Sample records for ieee pervasive computing

  1. Adaptive Offloading for Pervasive Computing , Alan Messer

    E-print Network

    Nahrstedt, Klara

    Milojicic¶ , Klara Nahrstedt Accepted by IEEE Pervasive Computing Magazine (to appear). Abstract Pervasive. Xiaohui Gu and Klara Nahrstedt are affiliated with Department of Computer Science, University of Illinois

  2. 52 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 2014 IEEE A Secure Supply-Chain

    E-print Network

    Wool, Avishai

    52 PERVASIVE computing Published by the IEEE CS n 1536-1268/14/$31.00 © 2014 IEEE A Secure Supply-Chain (EPC) standard1 into the global supply chain is one of the world's most ambitious pervasive computing capacity and interrogation range make EPC tags useful for supply-chain operators, these same ca- pabilities

  3. 24 PERVASIVE computing Published by the IEEE Computer Society 1536-1268/07/$25.00 2007 IEEE Rapid Trust

    E-print Network

    Satyanarayanan, Mahadev "Satya"

    , and speed (for a com- parison of Trust-Sniffer and other approaches, see the sidebar). Design overview Trust- imalist approach speeds trust establish- ment and makes ISR more ubiquitous. A second important design Rapid Trust Establishment for Pervasive Personal Computing I n the emerging Internet Suspend

  4. Representations in Pervasive Computing1

    Microsoft Academic Search

    Christopher Lueg

    2002-01-01

    The idea behind pervasive computing is that embedded and invisible technology calms our lives by removing the annoyances. Everyday life, however, is shaped by what people do, how they do it, and how they perceive what they are doing. As a consequence everyday life is difficult to grasp in computational terms. A look at the pervasive computing literature indicates that

  5. Discussion on Pervasive Computing Paradigm

    Microsoft Academic Search

    Zhenjiang Miao; Baozong Yuan

    2005-01-01

    Pervasive\\/ubiquitous computing is considered as the next generation of computing and IT technology (Amor, 2001; Saha et al., 2003). As such an important computing technology, what its computing paradigm should be? For the present network computing, its computing paradigms such as client-server, message passing and the recent peer-to-peer are well known. Are the network computing paradigms suitable and sufficient to

  6. Agile Middleware of Pervasive Computing Environments

    Microsoft Academic Search

    Eila Niemelä; Teemu Vaskivuo

    2004-01-01

    In this paper, we survey the models and approaches applied to the middleware services of pervasive comput- ing environments. Architectural styles and patterns in- troduced in the domain of mobile and wireless computing are also appropriate in pervasive computing. However, the development of pervasive middleware requires more emphasis on interoperability, adaptability and scalability of software services and components. To this

  7. Adaptive Offloading for Pervasive Computing

    Microsoft Academic Search

    Xiaohui Gu; Klara Nahrstedt; Alan Messer; Ira Greenberg; Dejan Milojicic

    2004-01-01

    Pervasive computing allows a user to access an application on heterogeneous devices continuously and con-sistently. However, it is challenging to deliver complex applications on resource-constrained mobile devices such as cell phones. Application-based or system-based adaptations have been proposed to address the problem, but they often require application fidelity to be significantly degraded. We believe that this problem can be overcome

  8. Privacy in Pervasive Computing and Open Issues

    Microsoft Academic Search

    Pankaj Bhaskar; Sheikh Iqbal Ahamed

    2007-01-01

    Privacy appears as a major issue for pervasive computing applications. Several models have been proposed to address privacy challenges. Successful design requires awareness of the technology's users and that their desires and concerns are understood. This is difficult as few empirical researches exist about potential pervasive users that designers can use. Complicating design further is the fact that pervasive systems

  9. Architecturing Conflict Handling of Pervasive Computing Resources

    E-print Network

    Paris-Sud XI, Université de

    are used to automate conflict detection, manage the states of a pervasive computing system, and orchestrate to conflict in their usage of shared resources, e.g., controlling doors for security and fire evacuation the description of a pervasive comput- ing system with declarations for resource handling. These declarations

  10. Pervasive. Computing: What. is. it. Anyway?

    Microsoft Academic Search

    Emerson Lourero

    In this chapter, we introduce the key ideas related to the paradigm of pervasive computing. We discuss its concepts, challenges, and current solutions by dividing it into four research areas. Such division is how we were able to understand what really is involved in pervasive computing at different levels. Our intent is to provide readers with introductory theoretical support in

  11. PICO: A middleware framework for pervasive computing

    Microsoft Academic Search

    Mohan Kumar; Behrooz A. Shirazi; Sajal K. Das; Byung Y. Sung; David Levine; Mukesh Singhal

    2003-01-01

    The pervasive information community organization is a framework for creating mission-oriented dynamic communities of autonomous software entities that perform tasks for users and devices. PICO's telemedicine example scenario demonstrates its potential as a simple, unique, and versatile middleware framework for pervasive computing.

  12. System challenges for ubiquitous & pervasive computing

    Microsoft Academic Search

    Roy Want; Trevor Pering

    2005-01-01

    The terms Ubiquitous and Pervasive computing were first coined at the beginning of the 90's, by Xerox PARC and IBM respectively, and capture the realization that the computing focus was going to change from the PC to a more distributed, mobile and embedded form of computing. Furthermore, it was predicted by some researchers that the true value of embedded computing

  13. A User-centric Task Computing Architecture for Pervasive Computing

    Microsoft Academic Search

    Faqun Jiang; Jintao Li; Zhenmin Zhu

    2008-01-01

    Recent advances in pervasive computing and service-oriented computing have led to a desire to better support user-oriented tasks. Task computing is a new paradigm that tries to provide computational support for humans in terms of their tasks that the human is involved in, which has become a driving force in realizing the vision of pervasive computing. One of the key

  14. Project Aura: Toward Distraction-Free Pervasive Computing

    NSDL National Science Digital Library

    Garlan, David.

    2002-01-01

    In the April-June 2002 special issue of the IEEE Pervasive Computing journal, a team from Carnegie Mellon University contributed with a discussion of their Project Aura. The project's goal is to increase computing efficiency, particularly in wireless environments, so that "distractions such as poor performance and failures" are minimized. With greater system reliability and fewer distractions, users can make better use of their time and focus on the task at hand. This article describes the specifics of Project Aura, bringing together many areas that are being studied to accomplish the team's goals. The Aura home page gives further insights into research and additional papers.

  15. Self-healing for Autonomic Pervasive Computing

    NASA Astrophysics Data System (ADS)

    Ahmed, Shameem; Ahamed, Sheikh I.; Sharmin, Moushumi; Hasan, Chowdhury S.

    To ensure smooth functioning of numerous handheld devices anywhere anytime, the importance of a self-healing mechanism cannot be overlooked. This is one of the main challenges to growing autonomic pervasive computing. Incorporation of efficient fault detection and recovery in the device itself is the ultimate quest but there is no existing selfhealing scheme for devices running in autonomic pervasive computing environments that can be claimed as the ultimate solution. Moreover, the highest degree of transparency, security and privacy should also be maintained. In this book chapter, an approach to develop a self-healing service for autonomic pervasive computing is presented. The self-healing service has been developed and integrated into the middleware named MARKS+ (Middleware Adaptability for Resource discovery, Knowledge usability, and Self-healing). The self-healing approach has been evaluated on a test bed of PDAs. An application has been developed by using the service. The evaluation results are also presented in this book chapter.

