aand positioning technologies. Nevertheless, the wide deployment of LBSs can\\u000ajeopardize the location privacy of mobile users. Consequently, providing\\u000asafeguards for location privacy of mobile users against being attacked is an\\u000aimportant research issue. In this paper a new scheme for

Lin Yao; Chi Lin; Xiangwei Kong; Feng Xia; Guowei Wu

2010-01-01

73

Design and implementation of a virtual assistant for healthcare professionals using pervasive computing technologies  

Microsoft Academic Search

With the advancement of hand-held devices, wireless and sensor network pervasive computing has achieved a perfect momentum.\\u000a Formerly, a requirement existed that was a serious impediment and threat to the mobility of users the necessary presence\\u000a of a fixed wired network. This has been resolved by the recent advances in wireless and mobile technologies, particularly\\u000a Bluetooth and WiFi. The

Sheikh Iqbal Ahamed; Moushumi Sharmin; Shameem Ahmed; Munirul M. Haque; Ahmed J. Khan

2006-01-01

74

IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014 369 Heterogeneity in Mobile Cloud Computing  

E-print Network

, IEEE, Abdullah Gani, Senior Member, IEEE and Rajkumar Buyya, Senior Member, IEEE Abstract--The unabated.C/HIR/MOHE/FCSIT/03. Z. Sanaei, S. Abolfazli, and A. Gani are with the Department of Computer System & Technology

Buyya, Rajkumar

75

Delegation, Arbitration and High-Level Service Discovery as Key Elements of a Software Infrastructure for Pervasive Computing  

E-print Network

The dream of pervasive computing is slowly becoming a reality. A number of projects around the world are constantly contributing ideas and solutions that are bound to change the way we interact with our environments and ...

Gajos, Krzysztof

2003-06-01

76

Computational Photography 32 March/April 2007 Published by the IEEE Computer Society 0272-1716/07/$25.00 2007 IEEE  

E-print Network

Computational Photography 32 March/April 2007 Published by the IEEE Computer Society 0272-1716/07/$25.00 © 2007 IEEE Many computational photography appli- cations require sets of images that are captured) filter reduces the amount of transmitted light, equally across all wavelengths. The plate mirror splits

Nayar, Shree K.

77

1070-986X/03/$17.00 2003 IEEE Published by the IEEE Computer Society 11 Media Impact  

E-print Network

1070-986X/03/$17.00 © 2003 IEEE Published by the IEEE Computer Society 11 Media Impact Editor- lem of automatic retrieval of syntactic and semantic data from audio­visual media as a way to overcome seems to solve new problems with old solu- tions and that only furthers the crisis. Let me explain why

Nack, Frank

78

Computational Intelligence and AI in Games: A New IEEE Transactions  

E-print Network

increase in the quality, diversity and pervasiveness of video games. The value of the worldwide computer and video games market is estimated to be $USD25bn annually1 , and is predicted to grow rapidly over to chess and checkers do not work well for Go, and are even less applicable to video games where the state

Lucas, Simon M.

79

Nominee for IEEE Computer Society President-Elect (2016 President)  

E-print Network

and government. Also, I will try to give young people technological dreams. The Computer Society's core by Internet: August 4 - 12:00 noon EDT, October 6, 2014 You will receive an e-mail from IEEE-CS for the voting in creating modern products and services attractive to young and experienced members and potential members

Kasahara, Hironori

80

IEEE COMPUTATIONAL INTELLIGENCE SOCIETY RECOGNIZES JERRY MENDEL AND DONGRUI WU  

E-print Network

IEEE COMPUTATIONAL INTELLIGENCE SOCIETY RECOGNIZES JERRY MENDEL AND DONGRUI WU Dr. Jerry Mendel of Type-1 and Interval Type-2 Fuzzy Logic Systems". Dr. Mendel was presented the award by CT Lin, Dr. Mendel defined Fuzzy Logic and their breakthrough in this specific subject. Dr. Mendel likes

Shahabi, Cyrus

81

82 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 3, NO. 2, JULY 1999 Evolutionary Programming Made Faster  

E-print Network

82 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 3, NO. 2, JULY 1999 Evolutionary Programming Made Faster Xin Yao, Senior Member, IEEE, Yong Liu, Student Member, IEEE, and Guangming Lin Abstract step size and the probability of finding a global optimum and thus explains why FEP performs better

Yao, Xin

82

Optimal Resource Allocation for Pervasive Health Monitoring Systems  

E-print Network

Optimal Resource Allocation for Pervasive Health Monitoring Systems with Body Sensor Networks Yifeng He, Member, IEEE, Wenwu Zhu, Fellow, IEEE, and Ling Guan, Fellow, IEEE Abstract--Pervasive health monitoring is an eHealth service, which plays an important role in prevention and early detection of diseases

Chen, Ing-Ray

83

OXYGENMIT LABORATORY FOR COMPUTER SCIENCE MIT ARTIFICIAL INTELLIGENCE LABORATORY PERVASIVE, HUMAN-CENTERED COMPUTING  

E-print Network

will be pervasive, like batteries, power sockets, and the oxygen in the air we breathe. Configurable generic devices. It must adapt to change, both in user requirements and in operating conditions. It must never shut down, offices, and cars sense and affect our immediate environment. Hand-held devices, called Handy21s (H21s

Goldwasser, Shafi

84

Systems Directions for Pervasive Computing Robert Grimm, Janet Davis, Ben Hendrickson, Eric Lemar, Adam MacBeth,  

E-print Network

comput- ing space has been mapped as a combination of mobile and stationary devices that draw on powerful, Adam MacBeth, Steven Swanson, Tom Anderson, Brian Bershad, Gaetano Borriello, Steven Gribble, David applications in the pervasive computing space. In this paper, we argue that existing approaches to dis

Wetherall, David

85

A Pervasive Computing Solution to Asset, Problem and Knowledge Management Suman K. Kalia, Charles C. Tappert, Allen Stix, and Fred Grossman  

E-print Network

the effects of pervasive computing on the management of a technology Help Desk environment. The researchA Pervasive Computing Solution to Asset, Problem and Knowledge Management Suman K. Kalia, Charles C. Tappert, Allen Stix, and Fred Grossman School of Computer Science and Information Systems Pace University

Tappert, Charles

86

10 PERVASIVE computing Published by the IEEE Computer Society 1536-1268/07/$25.00 2007 IEEE Data Management  

E-print Network

, through the CDC's PulseNet database). Medical patients, including those infected with zooanotic diseases these reports into a data warehouse that would serve to provide early warning and track and manage an outbreak's evolution. But to monitor and manage an outbreak such as avian flu, many domains must be able to gather

Deshpande, Amol

87

64 PERVASIVE computing Published by the IEEE Computer Society 1536-1268/07/$25.00 2007 IEEE Privacy in Location-  

E-print Network

predict that by 2010 half of all cell phone users in the US will be using loca- tion-based services.1 with place and social context. These findings are useful for designing privacy policies and user interfaces,6 As a result, people often use new technolo- gies in unforeseen ways,7,8 which could compro- mise privacy

Kotz, David

88

JANUARY/FEBRUARY 2003 1094-7167/03/$17.00 2003 IEEE 55 Published by the IEEE Computer Society  

E-print Network

JANUARY/FEBRUARY 2003 1094-7167/03/$17.00 © 2003 IEEE 55 Published by the IEEE Computer Society N a t u r a l L a n g u a g e P r o c e s s i n g P r o c e s s i n g Intelligent Indexing of Crime Scene of documentation in a domain of considerable social importance: crime investigation. The state in which

Saggion, Horacio

89

A Clustering-based Location Privacy Protection Scheme for Pervasive Computing  

E-print Network

In pervasive computing environments, Location- Based Services (LBSs) are becoming increasingly important due to continuous advances in mobile networks and positioning technologies. Nevertheless, the wide deployment of LBSs can jeopardize the location privacy of mobile users. Consequently, providing safeguards for location privacy of mobile users against being attacked is an important research issue. In this paper a new scheme for safeguarding location privacy is proposed. Our approach supports location K-anonymity for a wide range of mobile users with their own desired anonymity levels by clustering. The whole area of all users is divided into clusters recursively in order to get the Minimum Bounding Rectangle (MBR). The exact location information of a user is replaced by his MBR. Privacy analysis shows that our approach can achieve high resilience to location privacy threats and provide more privacy than users expect. Complexity analysis shows clusters can be adjusted in real time as mobile users join or lea...

Yao, Lin; Kong, Xiangwei; Xia, Feng; Wu, Guowei

2010-01-01

90

Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile Phones  

Microsoft Academic Search

Passive RFID technology and unobtrusive Bluetooth- enabled active tags are means to augment products and everyday objects with information technology invisible to human users. This paper analyzes general interaction pat- terns in such pervasive computing settings where informa- tion about the user's context is derived by a combination of active and passive tags present in the user's environment. The concept

Frank Siegemund; Christian Fler

2003-01-01

91

R&I Research Report R 36\\/2007 Title Value networks for universal pervasive computing using smart spaces  

Microsoft Academic Search

The majority of scenarios for pervasive computing emphasizes the seamless availability of services and resources in smart spaces. This seamless availability is in its current form limited to nomadic situations where users are in trusted pre-configured smart spaces. In order to support wider availability and universal usage of smart spaces we need to have clear business models, in particular clearly

Babak Farshchian; Arild Herstad; Reidar Martin Svendsen; Erik Berg; Geir Gylterud; Stein Tore Rekdal

92

Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-based Services  

NASA Astrophysics Data System (ADS)

During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists and science fiction writers. Today this subject has become of interest to business, government, and society. Governmental authorities exercise their power through the networked environment. Credit card databases maintain our credit history and decide whether we are allowed to rent a house or obtain a loan. Mobile telephones can locate us in real time so that we do not miss calls. Within another 10 years, all sorts of devices will be connected through the network. Our fridge, our food, together with our health information, may all be networked for the purpose of maintaining diet and well-being. The Internet will move from being an infrastructure to connect computers, to being an infrastructure to connect everything [2, 3].

Soppera, A.; Burbridge, T.

93

Recent Advances in AI for Computational Sustainability AI and Sustainability Department, IEEE Intelligent Systems  

E-print Network

Recent Advances in AI for Computational Sustainability AI and Sustainability., "Computing and AI for a Sustainable Future," IEEE Intelligent Systems, vol. 27, no. 4, July/Aug 2012. Though research at the intersection of AI

Fisher, Douglas H.

94

Wireless Adaptive Therapeutic TeleGaming in a Pervasive Computing Environment  

NASA Astrophysics Data System (ADS)

This chapter introduces a wireless, pervasive computing approach to adaptive therapeutic telegaming considered in the context of near set theory. Near set theory provides a formal basis for observation, comparison and classification of perceptual granules. A perceptual granule is defined by a collection of objects that are graspable by the senses or by the mind. In the proposed pervasive computing approach to telegaming, a handicapped person (e.g., stroke patient with limited hand, finger, arm function) plays a video game by interacting with familiar instrumented objects such as cups, cutlery, soccer balls, nozzles, screw top-lids, spoons, so that the technology that makes therapeutic exercise game-playing possible is largely invisible (Archives of Physical Medicine and Rehabilitation 89:2213-2217, 2008). The basic approach to adaptive learning (AL) in the proposed telegaming environment is ethology-inspired and is quite different from the traditional approach to reinforcement learning. In biologically-inspired learning, organisms learn to achieve some goal by durable modification of behaviours in response to signals from the environment resulting from specific experiences (Animal Behavior, 1995). The term adaptive is used here in an ethological sense, where learning by an organism results from modifying behaviour in response to perceived changes in the environment. To instill adaptivity in a video game, it is assumed that learning by a video game is episodic. During an episode, the behaviour of a player is measured indirectly by tracking the occurrence of gaming events such as a hit or a miss of a target (e.g., hitting a moving ball with a game paddle). An ethogram provides a record of behaviour feature values that provide a basis a functional registry for handicapped players for gaming adaptivity. An important practical application of adaptive gaming is therapeutic rehabilitation exercise carried out in parallel with playing action video games. Enjoyable and engaging interactive gaming will motivate patients to complete the rehabilitation process. Adaptivity is seen as a way to make action games more accessible to those who have physical and cognitive impairments. The telegaming system connects to the internet and implements a feed-and-forward mechanism that transmits gaming session tables after each gaming session to a remote registry accessible to therapists and researchers. The contribution of this chapter is the introduction of a framework for wireless telegaming useful in therapeutic rehabilitation.

Peters, James F.; Szturm, Tony; Borkowski, Maciej; Lockery, Dan; Ramanna, Sheela; Shay, Barbara

95

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Drawing-based Procedural Modeling of Chinese  

E-print Network

of Chinese Architectures Fei Hou, Yue Qi, Member, IEEE and Hong Qin, Member, IEEE Abstract--This paper,000 archives of Yang Shi Lei (the family in charge of the imperial architecture construction during the Qing, China. E-mail: qy@vrlab.buaa.edu.cn · H. Qin is with the Department of Computer Science, Stony Brook

Qin, Hong

96

Rectified Catadioptric Stereo Sensors Joshua Gluckman, Member, IEEE Computer Society, and Shree K. Nayar, Senior Member, IEEE  

E-print Network

Rectified Catadioptric Stereo Sensors Joshua Gluckman, Member, IEEE Computer Society, and Shree K novel catadioptric sensors that use mirrors to produce rectified stereo images. The scan- line be satisfied to obtain rectified stereo images with a single camera. Then, we discuss in detail the use of both

Nayar, Shree K.

97

82 PERVASIVE computing 1536-1268/02/$17.00 2002 IEEE Today, mobile devices and gadgets  

E-print Network

. Refrigerators with Web pads, microwaves that download recipes, and stereo systems that mute when the phone ringsME has evolved according to the Java Commu- nity Process, a formalized process and an open

Helal, Abdelsalam

98

IEEE Pervasive Computing (Revised) Cardiovascular Monitoring Using Earphones and a Mobile Device  

E-print Network

catastrophes and treatment therapies of chronic disease. Resting heart rate, one of the simplest cardiovascular Frequent and non-invasive cardiovascular monitoring is important in surveillance for cardiovascular) for cardiovascular disease [1]. In particular, the association between accelerated resting heart rate and mortality

99

Proc. IEEE Int. Conference on Computational Photography (ICCP) 2011 Spaceborne Underwater Imaging  

E-print Network

Proc. IEEE Int. Conference on Computational Photography (ICCP) 2011 Spaceborne Underwater Imaging at multiple wavelengths indicate depth. The es- timated depth, however, changes with the albedo of the sub

Schechner, Yoav Yosef

100

IEEE COMPUTER ARCHITECTURE LETTERS, VOL. XXX, NO. XXX, XXXX 2013 1 Memristor-Based Multithreading  

E-print Network

IEEE COMPUTER ARCHITECTURE LETTERS, VOL. XXX, NO. XXX, XXXX 2013 1 Memristor-Based Multithreading in deep pipeline machines. CFMT is applicable to any execution event that can cause a pipe- line stall

Feitelson, Dror

101

The Science of Security 18 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES 1540-7993/11/$26.00 2011 IEEE MAY/JUNE 2011  

E-print Network

The Science of Security 18 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES 1540-7993/11/$26.00 © 2011 IEEE MAY/JUNE 2011 I n this article, we report a representative result in the science of security and energy (a relation- ship among physical concepts). It explains observed phenomena, such as the bending

Kaynar, Dilsun Kirli

102

Pervasive and standalone computing: the perceptual effects of variable multimedia quality  

Microsoft Academic Search

The introduction of multimedia on pervasive and mobile communication devices raises a number of perceptual quality issues, however, limited work has been done examining the 3- way interaction between use of equipment, quality of perception and quality of service. Our work measures levels of informational transfer (objective) and user satisfaction (subjective) when users are presented with multimedia video clips at

Stephen R. Gulliver; Tacha Serif; George Ghinea

2004-01-01

103

Consumers and Pervasive Retail Panos Kourouthanasis  

E-print Network

, grocery shopping anywhere and anytime becomes possible. However, deploying pervasive computing systems concentrated towards consumer perceptions of pervasive commerce systems. In this article we present the front-generation pervasive retail system. Our initial motivation for the development of a retail system using pervasive

Roussos, George

104

A Sense of Security in Pervasive ComputingIs the Light on When the Refrigerator Door Is Closed?  

NASA Astrophysics Data System (ADS)

In this paper, we investigate how existing theoretical contributions on usable security can serve to guide the design of a specific system. We illustrate how going through this theoretically informed, concrete design process, also provides the basis for complementing existing theoretical contributions. The system we have designed is a system taking advantage of pervasive computing technology to offer hotel guests access to their personal, digital materials while in a hotel room. The design is based on two ideas novel to usable security, namely falsification and the singleton invariant..

Pagter, Jakob Illeborg; Petersen, Marianne Graves

105

Managing Standards Compliance Wolfgang Emmerich, Member, IEEE Computer Society,  

E-print Network

(SPI) initiatives, ISO 9000 [16] certifications and ISO 15504 [19] trials, and 3) as a consequence-established software and systems engineer- ing standards such as ISO 12207 [17], IEEE 1074 [14], and PSS-05 [23] set

Finkelstein, Anthony

106

2012 IEEE 4th International Conference on Cloud Computing Technology and Science 978-1-4673-4510-1/12/$31.00 2012 IEEE  

E-print Network

2012 IEEE 4th International Conference on Cloud Computing Technology and Science 978Reduce applications that couples cloud computing with distributed embedded computing. Specifically, our system as Cloud services. These large- scale centers provide all sorts of computational services to a multiplicity

Hone, James

107

1550 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 16, NO. 6, DECEMBER 2008 Perceptual Reasoning for Perceptual Computing  

E-print Network

for Perceptual Computing Jerry M. Mendel, Life Fellow, IEEE, and Dongrui Wu, Student Member, IEEE Abstract subjective judgments using CWW was proposed by Mendel in 2001. It is called a Perceptual Computer (Per Angeles, CA 90089-2564 USA (e-mail: Mendel@sipi.usc.edu; dongruiw@ usc.edu). Digital Object Identifier 10

Mendle, Jerry M.

108

CIMSA 2005 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications  

E-print Network

CIMSA 2005 ­ IEEE International Conference on Computational Intelligence for Measurement Systems of Best Practices, with Application in the Petroleum Industry Shahab D. Mohaghegh1 , Razi Gaskari1 1 West of this methodology to a problem in the petroleum industry is presented. Keywords ­ Soft Computing, Best Practices

Mohaghegh, Shahab

109

To Appear in IEEE Computer -February 2003 Simulating a $2M Commercial Server  

E-print Network

1 To Appear in IEEE Computer - February 2003 Simulating a $2M Commercial Server on a $2K PC Alaa R://www.cs.wisc.edu/multifacet/ Department of Electrical and Computer Engineering Duke University Abstract Commercial workloads and methods suitable for commercial workload simulation. The Wisconsin Commercial Workload Suite currently

Xu, Min

110

8th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS)  

Microsoft Academic Search

CONFERENCE AND WORKSHOP: ECBS 2001 will be the 8th formal IEEE sponsored meeting dedicated to formulating and advancing methods, techniques and tools for the engineering of computer-based systems. This emerging discipline is devoted to the design, development, deployment, and analysis of complex systems whose behavior is largely determined or controlled by computers. CBSs are characterized by functional, performance, and reliability

Taghi Khoshgoftaar

111

Computer science curriculum 2013: reviewing the strawman report from the ACM\\/IEEE-CS task force  

Microsoft Academic Search

Beginning over 40 years ago with the publication of Curriculum 68, the major professional societies in computing--ACM and IEEE-Computer Society--have sponsored various efforts to establish international curricular guidelines for undergraduate programs in computing. As the field has grown and diversified, so too have the recommendations for curricula. There are now guidelines for Computer Engineering, Information Systems, Information Technology, and Software

Mehran Sahami; Steve Roach; Ernesto Cuadros-Vargas; David Reed

2012-01-01

112

Intelligent Pervasive Network Authentication: S\\/Key Based Device Authentication  

Microsoft Academic Search

The intelligent pervasive network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. As a number of pervasive network services are available and smart environment is expanding into ubiquitous computing environment, we need to protect intelligent pervasive environment system from illegal accesses and a variety

Deok Gyu Lee; Jong-Wook Han; Doo Soon Park; Im Yeong Lee

2009-01-01

113

38 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE Enhancing Security  

E-print Network

), and a tele- matics service provider (TSP)--perhaps a subsidiary of a vehicle manufacturer. Telematics Enhancing Security and Privacy in Traffic-Monitoring Systems I ntelligent transportation systems increas- ingly depend on probe vehicles to monitor traffic: they can automatically report posi- tion, travel time

Gruteser, Marco

114

10 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/07/$25.00 2007 IEEE Psychotherapy  

E-print Network

-Supported Psychology" sidebar). However, these approaches tend to be for particular disorders, without ther- apist, and associated disorders. Basedonaconstructivistmodel,CBT relies on the therapists' ability Cognition Outlines on Psychological Evaluation) project, we've developed a set of ubiquitous tools to sup

Antunes, Pedro

115

Sample Title 68 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE  

E-print Network

and information technologies as applied to intelligent transportation systems (see the "History of the ITSS and call for innova- tive solutions. TRAVELING IN INTELLIGENT SPACES Intelligent spaces are environments agents traveling in intelligent spaces. For example, traffic control at intersections could employ

Yang, Liuqing

116

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Image-Based Stained Glass  

E-print Network

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Image-Based Stained Glass Stephen Brooks of a work of stained glass. To this end, we develop a novel approach which involves image warping is first segmented. Each segment is subsequently transformed to match real segments of stained glass

Brooks, Stephen

117

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION 1 Coevolving Game-Playing Agents: Measuring  

E-print Network

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION 1 Coevolving Game-Playing Agents: Measuring by evolving weighted piece counter value functions to play Othello, a classic two player perfect information if such an agent did exist, care would be needed to adapt its strength to be roughly equal to the current strength

Lucas, Simon M.