  16. SMART ROADS IN THE PERVASIVE COMPUTING LANDSCAPE

    Microsoft Academic Search

    V. Christian; A. Ferscha; W. Narzt; G. Pomberger; D. Kolb; R. Müller; J. Wieghardt; R. Bidner; H. Hörtner; C. Lindinger

    Physical objects capable of supplying computing services to users by utilizing hidden pervasive computing technologies are considered to be smart. Allowing not only a physical correspondence of object and enabling technology but also a logical one substantially increases the set of real objects to be considered as smart. This paper presents an innovative thought model of virtually smart things, i.e.,

  17. Towards pervasive computing in health care – A literature review

    Microsoft Academic Search

    Carsten Orwat; Andreas Graefe; Timm Faulwasser

    2008-01-01

    BACKGROUND: The evolving concepts of pervasive computing, ubiquitous computing and ambient intelligence are increasingly influencing health care and medicine. Summarizing published research, this literature review provides an overview of recent developments and implementations of pervasive computing systems in health care. It also highlights some of the experiences reported in deployment processes. METHODS: There is no clear definition of pervasive computing

  18. Context-Aware Pervasive Computing at Large: Three Example Applications

    E-print Network

    Loke, Seng W. - Loke, Seng W.

    : the situation What is a context-aware pervasive computing system? A system that can respond intelligentlyContext-Aware Pervasive Computing at Large: Three Example Applications Seng W. Loke Department;Context-Awareness in Pervasive Computing Started in Schilit's PhD thesis on context-awareness for mobile

  19. Pervasive Computing Goes to School

    ERIC Educational Resources Information Center

    Plymale, William O.

    2005-01-01

    In 1991 Mark Weiser introduced the idea of ubiquitous computing: a world in which computers and associated technologies become invisible, and thus indistinguishable from everyday life. This invisible computing is accomplished by means of "embodied virtuality," the process of drawing computers into the physical world. Weiser proposed that…

  20. Analytical techniques for debugging pervasive computing environments

    E-print Network

    Nigam, Atish, 1981-

    2004-01-01

    User level debugging of pervasive environments is important as it provides the ability to observe changes that occur in a pervasive environment and fix problems that result from these changes, especially since pervasive ...

  1. A Security Conscious Service Discovery Framework in Pervasive Computing Environments

    Microsoft Academic Search

    Mahdi Sharifi; Sayed Gholam Hassan Tabatabaei; Homa Movahednejad; Azizah Abdul Manaf; Suhaimi Ibrahim

    2009-01-01

    In today's Web environments, digital world is witnessing the birth of a revolutionary computing paradigm called pervasive or ubiquitous computing that promises to have a profound effect on the way users interact with computers, devices, physical spaces, and other users. Pervasive computing is aimed to eliminate time and place barriers by making services available to users anytime and anywhere. Due

  2. Published by the IEEE CS n 1536-1268/11/$26.00 2011 IEEE PERVASIVE computing 13 S M A R T E N E R G Y S Y S T E M S

    E-print Network

    Hazas, Mike

    -provoking submissions on energy-related topics (for example, the Workshop on Ubiquitous Sus- tainability at UbiComp 2007.computer.org/pervasive SMART ENERGY SYSTEMS array of topics, including basic opinion survey results, energy for the psychology community that summarized energy conservation re- sults from the 1970s and early 1980s.2 According

  3. Is cloud computing essential to the future of pervasive services?

    Microsoft Academic Search

    Julie A. McCann; Manish Parashar; Omer Rana; Luca Foschini; Tim Kindberg

    2009-01-01

    Cloud computing is a new paradigm for deploying computing\\/information services, which is based pervasive and on demand access to computing utilities, an abstraction of unlimited computing resources, and a usage-based payment model made users essentially \\

  4. Security Issues with Pervasive Computing Frameworks Michael Collins1

    E-print Network

    Dobson, Simon

    Security Issues with Pervasive Computing Frameworks Michael Collins1 , Simon Dobson2 , Paddy Nixon2 Systems Research Group, School of Computer Science and Informatics, UCD Dublin, Ireland 1 michael://www.csi.ucd.ie/Staff/AcademicStaff/{sdobson, pnixon} Abstract. The deployment of pervasive computing systems inevitably raises security concerns

  5. Flying Control System Architecture of Informationization for Pervasive Computing

    Microsoft Academic Search

    Lin Jinyong; Zhang Jun; Dong Wenjie; Gao Xiaoying; Qi Chuntang

    2010-01-01

    The paper involves one kind of mobile autonomous running system for pervasive computing. The developing requirements about aircraft flying control system of informationization were firstly analyzed, then the architecture on aircraft flying control system of informationization based on pervasive computing was presented. Lastly the design conception and its accuracy were verified by principle prototypes.

  6. PAC: Location Aware Access Control for Pervasive Computing Environments

    Microsoft Academic Search

    Nikolaos Michalakis

    2003-01-01

    Abstract: In pervasive computing environments certain applications are interested in a user's location in order to provide a service. Such applications would bene t from an architecture that enables users to prove their location prior to requesting a service. We present PAC, an architecture for location-aware access control in pervasive computing environments, where users authenticate their location in order to

  7. Autoconfiguration, registration, and mobility management for pervasive computing

    Microsoft Academic Search

    Archan MISRA; Subir Das; Anthony McAuley; Sajal K. Das

    2001-01-01

    In the vision of pervasive computing, users will exchange information and control their environments from anywhere using various wireline\\/wireless networks and computing devices. We believe that current protocols, such as DHCP, PPP, and Mobile IP, must be enhanced to support pervasive network access. In particular, this article identifies three fundamental functions: autoconfiguration, registration, and mobility management, that need such enhancements.

  8. An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment

    Microsoft Academic Search

    Munirul M. Haque; Sheikh Iqbal Ahamed

    2007-01-01

    Mutual collaboration plays a vital role in sharing of resources in an ad hoc network of handheld devices in a pervasive computing environment. Effective sharing of resources is facilitating tiny pervasive devices to benefit from situations which otherwise would not have been possible due to several limitations (such as poor storage and computational capability). An unavoidable consequence of this aspect

  9. Ad Hoc Composition of User Tasks in Pervasive Computing Environments

    Microsoft Academic Search

    Sonia Ben Mokhtar; Nikolaos Georgantas; Valérie Issarny

    2005-01-01

    Due to the large success of wireless networks and portable devices, the pervasive computing paradigm is becoming a reality. One of the most challeng- ing objectives to be achieved in pervasive computing environments is to allow a user to perform a task by composing on the fly the environment's service and resource components. However, existing approaches commonly assume that net-

  10. Probabilistic Data Management for Pervasive Computing: The Data Furnace Project

    Microsoft Academic Search

    Minos N. Garofalakis; Kurt P. Brown; Michael J. Franklin; Joseph M. Hellerstein; Daisy Zhe Wang; Eirinaios Michelakis; Liviu Tancau; Eugene Wu; Shawn R. Jeffery; Ryan Aipperspach

    2006-01-01

    The wide deployment of wireless sensor and RFID (Radio Frequency IDentification) devices is one of the key en- ablers for next-generation pervasive computing applications, including large-scale environmental monitoring and control, context-aware computing, and \\

  11. Security in Pervasive Computing: Current Status and Open Issues

    Microsoft Academic Search

    Munirul M. Haque; Sheikh Iqbal Ahamed

    2006-01-01

    Million of wireless device users are ever on the move, be- coming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies. The wireless nature of these devices has fostered a new era of mobility. Thou- sands of pervasive devices are able to

  12. Investigating the next generation mobile wireless technology to deliver a pervasive mobile pervasive computing environment

    E-print Network

    Newcastle upon Tyne, University of

    are immeasurable and include areas such as road user charging, congestion control and fleet management pervasive computing environment for road user charging and other ITS services Dr A. Tully School would be the possibility of using such a system to implement an incremental road-user charging system

  13. IPv6 MANET: An Essential Technology for Future Pervasive Computing

    Microsoft Academic Search

    J. Gnana Jayanthi; S. Albert Rabara; A. R. Macedo Arokiaraj

    2010-01-01

    In the near future, a pervasive computing environment can be expected to be based on the recent progresses and advances in computing and communication technologies. The Next generation (Next-Gen) of mobile communications will include both prestigious infrastructured wireless networks and novel infrastructureless Mobile Adhoc NETworks (MANETs). The special features of MANET bring great opportunities together with severe challenges. With this

  14. 2012 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops The Estrellita System

    E-print Network

    Hayes, Gillian R.

    the sometimes-competing needs of parents, clinicians, and other healthcare professionals. Keywords2012 6th International Conference on Pervasive Computing Technologies for Healthcare (Pervasive for delays in cognitive, motor, and other skills. In this demo, we describe a health informatics system we

  15. Published in IEEE Pervasive Computing, Mobile and Ubiquitous Systems. Volume 2, No.3, pp 62-71. July-September 2003.

    E-print Network

    Lopes, Cristina Videira

    by the specific characteristics of the aerial acoustic communication paradigm used by humans and other animals, we- nications.) Within the project, we investigate bridges between human and computer commu- Sound offers and infrared, enabling communication among small computing devices and humans in a ubiquitous computing

  16. Reconfigurable context-sensitive middleware for pervasive computing

    Microsoft Academic Search

    S. S. Yau; F. Karim; Yu Wang; Bin Wang; S. K. S. Gupta

    2002-01-01

    Context-sensitive applications need data from sensors, devices, and user actions, and might need ad hoc communication support to dynamically discover new devices and engage in spontaneous information exchange. Reconfigurable Context-Sensitive Middleware facilitates the development and runtime operations of context-sensitive pervasive computing software.

  17. QoS-Based Design Process for Pervasive Computing Applications

    E-print Network

    S, sensor network, software components, supervision platform. 1. INTRODUCTION We are currently facing with hardware limits, users' needs and current context use. Although the characteristics proposed by such mobile the recurrent problem of QoS management in pervasive computing due to resource limits, context changes and users

  18. Classification of Service Discovery in Pervasive Computing Environments

    Microsoft Academic Search

    Feng Zhu; Matt Mutka; Lionel Ni

    2002-01-01

    Service discovery is an essential task in pervasive c omputing environments. Simple and efficient service discovery enables heterogeneous and ubiquitous computing devices and services to be easier to use. Service integr ation uses services as building blocks to achieve complex services. We describe service disc overy and service integration, analyze design issues, and categorize the service discover y protocols. n

  19. User-Controllable Security and Privacy for Pervasive Computing

    Microsoft Academic Search

    Jason Cornwell; Ian Fette; Gary Hsieh; Madhu Prabaker; Jinghai Rao; Karen Tang; Kami Vaniea; Lujo Bauer; Lorrie Cranor; Jason Hong; Bruce McLaren; Mike Reiter; Norman Sadeh

    2007-01-01

    We describe our current work in developing novel mechanisms for managing security and privacy in pervasive computing environments. More specifically, we have developed and evaluated three different applications, including a contextual instant messenger, a people finder application, and a phone-based application for access control. We also draw out some themes we have learned thus far for user-controllable security and privacy.

  20. Autonomic Computing for Pervasive ICT — A Whole-System Perspective

    Microsoft Academic Search

    M Shackleton; F Saffre; R Tateson; E Bonsma; C Roadknight

    2004-01-01

    It is unlikely that we can expect to apply traditional centralised management approaches to large-scale pervasive computing scenarios. Approaches that require manual intervention for system management will similarly not be sustainable in the context of future deployments considering their scale and their dynamic (or mobile) nature. This situation motivates the need to apply ‘autonomic’ techniques to system management, where the

  1. Developing Testing Techniques for Event-driven Pervasive Computing Applications

    E-print Network

    Memon, Atif M.

    . 4. embedded software [36] that controls modern buildings, cars, elevators, fire-alarms, etc. Sensors As we move closer to the world of pervasive computing, embedded devices, sensors, and software agents send signals to the software that changes its state, sends output signals to control devices

  2. LASER POINTERS AS INTERACTION DEVICES FOR COLLABORATIVE PERVASIVE COMPUTING

    E-print Network

    Stürzlinger, Wolfgang

    LASER POINTERS AS INTERACTION DEVICES FOR COLLABORATIVE PERVASIVE COMPUTING Andriy Pavlovych1 environments. The system uses laser pointers as interaction devices and employs a video camera to detect where each laser pointer is pointing. Time-division multiplexing together with a wireless link affords

  3. Context-Aware Role-based Access Control in Pervasive Computing Systems

    E-print Network

    Minnesota, University of

    ,tripathi)@cs.umn.edu ABSTRACT In this paper we present a context-aware RBAC (CA- RBAC) model for pervasive computing, Pervasive Computing, Context- based Access Control, RBAC This work was supported by NSF grants 0411961

  4. PALLAS: A Querying Interface for Pervasive Computing using Handheld Devices

    Microsoft Academic Search

    Stavros Polyviou; Paraskevas Evripidou; George Samaras

    2004-01-01

    In this paper we describe PALLAS (PALm Logic-based Algebraic Search), a prototype architecture, design and implementation for a search interface on a portable digital assistant. PALLAS is part of the UbAgent, a middleware infrastructure that provides an efficient way of handling the back-end processing of Pervasive Computing: accessing information from distributed databases, computation processing, and location specific services. The goal

  5. PALLAS: a querying interface for pervasive computing using handheld devices

    Microsoft Academic Search

    Stavros Polyviou; Paraskevas Evripidou; George Samaras

    2004-01-01

    We describe PALLAS (PALm Logic-based Algebraic Search), a prototype architecture, design and implementation for a search interface on a portable digital assistant. PALLAS is part of the UbAgent, a middleware infrastructure that provides an efficient way of handling the back-end processing of pervasive computing: accessing information from distributed databases, computation processing, and location specific services. The goal of the PALLAS'

  6. Improving Mobile Infrastructure for Pervasive Personal Computing

    E-print Network

    Mellon University. Any opin- ions, findings, conclusions or recommendations expressed in this material, transient use, establishing trust, untrusted terminal, load-time validation, trusted computing, Xen, VMM's personalized computing environment by layering virtual machine technology on top of distributed stor- age

  7. Supporting Pervasive Collaboration in Healthcare --An Activity-Driven Computing Infrastructure

    E-print Network

    Christensen, Henrik Bærbak

    Supporting Pervasive Collaboration in Healthcare -- An Activity-Driven Computing Infrastructure, Pervasive Healthcare, Mobile CSCW, Distributed Collaboration, Software Archi- tecture. INTRODUCTION research done in a hospital setting where mobility is fundamental to the way clinicians work. Clinicians

  8. 8 PERVASIVE computing Published by the IEEE CS n 1536-1268/09/$25.00 2009 IEEE Wearable ComputingEditor: Paul Lukowicz n University of Passau n paul.lukowicz@uni-passau.de

    E-print Network

    Thomas, Bruce

    , indicating the direction to walk. As a second exam- ple, a fireman has to enter a hospital filled with smoke has a 640 × 480 pixel, 30-frames-per- second Point Gray Firefly firewire video camera attached. BEnEfItS Having your computing system in a wearable form factor enables hands- free viewing of in situ

  9. MediaBroker: An Architecture for Pervasive Computing

    Microsoft Academic Search

    Martin Modahl; Ilya Bagrak; Matthew Wolenetz; Phillip W. Hutto; Umakishore Ramachandran

    2004-01-01

    We present MediaBroker, a distributed framework designed to support pervasive computing applica- tions. Specifically, we propose an architecture consisting of a transport engine and peripheral clients that addresses issues in scalability, data sharing, data transformation and inherent platform heterogeneity. Key features of MediaBroker are a type-aware data transport that is capable of transforming data, an extensible system for describing types

  10. Pervasive computing in the large: socio-technical fabric

    Microsoft Academic Search

    Alois Ferscha

    2010-01-01

    Trends in miniaturizing of technology (modern microelectronics, system-on-chip technologies, ultra compact memory systems, Micro-mechanics, Nano-devices) and exponential growth and globalization of communication infrastructures have opened an unexpectedly wide terrain for ICT research in general, and Pervasive Computing in particular. The first generation of ICT aiming towards autonomic systems and their adaptation was driven by the availability of technology to connect