118

Smart Grid Communication and Co-Simulation Vincenzo Liberatore, Member, IEEE Computer, Ahmad Al-Hammouri  

E-print Network

1 Smart Grid Communication and Co-Simulation Vincenzo Liberatore, Member, IEEE Computer, Ahmad Al in smart grid com- munication, and proposes PowerNet, a system of heterogeneous yet interoperable networks investments in software and hardware. Smart grid communication involves disparate designs and complex issues

Liberatore, Vincenzo

119

Algorithms for Storytelling Deept Kumar, Naren Ramakrishnan, Member, IEEE Computer Society,  

E-print Network

Algorithms for Storytelling Deept Kumar, Naren Ramakrishnan, Member, IEEE Computer Society, Richard F. Helm, and Malcolm Potts Abstract--We formulate a new data mining problem called storytelling and identify two expressions in this vocabulary that induce the same set of objects. Storytelling, on the other

Ramakrishnan, Naren

120

0018-9162/02/$17.00 2002 IEEE64 Computer Get Ready for  

E-print Network

0018-9162/02/$17.00 © 2002 IEEE64 Computer Get Ready for Agile Methods, with Care F aced reacted to the manifesto with scathing criticism. Real-world examples argue for and against agile methods plans. Compared to unplanned and undisciplined hack- ing, agile methods emphasize a fair amount of plan

Tappert, Charles

121

INTERNATIONAL IEEE CONFERENCE ON COMPUTER SCIENCES -RIVF'06 1 Analysis of Nasopharyngeal Carcinoma Data with a  

E-print Network

INTERNATIONAL IEEE CONFERENCE ON COMPUTER SCIENCES - RIVF'06 1 Analysis of Nasopharyngeal Carcinoma to recover the original structure from data. The algorithm is then applied on the Nasopharyngeal carcinoma learning method to a real world epidemiological problem, namely the Nasopharyngeal Carcinoma (NPC

Paris-Sud XI, Université de

122

On Computing Farthest Dominated Locations Hua Lu, Member, IEEE, Man Lung Yiu  

E-print Network

1 On Computing Farthest Dominated Locations Hua Lu, Member, IEEE, Man Lung Yiu Abstract--In reality') spatial objects P, a set of (candidate) locations L, and a quality vector as design competence (for L), the farthest dominated location query (FDL) retrieves the location s L such that the distance to its nearest

Yiu, Man Lung

123

IEEE TRANSACTIONS ON MOBILE COMPUTING 1 A Location-Privacy Threat Stemming from the  

E-print Network

--Location Privacy; Network Address Translation (NAT); IP-Geolocation ! 1 INTRODUCTION AS mobile users benefit from and extended version of a paper that appears in the Proceedings of the 13th Privacy Enhancing Technologies SymIEEE TRANSACTIONS ON MOBILE COMPUTING 1 A Location-Privacy Threat Stemming from the Use of Shared

Petitpierre, Claude

124

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Blood Flow Clustering and Applications in  

E-print Network

Fluid Dynamics (CFD) simulations of blood flow based on patient-individual data are performed to betterIEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Blood Flow Clustering and Applications, Holger Theisel, Bernhard Preim Abstract--Understanding the hemodynamics of blood flow in vascular

125

Authentication for Pervasive Computing Sadie Creese 1 , Michael Goldsmith 3;4 , Bill Roscoe 2;3 , and Irfan Zakiuddin 1  

E-print Network

be encountered. 1 Introduction 1.1 Ambient Intelligence and Security. The Ambient Intelligence World will be surrounded by intelligent, intuitive, interfaces capable of provid- ing information and communication intelligent computing environment. In the future pervasive networking technologies will become commonplace

Roscoe, Bill

126

SelfRouting in Pervasive Computing Environments using Smart Messages # Cristian Borcea 1 , Chalermek Intanagonwiwat 1 , Akhilesh Saxena 1 , and Liviu Iftode 2  

E-print Network

Self­Routing in Pervasive Computing Environments using Smart Messages # Cristian Borcea 1 Science University of Maryland College Park, MD, 20742, USA iftode@cs.umd.edu Abstract Smart Messages (SMs the ITR Grant Number ANI­0121416 on a highway cooperating to adapt to the traffic conditions. Sensor

Rutgers University

127

Interactive Narrative 30 May/June 2006 Published by the IEEE Computer Society 0272-1716/06/$20.00 2006 IEEE  

E-print Network

computer games have (or would like to have) rich, non- linear plotlines with multiple end- ings, complexInteractive Narrative 30 May/June 2006 Published by the IEEE Computer Society 0272 dramas, story-based experiences where a player interacts with and influences a story. Many modern

California at Santa Cruz, University of

128

Studying the Elusive Experience in Pervasive Games  

ERIC Educational Resources Information Center

Studying pervasive games is inherently difficult and different from studying computer or board games. This article builds upon the experiences of staging and studying several playful pervasive technology prototypes. It discusses the challenges and pitfalls of evaluating pervasive game prototypes and charts methods that have proven useful in

Stenros, Jaakko; Waern, Annika; Montola, Markus

2012-01-01

129

Pervasive and Mobile Computing ( ) Contents lists available at SciVerse ScienceDirect  

E-print Network

persuasion systems [4,7,10­12] explore social effects in their feedback design. Studies [7,13] have shown from the design and evaluation of a social persuasion system Meng-Chieh Chiua, , Cheryl Chia-Hui Chenb Keywords: Persuasive technology Ubiquitous computing Social persuasion Mobile computing Activity

Huang, Polly

130

Elsevier Editorial System(tm) for Pervasive and Mobile Computing Manuscript Draft  

E-print Network

athletes is an important com- ponent of their training. In this paper we describe an application that per. Introduction Recently, motivated by ever increasing levels of interaction between humans and computing devices, context aware computing has received extensive re- 6The authors acknowledge the staff and athletes

Shamir, Ron

131

74 Published by the IEEE Computer Society 1089-7801/09/$26.00 2009 IEEE IEEE INTERNET COMPUTING InternetofThingsTrack  

E-print Network

to the real world is the Internet of Things,2 which connects such resources with everyday objects's based on the Internet of Things and its technologies. Their framework for integrating Web services-Essen Heinrich Hu?mann University of Munich Perci: Pervasive Service Interaction with the Internet of Things #12

132

Pervasive and Mobile Computing 10 (2014) 203221 Contents lists available at ScienceDirect  

E-print Network

persuasion systems [4,7,10­12] explore social effects in their feedback design. Studies [7,13] have shown: Lessons learned from the design and evaluation of a social persuasion system Meng-Chieh Chiua, , Cheryl online 29 April 2013 Keywords: Persuasive technology Ubiquitous computing Social persuasion Mobile

Ouhyoung, Ming

133

"Making Use of Serendipity: A new Direction for Pervasive Computing from a  

E-print Network

-hua Chu ( ) Computer Science & Information Engineering Department National Taiwan University #12;A few words ... · This talk is an adventure for me in the psychology department. ­ Not sure why I said yes so as much as you do. ­ who are also planning to take an adventure trip to Africa. ­ who also saw the movie

Ouhyoung, Ming

134

Pervasive and Mobile Computing 1 (2005) 157189 www.elsevier.com/locate/pmc  

E-print Network

'Hallarona aSchool of Computer Science, Carnegie Mellon University, Pittsburgh PA, United States bIntel Research Pittsburgh, Pittsburgh PA, United States Received 1 March 2005; accepted 23 March 2005 Available, 5000 Forbes Avenue, 15213 Pittsburgh, PA, United States. Tel.: +1 412 268 3743; fax: +1 412 268 4136. E

Shewchuk, Jonathan

135

PERPLEXUS: Pervasive Computing Framework for Modeling Complex Virtually-Unbounded Systems  

Microsoft Academic Search

This paper introduces Perplexus, a European project that aims to develop a scalable hardware platform made of custom reconfigurable devices endowed with bio-inspired capabilities. This platform will enable the simulation of large-scale complex systems and the study of emergent complex behaviors in a virtually unbounded wireless network of computing modules. The final infrastructure will be used as a simulation tool

Eduardo Sanchez; Andrs Prez-uribe; Andres Upegui; Yann Thoma; Juan Manuel Moreno; Alessandro E. P. Villa; Henri Volken; Andrzej Napieralski; Gilles Sassatelli; Erwan Lavarec

2007-01-01

136

1 Mobile, Distributed, and Pervasive Michel Barbeau  

E-print Network

, and distributed computing are key technologies to support perva- sive computing. This chapter is about software technologies designed to address problems in mobile, distributed, and pervasive computing. Characteristics open communication technologies to support pervasive computing are presented in detail, namely, service

Barbeau, Michel

137

1541-1672/08/$25.00 2008 IEEE IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society  

E-print Network

n t h e Features Editor: Dennis Taylor dtaylor@computer.org "A lot of the early work in game AI has and utterances extracted N e w sALSo FEATurEd The Year The Power Grid GoT SmarTer Toward More Human Video Game University of Ap- plied Sciences, who wrote Programming Believable Characters for Computer Games (Charles

138

IEEE TRANSACTIONS ON COMPUTERS, VOL. C-26, NO. 12, DECEMBER 1977 further investigation into other technologies (I2L) and with  

E-print Network

IEEE TRANSACTIONS ON COMPUTERS, VOL. C-26, NO. 12, DECEMBER 1977 further investigation into other. Comput., vol. C-24, pp. 1101-1104, Nov. 1975. [61 D. Etiemble and M. Israel, "Noise margins circuits," IEEE Trans. Comput., vol. C-26, pp. 281-288, Mar. 1977. [8] The TTL Data Book for Design

Stanford University

139

IEEE TRANSACTIONS ON COMPUTERS, VOL. c-30, NO. 12, DECEMBER 1981 PASM: A Partitionable SIMD/MIMD System  

E-print Network

IEEE TRANSACTIONS ON COMPUTERS, VOL. c-30, NO. 12, DECEMBER 1981 PASM: A Partitionable SIMD/or MIMD machines. PASM consists of a parallel computation unit, which contains N processors, N memories systems, multiple-SIMD machines, parallel processing, partitionable computer systems, PASM, recon

140

IEEE TRANSACTIONS ON COMPUTERS, AUGUST 1974 Property 8  

E-print Network

, "Dynamic storage allocation system,"Commun. Ass. Comput. Mach., yol. 11, pp. 297-305, May 1968. [3] P. J, and J. D. Ullman, "Principles of optimalgage replacement," J. Ass. Comput. Mach., vol. 18, pp. 80-93, [5] P. J. Denning, "The working set model for program behavior,"Commun. Ass. Comput. Mach., vol. 11, pp

Stanford University

141

Proceedings IEEE Visualization 2000, pages 441444. cIEEE Computer Society Press, 2000. A Computational Steering System for Studying  

E-print Network

. A Computational Steering System for Studying Microwave Interactions with Missile Bodies J. Edward Swan II½ Marco that supports computational steering, which is an effort to make the typical simulation workflow more efficient, Computational Steering, Inverse Steering, Virtual Reality 1 Introduction This paper describes computational

Swan II, J. Edward

142

0018-9162/05/$20.00 2005 IEEE70 Computer C O V E R F E A T U R E  

E-print Network

and interpreting particular US gov- ernment regulations have become easier in recent years. For example, Business.gov0018-9162/05/$20.00 © 2005 IEEE70 Computer C O V E R F E A T U R E Published by the IEEE Computer and reconcile multiple authoritative sources. For example, US companies frequently must com- ply

Stanford University

143

IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. X, NO. X, XXXX 201X 1 Oruta: Privacy-Preserving Public Auditing  

E-print Network

IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. X, NO. X, XXXX 201X 1 Oruta: Privacy-Preserving Public--Public auditing, privacy-preserving, shared data, cloud computing. 1 INTRODUCTION CLOUD service providers offer verifiers. In this paper, we propose a novel privacy-preserving mechanism that supports public auditing

Li, Baochun

144

IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, AUGUST 200X 1 A Policy-Oriented Architecture for Opportunistic  

E-print Network

, and Supratik Bhattacharya2 1School of Computer Science 2Sprint Advanced Technology Lab University of Waterloo-layer policies of past work. Session-layer policy definitions allow us to include a delay component (suchIEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, AUGUST 200X 1 A Policy-Oriented Architecture

Prasad, Sanjiva

145

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. XX, NO. Y, MONTH 1998 1 Modeling of Ship Trajectory in Collision  

E-print Network

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. XX, NO. Y, MONTH 1998 1 Modeling of Ship and other moving ships, the problem of avoiding collisions is reduced to a dynamic optimiza- tion task system. This new extension of EP/N computes a safe-optimum path of a ship in given static and dy- namic

Michalewicz, Zbigniew

146

2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any c  

E-print Network

.ieee.org/web/publications/rights/index.html. MOBILE AND UBIQUITOUS SYSTEMS www.computer.org/pervasive Hacking, Mashing, Gluing: Understanding T I O N Hacking, Mashing, Gluing: Understanding Opportunistic Design Björn Hartmann, Scott Doorley. Although many ubiquitous computing practitioners have engaged in these practices, design tools and software

Pratt, Vaughan

147

Proceedings of the IEEE international conference on computers  

SciTech Connect

This book presents the papers given at a conference on array processors and supercomputers. Topics considered at the conference included fault-tolerant systolic arrays, computer architecture, systolic processing, algorithms, performance, sorting, monitoring, parallel processing, speech recognition, vector processing, VLSI, image processing, and data-flow processing.

Not Available

1985-01-01

148

A semantic approach for building pervasive spaces  

Microsoft Academic Search

Large and pervasive sensing, communications, and computing infrastructures are enabling the realization of pervasive spaces. Enabling such spaces, however, encompasses a set of challenges. First, programming each application such that it connects to each sensor and it interprets the data being sensed requires a concentration of expertise that is rarely available. Second, achieving a wise and fair usage of the

Daniel Massaguer; Sharad Mehrotra; Nalini Venkatasubramanian

2009-01-01

149

IEEE Transactions on Computational Intelligence and AI in Games (Special Issue on Brain/Neuronal-Computer Games Interfaces and Interaction), 2013, in press.  

E-print Network

, the broader use of the P300 BCI in BCI-controlled video games is recommended. Index Terms--Brain computer [4], [5]. BCI-controlled games (primarily video games) constitute an area that may meet the interestsIEEE Transactions on Computational Intelligence and AI in Games (Special Issue on Brain

Kaplan, Alexander

150

76 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 2014 IEEE Smartphones Editor: Roy Want n Google n roywant@acm.org  

E-print Network

. Improving Battery Technology Over the last 30 years, recharge- able battery energy capacities have increased are cre- ated--as long as a day's use is possible. However, the improvement of battery technology has been. The reality is that it's hard to make a better battery that's both high capacity and safe. In fact, even Li

Cortes, Corinna

151

52 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 2014 IEEE A Secure Supply-Chain  

E-print Network

of several meters--even with no line of sight between the tag and the reader. Although the increased data in multiple locations and searching for any RFID tags a person carries, such as RFID-tagged clothes increases with the potential dam- age to users and the potential gain to attack- ers.3 Encrypting

Wool, Avishai

152

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 4, NO. 1, MARCH 2012 1 A Survey of Monte Carlo Tree Search Methods  

E-print Network

, Computer Go. ! 1 INTRODUCTION MONTE Carlo Tree Search (MCTS) is a method for finding optimal decisions A Survey of Monte Carlo Tree Search Methods Cameron Browne, Member, IEEE, Edward Powley, Member, IEEE that the field is ripe for future work. Index Terms--Monte Carlo Tree Search (MCTS), Upper Confidence Bounds (UCB

Lucas, Simon M.

153

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 3, NO. 1, MARCH 2011 43 Reinforcement Learning in First Person  

E-print Network

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 3, NO. 1, MARCH 2011 43 Reinforcement Learning in First Person Shooter Games Michelle McPartland and Marcus Gallagher, Member, IEEE in learning how to play classic style games. Applying RL to first person shooter (FPS) games is an interesting

Gallagher, Marcus

154

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 2, APRIL 2009 229 Multiobjective Groundwater Management  

E-print Network

Groundwater Management Using Evolutionary Algorithms Tobias Siegfried, Stefan Bleuler, Marco Laumanns, Member, IEEE, Eckart Zitzler, Member, IEEE, and Wolfgang Kinzelbach Abstract--Sustainable management of groundwater resources is of crucial importance for regions where freshwater supply is nat- urally limited

Zitzler, Eckart

155

96 IEEE Annals of the History of Computing Published by the IEEE Computer Society 1058-6180/04/$20.00 2004 IEEE Think Piece  

E-print Network

, relevant explanations of how the computer shapes, and is shaped by, modern society. This being said scholarship in the history of technolo- gy has been the realization that technological change is as much" of the computer revolution's unprecedented sci- entific and technological accomplishments. If in practice, its

Ensmenger, Nathan

156

GUEST EDITOR'S INTRODUCTION Published by the IEEE Computer Society 0018-9162/11/$26.00 2011 IEEE  

E-print Network

-9162/11/$26.00 © 2011 IEEE phones, cameras, and TVs into smart devices. Super- fast wired and wireless networks make), tablets (foot), and Web-enabled televisions (yard) dramatically changing the Internet landscape. Moreover while keeping your current job. CybErsECUrity DEFEAt CybEr CriMinAls. AnD yoUr Co

Tomkins, Andrew

157

FROM THE AREA EDITOR Published by the IEEE Computer Society 0018-9162/09/$26.00 2009 IEEE  

E-print Network

IEEE About three years ago, Netflix, the movie rental com- pany, announced a $1 million prize upon Netflix's proprietary system by at least 10 percent. Some have hailed the competition as a clever example of crowd- sourcing, but there is no denying that Netflix's release of a more than 100-million

Ramakrishnan, Naren

158

6 COMPUTER Published by the IEEE Computer Society 0018-9162/14/$31.00 2014 IEEE SPOTLIGHT ON TRANSACTIONS  

E-print Network

- ventional telematics solutions use a radar-type mechanism that detects an obstacle ahead of a vehicle. But if we flood the system with alarm messages, starting from the crash scene out to each vehicle, it could and is a promising ap- proach to implementing a warning system in vehicles. Song Guo is a professor of computer

Stojmenovic, Ivan

159

13-th IEEE International Conference on Peer-to-Peer Computing Information Propagation in the Bitcoin Network  

E-print Network

13-th IEEE International Conference on Peer-to-Peer Computing Information Propagation in the Bitcoin Network Christian Decker, Roger Wattenhofer ETH Zurich, Switzerland cdecker currencies does not rely on a centralized authority. Instead Bit- coin relies on a network of volunteers

160

IEEE TRANSACTIONS ON COMPUTERS, VOL. c-24, NO. 5, MAY 1975 Fault Masking in Combinational Logic Circuits  

E-print Network

investigates the masking relations among faults in a combinational logic circuit. For this purpose a transform for the circuit is defined and a model for fault analysis is constructed. This transform and model reduceIEEE TRANSACTIONS ON COMPUTERS, VOL. c-24, NO. 5, MAY 1975 Fault Masking in Combinational Logic

Stanford University

161

IEEE TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, TCBB-2014-03-0071 1 A Deep Learning Network Approach to ab  

E-print Network

IEEE TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, TCBB-2014-03-0071 1 A Deep Learning that have traditionally employed neural networks are experimenting with novel deep learning techniques prediction, we wanted to determine whether deep learning could contribute to the advancement of this field

Cheng, Jianlin Jack

162

IEEE/ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS 1 Network-Based Drug-Target Interaction  

E-print Network

IEEE/ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS 1 Network-Based Drug Getoor Abstract--Drug-target interaction studies are important because they can predict drugs' unexpected using a bipartite graph of drug-target interactions augmented with drug-drug and target

Getoor, Lise

163

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, VOL. XX, NO. X, XXXX 20XX 1 Big Data Opportunities and Challenges  

E-print Network

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, VOL. XX, NO. X, XXXX 20XX 1 Big Data Opportunities, and Graham J. Williams Abstract--"Big Data" as a term has been among the biggest trends of the last three and perspectives of the authors relating to the new opportunities and challenges brought forth by the big data

Jin, Yaochu

164

1050 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 17, NO. 4, JULY 2006 Real-Time Computing Platform for  

E-print Network

1050 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 17, NO. 4, JULY 2006 Real-Time Computing Platform where the synapses are modeled as input-driven conductances. The temporal dynamics of the synaptic, where the different stages of the neuron model are processed in parallel. Further improvements occur

Eduardo, Ros

165

1414 IEEE TRANSACTIONS ON MAGNETICS, VOL. 47, NO. 5, MAY 2011 Ships Magnetic Anomaly Computation With Integral Equation and Fast  

E-print Network

1414 IEEE TRANSACTIONS ON MAGNETICS, VOL. 47, NO. 5, MAY 2011 Ships Magnetic Anomaly Computation) and a fast multipole algorithm (FMM) in order to model ships magnetic anomaly. complex geometries of real, magnetostatics, marine technology. I. INTRODUCTION ANAVAL vessel, magnetized in the earth's magnetic field

Paris-Sud XI, Université de

166

IEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 55, NO. 1, FEBRUARY 2008 501 Neutron Stimulated Emission Computed Tomography  

E-print Network

and malignant samples, which were confirmed through neutron activation analysis (NAA). Statistically significantIEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 55, NO. 1, FEBRUARY 2008 501 Neutron Stimulated Emission. Pedroni, and Carey E. Floyd, Jr. Abstract--Neutron stimulated emission computed tomography (NSECT

167

2 Published by the IEEE Computer Society 1089-7801/12/$31.00 2012 IEEE IEEE INTERNET COMPUTING teve Jobs changed the world. He did amazing  

E-print Network

not only developed technology but also innovated business models, and to point-out one world-changing COMPUTING S teve Jobs changed the world. He did amazing work and produced amazing products that went from cult to mainstream. But what does that mean, that he "changed the world"? This is interesting

Petrie, Charles

168

ScaleMirror: A Pervasive Device to Aid Weight Analysis  

E-print Network

ScaleMirror: A Pervasive Device to Aid Weight Analysis Abstract As today's fast paced environment and control weight gain. With the advent of pervasive and ubiquitous computing, there are new opportunities and creation of ScaleMirror; a prototype pervasive device to help users monitor their weight. This awareness

Connelly, Kay

169

Proc. Computer Vison and Pattern Recognition (CVPR'99), Fort Collins, CO, USA, 23-25 June 1999, IEEE Computer Society PR00149, pp. 402407  

E-print Network

. The applica- tion scenario we have in mind is the registration of local changes in medical images due, IEEE Computer Society PR00149, pp. 402­407 Elastic Registration of Medical Images Using Radial Basis for elastic registration of medical images. With these basis functions the influence of a landmark

Hamburg,.Universität

170

Pervasive software development method  

Microsoft Academic Search

Software development methods aim at solving the software crisis. Many presented methods gain reputations under special application environments. There are so many kinds of methods that developers are troubled when choosing the most suitable one. This article presents a pervasive software development method aiming at helping developers deal with the trouble. The pervasive method advocates logicality, comprehensiveness, flexibility and self-improvement

Yu Wang; Xianguo Tuo

2010-01-01

171

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS AND CONTROL INSTRUMENTATION, VOL. JECI-14, NO. 1, APRIL 1967 A Study of the Applications of Analog Computers  

E-print Network

1967 A Study of the Applications of Analog Computers V. P. KODALI, MEMBER, IEEE Abstract-An electronic analog computer is a tool for solving mathematical differential equations. The basis for the use of such a computer in the simulation of many scientific and engineering prob- lems is the possibility

Leach Jr.,W. Marshall

172

A Framework for Safe Composition of Heterogeneous SOA Services in a Pervasive Computing Environment with Resource Constraints  

ERIC Educational Resources Information Center

The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.

Reyes Alamo, Jose M.

2010-01-01

173

JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, VOL. 1, NO. 2, JUNE 2005 89 Blind Source Separation of Acoustic Signals  

E-print Network

, Fukushima 965-8580, Japan AND Brain Science Institute, RIKEN, Saitama 351-0198, Japan Email: sding@u-aizu.ac.jp ANDRZEJ CICHOCKI Brain Science Institute, RIKEN, Saitama 351-0198, Japan JIE HUANG AND DAMING WEI Department of Computer Software, The University of Aizu, Tsuruga, Ikki-machi, Aizu-Wakamatsu City, Fukushima

Vialatte, François

174

84 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 12, NO. 1, FEBRUARY 2004 Computing Derivatives in Interval  

E-print Network

in Interval Type-2 Fuzzy Logic Systems Jerry M. Mendel, Life Fellow, IEEE Abstract--This paper makes type-2 Engineering, University of Southern California, Los Angeles, CA 90089-2564 USA (e-mail: mendel

Mendle, Jerry M.

175

Performance evaluation of a decision-theoretic approach for quality of experience measurement in mobile and pervasive computing scenarios  

Microsoft Academic Search

Measuring and predicting users quality of experience (QoE) in dynamic network conditions is a challenging task. This paper presents results related to a decision-theoretic methodology incorporating Bayesian networks (BNs) and utility theory for quality of experience (QoE) measurement and prediction in mobile computing scenarios. In particular, we show how both generative and discriminative BNs can be used to measure and

Karan Mitra; Christer Ahlund; Arkady Zaslavsky

2012-01-01

176

Using Digital Computer Field Mapping of Outcrops to Examine the Preservation of High-P Rocks During Pervasive, Retrograde Greenschist Fluid Infiltration, Tinos, Cyclades Archipelago, Greece  

NASA Astrophysics Data System (ADS)

Digital field mapping of outcrops on the island of Tinos, Greece, was undertaken to investigate the nature of retrograde fluid infiltration during exhumation of high-P metamorphic rocks of the Attic-Cycladic blueschist belt. High-resolution digital photographs of outcrops were taken and loaded into graphics editing software on a portable, belt-mounted computer in the field. Geologic features from outcrops were drawn and labeled on the digital images using the software in real-time. The ability to simultaneously identify geologic features in outcrops and digitize those features onto digital photographs in the field allows the creation of detailed, field-verified, outcrop-scale maps that aid in geologic interpretation. During Cretaceous-Eocene subduction in the Cyclades, downgoing crustal material was metamorphosed to eclogite and blueschist facies. Subsequent Oligocene-Miocene exhumation of the high-P rocks was accompanied by pervasive, retrograde fluid infiltration resulting in nearly complete greenschist facies overprinting. On Tinos, most high-P rocks have undergone intense retrogression; however, adjacent to thick marble horizons with completely retrograded contact zones, small (sub km-scale) enclaves of high-P rocks (blueschist and minor eclogite facies) were preserved. Field observations suggest that the remnant high-P zones consist mostly of massive metabasic rocks and minor adjacent metasediments. Within the enclaves, detailed digital outcrop maps reveal that greenschist retrogression increases in intensity outward from the center, implying interaction with a fluid flowing along enclave perimeters. Permeability contrasts could not have been solely responsible for preservation of the high-P rocks, as similar rock suites distal to marble contacts were completely overprinted. We conclude that the retrograded contacts of the marble units served as high-permeability conduits for regional retrograde fluid flow. Pervasive, layer-parallel flow through metasediments would have been drawn into these more permeable flow channels. Deflections in fluid flow paths toward the high flux contacts likely caused retrograde fluids to flow around the enclaves, preserving the zones of "dry," unretrograded high-P rocks near marble horizons. Digital mapping of outcrops is a unique method for direct examination of the relationships between geologic structure, lithology, and mineral assemblage variation in the field. Outcrop mapping in the Attic-Cycladic blueschist belt has revealed that regional fluid flow along contacts can have important implications for the large-scale distribution of mineral assemblages in metamorphic terranes.

Breeding, C. M.; Ague, J. J.; Broecker, M.

2001-12-01

177

2007 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology  

Microsoft Academic Search

This symposium will bring together top researchers, practitioners, and students from around the world to discuss the latest advances in the field of computational intelligence and their application to real-world problems in biology. Computational Intelligence includes artificial neural nets, fuzzy logic, evolutionary algorithms, and other emerging techniques. Topics of interest include but are not limited to: gene expression array analysis,

Gary B. Fogel; Scott Smith; Kay C. Wiese; Publicity Co-Chairs

178

IEEE Transactions on Evolutionary Computation Special Issue on Evolutionary Computation in Scheduling  

E-print Network

timetabling (educational timetabling, railway scheduling, sports scheduling and project scheduling, etc: Evolutionary computation in: - Production scheduling - Personnel scheduling - Sports scheduling - Educational and practice, having relevance across a wide range of disciplines including operations research, artificial

Qu, Rong

179

1536-1268/06/$20.00 2006 IEEE Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 25 R F I D T E C H N O L O G Y  

E-print Network

is a LoJack device attached to a car, which incorpo- rates cellular technology and a GPS to locate the car chip attached to the antenna, and some form of encapsulation. The tag reader is responsible for pow's chip coordinates this process). The encap- sulation maintains the tag's integrity and protects

Han, Richard Y.