  11. ARTICLE IN PRESS Pervasive and Mobile Computing ( )

    E-print Network

    Dustdar, Schahram

    ready for services? A domotic infrastructure based on the Web service stack Marco Aiello, Schahram and openness. By considering the evolution of domotic research and projects, we advocate a role for Web-oriented approaches in ubiquitous computing. c 2008 Elsevier B.V. All rights reserved. Keywords: Domotics; Web service

  12. Towards Enhancing Undergraduate Pervasive Computing Skills: An Innovative Multi-Disciplinary Approach 1

    Microsoft Academic Search

    Fei Hu; Ankur Teredesai

    Pervasive Computing is becoming more and more prevalent in our society. Rapid developments in wireless technologies and Sensor-network-based smart spaces are creating an urgent need for well trained Pervasive Computing Engineers. This NSF-funded project seeks to enhance our undergraduate computing skills by establishing a Wireless & Mobile Computing lab environment. Our project has the following innovations: (1) The establishment of

  13. A hybrid approach to context modelling in large-scale pervasive computing environments

    Microsoft Academic Search

    Deirdre Lee; René Meier

    2009-01-01

    Pervasive computing aims to unobtrusively embed computer systems into everyday life environments to enrich the user experience without demanding the user's explicit attention. For pervasive computing to be minimally invasive, computer systems must be conscious of and ultimately, be able to act according to the context of the user and her intelligent environment. However, such context is often heterogeneous as

  14. Design and Evaluation of a Hybrid Physical Space Service for Pervasive Computing Applications

    E-print Network

    Steenkiste, Peter

    1 Design and Evaluation of a Hybrid Physical Space Service for Pervasive Computing Applications-- In this paper we present the design and implementa- tion of a space service that gives pervasive computing applications both a hierarchical and coordinate-based view of physical space. The space service supports both

  15. Pervasive and Mobile Computing 5 (2009) 734749 Contents lists available at ScienceDirect

    E-print Network

    Saxena, Nitesh

    2009-01-01

    , cameras and media players) continuously opens up new services and possibilities for ordinary usersPervasive and Mobile Computing 5 (2009) 734­749 Contents lists available at ScienceDirect Pervasive and Mobile Computing journal homepage: www.elsevier.com/locate/pmc A comparative study of secure device

  16. Data-Centric Middleware for Context-Aware Pervasive Computing Guanling Chen

    E-print Network

    Kotz, David

    if not carefully managed. To minimize user distraction the applications must be aware of and adapt to the situationData-Centric Middleware for Context-Aware Pervasive Computing Guanling Chen , Ming Li , and David and deploying context-aware pervasive-computing applications calls for distributed software infrastructures

  17. Collaborative editing within the pervasive collaborative computing environment

    SciTech Connect

    Perry, Marcia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deb [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2003-09-11

    Scientific collaborations are established for a wide variety of tasks for which several communication modes are necessary, including messaging, file-sharing, and collaborative editing. In this position paper, we describe our work on the Pervasive Collaborative Computing Environment (PCCE) which aims to facilitate scientific collaboration within widely distributed environments. The PCCE provides a persistent space in which collaborators can locate each other, exchange messages synchronously and asynchronously and archive conversations. Our current interest is in exploring research and development of shared editing systems with the goal of integrating this technology into the PCCE. We hope to inspire discussion of technology solutions for an integrated approach to synchronous and asynchronous communication and collaborative editing.

  18. IEEE Computer Society 2012724()

    E-print Network

    Kasahara, Hironori

    , Panasonic Uniphier, NEC/ARM MPCore/MP211/NaviEngine, Renesas 4 core RP1, 8 core RP2, 15core Hetero RP() 2008 LSI 2008 2008 Intel Asia Academic Forum Best Research Award 2010IEEE Computer Society Golden Core, 32 WebTV 443 #12;Multi/Many-core Everywhere Multi-core from embedded to supercomputers Consumer

  19. Vertical handover supporting pervasive computing in future wireless networks

    Microsoft Academic Search

    Sasitharan Balasubramaniam; Jadwiga Indulska

    2004-01-01

    A variety of current and future wired and wireles s networking technologies can be transformed into seamless communication environments through application of context- based vertical handovers. Such seamless communication environments are needed for future pervasive\\/ubiquitous systems. Pervasive systems are context aware and n eed to adapt to context changes, including network disconnection s and changes in network Quality of Service.

  20. Adaptive Offloading Inference for Delivering Applications in Pervasive Computing Environments

    E-print Network

    Nahrstedt, Klara

    Xiaohui Gu ¡ , Klara Nahrstedt, Alan Messer ¢ , Ira Greenberg £ , Dejan Milojicic ¤ Abstract Pervasive reflect the views of the NSF, NASA, or the U.S. Government.¦ Xiaohui Gu and Klara Nahrstedt are affiliated

  1. Towards a Pervasive Grid

    Microsoft Academic Search

    Vipul Hingne; Anupam Joshi; Timothy W. Finin; Hillol Kargupta; Elias N. Houstis

    2003-01-01

    The increase in the use of mobile & embedded devices, coupled with ad-hoc, short range wireless networking is enabling pervasive computing. This pervasive computing environment and the wired Grid infrastructure can be combined to make the computation and information Grid truly pervasive. This paper identifies some of the interesting research issues and challenges in creating such a pervasive Grid, and

  2. Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions

    Microsoft Academic Search

    Roshan K. Thomas; Ravi S. Sandhu

    2004-01-01

    Abstract Weexplore,the challenges and research directions in building models, protocols and architectures to support security in pervasive ,computing ,environments. We argue that to be successful, efforts to build these would have to recognize,from ,the onset ,that pervasive ,computing settings are complex ,socio-technical system and would thus,have ,to go ,beyond ,traditional system-centric approaches,to analyzing and designing security.

  3. Context-Aware Regulation of Context-Aware Mobile Services in Pervasive Computing Environments

    Microsoft Academic Search

    Evi Syukur; Seng Wai Loke

    2006-01-01

    \\u000a This paper discusses concepts, the design and prototype implementation of a context-aware policy system that governs mobile\\u000a services visibility and execution in pervasive computing environments. We view a pervasive environment as a collection of\\u000a mobile users, mobile services, contexts, policies and roles. Applicable policies are selected depending on the context of\\u000a users i.e., location, activity and the user’s role, and

  4. Adaptive Offloading Inference for Delivering Applications in Pervasive Computing Environments

    E-print Network

    Nahrstedt, Klara

    Xiaohui Gu , Klara Nahrstedt, Alan Messer , Ira Greenberg§ , Dejan Milojicic¶ In Proceedings of IEEE reflect the views of the NSF, NASA, or the U.S. Government. Xiaohui Gu and Klara Nahrstedt are affiliated

  5. Solar: A pervasive-computing infrastructure for context-aware mobile applications

    Microsoft Academic Search

    Guanling Chen; David Kotz

    2002-01-01

    Emerging pervasive computing technologies transform the way we live and work by embedding computation in our surrounding environment. To avoid increasing complexity, and allow the user to concentrate on her tasks, ap- plications must automatically adapt to their changing context, the physical and computational environment in which they run. To support these \\

  6. An ontology for context-aware pervasive computing environments

    Microsoft Academic Search

    HARRY CHEN; TIM FININ; ANUPAM JOSHI

    2003-01-01

    This document describes COBRA-ONT an ontology for supporting pervasive context-aware systems. COBRA-ONT, expressed in the Web Ontology Language OWL, is a collection of ontologies for describing places, agents, events and their associated properties in an intelligent meeting room domain. This ontology is developed as a part of the Context Broker Architecture (CoBrA), a broker-centric agent architecture that provides knowledge sharing,

  7. IEEE Computer Society: http://computer.org Computer: http://computer.org/computer

    E-print Network

    Stanford University

    IEEE Computer Society: http://computer.org Computer: http://computer.org/computer computer@computer.org IEEE Computer Society Publications Office: +1 714 821 8380 COVER FEATURES GUEST EDITOR'S INTRODUCTION 28 Computational Photography--The Next Big Step Oliver Bimber Computational photography extends

  8. SelfTuned Remote Execution for Pervasive Computing Jason Flinn, Dushyanth Narayanan and M. Satyanarayanan

    E-print Network

    Flinn, Jason

    monitors resources such as battery energy and file cache state which are especially important for mo­ bile of pervasive computing has created new opportunities and challenges for remote ex­ ecution. In this paper, we. The size limitations of these devices con­ strain their compute power, battery energy and storage capacity

  9. SECURE SEMANTIC SENSOR WEB AND PERVASIVE COMPUTING Bhavani Thuraisingham and Kevin W. Hamlen

    E-print Network

    Hamlen, Kevin W.

    SECURE SEMANTIC SENSOR WEB AND PERVASIVE COMPUTING Bhavani Thuraisingham and Kevin W. Hamlen@utdallas.edu Abstract--In this paper we discuss issues on developing a secure semantic sensor web. SensorML is the starting point for this work. We explore the layers for a semantic sensor web and discuss security issues

  10. Trust model based on dynamic policy similarity for pervasive computing environments

    Microsoft Academic Search

    Zeng Shuai; Xu Fen; Xin Yang; Yang Yi-xian; Hu Zheng-ming

    2010-01-01

    Traditional security mechanisms can not satisfy the pervasive computing environment commendably. A dynamic trust model is proposed, utilizing the Dempster-Shafer (D-S) theory to model the diminution of the hypothesis set on trust evaluation with the accumulation of evidence. The trust expression of relationship between entities, the general formula of direct trust, indirect trust and integrated trust are deduced. With the

  11. Mobile fighting crime device based on information technology by police cloud computing toward pervasive investigations

    Microsoft Academic Search

    Ke-Ren Chen; Hung-Jen Tsai

    2011-01-01

    In this paper, we present the pervasive investigation crime (PIC) system in which this cloud scenario integrates the emerging cloud computing and the radio identification (RFID) technology. This cloud device can give a wider cloud resource including 2G, 3G and 4G cell phone resource that it is suitable for investigator enables to detection a misdeed or suspected vehicle and associated

  12. The Pervasive Fridge A Smart Computer System Against Uneaten Food Loss

    E-print Network

    Boyer, Edmond

    The Pervasive Fridge A Smart Computer System Against Uneaten Food Loss José Rouillard LIFL Abstract -- Food waste or food loss is food that is discarded or lost uneaten. The work presented Fridge" prototype allows users to be notified proactively, when a food arrives to its expiration date

  13. A Taxonomy-Driven Approach to Visually Prototyping Pervasive Computing Applications

    E-print Network

    Paris-Sud XI, Université de

    A Taxonomy-Driven Approach to Visually Prototyping Pervasive Computing Applications Zo´e Drey1 environment into a visual pro- gramming language. A taxonomy describes the relevant entities of a given to taxonomical information. We have implemented a visual environment to develop taxonomies and orchestration

  14. Using a Properties Based Naming System in Mobile Agents Environments for Pervasive Computing

    Microsoft Academic Search

    Fabio Tarantino; Alessio Ravani; Mario Zambrini

    2003-01-01

    Mobile Agents model is widely accepted as a good solution to simplify the coordination in a complex and distributed environment. Pervasive computing, presents many issues regarding resources discovery and heterogeneous routing on different network topologies. This paper is concerned about the architecture of a dynamic name properties based system able to manage Agents and places without a network dependent architecture.

  15. Effective GUI-oriented automated testing platform for pervasive computing software environment

    Microsoft Academic Search

    Songwen Pei; Chunxue Wu; Yuewei Ding; Baifeng Wu

    2009-01-01

    Graphical user interfaces (GUIs) are critical components of software environment for pervasive computing and applications. A systemic solution called GUI testing architecture (GUITA) for automated testing oriented GUIs is proposed in this paper, which is built on the platform that integrating ATS and WinRunner¿ by a socket interface. By parsing configure file and loading GUI map successfully, it can invoke

  16. Split Smart Messages: Middleware for Pervasive Computing on Smart Phones Nishkam Ravi1

    E-print Network

    Iftode, Liviu

    technology is the result of the conver- gence of cell phones and PDAs and is steadily becom- ing ubiquitousSplit Smart Messages: Middleware for Pervasive Computing on Smart Phones Nishkam Ravi1 , Cristian@cs.rutgers.edu Abstract Smart Phone is a recently emerged technology that sup- ports Java program execution and provides

  17. Creating Innovative Solutions for Future Hotel Rooms with Intelligent Multimedia and Pervasive Computing

    NASA Astrophysics Data System (ADS)

    Sharda, Nalin K.

    Pervasive computing and intelligent multimedia technologies are becoming increasingly important to the modern way of living. However, many of their potential applications have not been fully realized yet. This chapter explores how innovative applications can be developed to meet the needs of the next generation hotels. Futuristic hotel rooms aim to be more than “home-away-from-home,” and as a consequence, offer tremendous opportunities for developing innovative applications of pervasive computing and intelligent multimedia. Next generation hotels will make increased use of technology products to attract new customers. High end TV screens, changeable room ambiance, biometric guest recognition, and electronic check-in facilities are some of the features already being implemented by some hotels. Entirely futuristic hotels in the sea, the stratosphere or the outer space, are also being proposed. All of these provide many novel opportunities for developing innovative solutions using intelligent multimedia and ubiquitous computing.

  18. IEEE Computer Society NEDO, , 2012330

    E-print Network

    Kasahara, Hironori

    , Panasonic Uniphier, NEC/ARM MPCore/MP211/NaviEngine, Renesas 4 core RP1, 8 core RP2, 15core Hetero RP() 2008 LSI 2008 2008 Intel Asia Academic Forum Best Research Award 2010IEEE Computer Society Golden Core, 32 WebTV 443 API #12;Multi/Many-core Everywhere Multi-core from embedded to supercomputers Consumer

  19. Pervasive Personal Computing in an Internet Suspend\\/Resume System

    Microsoft Academic Search

    Mahadev Satyanarayanan; Benjamin Gilbert; Matt Toups; Niraj Tolia; Ajay Surie; David R. O'hallaron; Adam Wolbach; Jan Harkes; Adrian Perrig; David J. Farber; Michael A. Kozuch; Casey J. Helfrich; Partho Nath; H. Andrés Lagar-cavilla

    2007-01-01

    The Internet suspend\\/resume model of mobile computing cuts the tight binding between PC state and PC hardware. By layering a virtual machine on distributed storage, ISR lets the VM encapsulate execution and user customization state; distributed storage then transports that state across space and time. This article explores the implications of ISR for an infrastructure-based approach to mobile computing. It

  20. MediaBroker: A pervasive computing infrastructure for adaptive transformation and sharing of stream data

    Microsoft Academic Search

    Umakishore Ramachandran; Martin Modahl; Ilya Bagrak; Matthew Wolenetz; David J. Lillethun; Bin Liu; James Kim; Phillip W. Hutto; Ramesh Jain

    2005-01-01

    MediaBroker is a distributed framework designed to support pervasive comput- ing applications. Key contributions of MediaBroker are e-cient and scalable data transport, data stream registration and discovery, an extensible system for data type description, and type-aware data transport that is capable of dynamically transforming data en route from source to sinks. Speciflcally, the architecture con- sistsofatransportengineandperipheralclientsandaddressesissuesinscalability, datasharing,datatransformationandplatformheterogeneity.DetailsoftheMedia- Broker architecture, implementation,

  1. A Clustering-based Location Privacy Protection Scheme for Pervasive Computing

    Microsoft Academic Search

    Lin Yao; Chi Lin; Xiangwei Kong; Feng Xia; Guowei Wu

    2010-01-01

    In pervasive computing environments, Location- Based Services (LBSs) are\\u000abecoming increasingly important due to continuous advances in mobile networks\\u000aand positioning technologies. Nevertheless, the wide deployment of LBSs can\\u000ajeopardize the location privacy of mobile users. Consequently, providing\\u000asafeguards for location privacy of mobile users against being attacked is an\\u000aimportant research issue. In this paper a new scheme for

  2. Supporting Activity-Based Computing using Dynamically (De)Composable Mobile Applications Position Paper for Support for Human Tasks and Activities'04 (Pervasive'04 Workshop)

    Microsoft Academic Search

    Kari S. F. Schougaard; Ulrik P. Schultz

    In the era of pervasive computing computers are ubiquitous. Activities carried out by the use of computers can now encompass various devices and be carried out while moving as well as in front of the personal computer. The activity-centered computing paradigm has been suggested as better than the document-centered paradigm for pervasive computing: it crosscuts work with dieren t kinds

  3. 48 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/06/$20.00 2006 IEEE C O N T E X T -A W A R E C O M P U T I N G

    E-print Network

    Loke, Seng W. - Loke, Seng W.