180

62 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE R F I D T E C H N O L O G Y  

E-print Network

transmission.1 In 1935, Alexander Watson- Watt showed how his new invention, radar, could use radio waves F I D T E C H N O L O G Y The Evolution of RFID Security S ince its invention in the 1940s, RFID has was the advent of radio technology. Since Guglielmo Marconi first transmitted radio signals across the Atlantic

Tanenbaum, Andrew S.

181

1536-1268/04/$20.00 2004 IEEE Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 15 S U C C E S S F U L A G I N G  

E-print Network

S U C C E S S F U L A G I N G Automated Analysis of Nursing Home Observations O ur society. Five percent of Americans over 65 currently reside in nursing homes, with 20 to 50 percent of those over 85 expecting to be placed in a nursing home at some point in their lives.1,2 At Carnegie Mellon

Wactlar, Howard D.

182

F E A T U R E 1089-7801/97/$10.00 1997 IEEE IEEE INTERNET COMPUTING  

E-print Network

on the Web is to launch a Web robot (also called a wanderer, worm, walker, spider, or knowbot).These software index built and updated periodically by Web robots. The index is a search- able archive that gives- municate, it is possible for a robot executing on a single computer to traverse the entire Web

Raghavan, Vijay

183

Systems Directions for Pervasive Computing  

E-print Network

format ­ Rely on a common core API · But data and functionality depend on each other ­ Migrating ­ Are self-describing records ­ Define common data model, type system ­ Enable a common query language · Components implement functionality ­ Export and import event handlers ­ Are distributed in a common binary

Grimm, Robert

184

IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. ?, NO. ?, SEPTEMBER 2011 1 Estimation of Task Persistence Parameter from  

E-print Network

Persistence Parameter from Pervasive Medical Systems with Censored Data Yannick Fouquet, C´eline Franco, Bruno Diot, Jacques Demongeot and Nicolas Vuillerme Abstract--This paper compares two statistical models. When data missed or errors occurred, an estimate of the joint probabilities of these random variables

Fouquet, Yannick

185

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, MANUSCRIPT ID 1 The Five W's for Information Visualization  

E-print Network

's for Information Visualization with Application to Healthcare Informatics Zhiyuan Zhang, Student Member, IEEE, Bing significantly lower the time and effort needed to access the medical patient information required to arrive these views via cross-filtering [32] and brushing [6] is the key to successful information (and data

Mueller, Klaus

186

Transforming Agriculture through Pervasive Wireless Sensor Networks  

Microsoft Academic Search

A large-scale, outdoor pervasive computing system uses static and animal-borne nodes to measure the state of a complex system comprising climate, soil, pasture, and animals. Agriculture faces many challenges, such as climate change, water shortages, labor shortages due to an aging urbanized population, and increased societal concern about issues such as animal welfare, food safety, and environmental impact. Humanity depends

Tim Wark; Peter I. Corke; Pavan Sikka; Lasse Klingbeil; Ying Guo; Christopher Crossman; Philip Valencia; Dave Swain; Greg Bishop-hurley

2007-01-01

187

Personal Pervasive Environments: Practice and Experience  

PubMed Central

In this paper we present our experience designing and developing two different systems to enable personal pervasive computing environments, Plan B and the Octopus. These systems were fully implemented and have been used on a daily basis for years. Both are based on synthetic (virtual) file system interfaces and provide mechanisms to adapt to changes in the context and reconfigure the system to support pervasive applications. We also present the main differences between them, focusing on architectural and reconfiguration aspects. Finally, we analyze the pitfalls and successes of both systems and review the lessons we learned while designing, developing, and using them. PMID:22969340

Ballesteros, Francisco J.; Guardiola, Gorka; Soriano, Enrique

2012-01-01

188

0018-9162/05/$20.00 2005 IEEE64 Computer C O V E R F E A T U R E  

E-print Network

-generation pervasive computing systems lack the ability to evolve as new technologies emerge or as an application the traditional programmer model. Our approach enables domain experts--for exam- ple, health professionals. In collaboration with the university's College of Public Health and Health Professions, and with fed- eral funding

Helal, Abdelsalam

189

0018-9162/05/$20.00 2005 IEEE50 Computer C O V E R F E A T U R E  

E-print Network

-generation pervasive computing systems lack the ability to evolve as new technologies emerge or as an application the traditional programmer model. Our approach enables domain experts--for exam- ple, health professionals. In collaboration with the university's College of Public Health and Health Professions, and with fed- eral funding

Chen, Yuanzhu Peter

190

To appear in Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition 1996. What is the Set of Images of an Object  

E-print Network

To appear in Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition 1996. What is the Set of Images of an Object Under All Possible Lighting Conditions? Peter N. Belhumeur David J of images of an object un- der all lighting conditions and pose? In this paper, we consider only the set

Jaffe, Jules

191

64 IEEE ComputatIonal IntEllIgEnCE magazInE | august 2013 Kyung-Joong Kim Sejong University,  

E-print Network

64 IEEE ComputatIonal IntEllIgEnCE magazInE | august 2013 Kyung-Joong Kim Sejong University, So. CI educators have been used different types of tools to define course projects for stu- dents, making it difficult to share them. Furthermore, if the projects are dependent on special hardware or soft

Cho, Sung-Bae

192

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 9, SEPTEMBER 2008 1571 Model Order Reduction of Parameterized  

E-print Network

-Directional Arnoldi Process Yung-Ta Li, Zhaojun Bai, Yangfeng Su, and Xuan Zeng, Member, IEEE Abstract--This paper August 20, 2008 (projected). The work of Y.-T. Li and Z. Bai was supported in part by the National. Bai is with the Department of Computer Science and Department of Mathematics, University of California

Bai, Zhaojun

193

Proceedings of 12th IEEE International Conference on Computer Communications and Networks (ICCCN), 2003 Effect of TCP on Self-Similarity of Network Traffic  

E-print Network

Proceedings of 12th IEEE International Conference on Computer Communications and Networks (ICCCN), 2003 1 Effect of TCP on Self-Similarity of Network Traffic Nawaporn Wisitpongphan, Jon M. Peha Carnegie Markovian models such as the Poisson process. In this work, we simulate a simple network with a full

Peha, Jon M.

194

IEEE TRANSACTIONS ON NANOBIOSCIENCE SPECIAL ISSUE/SPECIAL TOPIC SECTION ON "COMPUTATIONAL NANOBIOSCIENCE" 1 Informative SNP Selection Methods Based on SNP  

E-print Network

NANOBIOSCIENCE" 1 Informative SNP Selection Methods Based on SNP Prediction Jingwu He, Member, IEEE of the SNPs. Tag SNP selection can achieve (i) considerable budget savings by genotyping only a limited number of SNPs and computationally inferring all other SNPs or (ii)necessary reduction of the huge SNP sets

Zelikovsky, Alexander

195

Metrics for Human Driving of Multiple Robots Dan R. Olsen Jr, Member IEEE Computer Society, Stephen Bart Wood, and Jonathan Turner  

E-print Network

Metrics for Human Driving of Multiple Robots Dan R. Olsen Jr, Member IEEE Computer Society, Stephen Bart Wood, and Jonathan Turner Abstract--A goal of human-robot interaction is to expand the capability of human beings so that they can control multiple robots simultaneously. This provides leverage for human

Olsen Jr., Dan R.

196

754 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 4, AUGUST 2009 From Fireflies to Fault-Tolerant Swarms of Robots  

E-print Network

754 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 4, AUGUST 2009 From Fireflies inspiration from the synchronized flashing behavior observed in some species of fireflies. We derive a completely decentralized algorithm to detect non-operational robots in a swarm robotic system. Each robot

Libre de Bruxelles, Université

197

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 1, NO. 2, JUNE 2009 1 Rapid and Reliable Adaptation of  

E-print Network

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 1, NO. 2, JUNE 2009 1 Rapid and Reliable Adaptation of Video Game AI Sander Bakkes, Pieter Spronck, and Jaap van den Herik Abstract--Current approaches to adaptive game AI typically require numerous trials to learn effective behaviour (i.e., game

Spronck, Pieter

198

Proceedings of the 10th International Conference on Computer Supported Cooperative Work in Design 1-4244-0165-8/06/$20.00 2006 IEEE.  

E-print Network

insights about workspace collaboration, not cov- ered by other evaluation methods [1]. The advantagesProceedings of the 10th International Conference on Computer Supported Cooperative Work in Design 1-4244-0165-8/06/$20.00 ©2006 IEEE. Quantitative Evaluation of Workspace Collaboration Antonio Ferreira, Pedro Antunes

Antunes, Pedro

199

Kothe, C., Onton, J., Makeig, S. "Emotion Recognition from EEG During Self-Paced Emotional Imagery." In proceedings of: Affective Brain-Computer Interfaces (aBCI) Workshop, IEEE Affective Computing and Intelligent Interaction 2013, Geneva  

E-print Network

Kothe, C., Onton, J., Makeig, S. "Emotion Recognition from EEG During Self-Paced Emotional Imagery." In proceedings of: Affective Brain-Computer Interfaces (aBCI) Workshop, IEEE Affective Computing and Intelligent Interaction 2013, Geneva Switzerland, 2013 Emotion Recognition from EEG During Self-Paced Emotional Imagery

Makeig, Scott

200

Your Way Your Missions: A Location-Aware Pervasive Game Exploiting the Routes of Players  

Microsoft Academic Search

With the development of pervasive computing, location-aware pervasive games have proliferated quickly. To counter the inefficiency of information adaptation based on a location and a radius, this paper presents the design and implementation of Your Way Your Missions (YWYM), which is a location-aware pervasive game exploiting the routes of players. YWYM provides a Google Maps based tool for players to

Ling Chen; Gencai Chen; Steve Benford

2012-01-01

201

8 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$25.00 2009 IEEE Wearable ComputingEditor: Paul Lukowicz n University of Passau n paul.lukowicz@uni-passau.de  

E-print Network

with a Linux-base Pentium-M 2.0-GHz, 2-Gbyte RAM, Nvidia GeForce 6600 graphics chip- set, 802.11 wireless to three hours. Headphones are fixed inside the hel- met for sound. A GPS antenna (for positioning) and an InterSense Iner- tiaCube3 inertial sensor (for orienta- tion) are mounted on the helmet. The GPS

Thomas, Bruce

202

0018-9162/07/$25.00 2007 IEEE36 Computer Published by the IEEE Computer Society C O V E R F E A T U R E  

E-print Network

for this foundation will require enriching computer science paradigms to encompass models and methods traditionally that is impossible to foresee. Many current research challenges--the semantic Web, nanotechnologies, computational, and policy makers. THE DESIGN PROBLEM An embedded system is an engineering arti- fact involving computation

Henzinger, Thomas A.

203

0018-9162/07/$25.00 2007 IEEE32 Computer Published by the IEEE Computer Society C O V E R F E A T U R E  

E-print Network

for this foundation will require enriching computer science paradigms to encompass models and methods traditionally that is impossible to foresee. Many current research challenges--the Semantic Web, nanotechnologies, computational, and policy makers. THE DESIGN PROBLEM An embedded system is an engineering arti- fact involving computation

Sifakis, Joseph

204

Abstract--In this work we explore the opportunity Pervasive Spaces could provide as supplemental energy sources. We utilize the nature of pervasive smart spaces to outsource computation that would normally be performed on a mobile  

E-print Network

normally be performed on a mobile device to a surrogate server within the smart space. The decision to outsource a computation depends on whether its energy cost on the device is larger than the cost approach. Our experimental validation and benchmarks shows significant energy saving on the mobile device

Helal, Abdelsalam

205

[Pervasive developmental disorders].  

PubMed

Pervasive developmental disorders (PDD-ICD10), covering roughly the same entity as the autism spectrum disorders (ASD DSM-IVTR and DSM-V) include a heterogeneous clinical reality. PDD develop in childhood and are characterized by alterations in socialization, communication and behavior disorders with stereotypies and repetitive movements. Autism is included in PDD and has led to many debates in France and to the publication of recommendations and government plans, in recent years. We propose in this article to review the current knowledge of this topic. PMID:24855782

Ferreri, Mlanie

2014-04-01

206

Evolving Content in the Galactic Arms Race Video Game In: Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG09). Piscataway, NJ:IEEE  

E-print Network

Evolving Content in the Galactic Arms Race Video Game In: Proceedings of the IEEE Symposium Erin J. Hastings, Ratan K. Guha, and Kenneth O. Stanley Abstract-- Video game content includes. In most modern video games, the set of content shipped with the game is static and unchanging, or at best

Stanley, Kenneth O.

207

Pervasive Developmental Disorders in Girls  

Microsoft Academic Search

Pervasive developmental disorders are a group of conditions sharing as their common features impairment in social reciprocity,\\u000a developmental disturbances affecting communication, and manifestation of restricted and repetitive behaviors. Autism is the\\u000a prototypical pervasive developmental disorder, and others include Asperger's Disorder, Rett's Disorder, Childhood Disintegrative\\u000a Disorder, and Pervasive Developmental Disorder-Not Otherwise Specified (PDD-NOS). Critical to understanding these conditions\\u000a is appreciation of

Kathleen Koenig; Katherine D. Tsatsanis

208

C O V E R F E A T U R E 0018-9162/06/$20.00 2006 IEEE40 Computer Published by the IEEE Computer Society  

E-print Network

and the technology push. Bridging the gaps Closing the computational gap in systems biology requires constructing the language needed to study and understand complex multiscale,multiscience systems.ViroLab,a grid, integrating, and managing a plethora of models. A bottom-up, data-driven approach Computer science provides

Amsterdam, Universiteit van

209

Pervasive Advertising Jrg Mller1  

E-print Network

Pervasive Advertising Jörg Müller1 , Florian Alt2 , Daniel Michelis3 1 Deutsche Telekom technologies leave the labs, they are starting to be used for the purpose of advertising. Pervasive Advertising shaping this development in a meaningful way. In particular, many marketing and advertising professionals

210

Pervasive media violence.  

PubMed

In this review, we focus our discussion on studies examining effects on children and young adults. We believe that the current epidemic of youth violence in the United States justifies a focus on this vulnerable segment of society. We consider media effects on individual children's behaviors, such as imitating aggressive acts. In addition, we examine how the media influence young people's perceptions of norms regarding interpersonal relationships. Next, we assess mass media effects on societal beliefs, or what children and adolescents think the "real world" is like. We suggest these media influences are cumulative and mutually reinforcing, and discuss the implications of repeated exposure to prominent and prevalent violent media messages. Finally, we catalog multiple intervention possibilities ranging from education to regulation. From a public health perspective, therefore, we evaluate the effects that pervasive media messages depicting violence have on young people and present multiple strategies to promote more healthful outcomes. PMID:8724228

Schooler, C; Flora, J A

1996-01-01

211

C O V E R F E A T U R E 0018-9162/07/$25.00 2007 IEEE62 Computer Published by the IEEE Computer Society  

E-print Network

-level sensor events and high-level situational awareness. Database technologies, including extensions to data for extracting situational awareness from sensed data is therefore needed. During the past three years, we have," formally known as situational awareness. In the context of computer security, situational awareness

Cybenko, George

212

C O V E R F E A T U R E 0018-9162/06/$20.00 2006 IEEE52 Computer Published by the IEEE Computer Society  

E-print Network

students' abilities in both analytical and creative thinking. We believe that many students have both types to the computer/videogames development field. · Fostering "whole brain education." By this we mean developing understanding and intuition than is possible with only one type of thinking. · Increasing enrollments

Leutenegger, Scott T.

213

ReseaRch FeatuRe 76 computer Published by the IEEE Computer Society 0018-9162/13/$31.00 2013 IEEE  

E-print Network

performance and power consumption data for three mainstream smart- phones--the Motorola Droid, HTC EVO-store-metrics). Although 3D entertainment is gaining a market foothold in other media, including desktop computing, 3D consumption of desktop 3D games,2 but undertaking the same task for smartphones is much more challenging

Azevedo, Ricardo

214

Preprint: Clip Art Rendering of Smooth Isosurfaces Accepted pending revision for IEEE Transactions on Visualization and Computer Graphics  

E-print Network

of authoring tools for articles, books and presentations. Clip art libraries are generated by designers1 Preprint: Clip Art Rendering of Smooth Isosurfaces Accepted pending revision for IEEE Eisemann and John C. Hart, Member, IEEE Abstract-- Clip art is a simplified illustration form consisting

Paris-Sud XI, Université de

215

IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014 337 Cloud-Based Augmentation for Mobile Devices  

E-print Network

, Zohreh Sanaei, Member, IEEE, Ejaz Ahmed, Member, IEEE, Abdullah Gani, Senior Member, IEEE, and Rajkumar. Sanaei, E. Ahmed, and A. Gani are with the Department of Computer System & Technology, The University

Buyya, Rajkumar

216

Insectopia: exploring pervasive games through technology already pervasively available  

Microsoft Academic Search

We present the pervasive game Insectopia, which have been designed by the approach of utilizing commercially available mobile phones to provide context-dependent gameplay. The design and evaluation of the game is described together with a discussion on how this approach can speed up making pervasive games a viable game genre for the general public. Categories and Subject Descriptors H1.2 User\\/Machine

Johan Peitz; Hannamari Saarenp; Staffan Bjrk

2007-01-01

217

This site and all contents (unless otherwise noted) are Copyright 2010 IEEE. All rights reserved. IEEE Transactions on Mobile  

E-print Network

framework represents a means to compromise the tradeoff between different performance metrics including, IEEE Robotics and Automation Society, and IEEE Systems, Man and Cybernetics Society TMC is indexed TMC Order Reprints Search Advanced The world's leading membership organization for computing

Sreenan, Cormac J.

218

2 IEEE TRANSACTIONS ON EDUCATION, VOL. 46, NO. 1, FEBRUARY 2003 Review of Computer Vision Education  

E-print Network

--Computer vision is becoming a mainstream subject of study in computer science and engineering. With the rapid. Index Terms--Computer vision, education, image processing, re- search, teaching. I. INTRODUCTION VISION, medical imaging, image databases, pattern recognition, computer graphics, and virtual reality. During

Bebis, George

219

Adaptive Self-triggered Control over IEEE 802.15.4 Networks U. Tiberi1, C. Fischione2, K.H. Johansson2 and M.D. Di Benedetto1  

E-print Network

]. The IEEE 802.15.4 communication protocol is the most popular standard for low power and low data rate WSNs.H. Johansson2 and M.D. Di Benedetto1 Abstract-- The communication protocol IEEE 802.15.4 is becoming pervasive by this protocol. In this paper, the stability of IEEE 802.15.4 networked control systems (NCSs) is addressed

Johansson, Karl Henrik

220

Setting the stage for computing curricula 2013: computer science -- report from the ACM\\/IEEE-CS joint task force  

Microsoft Academic Search

Following a roughly 10 year cycle, the Computing Curricula volumes have helped to set international curricular guidelines for undergraduate programs in computing. In the summer of 2010, planning for the next volume in the series, Computer Science 2013, began. This panel seeks to update and engage the SIGCSE community on the Computer Science 2013 effort. The development of curricular guidelines

Mehran Sahami; Mark Guzdial; Andrew McGettrick; Steve Roach

2011-01-01

221

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 9, NO. 3, MARCH 1998 283 Parallel Computation  

E-print Network

performance demonstrates that parallel computational methods can significantly reduce the computational time developed parallel methods to reduce the time required to perform two com- putationally intensive analyses: homologous sequence searching and multiple sequence alignment. Our parallel searching method reduces

222

IEEE TRANSACTIONS ON COMPUTERS, TC-2011-04-0261 1 A Parallel Neuromorphic Text Recognition  

E-print Network

by the modern HPC clusters and convert it to useful computations that assist or even replace the human cognition progress in the evolution of high performance computing (HPC) technologies, the research in computational. The algorithm learns from what has been read and, based on the obtained knowledge, it forms anticipations

Qiu, Qinru

223

Survey on attitude towards pervasive games  

Microsoft Academic Search

Pervasive gaming as a research field has been attracting more and more attentions from researchers and practitioners. However, there is no much work on player's general attitude to pervasive games even this is an important aspect of understanding player enjoyment of pervasive games. We created a survey where we wanted to investigate people's attitude towards pervasive games. The survey included

Alf Inge Wang; Hong Guo; Meng Zhu; Are Sterb Akselsen; Kenneth Kristiansen

2010-01-01

224

2 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$26.00 2009 IEEE V I R T U A L M A C H I N E S  

E-print Network

that millions of users world- wide experience through BlackBerries, iPhones, Windows Mobile, and other mobile empowering mobile users, we could transform many areas of human activity (see the sidebar for an example as a mobile device moves with its user through the physical world is called cloudlet-based, resource

Satyanarayanan, Mahadev "Satya"

225

Published by the IEEE CS n 1536-1268/11/$26.00 2011 IEEE PERVASIVE computing 13 S M A R T E N E R G Y S Y S T E M S  

E-print Network

prices fell in the 1980s, but an increased focus on urban smog and acid rain raised awareness of energy to Stern, whereas environ- mental policy and research funding waned in the 1980s, energy and envi

Hazas, Mike

226

Published by the IEEE CS n 1536-1268/10/$26.00 2010 IEEE PERVASIVE computing 37 C O N N E C T E D Y O U T H  

E-print Network

that de- fine the climate of mobile phone and social media use in classrooms. Understanding these policies Y O U T H M obile technologies and social applications are nearly ubiquitous in the lives of many of America's youth. Mobile device own- ership and social media use have been increas- ing over the past few

Hayes, Gillian R.

227

2 PERVASIVE computing Published by the IEEE CS n 1536-1268/11/$26.00 2011 IEEE P e r v a s i v e r e ta i l  

E-print Network

opportunities for spending money. This study proposes a phone-based system to sense physical shopping activities r e ta i l Using Mobile Phones to Monitor shopping time at Physical stores A ccording to retail management theory, the shopping experience typically aims to maximize either efficiency or entertainment.1

Ouhyoung, Ming

228

66 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$25.00 2009 IEEE O c c u pa t i O n a l t h e r a p y  

E-print Network

be chal- lenging even for experienced parents and teachers. Such persuasion is usually verbal, but verbal ther- apy refers to the use of a child occupation--that is, play--to cultivate the general skills and abilities needed to perform daily functional activities.1 Play-based occupational therapy has proven

Ouhyoung, Ming

229

80 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 2014 IEEE ConferencesEditor: Elizabeth Belding n UC Santa Barbara n ebelding@cs.ucsb.edu  

E-print Network

ImAtIon to GooGlE GlASS UbiComp 2013 featured keynotes by Markus Gross, of ETH Zurich and Disney Research reminded the audience that Disney had its first revolutionary pat- ent on synchronizing sound and mov- ing't satisfied by simple cartoon movies anymore but demand customized digital and physi- cal experiences

230

The human element as the key enabler of pervasiveness  

Microsoft Academic Search

The recent proliferation of sensor-equipped smartphones has brought sensor networking to the general public in the form of mobile phone sensing. By reaching out to mainstream users, mobile phone sensing has the potential of achieving the pervasive computing vision by putting the human element in the foreground. Because mo- bile phone sensing may require computationally intensive applications, it is impractical

Silvia Giordano; Daniele Puccinelli

2011-01-01

231

Ubiquitous Monitoring and Human Behaviour in Intelligent Pervasive Spaces  

Microsoft Academic Search

we are soon approaching the pervasive-era of computing, where computers are embedded into objects and the environment in order to provide new services to users. Significant levels of data are required in order for these services to function as intended, and it is this collection of data which we refer to as ubiquitous monitoring. Existing monitoring techniques have often been

Stuart Moran; Keiichi Nakata

2009-01-01

232

OCTOBERDECEMBER 1998 0740-7475/98/$10.00 1998 IEEE 17 EMBEDDED SYSTEMS are computers in-  

E-print Network

measures to ensure safety and relia- bility throughout the lifetime of products in- corporating the systems redundancy, and time redundancy. Embedded-system test issues Cost constraints in consumer products typ with computer systems--perhaps a few hours per month. People are much less patient with computer downtime

Al-Asaad, Hussain

233

0018-9162/01/$10.00 2001 IEEE48 Computer Copy Protection  

E-print Network

][+ to pirate games in our school's computer lab or kids today swapping MP3 files on Internet chat systems for as long as the media for making copies have existed. Some early musicians refused to record their work

Wallach, Dan

234

0018-9162/00/$10.00 2000 IEEE50 Computer Video Image  

E-print Network

urrent industrial videoprocessing systems use a mixture of high-performance work- stations easily transfer them directly to the configurable computing platform. The frequency of hardware, a statically configured device simply performs an ASIC's function, wasting the flexibility that configurable

Cheung, Peter Y. K.

235

ACCEPTED FOR PUBLICATION IN IEEE TRANSACTION ON VISUALIZATION AND COMPUTER GRAPHICS 1 Filtering and Rendering of  

E-print Network

AND COMPUTER GRAPHICS 3 Fig. 1. The changing reflectance characteristics of a desert scene at different is defined as the ratio of the reflected radiance in the direction towards the viewer to the irradiance

Tan, Ping

236

IEEE TRANSACTIONS ON COMPUTERS, VOL. C-25, NO. 12, DECEMBER 1976 On Communications and Networks  

E-print Network

possible due to the wedding oftwo large and dissimilar industries, namely, the communication and computing industries. (Perhaps we should think oftheirs as a "shotgun" wedding, with at least one of the marriage greatly reduced communications costs as has the introduction of the satellite technology. In 1972 the FCC

Kleinrock, Leonard

237

IEEE TRANSACTIONS ON MOBILE COMPUTING 1 Verifying Delivered QoS in Multi-hop Wireless  

E-print Network

of statistical QoS for groups of packets. The protocols are proved to be cheat-proof. We also provide expressions for the minimum verifiable delay. Index Terms-- C.2.8.a Mobile computing algorithm/protocol design and analysis, C], [13]. Other work has addressed the issue of cheating and payment in such schemes [17]. All

Singh, Suresh

238

IEEE TRANSACTIONS ON COMPUTERS, TC-2013-12-0869 1 Proximity-Aware Local-Recoding  

E-print Network

with MapReduce for Scalable Big Data Privacy Preservation in Cloud Xuyun Zhang, Wanchun Dou, Jian Pei Abstract--Cloud computing provides promising scalable IT infrastructure to support various processing privacy concerns potentially if the information is released or shared to third-parties in cloud

Pei, Jian

239

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1 A Parallel Computing Framework for Large-scale  

E-print Network

-scale Air Traffic Flow Optimization Yi Cao and Dengfeng Sun Abstract--Optimizing the nationwide air traffic), air traffic flow optimization, large-scale optimization, parallel computing. I. INTRODUCTION THE National Airspace System (NAS) is monitored and controlled by the Air Traffic Control System Command Center

Sun, Dengfeng

240

IEEE Network July/August 20114 loud computing is a recent trend in information  

E-print Network

, and delivered. The key driving forces behind the emergence of cloud computing include the overcapacity of today articles focus on virtual networking aspects in the cloud. The next article covers security issues in cloud hardware, requiring minimal modifications to virtual machine servers irrespec- tive of the platform

Pallis, George

241

PROCEEDINGS OF IEEE, MARCH 2009 1 Sparse Representation For Computer Vision and  

E-print Network

semantic information. The choice of dictionary plays a key role in bridging this gap: unconven- tional-of-the- art results and to attaching semantic meaning to sparse signal representations. Understanding the good representation and computer vision can enrich both fields, and raises a number of open questions for further

Ma, Yi

242

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Directing Crowd Simulations  

E-print Network

or by importing motion flow fields extracted from crowd video footage. We propose a novel formulation to blend decades, advances in agent-based sys- tems, cognitive modeling and AI have found widespread use in simulating autonomous agents and virtual crowds in computer games, training systems and animated fea- ture

North Carolina at Chapel Hill, University of

243

PDP and GSDL: A New Service Discovery Middleware to Support Spontaneous Interactions in Pervasive Systems  

Microsoft Academic Search

In pervasive computing environments, mobile devices communicate via wireless links without requiring any fixed infrastructure. These devices must be able to discover and share services dynamically. In this paper, we propose a new service discovery middleware specifically designed for this kind of environments. This middleware is composed of a service discovery protocol, Pervasive Discovery Protocol (PDP), and a service description

Celeste Campo; Mario Muoz; Jose Carlos Perea; Andrs Marn Lpez; Carlos Garca-rubio

2005-01-01

244

The Multimedia Challenges Raised by Pervasive Games Mauricio Capra, Milena Radenkovic, Steve Benford, Leif Oppermann,  

E-print Network

The Multimedia Challenges Raised by Pervasive Games Mauricio Capra, Milena Radenkovic, Steve Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devices, positioning systems and other

Aickelin, Uwe

245

934 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 47, NO. 7, JULY 2000 Staging of Cervical Cancer with Soft Computing  

E-print Network

paradigm for detecting the different stages of cervical cancer. Hybridization includes the evolution cases diagnosed. Cervical cancer has a more or less well-defined treat- ment modality. Treatment934 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 47, NO. 7, JULY 2000 Staging of Cervical

Mitra, Pabitra

246

182 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 6, NO. 2, APRIL 2002 A Fast and Elitist Multiobjective Genetic Algorithm  

E-print Network

and Development Scheme. The authors are with the Kanpur Genetic Algorithms Laboratory, Indian In- stitute Multiobjective Genetic Algorithm: NSGA-II Kalyanmoy Deb, Associate Member, IEEE, Amrit Pratap, Sameer Agarwal nondominated sorting genetic algorithm II (NSGA-II), which alleviates all the above three difficulties

Jagannatham, Aditya K.

247

1306 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 57, NO. 6, JUNE 2010 Electronic Cleansing for Computed Tomography  

E-print Network

1306 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 57, NO. 6, JUNE 2010 Electronic Cleansing-invariant method to determine material fractions in voxels near such T-junctions. The proposed electronic cleansing the width of the PSF. (b) Electronic cleansing replaces H with L. (c) Transfer function based on thresholds

van Vliet, Lucas J.

248

420 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 6, NO. 4, AUGUST 2002 Design of Evolvable Computer Languages  

E-print Network

design decisions for constructing a computational genetic language in an autoadaptive system experiments in genetic programming [8] and evolutionary programming [5] focused on the evolution of tree, genetic algorithms [6] can be viewed as a tool to evolve specialized problem-solving code. In both

249

Using Digital Computer Field Mapping of Outcrops to Examine the Preservation of High-P Rocks During Pervasive, Retrograde Greenschist Fluid Infiltration, Tinos, Cyclades Archipelago, Greece  

Microsoft Academic Search

Digital field mapping of outcrops on the island of Tinos, Greece, was undertaken to investigate the nature of retrograde fluid infiltration during exhumation of high-P metamorphic rocks of the Attic-Cycladic blueschist belt. High-resolution digital photographs of outcrops were taken and loaded into graphics editing software on a portable, belt-mounted computer in the field. Geologic features from outcrops were drawn and

C. M. Breeding; J. J. Ague; M. Broecker

2001-01-01

250

Pervasive Home Environments  

NASA Astrophysics Data System (ADS)

An increasing number of computers and other equipment, such as games consoles and multimedia appliances for the home, have networking capability. The rapid growth of broadband in the home is also fuelling the demand for people to network their homes. In the near future we will see a number of market sectors trying to 'own' the home by providing gateways either from the traditional ISP or from games and other service providers. The consumer is bombarded with attractive advertising to acquire the latest technological advances, but is left with a plethora of different appliances, which have a bewildering range of requirements and features in terms of networking, user interface, and higher-level communications protocols. In many cases, these are proprietary, preventing interworking. Such technical and usability anarchy confuses the consumer and could ultimately suppress market adoption.

Bull, P.; Limb, R.; Payne, R.

251

Tourette Syndrome and Comorbid Pervasive Developmental Disorders  

Microsoft Academic Search

We examined the rates of comorbid pervasive developmental disorders in participants with Tourette syndrome. We used 7288 participants from the Tourette Syndrome International Database Consortium Registry. We found 334 (4.6%; 1 of every 22 participants) with Tourette syndrome had a comorbid pervasive developmental disorder. In participants with Tourette syndrome and comorbid pervasive developmental disorders, 98.8% had one or more comorbidities

Larry Burd; Qing Li; Jacob Kerbeshian; Marilyn G. Klug; Roger D. Freeman

2009-01-01

252

Promoting renewed domestic energy consumption patterns with pervasive learning games  

Microsoft Academic Search

Engaging computer games can have an impact on energy consumption patterns in the home. PowerAgent is a mobile pervasive game for Java-enabled mobile phones that has been designed to influence everyday activities and electricity usage patterns in the household. The game is connected to the household's automatic electricity meters reading equipment via the cell network and this setup enables us

Magnus Bng; Anton Gustafsson; Cecilia Katzeff

253

Building Consumer Trust in Pervasive Retail George Roussos  

E-print Network

of lifestyle to questions of social organization and its implications for everyday life: where and how we live of the vision of pervasive computing lies the ability to aug- ment physical artefacts with electronic properties and for this reason, it is frequently judged by its ability to sustain desired ways of life and meet perceived needs

Roussos, George

254

M.I.T. Media Laboratory Perceptual Computing Technical Report No. 283, June 1994 Short Version Appeared: IEEE Multimedia Magazine, Vol. 1, No. 2, pp. 73-75, 1994  

E-print Network

M.I.T. Media Laboratory Perceptual Computing Technical Report No. 283, June 1994 Short Version Appeared: IEEE Multimedia Magazine, Vol. 1, No. 2, pp. 73-75, 1994 Video And Image Semantics: Advanced-387, The Media Laboratory Massachusetts Institute of Technology 20 Ames St., Cambridge MA 02139 Email: fsandy

255

14 May/June 2011 Published by the IEEE Computer Society 0272-1716/11/$26.00 2011 IEEE Visualization Viewpoints  

E-print Network

Visualization Viewpoints Editor: Theresa-Marie Rhyne Can Computers Master the Art of Communication? A Focus for the computer to master the art of interpersonal communica- tion--that is, communication between aren't always under the sender's direct control and are usually recognized subconsciously

McDonnell, Kevin

256

1556-603X/08/$25.002008IEEE FEBRUARY 2008 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE 31 Edward P.K. Tsang and Serafin Martinez-Jaramillo  

E-print Network

.K. Tsang and Serafin Martinez-Jaramillo Centre for Computational Finance and Economic Agents (CCFEA.1109/MCI.2007.913386 Xin Yao The University of Birmingham, UK Md. Monirul Islam Bangladesh University

Yao, Xin

257

Multiscale Density Estimation R. M. Willett, Student Member, IEEE, and R. D. Nowak, Member, IEEE  

E-print Network

1 Multiscale Density Estimation R. M. Willett, Student Member, IEEE, and R. D. Nowak, Member, IEEE July 4, 2003 Abstract The nonparametric density estimation method proposed in this paper is computationally fast, capable of detect- ing density discontinuities and singularities at a very high resolution

Nowak, Robert

258

Session F1G 0-7803-7961-6/03/$17.00 2003 IEEE November 5-8, 2003, Boulder, CO  

E-print Network

books for IEEE CS Press, thayer@csus.edu 6 Ted Lewis, author of professional books for IEEE CS Press, t.lewis@computer/IEEE Frontiers in Education Conference F1G-1 PANEL: AUTHORING A PROFESSIONAL BOOK James M. Conrad1 , Deborah of North Carolina-Charlotte, jmconrad@uncc.edu 2 Deborah Plummer, Editor, IEEE CS Press, dplummer@computer

Conrad, James M.

259

Pervasive Data Management *C. Zhou, X. Meng: Out-of-Order Durable Event Processing in Integrated Wireless  

E-print Network

Processing,2010.5.6 2. Location Privacy Preserving, 2010.5.6 3. Storage and Indexing on Flash-based Database Wireless Networks. Accepted for publication in Journal of Pervasive and Mobile Computing (PMCJ). (2010). C. Zhou, X. Meng: IO3: Interval-based Out-of-Order Event Processing in Pervasive Computing. In Proceedings

260

14 January/February 2014 Published by the IEEE Computer Society 0272-1716/14/$31.00 2014 IEEE Feature Article  

E-print Network

2b). Such dynamic risk maps can significantly fa- cilitate decision making. When selecting a path's scalp and assessment of their suitabil- ity, to determine an appropriate insertion path. To avoid errors involved in estimating the risk for paths. It implements computation on GPUs, which ex- ploits the problem

Deng, Zhigang

261

IEEE Copyright Statement: Copyright IEEE.  

E-print Network

* Conference or Journal Yr/Mo Citation J 2013.00 Distributed Energy Resources Integration Challenges in Low, L.A.F.M. ; Ilic, M.D. IEEE Transactions on Sustainable Energy, Volume: 4 , Issue: 1, 2013, Page , Page(s): 214 - 232 J 2011.00 Dynamic Monitoring and Decision Systems for Enabling Sustainable Energy

Ilic, Marija D.

262

Electronic textiles: a platform for pervasive computing  

Microsoft Academic Search

Abstract: this paper, welook at the synergistic relationship between textiles and computingand identify the need for their "integration" using tools providedby an emerging new field of research that combines the strengthsand capabilities of electronics and textiles into one: electronictextiles, or e-textiles. E-textiles, also called smart fabrics, havenot only "wearable" capabilities like any other garment, butManuscript received March 1, 2003; revised

DIANA MARCULESCU; RADU MARCULESCU; NICHOLAS H. ZAMORA; PRADEEP K. KHOSLA; Jayaraman Jung; L. Weber; K. Cottet; Grzyb; Troster; Nakad

2003-01-01

263

No Pervasive Computing Without Intelligent Systems  

Microsoft Academic Search

\\u000a It is interesting to think about the technologies that have become part of our everyday lives and compare their invention\\u000a and development with those that have fallen by the wayside. Examples of failed technologies such as electrical cars and satellite\\u000a mobile telephones are not uncommon, but more interestingly numerous other technologies such as instant messaging, text messaging,\\u000a and b2c eCommerce

S G Thompson; B. Azvine

2006-01-01

264

IEEE: Power Electronics Society (PELS)  

NSDL National Science Digital Library

IEEE's Power Electronics Society (PELS) "helps in the development and effective application of power electronics technology." Power electronics is definted as "the application of electronic circuits to energy conversion," which is used "everywhere you look," including in computers automobiles, telecommunications, space systems and satellites motors, lighting, and alternative energy. The PELS newsletter is available free online, but the bimonthly series of peer-reviewed papers (the IEEE Transactions on Power Electronics) is for members only. The website also provide some background information on the main areas of power electronics research and states that volunteers will respond to questions about power electronics. Information on PESL conferences and workshops is also provided.

265

Design and Validation of a Low-Power Network Node for Pervasive Applications  

Microsoft Academic Search

Pervasive computing refers to making many computing devices available throughout the physical environment, while making them effectively invisible to the user. To further increase the applicability of ubiquitous computing, minimizing energy consumption and hardware cost are mandatory in real world applications. In this paper we present our platform prototype for ubiquitous computing, which has been implemented based on commercial Bluetooth

Juan-carlos Cano; Carlos Miguel Tavares Calafate; Pietro Manzoni; Jos-manuel Cano; Eva Gonzlez

2007-01-01

266

Systems Architecture for Pervasive Retail George Roussos  

E-print Network

Systems Architecture for Pervasive Retail George Roussos Birkbeck College Malet Street WC1E 7HX manufacturing processes have made possible the construction of pervasive systems in specific application areas for the automated replenishment of home product supplies. The primary motivation for this work is the optimization

Roussos, George

267

Semantic Pervasive Advertising Lorenzo Carrara1  

E-print Network

Semantic Pervasive Advertising Lorenzo Carrara1 , Giorgio Orsi2 , and Letizia Tanca3 1 Cubica S@elet.polimi.it Abstract. Pervasive advertising targets consumers on-the-move with ads dis- played on their mobile devices. As for web advertising, ads are distributed by embedding them into websites and apps, easily flooding

Orsi, Giorgio

268

On Designing a Pervasive Mobile Learning Platform  

ERIC Educational Resources Information Center

This article presents the features, design and architecture of the Myst pervasive game platform that has been applied in creating pervasive mobile learning games in various contexts such as science festivals and museums in Finland. Based on our experiences with the development, we draw a set of design principles for creating successfully a

Laine, Teemu H.; Vinni, Mikko; Sedano, Carolina Islas; Joy, Mike

2010-01-01

269

2502 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 11, NOVEMBER 2006 Thermal-Safe Test Scheduling for Core-Based  

E-print Network

, Bashir M. Al-Hashimi, Senior Member, IEEE, and Krishnendu Chakrabarty, Senior Member, IEEE Abstract--Overheating study involving the Motorola Version 3 ColdFire proces- sor [14] reported a minimum of 3X increase exponentially with temperature. An undesirable consequence of overheating is thermal stress. At high tem

Chakrabarty, Krishnendu

270

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 29, NO. 11, NOVEMBER 2010 1709 Technology Mapping and Clustering for FPGA  

E-print Network

Member, IEEE, Fei Li, Member, IEEE, and Chi-Chen Peng Abstract--This paper presents a technology mapping that our dual-Vdd mapping algorithm, named DVmap-2, can further improve total power savings by 12.8% over be dictated by battery life, chip pack- aging, and/or cooling costs. It is important to minimize power

Chen, Deming

271

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 31, NO. 12, DECEMBER 2012 1831 Efficient SRAM Failure Rate Prediction  

E-print Network

, DECEMBER 2012 1831 Efficient SRAM Failure Rate Prediction via Gibbs Sampling Shupeng Sun, Student Member, IEEE, Yamei Feng, Changdao Dong, and Xin Li, Senior Member, IEEE Abstract--Statistical analysis of SRAM has emerged as a chal- lenging issue because the failure rate of SRAM cells is extremely small

Li, Xin

272

How Much Room before you Rely: Balancing Privacy Control and Fidelity in the Location-based Pervasive Applications  

Microsoft Academic Search

Rapid development of innovative location-centric applications promoted through widespread proliferation of wireless technology and availability of small handheld devices have brought about a new era in pervasive computing. Besides, they are constantly challenged by individual privacy protection necessities as the location information are stored and exchanged among entities and service providers. In this paper, we attempt to categorize location-centric pervasive

Nilothpal Talukder; Sheikh I Ahamed

2008-01-01

273

A comparison of three rounding algorithms for IEEE oating-point multiplication.  

E-print Network

1 A comparison of three rounding algorithms for IEEE oating-point multiplication. Guy Even and Peter-M. Seidel Abstract| A new IEEE compliant oating-point round- ing algorithm for computing., and 16 logic levels in the algorithm of Yu and Zyner. Keywords| oating-point arithmetic, IEEE 754

Seidel, Peter-Michael

274

Joint Computer Science Department and Electrical and Computer Engineering Department Special Seminar Sponsored by ISTeC  

E-print Network

Joint Computer Science Department and Electrical and Computer Engineering Security Professor of Computer Science (College of Science) Tue., Sept. 16 IEEE, ACM, NSA and NIST such as the IEEE Computer Society's Technical

275

48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.  

Code of Federal Regulations, 2013 CFR

...the Environmental Assessment of Personal Computer Products. 52.223-16 Section...the Environmental Assessment of Personal Computer Products. As prescribed in 23.705...the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

2013-10-01

276

48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.  

Code of Federal Regulations, 2012 CFR

...the Environmental Assessment of Personal Computer Products. 52.223-16 Section...the Environmental Assessment of Personal Computer Products. As prescribed in 23.705...the Environmental Assessment of Personal Computer Products (DEC 2007) (a)...

2012-10-01

277

A Middleware Architecture for Mobile and Pervasive Large-Scale Augmented Reality Games  

Microsoft Academic Search

Ubiquitous or pervasive computing is a new kind of computing, where specialized elements of hardware and software will have such a high level of deployment that their use will be fully integrated with the environment. Augmented reality extends reality with virtual elements but tries to place the computer in a relatively unobtrusive, assistive role. Specialized network middleware solutions for large

Pedro Ferreira; Joo Orvalho; Fernando Boavida

2007-01-01

278

748 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 19, NO. 3, MAY 2004 A Design Method for Paralleling Current Mode  

E-print Network

for Paralleling Current Mode Controlled DC­DC Converters Peng Li, Member, IEEE and Brad Lehman, Member, IEEE@ece.neu.edu). B. Lehman is with the Department of Electrical and Computer Engineering, Northeastern University

Lehman, Brad

279

0018-9162/07/$25.00 2007 IEEE70 Computer Published by the IEEE Computer Society R E S E A R C H F E A T U R E  

E-print Network

, operates on it, and then scatters it back to memory. Stream computing can also be mapped onto general, and postponing writes of the live data to memory after the computation.1 Caravela: A Novel Stream for GPUs, to facilitate stream-processor programming. This work has gener- ally been limited to computing

Sousa, Leonel

280

Dynamic privacy management in pervasive sensor networks  

E-print Network

This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a ...

Gong, Nan-wei

281

IEEE Robotics & Automation Magazine42 1070-9932/08/$25.002008 IEEE SEPTEMBER 2008 Series Compliance for  

E-print Network

computer numeric control (CNC) machining, robotic weld- ing, painting, and pick-and-place circuit boardIEEE Robotics & Automation Magazine42 1070-9932/08/$25.00ª2008 IEEE SEPTEMBER 2008 Series Compliance for an Efficient Running Gait M any robots excel at precise position- ing and trajectory tracking

Hurst, Jonathan

282

IEEE Communications Magazine October 2006104 0163-6804/06/$20.00 2006 IEEE TOPICS IN INTERNET TECHNOLOGY  

E-print Network

be invoked either online (on demand) or offline (precomputed) depending on the instant when this computation is applied. In the online routing algorithms path requests are attended to one by one, while offline routingIEEE Communications Magazine · October 2006104 0163-6804/06/$20.00 © 2006 IEEE TOPICS IN INTERNET

Ortega, Eusebi Calle

283

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2006 211 Microfluidics-Based Biochips: Technology  

E-print Network

, FEBRUARY 2006 211 Microfluidics-Based Biochips: Technology Issues, Implementation Platforms, and Design, Fellow, IEEE Abstract--Microfluidics-based biochips are soon expected to revolutionize clinical diagnosis microfluidics offers a scalable system architecture and dynamic reconfigurability; groups of unit cells

Chakrabarty, Krishnendu

284

80 PERVASIVE computing 1536-1268/02/$17.00 2002 IEEE I N T E G R A T E D E N V I R O N M E N T S  

E-print Network

on discussions with medical professionals, patients, educators, and homeowners, we believe that the home of most technologies. Envisioning homes of the future If we are to believe most movies, television, and pop- ular press every- day tasks at all. We will spend nearly all our time in the home engaged in leisure activities

285

18 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/05/$20.00 2005 IEEE E N E R G Y H A R V E S T I N G & C O N S E R V A T I O N  

E-print Network

scat- tered throughout today's urban land- scape, we might consider background radio signals and microengines, potentially pose issues with exhaust, heat, noise, thrust, or safety. Ongoing power management power from human activity or derive limited energy from ambient heat, light, radio, or vibrations

Starner, Thad E.

286

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 13, NO. 5, OCTOBER 2009 1151 Memetic Algorithm with Extended Neighborhood  

E-print Network

Foundation of China under Grants 60533020 and U0835002, and by the Fund for Foreign Scholars in University is with the Center of Excellence for Research in Computational Intelligence and Applications, School of Computer for the edges and arcs that do not require service. A solution to the problem is a routing plan that consists

Yao, Xin

287

3188 IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, VOL. 57, NO. 12, DECEMBER 2009 An Analytical Approach to Computer-  

E-print Network

the plated silver of tuning screws and degrade the unloaded of the filter. Computer-aided tuning (CAT An Analytical Approach to Computer- Aided Diagnosis and Tuning of Lossy Microwave Coupled Resonator Filters Meng- tracting of the coupling matrix of a narrow band general Cheby- shev bandpass filter with losses

Wu, Ke-Li

288

IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 17, NO. 4, AUGUST 2009 923 Enhanced KarnikMendel Algorithms  

E-print Network

IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 17, NO. 4, AUGUST 2009 923 Enhanced Karnik­Mendel Algorithms Dongrui Wu, Student Member, IEEE, and Jerry M. Mendel, Life Fellow, IEEE Abstract--The Karnik­Mendel% computational cost can be saved if no sorting of the inputs is needed. Index Terms--Enhanced Karnik­Mendel (EKM

Mendle, Jerry M.

289

Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security  

US Patent & Trademark Office Database

Real time security, integrity, and reliability postures of operational (OT), information (IT), and security (ST) systems, as well as slower changing security and operational blueprint, policies, processes, and rules governing the enterprise security and business risk management process, dynamically evolve and adapt to domain, context, and situational awareness, as well as the controls implemented across the operational and information systems that are controlled. Embodiments of the invention are systematized and pervasively applied across interconnected, interdependent, and diverse operational, information, and security systems to mitigate system-wide business risk, to improve efficiency and effectiveness of business processes and to enhance security control which conventional perimeter, network, or host based control and protection schemes cannot successfully perform.

2014-10-07

290

New tricks with old sensors: Pervasive Technologies for Novel Applications  

NASA Astrophysics Data System (ADS)

Sensors are interleaved into society, instrumenting considerable aspects of our lives without our comprehension. Sensors such as the MEMS accelerometer have transitioned from their original domains to applications that they were never conceived for: from games controllers to contextually rotating the screen on your smartphone. Further advances in technologies such as pervasive computing and networked embedded sensing are enabling new applications and smart devices which utilise sensors in new ways. In this presentation I will highlight new trends, applications and research in these fields, and show how "simple" sensors are being used in larger connected systems - from assistive technologies to distributed monitoring.

Merrett, Geoff

2013-06-01

291

From Operating-System Correctness to Pervasively Verified Applications  

NASA Astrophysics Data System (ADS)

Though program verification is known and has been used for decades, the verification of a complete computer system still remains a grand challenge. Part of this challenge is the interaction of application programs with the operating system, which is usually entrusted with retrieving input data from and transferring output data to peripheral devices. In this scenario, the correct operation of the applications inherently relies on operating-system correctness. Based on the formal correctness of our real-time operating system Olos, this paper describes an approach to pervasively verify applications running on top of the operating system.