    O N T E X T - A W A R E C O M P U T I N G Context-Aware Artifacts: Two Development Approaches O ne of the most exciting and impor- tant recent developments in con- text-aware computing is to make everyday appliances, devices, and objects context aware. A context- aware artifact uses sensors to perceive

  4. 62 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/03/$17.00 2003 IEEE C O M M U N I C A T I O N D E V I C E S

    E-print Network

    with embedded com- putational and communication capabilities inter- act with other devices and with humans of the aerial acoustic communication paradigm used by humans and other animals, we examine the use of device the project, we investigate bridges between human and computer commu- Sound offers features not available

  5. Configurable Computing: Fabrics and Systems 114 0740-7475/05/$20.00 2005 IEEE Copublished by the IEEE CS and the IEEE CASS IEEE Design & Test of Computers

    E-print Network

    Wawrzynek, John

    by the IEEE CS and the IEEE CASS IEEE Design & Test of Computers A HIGH-END RECONFIGURABLE COMPUTER (HERC) is a machine with supercomputer-level perfor- mance configured on a per-problem basis to match the structure of the algorithm and data flow of a computing task. In such a machine, all data and control paths; mem- ory ports

  6. Identity-Based Inter-domain Authentication Scheme in Pervasive Computing Environments

    NASA Astrophysics Data System (ADS)

    Huo, Shi-Wei; Luo, Chang-Yuan; Xin, Hong-Zhi

    An Identity-based signature scheme is proposed based on additive elliptic curve group. The verification result of the signature is a constant with respect to the signer's identifier. Then an inter-domain authentication scheme is constructed by combining the proposed signature scheme. During the authentication, a user constructs the signature of timestamp as authentication proof, which realizes secure inter-domain authentication and user anonymity. It is showed that the proposed scheme has superiority in both security and efficiency, and is more suitable for pervasive computing.

  7. CloudComputing 24 Published by the IEEE Computer Society 1089-7801/09/$26.00 2009 IEEE IEEE INTERNET COMPUTING

    E-print Network

    Melbourne, University of

    CloudComputing 24 Published by the IEEE Computer Society 1089-7801/09/$26.00 © 2009 IEEE IEEE of commercial infrastructure providers, a concept known as cloud computing.3 Handling distributed applications to operate on cloud infrastructures, such as Amazon EC2. This article provides an abstract view

  8. Balancing Performance, Energy, and Quality in Pervasive Computing Jason Flinn, SoYoung Park, and M. Satyanarayanan

    E-print Network

    Satyanarayanan, Mahadev "Satya"

    Balancing Performance, Energy, and Quality in Pervasive Computing Jason Flinn, SoYoung Park, and M this determination, Spectra balances the competing goals of performance, energy conservation, and application quality that Spectra almost always selects the best execution plan, and that its few suboptimal choices are very close

  9. Balancing Performance, Energy, and Quality in Pervasive Computing Jason Flinn +# , SoYoung Park + , and M. Satyanarayanan +#

    E-print Network

    Flinn, Jason

    Balancing Performance, Energy, and Quality in Pervasive Computing Jason Flinn +# , SoYoung Park. In making this determination, Spectra balances the competing goals of performance, energy conservation­ firm that Spectra almost always selects the best execution plan, and that its few suboptimal choices

  10. MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments

    Microsoft Academic Search

    Moushumi Sharmin; Shameem Ahmed; Sheikh Iqbal Ahamed

    2006-01-01

    ,ABSTRACT With the tremendous ,increase in the use of mobile ,handheld ,and wearable devices, the pervasive computing arena is becoming stronger and more ,powerful ,day by day. Despite having various physical constraints, many of the functionalities enjoyed by resource-rich mobile devices have been incorporated in these tiny devices. That is why ,different fields of research ,have ,been developed, this,area. There

  11. Sponsored by CRC and IEEE Computer Society TTTC

    E-print Network

    Stanford University

    enter for eliable omputing C R C Sponsored by CRC and IEEE Computer Society TTTC Eleventh Pacific Local Arrangements: Mike Purtell, Advantest Publicity Chair: Mike Purtell, Advantest Finance Chair/IEEE Computing (CRC) and the IEEE Computer Society Test Technology Technical Council (TTTC)* , will be held

  12. Sponsored by CRC and IEEE Computer Society TTTC

    E-print Network

    Stanford University

    enter for eliable omputing C R C Sponsored by CRC and IEEE Computer Society TTTC Tenth Pacific Chair: Mike Purtell, Advantest Registration Chair: Subhasish Mitra, Stanford Finance Chair/IEEE Liaison Computing (CRC) and the IEEE Computer Society Test Technology Technical Council (TTTC)* , will be held

  13. Sponsored by CRC and IEEE Computer Society TTTC

    E-print Network

    Stanford University

    enter for eliable omputing C R C Sponsored by CRC and IEEE Computer Society TTTC Ninth Pacific Registration Chair: Chao-Wen Tseng, Stanford CRC Finance Chair/IEEE Liaison: Catherine Yu, Stanford CRC-sponsored by the Stanford University Center for Reliable Computing (CRC) and the IEEE Computer Society Test Technology

  14. Introduction to the IEEE Transactions on Cloud Computing

    E-print Network

    Buyya, Rajkumar

    Introduction to the IEEE Transactions on Cloud Computing Rajkumar Buyya Welcome to the IEEE Transactions on Cloud Computing (TCC). It is my privilege and honor to serve as the inaugural Editor-in-Chief of TCC. I would like to thank the IEEE and the world-wide Cloud Computing community for giving me

  15. Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-based Services

    NASA Astrophysics Data System (ADS)

    Soppera, A.; Burbridge, T.

    During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists and science fiction writers. Today this subject has become of interest to business, government, and society. Governmental authorities exercise their power through the networked environment. Credit card databases maintain our credit history and decide whether we are allowed to rent a house or obtain a loan. Mobile telephones can locate us in real time so that we do not miss calls. Within another 10 years, all sorts of devices will be connected through the network. Our fridge, our food, together with our health information, may all be networked for the purpose of maintaining diet and well-being. The Internet will move from being an infrastructure to connect computers, to being an infrastructure to connect everything [2, 3].

  16. IEEE Network September/October 20134 n order to provide rich mobile pervasive services to

    E-print Network

    Chen, Min

    applications demand- ed by users. Recently, mobile cloud computing (MCC) technologies for mobile devices have emerged to overcome these limitations. These technologies can minimize the requirements of computing power, etc.) can be greatly facilitated by cloud computing platforms employing advanced technologies

  17. Battery Emulation 150 0740-7475/05/$20.00 2005 IEEE Copublished by the IEEE CS and the IEEE CASS IEEE Design & Test of Computers

    E-print Network

    Shinozuka, Masanobu

    Battery Emulation 150 0740-7475/05/$20.00 © 2005 IEEE Copublished by the IEEE CS and the IEEE CASS IEEE Design & Test of Computers AS CONSUMERS DEMAND ever more functionality and smaller form factors in portable devices such as PDAs and celluar phones, batteries are quickly becoming a lim- iting factor

  18. Sponsored by CRC and IEEE Computer Society TTTC

    E-print Network

    Stanford University

    enter for eliable omputing C R C Sponsored by CRC and IEEE Computer Society TTTC 12th Pacific Publicity Chair: Mike Purtell, Advantest Finance Chair/IEEE Liaison: Erik Volkerink, Stanford) and the IEEE Computer Society Test Technology Technical Council (TTTC)* , will be held February 25 - 28, 2003

  19. Sponsored by CRC and IEEE Computer Society TTTC

    E-print Network

    Stanford University

    enter for eliable omputing C R C P Sponsored by CRC and IEEE Computer Society TTTC Eighth Pacific) and the IEEE Computer Society Test Technology Technical Committee (TTTC)* , will be held Feb. 23 -26, 1999 sponsors are invited to send a check for sponsorship (make checks payable to IEEE/CRC BAST Workshop

  20. Pervasive Computing Technologies to Continuously Assess Alzheimer’s Disease Progression and Intervention Efficacy

    PubMed Central

    Lyons, Bayard E.; Austin, Daniel; Seelye, Adriana; Petersen, Johanna; Yeargers, Jonathan; Riley, Thomas; Sharma, Nicole; Mattek, Nora; Wild, Katherine; Dodge, Hiroko; Kaye, Jeffrey A.

    2015-01-01

    Traditionally, assessment of functional and cognitive status of individuals with dementia occurs in brief clinic visits during which time clinicians extract a snapshot of recent changes in individuals’ health. Conventionally, this is done using various clinical assessment tools applied at the point of care and relies on patients’ and caregivers’ ability to accurately recall daily activity and trends in personal health. These practices suffer from the infrequency and generally short durations of visits. Since 2004, researchers at the Oregon Center for Aging and Technology (ORCATECH) at the Oregon Health and Science University have been working on developing technologies to transform this model. ORCATECH researchers have developed a system of continuous in-home monitoring using pervasive computing technologies that make it possible to more accurately track activities and behaviors and measure relevant intra-individual changes. We have installed a system of strategically placed sensors in over 480 homes and have been collecting data for up to 8?years. Using this continuous in-home monitoring system, ORCATECH researchers have collected data on multiple behaviors such as gait and mobility, sleep and activity patterns, medication adherence, and computer use. Patterns of intra-individual variation detected in each of these areas are used to predict outcomes such as low mood, loneliness, and cognitive function. These methods have the potential to improve the quality of patient health data and in turn patient care especially related to cognitive decline. Furthermore, the continuous real-world nature of the data may improve the efficiency and ecological validity of clinical intervention studies. PMID:26113819

  1. 10 Published by the IEEE Computer Society 1089-7801/10/$26.00 2010 IEEE IEEE INTERNET COMPUTING GuestEditors'Introduction

    E-print Network

    and technical challenges inherent to this "Internet of Things," of which privacy is the most compelling10 Published by the IEEE Computer Society 1089-7801/10/$26.00 © 2010 IEEE IEEE INTERNET COMPUTING GuestEditors'Introduction Internet Predictions Vinton G. Cerf Google Munindar P. Singh North Carolina

  2. Bond Computing Systems: a Biologically Inspired and High-level Dynamics Model for Pervasive Computing

    E-print Network

    Dang, Zhe

    Computing Linmin Yang1 , Zhe Dang1 , and Oscar H. Ibarra2 1 School of Electrical Engineering and Computer and CCF- 0524136. #12;as a person goes back home from the office, the meal is cooked and the air conditioner is turned on, etc. Another example is a health monitoring network for, e.g., assisting the aged

  3. Bond Computing Systems: a Biologically Inspired and High-level Dynamics Model for Pervasive Computing

    E-print Network

    Dang, Zhe

    and the air conditioner is turned on, etc. Another example is a health monitoring network for, e.g., assisting Computing Linmin Yang1 , Zhe Dang1 , and Oscar H. Ibarra2 1 School of Electrical Engineering and Computer, a helicopter will, automatically, come and carry him/her to a clinic. However, how to design a complex

  4. 2 Published by the IEEE Computer Society 1089-7801/11/$26.00 2011 IEEE IEEE INTERNET COMPUTING n recent columns, I've referred to an arti-

    E-print Network

    Petrie, Charles

    years later. I pre- dicted that 3G cellular wouldn't be the "wireless Internet" of the future and WiPeering 2 Published by the IEEE Computer Society 1089-7801/11/$26.00 © 2011 IEEE IEEE INTERNET distributed Internet-based systems have been unanticipated by people who should have been experts

  5. The Gator Tech Smart House: A Programmable Pervasive Space

    Microsoft Academic Search

    Sumi Helal; William C. Mann; Hicham El-zabadani; Jeffrey King; Youssef Kaddoura; Erwin Jansen

    2005-01-01

    Research groups in both academia and industry have developed prototype systems to demonstrate the benefits of pervasive computing in various application domains. Unfortunately, many first-generation pervasive computing systems lack the ability to evolve as new technologies emerge or as an application domain matures. To address this limitation, the University of Florida's Mobile and Pervasive Computing Laboratory is developing programmable pervasive

  6. Intelligent Pervasive Network Authentication: S\\/Key Based Device Authentication

    Microsoft Academic Search

    Deok Gyu Lee; Jong-Wook Han; Doo Soon Park; Im Yeong Lee

    2009-01-01

    The intelligent pervasive network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. As a number of pervasive network services are available and smart environment is expanding into ubiquitous computing environment, we need to protect intelligent pervasive environment system from illegal accesses and a variety

  7. PGS: Pervasive Grid Simulator Library

    Microsoft Academic Search

    Rebbah Mohammed; Mokhtari Chakir; Souane Naima; Ghezal Kheira

    2009-01-01

    Pervasive grids are service-oriented architecture,allowing sharing of resources through a flexible infrastructure, stable infrastructure providing computing power and secondly mobile devices allowing access to that power. They are characterized by their large scale in terms of number of resources, many users and geographical extent, heterogeneity and dynamism of their resources. The complexity of pervasive grids in regard to the study

  8. Distributed Pervasive Worlds: The Case of Exergames

    ERIC Educational Resources Information Center

    Laine, Teemu H.; Sedano, Carolina Islas

    2015-01-01

    Pervasive worlds are computing environments where a virtual world converges with the physical world through context-aware technologies such as sensors. In pervasive worlds, technology is distributed among entities that may be distributed geographically. We explore the concept, possibilities, and challenges of distributed pervasive worlds in a case…

  9. Studying the Elusive Experience in Pervasive Games

    ERIC Educational Resources Information Center

    Stenros, Jaakko; Waern, Annika; Montola, Markus

    2012-01-01

    Studying pervasive games is inherently difficult and different from studying computer or board games. This article builds upon the experiences of staging and studying several playful pervasive technology prototypes. It discusses the challenges and pitfalls of evaluating pervasive game prototypes and charts methods that have proven useful in…

  10. Pervasive Healthcare

    Microsoft Academic Search

    Upkar Varshney

    2003-01-01

    The US healthcare industry is confronting a number of challenges, including skyrocketing costs, a growing incidence of medical errors, inadequate staffing, and lack of coverage in rural and underserved urban areas. Healthcare workers are under increasing pressure to provide better services to more people using limited financial and human resources. One proposed solution to the current crisis is pervasive healthcare.