Daum, Matthias; Schirmer, Norbert W.; Schmidt, Mareike

292

Generalization of Results on Vector Sampling A. Feuer Fellow, IEEE, G. C. Goodwin Fellow, IEEE and M. Cohen  

E-print Network

1 Generalization of Results on Vector Sampling Expansion A. Feuer Fellow, IEEE, G. C. Goodwin://www.ee.technion.ac.il G.C. Goodwin is with the School of Electrical Engineering & Computer Science, University

Feuer, Arie

293

IEEE TRANSACTIONS ON COMPUTERS, VOL. XX, NO. XX, XX XXXX 1 Supplemental Material for the Paper "Deploying Wireless Sensor  

E-print Network

. A cyber-physical system (CPS) approach has recently been suggested in [11], considering both "Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring" Md Zakirul Alam is an interesting interdisciplinary topic, which is rarely combined by engineering and computer science (CS

Wu, Jie

294

IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 59, NO. 1, JANUARY 2012 35 A Multiscale Parallel Computing Architecture for  

E-print Network

Computing Architecture for Automated Segmentation of the Brain Connectome Sylvain Jaume , Kathleen Knobe such as Alzheimer's disease. Although consid- erably smaller than a human brain, a mouse brain already exhibits one billion connections and manually tracing the connectome of a mouse brain can only be achieved partially

Sylvain Jaume

295

IEEE TRANSACTIONS ON EDUCATION, VOL. 43, NO. 3, AUGUST 2000 273 Recursive Algorithms in Computer Science Courses  

E-print Network

be covered in the first year introductory computer science courses, in the second year data structure course a very simple form of a chain, where each vertex has only one child. This child corresponds to the single in any data structure course. Their time complexity is proportional to the size of a traversed tree

Stojmenovic, Ivan

296

Appearing in IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), May 1113, 2014 Energy Reduction through  

E-print Network

scaling is required to contain power density. However, this also increases the rate of transient upsets--potentially preventing us from scaling down voltage and possibly even requiring voltage increases to maintain reliability, but spending 2­3? the energy for redundant computation can diminish or reverse the benefits of voltage scaling

DeHon, André

297

Proceedings of the IEEE International Conference on Computer Vision (ICCV), Kyoto, Japan, Oct 2009 Spatio-Temporal Relationship Match  

E-print Network

-computer interfaces, and monitoring systems for children and elderly persons. For instance, a methodology of sparse local descriptors directly extracted from a 3-D XYT volume (i.e. a concatenation of image frames along time axis). They do not rely on background subtraction or human body-part segmentation, and thus

Ryoo, Michael S.

298

Appears in IEEE Conference Computer Vision and Pattern Recognition, Santa Barbara, California, 1998. A Spatiotemporal Motion Model for Video Summarization  

E-print Network

. A Spatiotemporal Motion Model for Video Summarization Nuno Vasconcelos Andrew Lippman MIT Media Laboratory - fnuno,lipg@media.mit.edu Abstract The compact description of a video sequence through a single image map and a dominant motion has body of research has been devoted to this topic in the recent past. The fundamental idea is to compute

Vasconcelos, Nuno M.

299

IEEE International Workshop on Soft Computing in Industrial Applications Binghamton University, Binghamton, New York, June 23-25, 2003  

E-print Network

and Their Data Files Ira Rudowsky1 , Olga Kulyba1 , Mikhail Kunin1 , Dmitri Ogarodnikov2 and Theodore Raphan1,2 1 Institute of Neural & Intelligent Systems Department of Computer and Information Science Brooklyn College and specialized programs are used to analyze the data. In this study we developed a prototype system for indexing

Rudowsky, Ira

300

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 1, NO. 1, MARCH 2009 1 CADIAPLAYER  

E-print Network

different games at an expert level without any human intervention. The traditional design model for GGP- based reasoning, heuristic search, computational intelligence, and machine learning. The two core components of any game-playing program are search and evaluation. The former provides the ability to think

Björnsson, Yngvi

301

162 IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 2, NO. 3, SEPTEMBER 2010 Game Bot Detection via Avatar Trajectory Analysis  

E-print Network

Game Bot Detection via Avatar Trajectory Analysis Hsing-Kuo Pao, Kuan-Ta Chen, Member, IEEE, and Hong Internet activities in recent years, but cheating activity, such as the use of game bots, has increased accuracy on a short trace of several hundred seconds. Index Terms--Behavior analysis, bot detection

Chen, Sheng-Wei

302

IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 3, NO. 3, SEPTEMBER 2011 201 Tanagra: Reactive Planning and Constraint Solving  

E-print Network

planning with nu- merical constraint solving, and an evaluation of the expressivity of the system by examining the range of content it can create. The mixed-initiative approach to design, where content is cre or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object

California at Santa Cruz, University of

303

1536 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 31, NO. 10, OCTOBER 2012 Analytical Eye-Diagram Determination for the  

E-print Network

Verification of Single Interconnect Lines Dongchul Kim, Hyewon Kim, and Yungseon Eo, Senior Member, IEEE--Eye diagram, intersymbol interference (ISI), jitter, signal integrity, transmission line. I. Introduction OVER, OCTOBER 2012 Analytical Eye-Diagram Determination for the Efficient and Accurate Signal Integrity

304

IEEE Power Engineering Society Conference Proceedings, SF, CA, June 12-16, 2005, to appear. An Agent-Based Computational Laboratory  

E-print Network

IEEE Power Engineering Society Conference Proceedings, SF, CA, June 12-16, 2005, to appear. These characteristics provide generators with a poten- tially large scope for the exercise of strategic behavior in part from strategic generator behaviors encouraged by inappropriate market design features ([1], [19

Tesfatsion, Leigh

305

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 12, DECEMBER 2006 2965 Statistical Timing Analysis With Coupling  

E-print Network

technologies, shrinking geometries have led to a reduction in the self- capacitance of wires. Meanwhile of coupling-capacitances will be even more dominant in the future as feature-sizes shrink [3]. Simultaneous, Senior Member, IEEE Abstract--As technology scales to smaller dimensions, increas- ing process variations

Zhou, Hai

306

Application requirements for middleware for mobile and pervasive systems  

Microsoft Academic Search

In this paper, we examine the requirements for future middleware to support mobile and pervasive applications and identify key research areas. We illustrate the research areas with requirements identified in two specific research projects concerning pervasive healthcare and home entertainment.

Kimmo E. E. Raatikainen; Henrik Brbak Christensen; Tatsuo Nakajima

2002-01-01

307

IEEE Copyright Statement: Copyright 2007 IEEE. Reprinted from IEEE Special Issue on "Modeling, Identification, and  

E-print Network

of the IEEE does not in any way imply IEEE endorsement of any of Carnegie Mellon University's products or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view to qualitatively different paradigms than those for which it was designed. As a matter of fact, major challenges

Ilic, Marija D.

308

SVM based context awareness using body area sensor network for pervasive healthcare monitoring  

Microsoft Academic Search

In the present growing era advancement of computer processing power, data communication capabilities, low power micro electronics devices and micro sensors increases the popularity of wireless sensor network in real life. Body area sensor network is a group of sensor nodes inside and outside the human body for continuous monitoring of health conditions, behavior and activities. Context awareness in pervasive

Sonali Agarwal; Divya; G. N. Pandey

2010-01-01

309

Automated Selection of Remote Control User Interfaces in Pervasive Smart Spaces  

Microsoft Academic Search

Pervasive computing offers a vision in which every room in the home and at work will become an interactive smart space filled with wireless and wired devices whose behavior can be remotely controlled by a user, including monitors, speakers, printers, kiosks, soda machines, appliances, toys, sensors, and networked software services. The goal of this paper is to address what we

Nirali Desai; Khomkrit Kaowthumrong; John Lebsack; Nishant Shah; Richard Han

2002-01-01

310

Healthcare Aide: Towards a Virtual Assistant for Doctors Using Pervasive Middleware  

Microsoft Academic Search

The advancement of available, portable, low cost handheld devices (PDAs, cell phones, etc.), bluetooth, and WiFi has resulted in the users' mobility at unprecedented levels. As these devices can communicate with one another, the combined capabilities can be leveraged to form a useful new set of tools. Presently, pervasive computing is being extended into the sophisticated healthcare sector with the

Moushumi Sharmin; Shameem Ahmed; Ahmed J. Khan; Munirul M. Haque

2006-01-01

311

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 9, NO. 1, FEBRUARY 2001 205 ACKNOWLEDGMENT  

E-print Network

. Soc. Optical Engineering (SPIE). Field Programmable Gate Arrays (FPGAs) Fast Board Development. Rytting, "A cad suite for high-performance fpga design," in Proc. IEEE Workshop FPGAs Custom Computing Terms--Adaptive computing, Boolean satisfiability, computer arithmetic, configurable computing. I

Hellebrand, Sybille

312

The Institute of Electrical and Electronics Engineers, Inc. (IEEE)  

NSDL National Science Digital Library

"The IEEE (Eye-triple-E) is a non-profit, technical professional association of more than 365,000 individual members in approximately 150countries. The full name is the "Institute of Electrical and Electronics Engineers, Inc., although the organization is most popularly known and referredto by the letters I-E-E-E.Through its members, the IEEE is a leading authority in technical areas ranging from computer engineering, biomedical technology and telecommunications, to electric power, aerospace engineering and consumer electronics, among others."Description courtesy of http://www.ieee.org/

2005-10-31

313

Appears in: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 697-703, June 1997. Real-Time Closed-World Tracking  

E-print Network

the method are discussed. The algorithm has been used to track children in an inter- active, narrative and observed by the room. We have constructed such an imagination space, called the KIDSROOM, where a computer the experimental setup of the KidsRoom viewed from the stationary color camera used for tracking objects. Here four

314

Dynamic Privacy Management in Pervasive Sensor Networks  

Microsoft Academic Search

\\u000a This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy\\u000a control and feedback in a pervasive sensor network. Our work began with the development of a potentially invasive sensor network\\u000a (with high resolution video, audio, and motion tracking capabilities) featuring different interactive applications that created\\u000a incentive for accepting this network as an

Nan-Wei Gong; Mathew Laibowitz; Joseph A. Paradiso

2010-01-01

315

Corruption in Asia: Pervasiveness and arbitrariness  

Microsoft Academic Search

How does one understand the differences and similarities of corruption among various Asian countries? We use a recent framework\\u000a developed by Rodriguez, Uhlenbruck, and Eden (2005) to suggest that corruption has to be examined from two different dimensions: pervasiveness and arbitrariness. Using this\\u000a framework, we ask why some Asian countries are able to achieve high levels of economic growth in

Seung-Hyun Lee; Kyeungrae Kenny Oh

2007-01-01

316

Pervasive Healthcare and Wireless Health Monitoring  

Microsoft Academic Search

Abstract With an increasingly mobile,society and,the worldwide deployment of mobile and wireless networks, the wireless infrastructure can support many,current and emerging,healthcare applications. This could fulfill the vision of Pervasive Healthcare or healthcare to anyone, anytime, and anywhere by removing locational, time and other restraints while increasing both the coverage and the quality. In this paper, we present applications and require-

Upkar Varshney

2007-01-01

317

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS--I: REGULAR PAPERS, VOL. 51, NO. 11, NOVEMBER 2004 2133 Radix-Based Digital Calibration Techniques for  

E-print Network

, Member, IEEE, Jipeng Li, Member, IEEE, and Un-Ku Moon, Senior Member, IEEE Abstract--This paper describes phases to do the job. These methods imply slower conversion speed and increased Manuscript received (e-mail: jipeng.li@nsc.com). U. Moon is with the School of Electrical Engineering and Computer

Moon, Un-Ku

318

Measured Performance of an IEEE 802.11  

Microsoft Academic Search

In this study, the capabilities of an IEEE 802.11 wireless LAN are measured. For the test phases, three wireless laptop computers, a wireless and wired desktop computers and an access point (AP) are used. In addition to these computers, products of Lucent Technologies have been used as the wireless communication adapters. Our metric that is the criteria used to evaluate

Tamer Demir; Cem Ersoy

319

Arithmetic Correlations and Walsh Andrew Klapper Senior Member, IEEE, Mark Goresky Member, IEEE,  

E-print Network

1 Arithmetic Correlations and Walsh Transforms Andrew Klapper Senior Member, IEEE, Mark Goresky branches of digital computation and communications. They construct arithmetic analogs of the Walsh of hypersurfaces; (2) show that the arithmetic Walsh spectrum characterizes a Boolean function; (3) study

Klapper, Andy

320

Lifelike Talking Faces for Interactive Services ERIC COSATTO, MEMBER, IEEE, JRN OSTERMANN, SENIOR MEMBER, IEEE,  

E-print Network

Lifelike Talking Faces for Interactive Services ERIC COSATTO, MEMBER, IEEE, J?RN OSTERMANN, SENIOR talking faces for interactive services are an exciting new modality for man­machine interactions. Recent developments in speech synthesis and computer animation enable the real-time synthesis of faces that look

321

IEEE Smart Grid Series of Standards IEEE 2030 (Interoperability) and IEEE 1547 (Interconnection) Status: Preprint  

SciTech Connect

The IEEE American National Standards smart grid publications and standards development projects IEEE 2030, which addresses smart grid interoperability, and IEEE 1547TM, which addresses distributed resources interconnection with the grid, have made substantial progress since 2009. The IEEE 2030TM and 1547 standards series focus on systems-level aspects and cover many of the technical integration issues involved in a mature smart grid. The status and highlights of these two IEEE series of standards, which are sponsored by IEEE Standards Coordinating Committee 21 (SCC21), are provided in this paper.

Basso, T.; DeBlasio, R.

2012-04-01

322

IEEE Computer Society 1986 , 1988  

E-print Network

-20 ExaFLOPS E T G Kei,2011.6&11, 11PFLOPS, 11.3MW Tianhe-2, 2013.06, 55PFLOPS, 17.8MW Titan,2012;Tianhe2, (MilkyWay2) China's National University of Defense Technology, Linpack Performance (Rmax)33 this planet. ·Developed in Mar. 2002 by STA (MEXT) and NEC with 400 M$ investment under Dr. Miyoshi

Kasahara, Hironori

323

IEEE Computer Society 1986 , 1988  

E-print Network

Executable Condition Analysis for coarse grain tasks (Macro-tasks) BPA BPA 1 BPA 3 BPA2 BPA 4 BPA 5 BPA 6 RB 7 RB15 BPA 8 BPA 9 BPA 10 RB 11 BPA 12 BPA 13 RB 14 RB END RB RB BPA RB Data Dependency Control flow Conditional branch Repetition Block RB BPA Block of Psuedo Assignment Statements 7 11 14 1 2 3 4 5 6 15 7 8 9

Kasahara, Hironori

324

IEEE TRANSACTIONS ON MEDICAL IMAGING 1 Four-Chamber Heart Modeling and Automatic  

E-print Network

-chamber heart seg- mentation system for the quantitative functional analysis of the heart from cardiac computed about the heart chambers, large vessels, and coronary arter- ies [1]. Therefore, CT is an important must be obtained from the IEEE by sending a request to pubs-permissions@ieee.org. quantitative

Barbu, Adrian

325

IEEE Transactions on Consumer Electronics, Vol. 50, No. 4, NOVEMBER 2004 Contributed Paper  

E-print Network

issue in modern society. In consumer applications as diverse as financial transactions, remote computerIEEE Transactions on Consumer Electronics, Vol. 50, No. 4, NOVEMBER 2004 Contributed Paper Verbauwhede, Senior Member, IEEE Abstract -- Biometrics have become a popular means for access control

Verbauwhede, Ingrid

326

Modelling and Stability Analysis of Hybrid Multiple Access in the IEEE 802.15.4 Protocol  

E-print Network

.2 [Computer-Communication Networks]: Network Protocols General Terms: Performance, Standardization, Theory. INTRODUCTION The IEEE 802.15.4 communication standard is arguably becoming the most popular protocol for low framework for modelling the behavior of the hybrid MAC protocol of the IEEE 802.15.4 standard is proposed

Johansson, Karl Henrik

327

IEEE TRANSACTION ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 1 Visual Tracking: an Experimental Survey  

E-print Network

Survey Arnold W. M. Smeulders*, Senior Member, IEEE, Dung M. Chu*, Student Member, IEEE, Rita Cucchiara Emilia, Italy. Afshin Dehghan and Mubarak Shah are with School of Electric Engineering and Computer to impressive, even amazing, individual results like tracking of the motor bicycle in the dirt or the car chase

Smeulders, Arnold

328

IEEE TRANSACTION ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 1 Visual Tracking: an Experimental Survey  

E-print Network

Survey Arnold W. M. Smeulders*, Senior Member, IEEE, Dung M. Chu*, Student Member, IEEE, Rita Cucchiara Emilia, Italy. Afshin Dehghan and Mubarak Shah are with School of Electric Engineering and Computer like tracking of the motor bicycle in the dirt or the car chase [1]. But as long as most tracking

329

IEEE Std 1394bTM-2002 (Amendment to IEEE Std 1394TM-1995)  

E-print Network

IEEE Std 1394bTM-2002 (Amendment to IEEE Std 1394TM-1995) IEEEStandards 1394bTM IEEE Standard, in an electronic retrieval system or otherwise, without the prior written permission of the publisher. IEEE Std 1394bTM -2002 (Amendment to IEEE Std 1394TM -1995) IEEE Standard for a High-Performance Serial Bus

Borgonovo, Flaminio

330

IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 16, NO. 1, FEBRUARY 2008 1 Aggregation Using the Fuzzy Weighted Average as  

E-print Network

Weighted Average as Computed by the Karnik­Mendel Algorithms Feilong Liu, Student Member, IEEE, and Jerry M. Mendel, Life Fellow, IEEE Abstract--By connecting work from two different problems-- the fuzzy weighted. This new algorithm uses the Karnik­Mendel (KM) algorithms to compute the FWA -cut end- points. It appears

Mendle, Jerry M.

331

FOCS 2005 Program The 46th Annual IEEE Symposium on  

E-print Network

Tutorials held at CMU University Center Reception at Omni William Penn Hotel, Monongahela Room, 17th floor-25, 2005 Omni William Penn Hotel, Pittsburgh, PA Sponsored by the IEEE Computer Society Technical Committee-Peled Bernard Chazelle Algorithmic Techniques and Tools from Computational Geometry WELCOME RECEPTION 7:00pm � 9

Guestrin, Carlos

332

2 PERVASIVE computing Published by the IEEE CS n 1536-1268/13/$31.00 2013 IEEE U n d e r s ta n d i n g a n d C h a n g i n g B e h av i o r  

E-print Network

, while interventions related to mood disorders are inherently related to monitoring participants' mental. Recent work has shown that we can make inferences about user contexts, physical activities,4,5 and mental physical and mental well-being. Doc- tors, therapists, teachers, and coaches deliver BCIs to patients

Mascolo, Cecilia

333

On the use of IEEE 802.15.4 to enable wireless sensor networks in pulp and paper industry  

Microsoft Academic Search

IEEE 802.15.4 is a new standard that addresses the need of low-rate wireless personal area networks (LR-WPAN) with a focus on enabling pervasive wireless sensor networks for residential, commercial and industrial applications. The standard is characterized by maintaining a high level of simplicity, allowing for low cost and low power implementations. This paper presents a brief technical introduction of the

Josk A. Gutierrez; David B. Durocher

2005-01-01

334

Pervasive Sensing to Model Political Opinions in Face-to-Face Networks  

Microsoft Academic Search

Exposure and adoption of opinions in social networks are important questions in education, business, and government. We de- scribe a novel application of pervasive computing based on using mobile phone sensors to measure and model the face-to-face interactions and subsequent opinion changes amongst undergraduates, during the 2008 US presidential election campaign. We nd that self-reported political discussants have characteristic interaction

Anmol Madan; Katayoun Farrahi; Daniel Gatica-Perez

2011-01-01

335

Pervasive sensor system for evidence-based nursing care support  

Microsoft Academic Search

This paper introduces a pervasive sensor system for nursing homes, where daily activities of elderly persons are monitored by pervasive sensors all the time. Deterioration in the quality of nursing care for the elderly has become one of the biggest problems in the aging society and the authors have been challenging the problem by sensors embedded in a nursing room.

Toshio Hori; Yoshifumi Nishida; S. Murakami

2006-01-01

336

Pervasive informatics and persistent actimetric information in health smart homes  

E-print Network

Pervasive informatics and persistent actimetric information in health smart homes: different-cameras). · Context ­ pervasive watching systems for Health Smart Homes ­ detection of neuro-degenerative diseases (e ­ model of elderly persons activity in Health Smart Homes ­ evaluation of actimetric perseveration

Fouquet, Yannick

337

A Conceptual Architecture for Pervasive Advertising in Public Display Networks  

E-print Network

A Conceptual Architecture for Pervasive Advertising in Public Display Networks Florian Alt, Stefan for pervasive advertising on public displays. It can help researchers and practitioners to inform the design with displays and it is not only large out- door advertisers anymore operating them. However, pub- lic displays

338

Meeting technology challenges of pervasive augmented reality games  

Microsoft Academic Search

Pervasive games provide a new type of game combining new technologies with the real environment of the players. While this already poses new challenges to the game developer, requirements are even higher for pervasive Augmented Reality games, where the real environment is additionally enhanced by virtual game items. In this paper we will review the technological challenges to be met

Wolfgang Broll; Jan Ohlenburg; Irma Lindt; Iris Herbst; Anne-kathrin Braun

2006-01-01

339

SEPTEMBER/OCTOBER 2005 Copublished by the IEEE CS and the AIP 1521-9615/05/$20.00 2005 IEEE 3 voices, and we can train computers to recognize 85 per-  

E-print Network

@computer.org NEWSN E W S Figure 1. Elephants at Walt Disney World's Animal Kingdom. Using software running a hidden team at Marquette hooked up with Disney's Animal Kingdom to test this acoustic analy- sis technology

Johnson, Michael T.

340

7 CFR 25.102 - Pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2011 CFR

...2011-01-01 2011-01-01 false Pervasive poverty, unemployment and general distress...Requirements 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be...

2011-01-01

341

7 CFR 25.102 - Pervasive poverty, unemployment and general distress.  

...2014-01-01 2014-01-01 false Pervasive poverty, unemployment and general distress...Requirements 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be...

2014-01-01

342

7 CFR 25.102 - Pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2012 CFR

...2012-01-01 2012-01-01 false Pervasive poverty, unemployment and general distress...Requirements 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be...

2012-01-01

343

7 CFR 25.102 - Pervasive poverty, unemployment and general distress.  

Code of Federal Regulations, 2013 CFR

...2013-01-01 2013-01-01 false Pervasive poverty, unemployment and general distress...Requirements 25.102 Pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Conditions of poverty must be...

2013-01-01

344

IEEE Working Group Areas  

NSDL National Science Digital Library

The Institute of Electrical and Electronics Engineers (IEEE) is one of the most active organizations in developing standards for emerging technologies. At this site, visitors can learn about many different working groups and the process of implementing new standards. Each working group's homepage has an overview of the purpose and scope of the particular standards project, and some offer reports and documentation for public download. The IEEE is involved in many different technical areas, as is immediately apparent when looking at the list of projects. Power and Energy and Information Technology are the two most prominent areas of standards development, but others range from broadcast technology to the voting system. [CL

345

Memorias Conferencia Internacional IEEE Mexico 1971, Sobre Sistemas, Redes Y Computadoras. Volumen I and Volumen II. (Proceedings of International Conference of IEEE Concerning Systems, Networks, and Computers. Volume I and Volume II.  

ERIC Educational Resources Information Center

The following papers in English from this international conference may be of particular interest to those in the field of education. T. Nakahara, A. Tsukamota, and M. Matsumoto describe a computer-aided design technique for an economical urban cable television system. W. D. Wasson and R. K. Chitkara outline a recognition scheme based on analysis

Concheiro, A. Alonso, Ed.; And Others

346

0018-9162/06/$20.00 2006 IEEE August 2006 57Published by the IEEE Computer Society C O V E R F E A T U R E  

E-print Network

A T U R E a range of wavelengths, . We can thus describe a color image as a 3D function, P into radiant light is an active topic in computational photography.Such techniques are making it possible, reveals a clear and amaz- ing truth: Through the technology of photography, a pattern of light crossing

O'Brien, James F.

347

Proceedings of the IEEE/ACM Workshop on Parallel and Distributed Simulation, pp. 89-96, IEEE Computer Society Press, May 16-19, Austria, 2004 (nominated for best paper award). To appear in the Transactions of the Society for  

E-print Network

to real world systems, the simulation model layer corresponds to different simulation event orderings that can be used to simulate a real world system, and the simulator layer corresponds to the simulator. Introduction As the size and complexity of simulations grow, the computational demand required is fast becoming

Teo, Yong-Meng

348

0018-9162/07/$25.00 2007 IEEE December 2007 33Published by the IEEE Computer Society C O V E R F E A T U R E  

E-print Network

. DOLLARS & CO2 Recent reports1,2 highlight a growing concern with computer-energy consumption and show how E A T U R E trends could make energy a dominant factor in the total cost of ownership.3 Besides the server electricity bill, TCO includes other energy-dependent components such as the cost of energy

Tomkins, Andrew

349

Abstract--Ubiquitous and pervasive networks and applications include a growing number of research themes. In most use cases,  

E-print Network

, localization algorithms, AOA, TDOA, OTDOA, UTDOA, RSS, GPS, A-GPS, location-aware, pervasive computing and services. Although GPS-based positioning is reliable and accurate for outdoor situations, it does is organized as follows. In section III, localization algorithms are presented. In section IV, positioning

Boyer, Edmond

350

Enabling Applications in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt, Vincent Matossian and Manish Parashar  

E-print Network

as a result of context and content based local behaviors. In this paper we also present the design, prototype application where computational models use stream- ing information from video broadband sensors embeddedEnabling Applications in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt

Parashar, Manish

351

library ieee; use ieee.std_logic_1164.ALL;  

E-print Network

library ieee; use ieee.std_logic_1164.ALL; use ieee.numeric_std.ALL; -- synopsys translate_a : in std_logic_vector (1 downto 0); clk : in std_logic; flash_ack_l : in std_logic; flash_data_in : in std_logic_vector (31 downto 0); lb_add : in std_logic_vector (15 downto 0); lb_bclk : in std_logic; lb_mi : in std

Grantner, Janos L.

352

Simulating the pervasive fracture and fragmentation of materials and structures using randomly close-packed Voronoi tessellations.  

SciTech Connect

Under extreme loading conditions most often the extent of material and structural fracture is pervasive in the sense that a multitude of cracks are nucleating, propagating in arbitrary directions, coalescing, and branching. Pervasive fracture is a highly nonlinear process involving complex material constitutive behavior, material softening, localization, surface generation, and ubiquitous contact. Two primary applications in which pervasive fracture is encountered are (1) weapons effects on structures and (2) geomechanics of highly jointed and faulted reservoirs. A pure Lagrangian computational method based on randomly close-packed Voronoi tessellations is proposed as a rational approach for simulating the pervasive fracture of materials and structures. Each Voronoi cell is formulated as a finite element using the reproducing kernel method. Fracture surfaces are allowed to nucleate only at the intercell faces. The randomly seeded Voronoi cells provide an unbiased network for representing cracks. In this initial study two approaches for allowing the new surfaces to initiate are studied: (1) dynamic mesh connectivity and the instantaneous insertion of a cohesive traction when localization is detected, and (2) a discontinuous Galerkin approach in which the interelement tractions are an integral part of the variational formulation, but only become active once localization is detected. Pervasive fracture problems are extremely sensitive to initial conditions and system parameters. Dynamic problems exhibit a form of transient chaos. The primary numerical challenge for this class of problems is the demonstration of model objectivity and, in particular, the identification and demonstration of a measure of convergence for engineering quantities of interest.

Bishop, Joseph E.

2008-09-01

353

DECEMBER 2000 IEEE Robotics  

E-print Network

DECEMBER 2000 IEEE Robotics & Automation Magazine A Hierarchical Team Robots Capable Carrying Out heterogeneous robotic that is based mainly on a miniature robotic system. Because some these operations require covert action, have chosen make robots team ex� tremely small that evade detection. This small allows

Hougen, Dean F.

354

Exploring the Edge of the Magic Circle: Defining Pervasive Games  

E-print Network

Pervasive gaming is a genre of gaming systematically blurring and breaking the traditional boundaries of game. The limits of the magic circle are explored in spatial, temporal and social dimensions. These ways of expanding the game are not new, since many intentional and unintentional examples of similar expansions can be found from earlier games, but the recently emerged fashion of pervasive gaming is differentiated with the use of these expansions in new, efficient ways to produce new kinds of gameplay experiences. These new game genres include alternate reality games, reality games, trans-reality games and crossmedia games. Keywords magic circle, pervasive game, social expansion, spatial expansion,

Markus Montola

2005-01-01

355

IEEE Multidisciplinary Engineering Education Magazine  

NSDL National Science Digital Library

The IEEE Multidisciplinary Engineering Education Magazine is the official means of communication for IEEE student members and educators. This magazine publishes interesting, useful, and informative material on all aspects of multidisciplinary engineering education for the benefit of students and educators. With this mission statement in mind, IEEE Multidisciplinary Engineering Education Magazine encourages submissions, both feature articles and columns, on all aspects of multidisciplinary engineering education. Target Audience: Post-Graduate Students, 2-4 Year College Students

2009-12-31

356

Pervasive domestication of defective prophages by bacteria.  

PubMed

Integrated phages (prophages) are major contributors to the diversity of bacterial gene repertoires. Domestication of their components is thought to have endowed bacteria with molecular systems involved in secretion, defense, warfare, and gene transfer. However, the rates and mechanisms of domestication remain unknown. We used comparative genomics to study the evolution of prophages within the bacterial genome. We identified over 300 vertically inherited prophages within enterobacterial genomes. Some of these elements are very old and might predate the split between Escherichia coli and Salmonella enterica. The size distribution of prophage elements is bimodal, suggestive of rapid prophage inactivation followed by much slower genetic degradation. Accordingly, we observed a pervasive pattern of systematic counterselection of nonsynonymous mutations in prophage genes. Importantly, such patterns of purifying selection are observed not only on accessory regions but also in core phage genes, such as those encoding structural and lysis components. This suggests that bacterial hosts select for phage-associated functions. Several of these conserved prophages have gene repertoires compatible with described functions of adaptive prophage-derived elements such as bacteriocins, killer particles, gene transfer agents, or satellite prophages. We suggest that bacteria frequently domesticate their prophages. Most such domesticated elements end up deleted from the bacterial genome because they are replaced by analogous functions carried by new prophages. This puts the bacterial genome in a state of continuous flux of acquisition and loss of phage-derived adaptive genes. PMID:25092302

Bobay, Louis-Marie; Touchon, Marie; Rocha, Eduardo P C

2014-08-19

357

A distributed object framework for pervasive computing applications  

E-print Network

This thesis presents a new architectural abstraction for developing dynamic and adaptive software. Separating application logic from implementation mechanism provides developers with a simple API for constructing new ...

Pham, Hubert

2005-01-01

358

The Augmented Knight's Castle Integrating Mobile and Pervasive Computing  

E-print Network

is an essential part of the childhood. Besides being a recreational amusement and pure fun, playing also serves experience, virtual content, storytelling and the imagination of the user [3]. By adding audio components

359

Opening Pervasive Computing to the Masses Using the SEAP Middleware  

E-print Network

inexpensive, single-purpose solutions (e.g., a motion- sensitive light switch) or expensive, complex, multi interdependencies; for example, George cannot reuse the motion sensor from his aware home after it is tied introduce the SEAP (Sensor Enablement for the Average Programmer) middleware which applies existing

Julien, Christine

360

Improving the Effectiveness of Medical Treatment with Pervasive Computing  

E-print Network

and the patient's mobile phone has a lot of potential in the healthcare domain because the smart objects user interface the mobile phone provides. 2 Current work We currently work on the design of smart the compliance data to the patient's mobile phone. unobtrusively, transmits the sensed data continuously

361

Indoor Location Systems for Pervasive Computing Joshua A. Tauber  

E-print Network

particularly on the Ad Hoc Lo- cation System (AHLoS), RADAR, Cricket, Cricket Compass, and Active Bats. Finally of existing sys- tems including the ad hoc location system (AHLoS), RADAR, Cricket, Cricket Compass

362

Indoor Location Systems for Pervasive Computing Joshua A. Tauber  

E-print Network

particularly on the Ad Hoc Lo- cation System (AHLoS), RADAR, Cricket, Cricket Compass, and Active Bats. Finally- tems including the ad hoc location system (AHLoS), RADAR, Cricket, Cricket Compass, and Active Bats. We

363

Location Privacy in Pervasive Computing Claudio A. Ardagna, Marco Cremonini,  

E-print Network

by legal disputes involving rental companies tracking their cars by means of Global Positioning System (GPS are collecting a huge amount of location information. Particularly relevant are privacy concerns and recent an experimental case study that analyzes the concerns of users about location privacy and shows how such concerns

Samarati, Pierangela

364

Pervasive computing in play-based occupational therapy for children  

E-print Network

Embedding digital technology into playful activity can make play-based occupational therapy more effective. This study proposes two play-based activities to improve children's eating and tooth-brushing behavior.

Chi, Pei-Yu

365

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. X, MONTH YEAR 1 Adaptive Sensing of Congested Spectrum Bands  

E-print Network

Spectrum Bands Ali Tajer, Member, IEEE, Rui M. Castro, and Xiaodong Wang, Fellow, IEEE, Abstract spectrum bands licensed to the legacy (primary) users. For this purpose, secondary users monitor. M. Castro is with the Department of Mathematics & Computer Sci- ence, Eindhoven University

Castro, Rui

366

1470 IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 33, NO. 10, OCTOBER 1998 Analysis, Design, and Optimization of Spiral  

E-print Network

structures and coupled inductors. A custom computer-aided-design tool called ASITIC is described, which, and Optimization of Spiral Inductors and Transformers for Si RF IC's Ali M. Niknejad, Student Member, IEEE, and Robert G. Meyer, Fellow, IEEE Abstract--Silicon integrated circuit spiral inductors and trans- formers

California at Berkeley, University of

367

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, SUBMITTED 2011, ACCEPTED 2013 1 Iterative Discovery of Multiple Alternative  

E-print Network

. Dy, Member, IEEE, and Michael I. Jordan, Fellow, IEEE Abstract--Complex data can be grouped, Boston, MA 02115. E-mail: dniu@ece.neu.edu, jdy@ece.neu.edu · M. I. Jordan is with the Computer Science Division and Department of Statistics, University of California, Berkeley, CA 94720. Email: jordan

Jordan, Michael I.

368

1428 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 23, NO. 3, MAY 2008 Digital Average Current-Mode Controller for DCDC  

E-print Network

1428 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 23, NO. 3, MAY 2008 Digital Average Current is with the Colorado Power Electronics Center, Electrical and Computer Engineering Department, University of Colorado, and Dragan Maksimovic, Senior Member, IEEE Abstract--A dc power supply in physical vapor deposition (PVD

369

1472 IEEE TRANSACTIONS ON MAGNETICS, VOL. 36, NO. 4, JULY 2000 High Order Differential Form-Based Elements for the  

E-print Network

-Based Elements for the Computation of Electromagnetic Field Z. Ren, Senior Member, IEEE, and N. Ida, Senior Member, IEEE Abstract--The Whitney elements, discrete spaces based on differential forms, have proven gives a general description of high order -form (nodal, edge, facet and volume) elements. Their function

Ida, Nathan

370

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 1, JANUARY 2009 109 DiversityMultiplexing Tradeoff in ISI Channels  

E-print Network

­Multiplexing Tradeoff in ISI Channels Leonard H. Grokop, Member, IEEE, and David N. C. Tse, Senior Member, IEEE Abstract--The optimal diversity­multiplexing tradeoff curve for the intersymbol interference (ISI) channel is computed, intersymbol interference (ISI), max- imum-likelihood sequence estimation , minimum mean-square- error (MMSE

Tse, David

371

Converging, pervasive technologies: chronic and emerging issues and policy adequacy.  

PubMed

This article is a thought piece with the expansive goal of identifying policy facilitators and barriers to the development of usable and accessible advanced information and communications technology for people with disabilities across the age span at the research and development and marketing stages. The working hypothesis is as follows: The lack of participation in and representation of the interests of people with disabilities in the technology resource system is a barrier to availability of affordable consumer goods that enable independence and community integration. Converging, pervasive computing technology, especially in housing applications, is used as a case example, drawing especially from research and development conducted by the National Science Foundation Quality of Life Technology Engineering Research Center. A critical theory approach is used to identify problems and seek solutions to the apparent lack of balance between the demand and needs of disabled users and the supply and availability of usable, affordable consumer goods produced by the technology resource system in which allocation decisions are made. The approach uses policy analysis tools such as a technology assessment framework; the participation and environment components of the World Health Organization's International Classification of Functioning, Disability and Health; and participatory action research. PMID:18939653

Seelman, Katherine D

2008-01-01

372

Fuzzy reasoning of accident provenance in pervasive healthcare monitoring systems.  

PubMed

In pervasive healthcare monitoring environments, data provenance, as one metadata, can help people analyze the reasons for medical accidents that are generated by complex events. This reasoning processing often encounters inaccurate time and irreversible reasoning problems. How to solve the uncertain process and fuzzy transformation time presents many challenges to the study of data provenance. In this paper, we propose a backward derivation model with the provenance semantic, backward fuzzy time reasoning net (BFTRN), to solve these two problems. We design a backward reasoning algorithm motivated by time automation theory based on this model. With regard to given life-critical alarms and some constraints, it cannot only derive all evolution paths and the possibility distribution of paths from historical information, but also efficiently compute the value of fuzzy time function for each transition of lift-critical complex alarms in the healthcare monitoring system. We also analyze the properties of BFTRN model in this paper. Experiments on real dataset show that the proposed model is efficient. PMID:24240719

Wang, Yongli; Hu, Xiaohua

2013-11-01

373

Present Scenarios and Future Challenges in Pervasive Middleware Amitava Mukherjee  

E-print Network

applications need to adapt to variations of context of execution (such as network bandwidth, battery power and screen size), physical change of locations, change of technological artifacts (devices), change, smartness and adaptation, heterogeneity and integration, and intelligent interfacing. Keywords: Pervasive

New South Wales, University of

374

Virtual Walls: Protecting Digital Privacy in Pervasive Environments  

Microsoft Academic Search

As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users' contextual information, leading to users unwit- tingly leaving \\

Apu Kapadia; Tristan Henderson; Jeffrey J. Fielding; David Kotz

2007-01-01

375

Clinical knowledge management at scale: fulfilling the promise of pervasive  

E-print Network

Clinical knowledge management at scale: fulfilling the promise of pervasive computerized clinical. Corporate Manager Clinical Knowledge Management and Decision Support, Clinical Informatics Research and application results 2. Clinical Knowledge Management System Typical knowledge engineering processes

Gabrieli, John

376

LIGHTWEIGHT CRYPTOGRAPHY Cryptographic Engineering for a Pervasive World  

E-print Network

applications), not to mention possible privacy issues. Even worse, pervasive devices are deployed in a hostile the asymmetric identification scheme crypto-GPS. Its design trade-offs are discussed and the implementation

377

Measured Performance of an IEEE 802.11 Wireless LAN ? ?  

Microsoft Academic Search

Abstract. In this study, the capabilities of an IEEE 802.11 wireless LAN are measured. For the test phases, three wireless laptop computers, a wireless and wired desktop computers,and an access point (AP) are used. In addition to these computers, products of Lucent Technologies have been used as the wireless communication,adapters. Our metric that is the ,criteria used to evaluate ,the

Tamer Demir; Cem Ersoy

378

Copyright (c) 2013 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing pubs-permissions@ieee.org. This article has been accepted for publication in a future issue of this journal, but has not been  

E-print Network

are with the Research School of Engineering, College of Engineering and Computer Science, The Australian National, Salman Durrani, Senior Member, IEEE and Jing Guo, Student Member, IEEE Abstract--This paper presents multi-hop networks [10], [11]. The k-connectivity is a most general notion of connectivity

Durrani, Salman

379

What Are You Viewing? Exploring the Pervasive Social TV Experience  

Microsoft Academic Search

\\u000a The vision of pervasive TV foresees users engaging with interactive video services across a variety of contexts and user interfaces.\\u000a Following this idea, this chapter extends traditional Social TV toward the notion of pervasive Social TV (PSTV) by including\\u000a mobile viewing scenarios. We discuss social interaction enablers that integrate TV content consumption and communication in\\u000a the context of two case

Raimund Schatz; Lynne Baillie; Peter Frhlich; Sebastian Egger; Thomas Grechenig

380

Data Center Transport Mechanisms: Congestion Control Theory and IEEE Standardization  

E-print Network

and deployment. Projects are underway in the IEEE 802.1 standards body, especially in the Data Center Bridging server farms (for web-hosting), as the con- vergence of computing and networking (high, server virtualization, and the development of high-performance Network Interface Cards (NICs). Mohammad

Prabhakar, Balaji

381

Proceedings of the IEEE International Conference on Mechatronics & Automation  

E-print Network

· July 2005 0-7803-9044-X/05/$20.00 © 2005 IEEE Virtual Prototyping and Hardware-in-the-Loop Testing for hardware-in-the-loop testing. We anticipate that such a coupling of computational analysis with development of hardware-in-the-loop simulations will play a significant role in rapid and systematic validation

Krovi, Venkat

382

978-1-4673-4713-6/10/$26.00 2013 IEEE 354 2013 9th International Conference on Natural Computation (ICNC 2013)  

E-print Network

SMR 3 Phantom 3.0 In this paper, PBSN (Planning based Behavior Selection Network) and P300 based BCI, Korea Abstract--We propose planning behavior selection network (PBSN) based brain-computer interface-Planning based Behavior Selection Network; Brain computer interface; I. INTRODUCTION BCI controls computer

Cho, Sung-Bae

383

ASSESSMENT OF (COMPUTER-SUPPORTED) COLLABORATIVE LEARNING This is a post-print of an article submitted for consideration in the IEEE Transactions on Learning  

E-print Network

ASSESSMENT OF (COMPUTER-SUPPORTED) COLLABORATIVE LEARNING This is a post-print of an article.37} Please refer this manuscript as: Strijbos, J. W. (2011). Assessment of (computer-supported) collaborative ON XXXXXXXXXXXXXXXXXXXX, VOL. #, NO. #, MMMMMMMM 1996 Assessment of (Computer-Supported) Collaborative Learning J

Boyer, Edmond

384

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 20, NO. 12, DECEMBER 2008 1585 TKDE 20(12) (December 2008) EIC Editorial  

E-print Network

Associate Editors, reviewers, authors, and support staff from the IEEE Computer Society Publications Office time, and ranks #3 in all IEEE Computer Society transactions in the most recent 2007 journal impact factors. I would like to take this opportunity to review some of the major activities that have taken

Wu, Xindong

385

Generic Node Removal for Factor-Graph SLAM Nicholas Carlevaris-Bianco, Student Member, IEEE, Michael Kaess, Member, IEEE, and  

E-print Network

1 Generic Node Removal for Factor-Graph SLAM Nicholas Carlevaris-Bianco, Student Member, IEEE on a generic factor-based method for node removal in factor-graph simultaneous localization and mapping (SLAM by long-term SLAM applications whereby nodes are removed in order to control the computational cost

Eustice, Ryan

386

Ubiquitous computing in sports: A review and analysis  

Microsoft Academic Search

Ubiquitous (pervasive) computing is a term for a synergetic use of sensing, communication and computing. Pervasive use of computing has seen a rapid increase in the current decade. This development has propagated in applied sport science and everyday life.The work presents a survey of recent developments in sport and leisure with emphasis on technology and computational techniques. A detailed analysis

Arnold Baca; Peter Dabnichki; Mario Heller; Philipp Kornfeind

2009-01-01

387

[Gender dysphoria in pervasive developmental disorders].  

PubMed

Pervasive developmental disorders (PDD) are characterized by two essential symptoms: impairment in social interaction, and restricted, repetitive, and stereotyped patterns of behavior, interests, and activities. PDD include autistic disorder, Asperger's disorder, and PDD-Not Otherwise Specified (PDD-NOS). These three disorders are sometimes termed autism spectrum disorders. A recent epidemiological survey demonstrated that the rate of PDD may be almost 1% and that many PDD cases might not be diagnosed properly in childhood. Erik Erikson described eight stages of psychosocial development through which a normally developing human should pass from infancy to adulthood. In the theory, an adolescent shows 'Identity vs. Role Confusion'. It has been reported that individuals with PDD often have identity crises which sometimes include gender dysphoria. This phenomenon might be related to the so-called identity diffusion in youth. When they reach their young youth, it has been said that subjects with PDD realize their uniqueness and differences compared to others, and, as a result, they may develop confusion of identity which could be exhibited as gender identity disorder. A recent study demonstrated that, amongst 204 children and adolescents who visited a GID clinic in the Netherlands, 7.8% were diagnosed with autism spectrum disorders after a careful diagnostic procedure by a multi-disciplinary team. Taken together, PDD and GID seem closely related to each other. In this paper, we present four PDD cases with gender dysphoria and related symptoms: 1) a girl with PDD who repeatedly asserted gender identity disorder (GID) symptoms in response to social isolation at school, 2) a junior high school boy with PDD and transvestism, 3) a boy diagnosed with Asperger's disorder who developed a disturbance of sexual orientation, and 4) a boy with Asperger's disorder and comorbid childhood GID. Many of the clinical symptoms related to gender dysphoria might be explained by the cognitive characteristics and psychopathology of PDD. The Japanese Society of Psychiatry and Neurology published guidelines for the assessment and treatment of GID in 1997, and revised them in 2006. As a result, GID has become well known as a clinical entity in Japan, and there have been an increasing number of Japanese patients complaining of gender dysphoria. It is important to consider an underlying diagnosis of PDD when encountering patients with gender dysphoria. PMID:22352003

Tateno, Masaru; Ikeda, Hiroshi; Saito, Toshikazu

2011-01-01

388

Proceedings of the 12th IEEE International Conference on Computer Communications and Networks, ICCCN 2003, Dallas, Texas, October 2003, pp.311-318.  

E-print Network

are weighted against their general advantage, these approaches do not seem to be gaining any acceptance. Zaghal Networking and Media Communications Research Laboratories Department of Computer Science, Kent

Khan, Javed I.

389

Developing quantum nanocomputing for pervasive health environments  

Microsoft Academic Search

A model of quantum information processing is proposed for applications in health-care and assistive environments. It uses implanted nano-chips which could incorporate quantum computing technology and make use of the advantages of high computing and large memory capacity of a quantum system to the data storage procedure of a medical sensor. Quantum information and its storage has not yet been

K. Prousalis; E. Konstantinou; N. Konofaos; A. A. Iliadis

2009-01-01

390

Appears in IEEE Transactions on Parallel and Distributed Systems, Volume 4(8), August 1993. The Scalability of FFT on Parallel Computers #  

E-print Network

. The Scalability of FFT on Parallel Computers # Anshul Gupta and Vipin Kumar Department of Computer Science, University of Minnesota Minneapolis, MN ­ 55455 agupta@cs.umn.edu kumar@cs.umn.edu TR 90­53, October 1990­Tukey FFT algorithm on a few classes of architectures, the methodology can be used to study the performance

Kumar, Vipin

391

In: Proceedings of the IEEE Real-Time Technology and Applications Symposium, Chicago, IL, May 1995, pp. 4-14. SUPPORT FOR REAL-TIME COMPUTING WITHIN GENERAL  

E-print Network

, pp. 4-14. SUPPORT FOR REAL-TIME COMPUTING WITHIN GENERAL PURPOSE OPERATING SYSTEMS Supporting Co operating system and a predictable real-time ker- nel, to co-exist on the same hardware. We discuss for real-time computing beyond allowing tasks to manipulate their exe- cution priority. Operating systems

Jeffay, Kevin

392

1248 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS--PART A: SYSTEMS AND HUMANS, VOL. 38, NO. 6, NOVEMBER 2008 A HumanComputer Interface Using Symmetry  

E-print Network

-grade computer with video input from an inexpensive Universal Serial Bus camera and works without special lighting. The system detects and tracks the person's face using multiscale template correlation a practical tool for people with severe paralysis. Index Terms--Assistive technology, disabled computer users

Betke, Margrit

393

An IEEE 1394-Firewall-Based Embedded Video System for Surveillance Applications  

Microsoft Academic Search

In order to address the need for portable inexpensive systems for video surveillance, we built a computer vision system that provides digital video data transfer from a CCD camera using embedded software\\/hardware via the IEEE 1394 protocol, also known as FireWire or i.Link, and Ethernet TCP\\/IP interfaces. Controlled by an extended version of the IEEE 1394-based digital camera specification (DCAM),

Ashraf Saad; Donnie Smith

2003-01-01

394

Configurable dynamic privacy for pervasive sensor networks  

E-print Network

Ubiquitous computing sensor networks have greatly augmented the functionality of interactive media systems by adding the ability to capture and store activity-related information. Analyzing the information recorded from ...

Gong, Nan-Wei

2009-01-01

395

0018-9162/04/$20.00 2004 IEEE36 Computer C O V E R F E A T U R E  

E-print Network

with conventional computers in offices, meeting rooms, classrooms, and homes. The smart homes of the future, thermostats, telephones, cam- corders, factory equipment, automobiles, and even some light switches in offices, meeting rooms, classrooms, homes, factories, and military command posts. Office

Myers, Brad A.

396

"What Are You Viewing?" Exploring the Pervasive Social TV Experience  

NASA Astrophysics Data System (ADS)

The vision of pervasive TV foresees users engaging with interactive video services across a variety of contexts and user interfaces. Following this idea, this chapter extends traditional Social TV toward the notion of pervasive Social TV (PSTV) by including mobile viewing scenarios. We discuss social interaction enablers that integrate TV content consumption and communication in the context of two case studies that evaluate Social TV on mobile smartphones as well as the traditional set-top-box-based setup. We report on the impact of social features such as text-chat, audio-chat, and synchronized channel-choice on the end-user's media experience. By analyzing the commonalities and the differences between mobile and living-room Social TV that we found, we provide guidance on the design of pervasive Social TV systems as well as on future research issues.

Schatz, Raimund; Baillie, Lynne; Frhlich, Peter; Egger, Sebastian; Grechenig, Thomas

397

Pervasive transcription: illuminating the dark matter of bacterial transcriptomes.  

PubMed

The conventional view of transcription posits that mRNAs are generated from the coding DNA strand and are delineated by gene boundaries; however, recent reports have mapped transcription start sites to unexpected locations in bacterial genomes, including the non-coding strand. The resultant RNAs were previously dismissed as artefacts, but models that describe such events as 'pervasive transcription' are now gaining support. In this Opinion article, we discuss our current understanding of pervasive transcription, its genetic origin and its regulation. On the basis of existing observations, we propose that RNAs that result from pervasive transcription are more than 'transcriptional noise' and have important functions in gene regulation and genome evolution. PMID:25069631

Wade, Joseph T; Grainger, David C

2014-09-01

398

IEEE Eng Med Biol Mag. Author manuscript Issues in image-guided therapy  

E-print Network

IEEE Eng Med Biol Mag. Author manuscript Page /1 5 Issues in image-guided therapy Haigron Pascal 1 ; computer assisted surgery ; computer vision ; image guided therapy ; medical robotics Medical robotics, Computer Assisted Surgery (CAS), Image-Guided Therapy (IGT) and the like emerged more than 20 years ago

Paris-Sud XI, Université de

399

Challenges in Data Quality Assurance in Pervasive  

E-print Network

and in this manner, we need a holistic system view that inspects contributions to risk and error in medical data displayed on the bedside monitor. nurse's station computer to enter Jane's identity, associating the data stream with Jane. Data entering mobile tablet associates with Jane's bedside monitor and sensor

Kotz, David

400

Autonomic Pervasive Applications Driven by Abstract Specifications  

E-print Network

.g. service and data providers and consumers). The current trend to build applications out of remote services technologies. Computing and communication power of these devices continuously increase, allowing them to run and maintain; most existing solutions are proprietary, limited in terms of provided services and executed

Paris-Sud XI, Université de

401

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS VOL. XX, NO. Y, MONTH 200X 1 Sparse Transformations and Preconditioners for 3-D Capacitance  

E-print Network

200X 1 Sparse Transformations and Preconditioners for 3-D Capacitance Extraction Shu Yan, Vivek Sarin Station, TX 77843, shu@ee.tamu.edu Vivek Sarin, Department of Computer Science, Texas A&M University, College Station, TX 77843, sarin@cs.tamu.edu Weiping Shi, Department of Electrical Engineering, Texas A

Sarin, Vivek

402

Proc. of 36th IEEE Conf. on Decision and Control, Dec. 1997, San Diego, CA, USA On Computing Optimal Controllers for Finite State  

E-print Network

their use is limited to quite small dy- namical system. We devised a symbolic algorithm for automatic syn for a semiconductor manufacturing facility. This entails computing OCs for plants with about 3#3;10 9 states. In- formally our Optimal Control Problem (OCP) can be described as follows. We are given a plant (i

Tronci, Enrico

403

IEEE TRANSACTIONS ON COMPUTERS, VOL. C-27, NO. 3, MARCH 1978 It should be noted that for the left-to right-scanning algorithm  

E-print Network

-194, 1965. The Automatic Counting of Asbestos Fibers in Air Samples T. PAVLIDIS AND K. STEIGLITZ Abstract-A method is described for automating the counting of asbestos fibers in air samples by computer processing of digitized pictures. Preliminary results sh-ow the method is feasible. Index Terms-Asbestos, asbestos fibers

Steiglitz, Kenneth

404

BU CS TR-1999-017. Appears in Proc. IEEE Computer Vision and Pattern Recognition, June 2000 Inferring Body Pose without Tracking Body Parts  

E-print Network

Inferring Body Pose without Tracking Body Parts R´omer Rosales and Stan Sclaroff Image and Video Computing. In this paper, we develop an approach for estimating hu- man body pose given a single image or a monocular image configuration (i.e.,the projection onto the image plane) of a single artic- ulated body in terms of the position

405

Appears in Proceedings of the 2011 IEEE International Conference on Computer Design (ICCD), Amherst, Massachusetts, October 2011. An Optimized Scaled Neural Branch Predictor  

E-print Network

, Massachusetts, October 2011. 1 An Optimized Scaled Neural Branch Predictor Daniel A. Jim´enez Department of optimizations to the Scaled Neural Analog Predictor [1], [2], a branch predictor based on neural learning of Computer Science The University of Texas at San Antonio Abstract--Conditional branch prediction remains one

Jiménez, Daniel A.

406

1012 IEEE TRANSACTIONS ON ELECTROMAGNETIC COMPATIBILITY, VOL. 47, NO. 4, NOVEMBER 2005 removed. This permits the FDTD method to be used for computing the  

E-print Network

. This permits the FDTD method to be used for computing the propagation of lightning pulses over more than 5000, quadripolar matrices model- ing, variable-speed drive. I. INTRODUCTION Voltage inverters used in a variable, 69134 Ecully, France (e-mail: vollaire@ec-lyon.fr). R. Meuret is with society SAFRAN, group Hispano

Boyer, Edmond

407

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, VOL. 5, NO. 4, DECEMBER 2001 271 Computer-Aided Prototype System for Nose Surgery  

E-print Network

--Rhinoplasty, or surgery to reshape the nose, is one of the most common of all plastic-surgery procedures. Rhino- plasty of aging. Rhinoplasty, or surgery to reshape the nose, is one of the most common of all plastic-surgery Computer-Aided Prototype System for Nose Surgery Tong-Yee Lee, Chao-Hung Lin, and Han-Ying Lin Abstract

Chen, Sheng-Wei

408

IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, VOL. 56, NO. 4, APRIL 2008 1009 Corrections to "Computational Modeling Evidence of a  

E-print Network

Corrections to "Computational Modeling Evidence of a Nonthermal Electromagnetic Interaction Mechanism corrected, we were unable to reproduce the microwave nonlinearity at carrier frequencies in the 500-MHz­8­2045, Aug. 2004. Manuscript received December 19, 2007. N. S. Stoykov is with the Rehabilitation Institute

Taflove, Allen

409

IEEE TRANSACTIONS ON COMPUTERS, VOL. C-28, NO. 9, SEPTEMBER 1979 [1] C. Black, C.-E. Sundberg, and W. K. S. Walker, "Development of a spaceborne  

E-print Network

-Many largesequential computers execute operations in a different order than isspecified by the program. A correct, hardware correctness, multiprocessing, parallel processing. A high-speed processor may execute operations with one another only through the memory modules. (Any special communication registers may be regarded

Rajamani, Sriram K.

410

1000 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 30, NO. 7, JULY 2011 Placement and Routing for Cross-Referencing  

E-print Network

. F. Y. Young is with the Department of Computer Science and En- gineering, Chinese University of Hong of biochips. Traditional biochips utilize continuous-flow microfluidic technologies. In continuous to be custom- made according to specific applications, because of the tight coupling of the system

Young, Evangeline Fun Yu

411

0018-9162/05/$20.00 2005 IEEE40 Computer C O V E R F E A T U R E  

E-print Network

Society High-Performance, Power-Aware Distributed Computing for Scientific Applications C omputer models- ulations of DNA sequencing and protein folding advance healthcare and drug dis- covery. Mathematical allow more accurate forecasting and life-saving weather alerts. Nanoscale simulations enhance underlying

Ge, Rong

412

in: Proceedings of the Tenth IEEE International Conference on Computer Vision, pp. 1292-1299, Beijing, China, October 15-21, 2005.  

E-print Network

pictures taken with conventional fish-eye lenses in many respects: they may span wider fields of view a scene we turn our eyes and head and cap- ture images in a wide field of view. For millennia painters of in- expensive digital cameras, their seamless integration with computers, and recent progress

Peters, Gabriele

413

50 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 23, NO. 1, JANUARY 2004 Optimizing Designs Using the Addition  

E-print Network

, JANUARY 2004 Optimizing Designs Using the Addition of Deflection Operations Jennifer L. Wong, Student of deflecting the re- sult of to , before reaching ; hence, we term such an operation a deflection operation. A deflection operation can be added anywhere in a computation structure without changing the functionality

Wong, Jennifer L.

414

Adding GPU Computing to Computer Organization Courses David Bunde  

E-print Network

techniques to teach CUDA in elective courses. The emerging ACM/IEEE Computer Science Curricula 2013 undergraduate computer organization course. One practical reason to teach GPU computing is the availabilityAdding GPU Computing to Computer Organization Courses David Bunde Knox College Galesburg, Illinois

Bunde, David

415

Affect comprehension in children with pervasive developmental disorders  

Microsoft Academic Search

Affect comprehension was studied in children with pervasive developmental disorders (PDD) and normal children matched for mental age. Three matching tasks were used: matching objects (a nonsocial control task), matching faces, and matching affects. The three tasks were developed to be of equal difficulty for normal children. Children were also tested for comprehension and expression of affect terms. The PDD

Mark Braverman; Deborah Fein; Dorothy Lucci; Lynn Waterhouse

1989-01-01

416

Fragmented Visuospatial Processing in Children with Pervasive Developmental Disorder  

ERIC Educational Resources Information Center

Children diagnosed with Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS) and Asperger Syndrome (AS) may be characterised by a similar perceptual focus on details as children with autistic disorder (AD). This was tested by analysing their performance in a visuoperceptual task [the Children's Embedded Figure Test (CEFT)] and a

Schlooz, Wim A. J. M.; Hulstijn, Wouter; van den Broek, Pieter J. A.; van der Pijll, Angela C. A. M.; Gabreels, Fons; van der Gaag, Rutger J.; Rotteveel, Jan J.

2006-01-01

417

Pervasive Technology in Distributed Healthcare: Simultaneous Assessment of Multiple Individuals  

Microsoft Academic Search

The current paradigm of clinic-focused healthcare is challenged by growing numbers of aging baby boomers and the concomitant cost of managing chronic health conditions. We have begun investigating an alternative to clinic-based health assessments, in which pervasive technologies are used to enable continuous monitoring and assessment of patients in a variety of settings outside of hospitals. There are many outstanding

Tamara L. Hayes; Misha Pavel; Andre Adami; Nicole Larimer; Ann Tsay

2006-01-01

418

Pervasive informatics and persistent actimetric information in health smart homes  

E-print Network

Pervasive informatics and persistent actimetric information in health smart homes Yannick Fouquet (arrows) for localizing dependent people in a health smart home (left) & pressure sensors (right: FSA Seat integrated smart home (HsH). In general, the underlying principle of the HsH consists in continuously

Fouquet, Yannick

419

Pervasive Learning Games: Explorations of Hybrid Educational Gamescapes  

ERIC Educational Resources Information Center

Pervasive gaming has tremendous potential as a learning tool and represents an interesting development in the field of video games and education. The literature surrounding video games and education is vast: For more than 20 years, educationalists have been discussing the potential that exists for the application of video games to learning.

Thomas, Siobhan

2006-01-01

420

Distributed video game streaming system for pervasive gaming  

E-print Network

Distributed video game streaming system for pervasive gaming A. Jurgelionis1 , F. Bellotti2 , A. De video game streaming system. Newly developed streaming protocols and system architectures enable that the Games@Large system is capable of running video games of different genres, also including First Person

Eisert, Peter

421

Chapter XX: Pervasive Sensing and Monitoring for Situational Awareness  

E-print Network

and processes which can then be used to gain situational awareness of the activities in the instrumented spaceChapter XX: Pervasive Sensing and Monitoring for Situational Awareness. Situational awareness, in a broad sense, refers to a continuum of knowledge that captures the current state

422

Policy Based Control of Context Aware Pervasive Services  

E-print Network

Policy Based Control of Context Aware Pervasive Services Evi Syukur1 and Seng Wai Loke2 1 School awareness is important if we want to give a mobile user autonomous, responsive and attentive services issues regarding location modeling, system design and implementation of simple awareness scenarios

Loke, Seng W. - Loke, Seng W.

423

Sound aided interface of a pervasive pain monitoring system  

Microsoft Academic Search

We have developed a new version of a pervasive system for monitoring and recording subjective pain experiences. The most important service the system offers to its users is real-time delivery of reported pain values from patients to nurses. Pain experiences are expressed on a six-value scale from \\

Ismo Alakarppa; Sofia Larsson; Jukka Riekki; Elisa Jaakkola

2011-01-01

424

From Operating-System Correctness to Pervasively Verified Applications  

E-print Network

correctness. Based on the formal correctness of our real-time operating system Olos, this paper describes of hardware, a real-time operating system, and application programs. We have implemented the operating system of its automotive subproject is a pervasively verified distributed real-time system, consisting

Paris-Sud XI, Université de

425

Early Symptoms and Recognition of Pervasive Developmental Disorders in Germany  

ERIC Educational Resources Information Center

Pervasive developmental disorders are characterised by the presence of abnormalities in social interaction and communication as well as repetitive patterns of behaviours. Although early symptoms of the disorder often appear during the first two years of life, its diagnosis is often delayed. The purpose of this study is to analyse the delay between

Noterdaeme, Michele; Hutzelmeyer-Nickels, Anna

2010-01-01

426

Pervasive Diagnosis: Integration of Active Diagnosis into Production Plans  

E-print Network

Pervasive Diagnosis: Integration of Active Diagnosis into Production Plans Lukas Kuhn, Bob Price goals. The same model can be used by model-based diagnosis to indirectly infer the condition of components in a sys- tem from partially informative sensors. Existing work has demonstrated that diagnosis

de Kleer, Johan

427

Pervasive Surveillance Networks: Design, Implementation and Performance Analysis  

Microsoft Academic Search

Pervasive surveillance implies the continuous tracking of multiple targets as they move about the monitored region. The tasks to be performed by a surveillance system have the following requirements: (1) track the identified targets automatically over the region being monitored; (2) allow tele-control of active sensors to follow operator commands; (3) provide concise feedback and video data of a tracked

Amit Goradia; Zhiwei Cen; Clayton Haffner; Yang Liu; Boo Heon Song; Matt Mutka; Ning Xi

428

Middleware for Pervasive Spaces: Balancing Privacy and Utility  

Microsoft Academic Search

Middleware for pervasive spaces has to meet conflicting re- quirements. It has to both maximize the utility of the information ex- posed and ensure that this information does not violate users' privacy. In order to resolve these conflicts, we propose a framework grounded in utility theory where users dynamically control the level of disclosure about their information. We begin by

Daniel Massaguer; Bijit Hore; Mamadou H. Diallo; Sharad Mehrotra; Nalini Venkatasubramanian

2009-01-01

429

Player Perception of Context Information Utilization in Pervasive Mobile Games  

Microsoft Academic Search

Pervasive games combine real world and virtual game elements in game design. A player might need to find WiFi hot spots, move to different locations based on mobile network cell IDs, or to do certain tasks at different times of the day. These are just few examples how the real world elements can be utilized in game design. The possibilities

Janne Paavilainen; Hannu Korhonen; Hannamari Saarenp; Jussi Holopainen

2009-01-01

430

Designing Pervasive Games to Support University Studies in Media Technology  

Microsoft Academic Search

New media technology students at university face many challenges from social to pedagogical when they start academic studies. One of the programs initial goals for these new students is to introduce them to some of the key social Web services that they will need to use for their schoolwork. The use of pervasive games to reach this specific purpose may

Daniel Spikol; Oskar Pettersson; Anders Gerestrand

2009-01-01

431

Pervasive integrated material handling in 300 mm semiconductor manufacturing  

Microsoft Academic Search

The semiconductor industry's transition to 300 mm manufacturing has created many new challenges for factory automation. The increased wafer size has introduced ergonomic concerns and operational challenges leading companies to pursue a pervasive automated lot delivery infrastructure capable of supporting lot movement and processing scenarios in both technology development and high volume manufacturing. This paper will trace the evolution in

Ross A. Giddings; Jeffrey C. Hunter

2004-01-01

432

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 20, NO. 12, DECEMBER 1998 1371 Real-Time American Sign Language  

E-print Network

, Student Member, IEEE, Joshua Weaver, and Alex Pentland, Member, IEEE Computer Society Abstract--We present training through Baum-Welch re-estimation was uncommon. Results were not reported with the standard accuracy measures accepted in the speech- and handwriting-recognition communities, and training and testing

Collins, Robert T.

433

1 of 9Submitted to IEEE Design & Test of Computers (22 March 2000 4:59 pm) Abstract: We propose a conceptual framework, called the Rugby Model, in which designs, design processes  

E-print Network

of tools and methodologies for designing complex system. 1: Introduction A conceptual framework like the Y chart [1] helps designers, researchers, teachers, tool developers, and foremost students Concepts in Electronic System Design Axel Jantsch, Shashi Kumar, Ahmed Hemani #12;2 of 9Submitted to IEEE

Jantsch, Axel

434

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION 1  

E-print Network

Dynamics on Scale-Free Interaction Networks Joshua L. Payne, Student Member, IEEE and Margaret J. Eppstein Abstract--There has been a recent surge of interest in study- ing dynamical processes, including of both scaling and assortativity. Neither the eigenvalues of the adjacency matrix nor the effective

Eppstein, Margaret J.

435

Gashi, I., Popov, P. T. & Strigini, L. (2007). Fault tolerance via diversity for off-the-shelf products: A study with SQL database servers. IEEE Transactions on Dependable and Secure Computing, 4(4),  

E-print Network

Gashi, I., Popov, P. T. & Strigini, L. (2007). Fault tolerance via diversity for off Online Original citation: Gashi, I., Popov, P. T. & Strigini, L. (2007). Fault tolerance via diversity, Peter POPOV, and Lorenzo STRIGINI, Member, IEEE Abstract-- If an off-the-shelf software product exhibits

Weyde, Tillman

436

Using Cluster Ensemble and Validation to Identify Subtypes of Pervasive Developmental Disorders  

E-print Network

-IV (Diagnostic and Statistical Manual of Mental Disorders - 4th Edition)2 , attempt to provide diagnosticUsing Cluster Ensemble and Validation to Identify Subtypes of Pervasive Developmental Disorders Centre, Kingston, Ontario Abstract Pervasive Developmental Disorders (PDD) are neurodevelopmental

Shatkay, Hagit

437

Simulation of Computer Architectures: Simulators, Benchmarks, Methodologies,  

E-print Network

Simulation of Computer Architectures: Simulators, Benchmarks, Methodologies, and Recommendations Joshua J. Yi, Member, IEEE, and David J. Lilja, Fellow, IEEE Abstract--Simulators have become an integral the efficacy of an enhancement. However, long simulation times and poor accuracy limit their effectiveness

Minnesota, University of

438

Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components  

PubMed Central

Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers. PMID:19132095

Fragopoulos, Anastasios; Gialelis, John; Serpanos, Dimitrios

2009-01-01

439

Proceedings of the 1994 ASME/IEEE joint railroad conference  

SciTech Connect

The proceedings contains 22 papers from the IEEE/ASME Joint Railroad Conference. Topics discussed include flange bearing crossing frogs; rapid transit; vehicle on-board computer systems; total transport system control functions; automated train dispatching system; wheel thermal damage limits; AC propulsion; AC traction drives; electric power supplies; failure detection and identification; cargo transportation; and critical speed for railroad vehicles. Papers within the scope of the data base have been processed separately.

Hawthorne, K.L. [ed.; Hill, J.R. [ed.

1994-12-31

440

Performance of the Sleep-Mode Mechanism of the New IEEE 802.16m Proposal for Correlated Downlink Traffic  

NASA Astrophysics Data System (ADS)

There is a considerable interest nowadays in making wireless telecommunication more energy-efficient. The sleep-mode mechanism in WiMAX (IEEE 802.16e) is one of such energy saving measures. Recently, Samsung proposed some modifications on the sleep-mode mechanism, scheduled to appear in the forthcoming IEEE 802.16m standard, aimed at minimizing the signaling overhead. In this work, we present a performance analysis of this proposal and clarify the differences with the standard mechanism included in IEEE 802.16e. We also propose some special algorithms aimed at reducing the computational complexity of the analysis.

de Turck, Koen; de Vuyst, Stijn; Fiems, Dieter; Wittevrongel, Sabine; Bruneel, Herwig

441

Supporting People with Dementia Using Pervasive Healthcare Technologies  

NASA Astrophysics Data System (ADS)

In this chapter, an introduction is provided into pervasive healthcare technology, specifically as the use of information and communications technology in support of European policies, primarily inclusion. The focus of the chapter, and indeed the book, is on how such technologies can support people suffering from debilitating diseases including Alzheimer's. The work describes a research project called COGKNOW, comprising a multidisciplinary research consortium of scientists from across Europe, and relates some of the early achievements of the group from some very different perspectives, including technical, clinical, ethical, and of course how the needs of people with dementia and their carers can be harnessed in the development process to produce pervasive healthcare technology and services that are valued by all the stakeholders in the process.

Mulvenna, Maurice D.; Nugent, Chris D.; Moelaert, Ferial; Craig, David; Dres, Rose-Marie; Bengtsson, Johan E.

442

P2P M-commerce in pervasive environments  

Microsoft Academic Search

Pervasive environments are characterized by the presence of wireless devices ranging from sensors to mobile PDA-phones to laptops. Peer-to-Peer (P2P) information sharing in such environments presents a tremendous opportunity for people and devices to exchange information such as music, pictures, documents and stock tickers with peers. Information that has a monetary value introduces a whole new set of problems for

Sasikanth Avancha; Peter D'Souza; Filip Perich; Anupam Joshi; Yelena Yesha

2002-01-01

443

Context-aware middleware for pervasive elderly homecare  

Microsoft Academic Search

The growing aging population faces a number of challenges, including rising medical cost, inadequate number of medical doctors and healthcare professionals, as well as higher incidence of misdiagnosis. There is an increasing demand for a better healthcare support for the elderly and one promising solution is the development of a context-aware middleware infrastructure for pervasive health\\/wellness-care. This allows the accurate

Hung Keng Pung; Tao Gu; Wenwei Xue; Paulito P. Palmes; Jian Zhu; Wen Long Ng; Chee Weng Tang; Nguyen Hoang Chung

2009-01-01

444

Familial pervasive development disorder, Tourette disorder and hyperlexia.  

PubMed

Four children and one adult have been found to have Pervasive Developmental Disorder, Tourette disorder and hyperlexia in North Dakota, a state with a population of 204,161 children ages 0-18. Assuming that these are independent disorders the probability of these three disorders occurring by chance in one child is 3.39 x 10(-12). Two of these individuals are from the same family. This suggests evidence for genetic linkage among these three disorders. PMID:3226648

Burd, L; Kerbeshian, J

1988-01-01

445

Pervasive Web News Recommendation for Visually Impaired People  

Microsoft Academic Search

It is very difficult for blind and visually-impaired people getting information from the outside world. In this paper, we propose an adaptive Web news recommendation system named EagleRadio, designed for blind man and supports pervasive access using terminals. EagleRadio offers natural and user-friendly interface. News stories from different topics are read via a speech synthesizer to users and they can

Wei Chen; Li-jun Zhang; Can Wang; Chun Chen; Jia-jun Bu

2008-01-01

446

TEDIS, Pervasive Developmental Disorder' patients information system, preliminary results.  

PubMed

TEDIS, an information system dedicated to patients with Pervasive Developmental Disorder (PDD) was tested. Results focused on the process of behavioural changes among physicians and health professionals with regard to structured organized patient information.The experiment encouraged changes in professionals' habits for further documenting and systematizing patient information collection. TEDIS' project federated professionals for developing methods for a systematic and exhaustive patient data management, in a longitudinal and cross-domain perspective, for improving knowledge and health care management. PMID:22874197

Ben Said, Mohamed; Robel, Laurence; Pellegrin-Touati, Marie; Rousselot-Pailly, Berangere; Golse, Bernard; Jais, Jean Philippe; Landais, Paul

2012-01-01

447

Eventcasting with a Wearable Computer  

Microsoft Academic Search

Traditionally, interaction methods for wearable comput- ers have focused on input to the computer itself, yet little has been done when it comes to allowing interaction with the surrounding environment. Pervasive computing, on the other hand, offers access to computational power from any place all the time, yet most interaction techniques utilizeei- ther physical hardware or monitoring of the user

Mikael Drugge; Marcus Nilsson; Kre Synnes; Peter Parnes

2004-01-01

448

2012 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops The Estrellita System  

E-print Network

. Using mobile phone as a health informatics tools can lead to early identification of potential-preterm infants, prematurity, health informatics, capture and access, clinicians, pediatric informatics, mobile-person HRIF visits through sharing of infant health data via mobile devices and an online web portal

Hayes, Gillian R.

449

ACCEPTED VERSION, IEEE TRANSACTIONS ON ROBOTICS. THE FINAL PUBLICATION IS AVAILABLE AT IEEEXPLORE.IEEE.ORG 1 On Cooperative Patrolling: Optimal Trajectories,  

E-print Network

ACCEPTED VERSION, IEEE TRANSACTIONS ON ROBOTICS. THE FINAL PUBLICATION IS AVAILABLE AT IEEEXPLORE algorithm for its computation. Then, we describe a distributed procedure that steers the robots toward refresh time problem, under the technical assumption of a constant number of robots involved

450

Pervasive and Non-Pervasive Conduct Problems in a Clinic Sample Aged 4-8 Years: Child, Family and Day-Care/School Factors  

ERIC Educational Resources Information Center

Differences between pervasive (home and day-care/school) versus non-pervasive (home only) conduct problems were examined in regard to various child, parent/family, and day-care/school characteristics in an outpatient clinic sample of 120 children aged 4-8 years. All children scored above the 90th percentile on the Eyberg Child Behavior Inventory

Drugli, May Britt; Larsson, Bo; Clifford, Graham; Fossum, Sturla

2007-01-01

451

Quasi-Output-Buffered Switches Cheng-Shang Chang, Fellow, IEEE, Jay Cheng, Senior Member, IEEE,  

E-print Network

1 Quasi-Output-Buffered Switches Cheng-Shang Chang, Fellow, IEEE, Jay Cheng, Senior Member, IEEE, Duan-Shin Lee, Senior Member, IEEE, and Chi-Feung Wu Abstract--It is well known that output-buffered switches have better performance than other switch architectures. However, output-buffered switches also

Chang, Cheng-Shang

452

Distributed Weight Balancing over Digraphs Apostolos I. Rikos, Member, IEEE, Themistoklis Charalambous, Member, IEEE, and  

E-print Network

Distributed Weight Balancing over Digraphs Apostolos I. Rikos, Member, IEEE, Themistoklis Charalambous, Member, IEEE, and Christoforos N. Hadjicostis, Senior Member, IEEE Abstract A weighted digraph is balanced if, for each node, the sum of the weights of the edges outgoing from that node is equal to the sum

Hadjicostis, Christoforos

453

2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any c  

E-print Network

.ieee.org/portal/pages/about/documentation/copyright/polilink.html. www.computer.org/intelligent Case Study: An Intelligent Decision-Support System Zbigniew Michalewicz IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society T r a n s p o r t a t i o n a n d L o g i s t i c s Case Study: An Intelligent Decision- Support System Zbigniew Michalewicz, University

Michalewicz, Zbigniew

454

IEEE Computer Society kasahara@waseda.jp  

E-print Network

:00-7:00 #12; Everywhere 2 , ,,TV, DVD IBM/ Sony/ Toshiba Cell, Fuijtsu FR1000, Panasonic Uniphier NEC M `` M `` 0 `0 3 `0 4 `0 5 `0 6`0 2 0 `0 3 `0 4 `0 5 `0 6`0 2 PC DVD M DVD M TVM M PC DVD M DVD M TVM M 2005.5.11 NEDO B

Kasahara, Hironori

455

IEEE Computer Society kasahara@waseda.jp  

E-print Network

-3203-4485 1 Top, 2012728() #12; 2020 IT 111 2 #12;CPU 100 70 705,024 4 3 #12; ­ CPU56GHz 3 ­ CPU182 CPU CPU ­ ­ ) 8 10.61mm x 9.88mm PJ 4 #12; CPU NEC 5 #12; M9000 SR16000 #12 of Static Schedule for Heterogeneous Multi-core with Data Transfer Overlapping and Power Control CPU0 CORE

Kasahara, Hironori

456

Correcting pervasive errors in RNA crystallography through enumerative structure prediction  

PubMed Central

Three-dimensional RNA models fitted into crystallographic density maps exhibit pervasive conformational ambiguities, geometric errors, and steric clashes. To address these problems, we present Enumerative Real-space Refinement ASsisted by Electron density under Rosetta (ERRASER), coupled to PHENIX (Python-based Hierarchical Environment for Integrated Xtallography) diffraction-based refinement. On 24 datasets, ERRASER automatically corrects the majority of MolProbity-assessed errors, improves average Rfree factor, resolves functionally important discrepancies in non-canonical structure, and refines low-resolution models to better match higher resolution models. PMID:23202432

Chou, Fang-Chieh; Sripakdeevong, Parin; Dibrov, Sergey M.; Hermann, Thomas; Das, Rhiju

2012-01-01

457

An IEEE 1451.1 Architecture for ISHM Applications  

NASA Technical Reports Server (NTRS)

The IEEE 1451.1 Standard for a Smart Transducer Interface defines a common network information model for connecting and managing smart elements in control and data acquisition networks using network-capable application processors (NCAPs). The Standard is a network-neutral design model that is easily ported across operating systems and physical networks for implementing complex acquisition and control applications by simply plugging in the appropriate network level drivers. To simplify configuration and tracking of transducer and actuator details, the family of 1451 standards defines a Transducer Electronic Data Sheet (TEDS) that is associated with each physical element. The TEDS contains all of the pertinent information about the physical operations of a transducer (such as operating regions, calibration tables, and manufacturer information), which the NCAP uses to configure the system to support a specific transducer. The Integrated Systems Health Management (ISHM) group at NASA's John C. Stennis Space Center (SSC) has been developing an ISHM architecture that utilizes IEEE 1451.1 as the primary configuration and data acquisition mechanism for managing and collecting information from a network of distributed intelligent sensing elements. This work has involved collaboration with other NASA centers, universities and aerospace industries to develop IEEE 1451.1 compliant sensors and interfaces tailored to support health assessment of complex systems. This paper and presentation describe the development and implementation of an interface for the configuration, management and communication of data, information and knowledge generated by a distributed system of IEEE 1451.1 intelligent elements monitoring a rocket engine test system. In this context, an intelligent element is defined as one incorporating support for the IEEE 1451.x standards and additional ISHM functions. Our implementation supports real-time collection of both measurement data (raw ADC counts and converted engineering units) and health statistics produced by each intelligent element. The handling of configuration, calibration and health information is automated by using the TEDS in combination with other electronic data sheets extensions to convey health parameters. By integrating the IEEE 1451.1 Standard for a Smart Transducer Interface with ISHM technologies, each element within a complex system becomes a highly flexible computation engine capable of self-validation and performing other measures of the quality of information it is producing.

Morris, Jon A.; Turowski, Mark; Schmalzel, John L.; Figueroa, Jorge F.

2007-01-01

458

CS 61C: Great Ideas in Computer Architecture (Machine Structures)  

E-print Network

provisioning a medium-sized (1000 servers) facility � More pervasive broadband Internet so can access remote computers efficiently � CommodiKzaKon of HW & SW, ... build $200M Warehouse Scale Computers with 100,000 servers for Internet

California at Irvine, University of

459

Bala KALYANASUNDARAM Department of Computer Science  

E-print Network

Infrastructure proposals Reviewer for: Information Processing Letters SIAM Journal on Computing IEEE Transactions on Computers Journal of Computer and System Sciences Information and Computation NSF proposals in Theoretical Computer Science ESA, FOCS, FST&TCS, STOC, SODA conferences 2 #12;Journal Publications indicates

Kalyanasundaram, Bala

460

Computer engineering curriculum in the new millennium  

Microsoft Academic Search

Currently there is a joint activity (referred to as Computing Curricula 2001, shortened to CC2001) involving the Association for Computing Machinery and the IEEE Computer Society, which is producing curriculum guidance for the broad area of computing. Within this activity, a volume on computer engineering is being developed. This volume addresses the important area of the design and development of

Andrew McGettrick; Mitchell D. Theys; David L. Soldan; Pradip K. Srimani

2003-01-01

461

Adaptive sleep mode management in IEEE 802.16m wireless metropolitan area networks  

E-print Network

Adaptive sleep mode management in IEEE 802.16m wireless metropolitan area networks Sunggeun Jin a of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011, United States c School of Electrical Engineering and INMC, Seoul National University, Seoul 151-744, Republic of Korea a r t i c l e i

Qiao, Daji

462

IEEE 802.15.4 based service configuration mechanism for smartphone  

Microsoft Academic Search

Recent advances in wireless communication technologies have made it possible for even tiny consumer devices to communicate to host systems in a reliable way. Since it is now equipped with strong computational power and sufficient amount of memory, the smartphone could play a role as the host system. In this paper, a service configuration mechanism based on IEEE 802.15.4 will

Choong-Bum Park; Byung-Sung Park; Huy-Jung Uhm; Hoon Choi; Hyong-Shik Kim

2010-01-01

463

IEEE Vehicular Technology Chapter Presentation Recent Advances in Body Area Networks and Industry  

E-print Network

Applications for Internet of Things Professor Min Chen School of Computer Science and Technology Huazhong University of Science and Technology, Wuhan, China Abstract: The Internet of Things (IoT), the ultimate communications and Internet of Things, etc. He is an IEEE Senior Member since 2009. DATE: Monday, April 16, 2012

Chen, Min

464

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 5, NO. 2, JUNE 2003 197 Grounded Spoken Language Acquisition  

E-print Network

is the development of effective archi- tectures for processing multisensory data. Inspired by theories of infant: Experiments in Word Learning Deb Roy, Member, IEEE Abstract--Language is grounded in sensory-motor experience in developing computational systems which represent words, utterances, and underlying concepts in terms

Roy, Deb

465

2009 IEEE 8TH INTERNATIONAL CONFERENCE ON DEVELOPMENT AND LEARNING 1 Learning to Make Facial Expressions  

E-print Network

2009 IEEE 8TH INTERNATIONAL CONFERENCE ON DEVELOPMENT AND LEARNING 1 Learning to Make Facial production by a robotic head with 31 degrees of freedom. Facial motor parameters were learned using feedback illuminate the computational study of how infants learn to make facial expressions. I. INTRODUCTION The human

Zhou, Yuanyuan

466

Integrating Color Constancy into JPEG2000 Marc Ebner, German Tischler and Jurgen Albert Member, IEEE  

E-print Network

of objects from the spectral power distribution entering the eye. This ability to compute color constant1 Integrating Color Constancy into JPEG2000 Marc Ebner, German Tischler and J?urgen Albert Member, IEEE Abstract---The human visual system is able to perceive colors as approximately constant

Ebner, Marc

467

Proceedings of the 1996 IEEE International Conference on Robotics and Automation  

E-print Network

on a single light sensitive VLSI chip (for examples see [5] [6] [8]). Local operations use operands withinProceedings of the 1996 IEEE International Conference on Robotics and Automation Minneapolis­Latency Computational Sensors Vladimir Brajovic and Takeo Kanade The Robotics Institute Carnegie Mellon University

Brajovic, Vladimir

468

0018-9162/99/$10.00 1999 IEEE June 1999 29 Misconceptions  

E-print Network

of Skovde, Sweden #12;30 Computer Using these definitions, we can better explain some common misconceptions about real-time databases. SOME MISCONCEPTIONS ABOUT REAL-TIME DATABASES We present nine commonD 0018-9162/99/$10.00 © 1999 IEEE June 1999 29 Misconceptions About Real-Time Databases atabases

Stankovic, John A.

469

Capability of IEEE 802.11g Networks in Supporting Multi-player Online Games  

E-print Network

the observed game performance greatly. I. INTRODUCTION Multi-player online games (MOGs) are computer games-person-shooter (FPS) games (e.g., Counter-strike [1], Half-life [2], and Unreal Tournament[3]), real-time strategy games. Specifi- cally, the game Half-life [2] is experimented. We choose the IEEE 802.11g Wi-Fi networks

Toulouse, Michel

470

IEEE TRANSACTIONSON POWER ELECTRONICS, VOL. 11, NO. 1, JANUARY 1996 89 Switching Frequency Dependent Averaged  

E-print Network

Dependent Averaged Models for PWM DC-DC Converters Brad Lehman, Member, IEEE, and Richard M. Bass, Senior.The work of B. Lehman was supported in part by the National Science Foundation under Presidential was with the Department of Electrical and Computer Engineering, Mississippi State University. B. Lehman

Lehman, Brad

471

IEEE TRANSACTIONS ON EDUCATION 1 Teaching Data Structures Using Competitive Games  

E-print Network

more effort in its development. In the project described in this paper, students write code that is the "artificial intelligence" for the computer to play a game. The student code is then uploaded to a serverIEEE TRANSACTIONS ON EDUCATION 1 Teaching Data Structures Using Competitive Games Ramon Lawrence

Lawrence, Ramon

472

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 1 Rapid Biologically-Inspired Scene Classification  

E-print Network

biologically plausible and of having low computational complexity, sharing its low-level features with a modelIEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 1 Rapid Biologically-Inspired Scene for mobile robotics applications. The system can differentiate outdoor scenes from various sites on a college

Itti, Laurent

473

20 IEEE TRANSACTIONS ON BROADCASTING, VOL. 55, NO. 1, MARCH 2009 Internet Multicasting of IPTV With  

E-print Network

20 IEEE TRANSACTIONS ON BROADCASTING, VOL. 55, NO. 1, MARCH 2009 Internet Multicasting of IPTV--A technology for multicasting packetized multimedia streams such as IPTV over the Internet backbone is proposed algorithm is used to pre-compute a deterministic transmission schedule for each IP router. The IPTV traffic

Szymanski, Ted

474

Proceedings of the 1996IEEE International Conference on Robotics and Automation  

E-print Network

with manipulators, haptic displays, or assistive devices. For example, in computer assisted surgery a surgeon mayProceedings of the 1996IEEE International Conference on Robotics and Automation Minneapolis,Minnesota - April 1996 Passive robots and haptic displaysbased on nonholonomicelements Michael Peshkin J. Edward

MacIver, Malcolm A.

475

478 IEEE TRANSACTIONS ON EDUCATION, VOL. 39, NO. 4, NOVEMBER 1996 LAD ocomputer Tool for  

E-print Network

and Simulation Robert D. Koller and Bogdan Wilamowski, Senior Member, IEEE Abstract-Modern analog filter designs for cascade filters are common, the same cannot be said for ladder filters. In order to teach advanced topics algorithms exist, most are too computationally complex to use in a classroom. A software package for advanced

Wilamowski, Bogdan Maciej

476

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 1 Skyline Processing on Distributed Vertical  

E-print Network

maintains exactly one dimension. This paper proposes a general solution for vertical decompositionsIEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 1 Skyline Processing on Distributed Vertical that is vertically decomposed among several servers, and a client that wishes to compute the skyline by obtaining

Papadias, Dimitris

477

Performance of asynchronous data transfer methods of IEEE 802.11 MAC protocol  

Microsoft Academic Search

The desire to provide universal connectivity for mobile computers and communication devices is fueling a growing interest in wireless packet networks. To satisfy the needs of wireless data networking, Study Group 802.11 was formed under IEEE project 802 to recommend an international standard for WLANs. A key part of the standard is the MAC protocol needed to support asynchronous and

H. S. Chhaya; S. Gupta

1996-01-01

478

Proceedings IEEE International Test Conference, Washington, DC, 1990 Generating Pseudo-Exhaustive Vectors for External Testing  

E-print Network

Proceedings IEEE International Test Conference, Washington, DC, 1990 Generating Pseudo-Exhaustive Vectors for External Testing S. Hellebrand, H.-J. Wunderlich, O. F. Haberl Institute of Computer Design. Germany Abstract In the past years special chips for external test have been suc- cessfully used

Hellebrand, Sybille

479

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 23, NO. 2, FEBRUARY 1997 83 Representation Inheritance  

E-print Network

Inheritance: A Safe Form of "White Box" Code Inheritance Stephen H. Edwards, Member, IEEE Computer Society implementations as-is, without direct access to their internals. Alternatively, white box code inheritance allows for the efficiency of some subclass operations and to prevent unnecessary duplication of code. Unfortunately, white

480

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 1 3D Convolutional Neural Networks for Human  

E-print Network

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 1 3D Convolutional Neural Networks handcrafted features computed from the raw inputs. Convolutional neural networks (CNNs) are a type of deep]. The convolutional neural networks (CNNs) [17] are a type of deep models in which trainable filters and local

Ji, Shuiwang

481

IEEE TRANSACTION ON PATTERN RECOGNITION AND MACHINE INTELLIGENCE (UNDER REVIEW) 1 Tracking People on a Torus  

E-print Network

IEEE TRANSACTION ON PATTERN RECOGNITION AND MACHINE INTELLIGENCE (UNDER REVIEW) 1 Tracking People surveillance, human- machine interface, video archival and retrieval, computer an- imation, autonomous driving in images. Despite the high dimensionality of the body configura- tion space, many human activities lie

Elgammal, Ahmed

482

Wind Aggregation Via Risky Power Markets Yue Zhao, Member, IEEE, Junjie Qin, Student Member, IEEE, Ram Rajagopal, Member, IEEE,  

E-print Network

--Renewable energy integration, power market, competitive equilibrium, wind aggregation, coalitional game I1 Wind Aggregation Via Risky Power Markets Yue Zhao, Member, IEEE, Junjie Qin, Student Member, IEEE (WPPs) can trade uncertain future power for efficient wind aggregation. A two-settlement market

Zhao, Yue

483

IEEE Communications Magazine May 2001108 Internet Accounting  

E-print Network

IEEE Communications Magazine · May 2001108 Internet Accounting 0163-6804/01/$10.00 © 2001 IEEE ABSTRACT This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different

Pras, Aiko

484

In IEEE International Conference on Pattern Recognition (CVPR), Alaska, June 2008. Recognizing Primitive Interactions by Exploring Actor-Object States  

E-print Network

and Bio-Inspired Computing Laboratory Department of Computer Sciences Florida Institute of TechnologyIn IEEE International Conference on Pattern Recognition (CVPR), Alaska, June 2008. Recognizing. The literature on activity recognition is extensive. In general, activity analysis methods focus on high

Ribeiro, Eraldo

485

IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 59, NO. 3, MARCH 2012 627 Dielectric Characterization of PCL-Based  

E-print Network

IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 59, NO. 3, MARCH 2012 627 Dielectric author *S. M. Aguilar is with the Department of Electrical and Computer Engineering, University. C. Hagness are with the Depart- ment of Electrical and Computer Engineering, University of Wisconsin

Sheridan, Jennifer

486

A Proposal for the IEEE Open Access Page 1 Prepared by: DEA Mediagroup SpA  

E-print Network

· Piscataway, NJ 08854 USA 6 maggio 2013 A Proposal For IEEE Open Access IEEE Xplore Digital Library 2013 #12;A research via the IEEE Xplore digital library IEEE e Open Access Molti Autori, per la pubblicazione dei loro utenti in tutto il mondo tramite la IEEE Xplore digital library! Le tre opzioni di IEEE Open Access

Segatti, Antonio

487

Urbiflock: An experiment in dynamic group management in Pervasive social applications  

Microsoft Academic Search

Pervasive social applications are applications that enable end users to interact and share information on the move. In these applications, the concept of a user group plays a central role as it models the user's social networks. Most pervasive social applications today model these user groups as simple lists of users that have to be manually managed by the user

Andoni Lombide Carreton; Dries Harnie; Elisa Gonzalez Boix; Christophe Scholliers; Tom Van Cutsem; Wolfgang De Meuter

2010-01-01

488

Task-involved versus Ego-Involved: Motivating children to exercise in a pervasive exergame  

Microsoft Academic Search

This paper presents current work on a pervasive health and fitness game (exergame), designed to motivate children to reach their recommended daily exercise goals and facilitate long term behavioural change. I discuss briefly the current work in the area of pervasive exergames and highlight a common theme in the approach they take. Through my study of the relevant psychology literature,

Andrew Peter Macvean

2011-01-01

489

Pervasive informatics and persistent actimetric information in health smart homes : From Language Model to Location Model  

E-print Network

Pervasive informatics and persistent actimetric information in health smart homes : From Language. Pervasive informatics and persistent actimetric information in health smart homes : From Language Model, this approach seems to be a good way of location modelling. Index Terms--smart flats for elderly people

Fouquet, Yannick

490

Empirical Validation of the Involvement Component of the Pervasive GameFlow Model  

E-print Network

into the virtual world of the game; in- stead, in these types of games the virtual world of the digital applicationEmpirical Validation of the Involvement Component of the Pervasive GameFlow Model Eduardo Calvillo presents an empirical investigation into the ques- tion of involvement in pervasive games. The study

Romero, Pablo

491

The molecular basis of cognitive deficits in pervasive developmental disorders  

PubMed Central

Persons with pervasive developmental disorders (PDD) exhibit a range of cognitive deficits that hamper their quality of life, including difficulties involving communication, sociability, and perspective-taking. In recent years, a variety of studies in mice that model genetic syndromes with a high risk of PDD have provided insights into the underlying molecular mechanisms associated with these disorders. What is less appreciated is how the molecular anomalies affect neuronal and circuit function to give rise to the cognitive deficits associated with PDD. In this review, we describe genetic mutations that cause PDD and discuss how they alter fundamental social and cognitive processes. We then describe efforts to correct cognitive impairments associated with these disorders and identify areas of further inquiry in the search for molecular targets for therapeutics for PDD. PMID:22904374

Bhattacharya, Aditi; Klann, Eric

2012-01-01

492

Markers for improvement in children with pervasive developmental disorders.  

PubMed

In a series of prevalence and follow-up studies on North Dakota's 59 children with pervasive developmental disorders, the patient characteristics of hyperlexia, Tourette disorder (TD), and the absence of seizures were found to be associated with improved outcome or higher IQ. We entered these and 17 other characteristics into a regression model using forward, step-wise inclusion to identify the smallest set of predictor variables which were significantly associated with the dependent variables of IQ, and receptive and expressive language. Of the 20 predictor variables used in the regression analysis, the same four variables met inclusion criteria for each of the dependent variables. These predictor variables were: hyperlexia, a known aetiology, TD and age. The relevance of these findings is discussed. PMID:3199430

Fisher, W; Burd, L; Kerbeshian, J

1988-10-01

493

Pervasive developmental disorders and criminal behaviour: a case control study.  

PubMed

The prevalence and pattern of criminal behaviour in a population of 313 former child psychiatric in-patients with pervasive developmental disorders were studied. The patients were divided into three subgroups and compared with 933 matched controls from the general population. Age at follow-up was between 25 years and 59 years. An account of convictions in the nationwide Danish Register of Criminality was used as a measure of criminal behaviour. Among 113 cases with childhood autism, .9% had been convicted. In atypical autism (n=86) and Asperger's syndrome (n=114) the percentages were 8.1% and 18.4%, respectively. The corresponding rate of convictions in the comparison groups was 18.9%, 14.7%, and 19.6% respectively. Particular attention is given to arson in Asperger's syndrome (p= .0009). PMID:17615427

Mouridsen, Svend Erik; Rich, Bente; Isager, Torben; Nedergaard, Niels Jrgen

2008-04-01

494

Utilizing Embedded Semantics for User-Driven Design of Pervasive Environments  

NASA Astrophysics Data System (ADS)

The Web does not only offer an almost infinitive number of services and resources but can be also seen as a technology to combine different technological devices, like mobile phones, digital media solutions, intelligent household appliances, tablet PCs, and any other kind of computers, in order to create environments satisfying the need of users. However, due to the large amount of web resources and services as well as the variety and range of user needs, it is impossible to realize software solutions for all possible scenarios. In this paper, we present a user-driven approach towards designing and assembling pervasive environments, taking into consideration resources and services available on the Web and provided through computing devices. Based on semantics embedded in the web content, we explain the concept as well as important components of this user-driven environment design methodology and show a first prototype. Finally, the overall approach is critically discussed from the perspectives of programmers and web users on the basis of related work.

Soylu, Ahmet; Mdritscher, Felix; de Causmaecker, Patrick

495

Characterizing On-line Games Chris Chambers, Wu-chang Feng, Member, IEEE, Sambit Sahu, Member, IEEE, Debanjan Saha, Member, IEEE,  

E-print Network

are those of the author(s) and do not necessarily reflect the views of IBM. GameSpy trace Start time Fri Nov1 Characterizing On-line Games Chris Chambers, Wu-chang Feng, Member, IEEE, Sambit Sahu, Member, IEEE, Debanjan Saha, Member, IEEE, David Brandt Abstract--On-line games are a rapidly growing Internet

496

Iterative Water-filling for Gaussian Vector Multiple Access Wei Yu member IEEE, Wonjong Rhee member IEEE, Stephen Boyd fellow IEEE,  

E-print Network

Rhee member IEEE, Stephen Boyd fellow IEEE, and John M. Cioffi fellow IEEE Abstract This paper proposes, University of Toronto, 10 King's College Road, Toronto, Ontario M5S 3G4, Canada. email: weiyu.S.A. email: won- jong@arraycomm.com. Stephen Boyd is with the Electrical Engineering Department, 350 Serra

497

Rate of first recorded diagnosis of autism and other pervasive developmental disorders in United Kingdom general practice, 1988 to 2001  

Microsoft Academic Search

BACKGROUND: There has been concern that the incidence of autism and other pervasive developmental disorders (PDDs) is increasing. Previous studies have been smaller, restricted to autism (excluding other pervasive developmental disorders such as Asperger's syndrome), included boys only, or have not been based on a national sample. We investigated time trends in the rates of diagnosis of pervasive developmental disorders.

Liam Smeeth; Claire Cook; Eric Fombonne; Lisa Heavey; Laura C Rodrigues; Peter G Smith; Andrew J Hall

2004-01-01

498

1/2/09 10:15 AMIEEE -IEEE Code of Ethics Page 1 of 2http://www.ieee.org/portal/pages/iportals/aboutus/ethics/code.html  

E-print Network

1/2/09 10:15 AMIEEE - IEEE Code of Ethics Page 1 of 2http://www.ieee.org/portal/pages/iportals/aboutus/ethics/code Home IEEE Code of Ethics Position Paper on Ethical Conduct Awareness Award for Distinguished Ethical Us » Ethics and Member Conduct IEEE Code of Ethics Printer Friendly As per IEEE Bylaw I-104

Wright, Dawn Jeannine

499

2 Published by the IEEE Computer Society 1089-7801/12/$31.00 2012 IEEE IEEE INTERNET COMPUTING Crowdsourcing  

E-print Network

techniques to influence consumer behavior and cognition. For example, when shown food advertisements during tele- vision viewing, children consumed 45 percent more food during and after viewing than when shown nonfood advertisements.8 In another example, racial cues in political advertisements primed racial

500

Global Prevalence of Autism and Other Pervasive Developmental Disorders  

PubMed Central

We provide a systematic review of epidemiological surveys of autistic disorder and pervasive developmental disorders (PDDs) worldwide. A secondary aim was to consider the possible impact of geographic, cultural/ethnic, and socioeconomic factors on prevalence estimates and on clinical presentation of PDD. Based on the evidence reviewed, the median of prevalence estimates of autism spectrum disorders was 62/10 000. While existing estimates are variable, the evidence reviewed does not support differences in PDD prevalence by geographic region nor of a strong impact of ethnic/cultural or socioeconomic factors. However, power to detect such effects is seriously limited in existing data sets, particularly in low-income countries. While it is clear that prevalence estimates have increased over time and these vary in different neighboring and distant regions, these findings most likely represent broadening of the diagnostic concets, diagnostic switching from other developmental disabilities to PDD, service availability, and awareness of autistic spectrum disorders in both the lay and professional public. The lack of evidence from the majority of the world's population suggests a critical need for further research and capacity building in low- and middle-income countries. Autism Res 2012, 5: 160179. 2012 International Society for Autism Research, Wiley Periodicals, Inc. PMID:22495912

Elsabbagh, Mayada; Divan, Gauri; Koh, Yun-Joo; Kim, Young Shin; Kauchali, Shuaib; Marcin, Carlos; Montiel-Nava, Cecilia; Patel, Vikram; Paula, Cristiane S; Wang, Chongying; Yasamy, Mohammad Taghi; Fombonne, Eric

2012-01-01