  11. IEEE Computer, Volume 32, Number 6, pp. 67-71, 1999. Copyright IEEE Research Feature

    E-print Network

    Giles, C. Lee

    a universal bibliographic and citation database that would link every scholarly work ever written.4 HeIEEE Computer, Volume 32, Number 6, pp. 67-71, 1999. Copyright © IEEE 1 Research Feature Digital with Internet access. The database would include citation links and would be comprehensive and current. Cameron

  12. Computational Intelligence and AI in Games: A New IEEE Transactions

    E-print Network

    Lucas, Simon M.

    increase in the quality, diversity and pervasiveness of video games. The value of the worldwide computer and video games market is estimated to be $USD25bn annually1 , and is predicted to grow rapidly over to chess and checkers do not work well for Go, and are even less applicable to video games where the state

  13. Editor: Charles Petrie petrie@stanford.edu 2 Published by the IEEE Computer Society 1089-7801/14/$31.00 2014 IEEE IEEE INTERNET COMPUTING

    E-print Network

    Petrie, Charles

    -7801/14/$31.00 © 2014 IEEE IEEE INTERNET COMPUTING N o, I'm not trying to apply the term "Inter- net of Things function, and is carried out by the Internet Assigned Num- bers Authority (IANA). Ok, is this a thing for Internet protocols, some of which include things like MIME types and TCP port numbers. Most importantly

  14. 1536-1268/07/$25.00 2007 IEEE Published by the IEEE Computer Society PERVASIVE computing 41 The Urbanet Revolution

    E-print Network

    Borcea, Cristian

    , smart phones and vehicular sys- tems are becoming attractive, convenient mobile sensor platforms enabling users to benefit from a sensor-rich world through novel mobile appli- cations. In particular. Compared to the tiny, energy- constrained sensors of regular sensor networks, smart phones can support more

  15. MAY JUNE 1997 http://computer.org/internet/ IEEE INTERNET COMPUTING MOBILE AGENTS

    E-print Network

    80 MAY · JUNE 1997 http://computer.org/internet/ IEEE INTERNET COMPUTING MOBILE AGENTS A lot_types, code)." The receiving agent can autono- mously decide--based among other things on its level of trust

  16. Middleware for Pervasive Healthcare A White Paper

    E-print Network

    Christensen, Henrik Bærbak

    developing an electronic patient record solution, and CfPC. The aim of the paper is to present and discussMiddleware for Pervasive Healthcare A White Paper Jakob E. Bardram Center for Pervasive Computing Computing University of Aarhus 8200 Ã?rhus N Denmark hbc@daimi.au.dk ABSTRACT This white paper describes work

  17. Pervasive and Mobile Computing 7 (2011) 344358 Contents lists available at ScienceDirect

    E-print Network

    Yang, Qiang

    2011-01-01

    .W. Zheng), qyang@cse.ust.hk (Q. Yang). 1 Tel.: +852 23588768; fax: +852 23581477. 1574-1192/$ ­ see front transfer learning Derek Hao Hu , Vincent Wenchen Zheng, Qiang Yang1 Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong a r t i c l e i n f o Article history

  18. Self-Routing in Pervasive Computing Environments using Smart Messages Cristian Borcea1

    E-print Network

    Borcea, Cristian

    of building large scale networks of embedded systems (NES). NES are inherently ad hoc networks because that will face us during the next decade as distributed computing did two decades ago. To program such NES, two distributed applications over NES, while this paper addresses the routing in NES. The applications running

  19. rfid in pervasive computing: State-of-the-art and outlook

    Microsoft Academic Search

    George Roussos; Vassilis Kostakos

    2009-01-01

    RFID has already found its way into a variety of large scale applications and arguably it is already one of the most successful technologies in the history of computing. Beyond doubt, RFID is an efiective automatic identiflcation technology for a variety of objects including natural, manufactured and handmade artifacts; humans and other species; locations; and increasingly media content and mobile

  20. IEEE Computer Society URL htt // k h d j /

    E-print Network

    Kasahara, Hironori

    ; Everywhere , ,,TV, DVD IBM/ Sony/ Toshiba Cell (9 cores), Fujitsu FR1000 (4 cores), Panasonic Uniphier NEC/ARM MPCore/MP211/NaviEngine (4 cores)Panasonic Uniphier, NEC/ARM MPCore/MP211/NaviEngine (4 cores) Renesas Computer Society Golden Core MemberSupercomputing R&D 2009 IEEE Computer Society (Golden Core Member 2010

  1. CBTM: A Trust Model with Uncertainty Quantification and Reasoning for Pervasive Computing

    Microsoft Academic Search

    Rui He; Jianwei Niu; Guangwei Zhang

    2005-01-01

    \\u000a This paper presents a novel trust model in which we model trust based on an exotic uncertainty theory, namely cloud model.\\u000a We regard trust between entities as a cloud that is called as trust cloud. Based on such a quantification model of trust,\\u000a we further propose the algorithms to compute propagated trust relationships and aggregated trust relationships, which are\\u000a needed

  2. DTT: A distributed trust toolkit for pervasive systems

    E-print Network

    Lagesse, Brent

    Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around distributed trust management. While such ...

  3. 410272-1732/05/$20.00 2005 IEEE Published by the IEEE computer Society The graphics processing unit

    E-print Network

    Silvano, Cristina

    410272-1732/05/$20.00 2005 IEEE Published by the IEEE computer Society The graphics processing such as fluid dynamics, weather sim- ulation, and financial option price modeling. The computational load- trates the evolution of image quality. The graphics problem What does a GPU do? Under the control

  4. T U T O R I A L 1089-7801/98/$10.00 1998 IEEE IEEE INTERNET COMPUTING

    E-print Network

    Nelakuditi, Srihari

    . T U T O R I A L 58 1089-7801/98/$10.00 ©1998 IEEE IEEE INTERNET COMPUTING TUTORIAL MOBILE. Truly mobile computing offers many advantages. Confident access to the Internet anytime, anywhere to the Internet. Another difference may well be rate of adoption. It took many years for mobile phones to become

  5. Editor: Charles Petrie petrie@stanford.edu 2 Published by the IEEE Computer Society 1089-7801/13/$31.00 2013 IEEE IEEE INTERNET COMPUTING

    E-print Network

    Petrie, Charles

    -7801/13/$31.00 © 2013 IEEE IEEE INTERNET COMPUTING R ecently, a friend asked me to write about Bitcoin. This has always into Bitcoin, I realized I couldn't add much to what you can get on this interest- ing topic yourself, starting with an excellent Wikipedia article (http://en.wikipedia.org/wiki/ Bitcoin). Bitcoin isn't a Ponzi scheme. Mining

  6. Automatic implementation generation for pervasive applications

    E-print Network

    Paluska, Justin Mazzola, 1981-

    2004-01-01

    Pervasive computing promises to put computers in almost every corner of our life. Unfortunately, it also promises to make programmers' jobs harder since they cannot know what components are available in the run-time ...

  7. IEEE TRANSACTIONS ON COMPUTERS, VOL. *, NO. *, * * 1 The Reliability Wall for Exascale

    E-print Network

    Xue, Jingling

    technol- ogy, architecture, power, reliability, programmability, and usability. This research addressesIEEE TRANSACTIONS ON COMPUTERS, VOL. *, NO. *, * * 1 The Reliability Wall for Exascale Supercomputing Xuejun Yang, Member, IEEE, Zhiyuan Wang, Jingling Xue, Senior Member, IEEE, and Yun Zhou Abstract--Reliability

  8. In proceedings of 10th annual IEEE symposiumon Logic in Computer Science, IEEE Computer Society Press, June 1995. Games and Full Abstraction for the Lazy calculus

    E-print Network

    McCusker, Guy

    In proceedings of 10th annual IEEE symposiumon Logic in Computer Science, IEEE Computer Society Press, June 1995. Games and Full Abstraction for the Lazy â??­calculus Samson Abramsky Guy Mc . A model of the lazy â??­calculus, a type­free functional language based on evaluation to weak head normal

  9. A Framework for the design of privacy preserving pervasive healthcare

    Microsoft Academic Search

    Simon Moncrieff; Svetha Venkatesh; Geoff West

    2009-01-01

    Privacy is an important aspect of pervasive and ubiquitous computing systems, and, in particular, pervasive healthcare. With reference to previous approaches on developing privacy sensitive pervasive healthcare applications, we detail a framework for the design of such systems that aims to minimise the impact of privacy on such systems. In reviewing previous approaches, we extract and combine common elements in

  10. Model-Driven.Development. for.Pervasive.Information. Systems

    Microsoft Academic Search

    This chapter focuses on design methodologies for pervasive information systems (PIS). It aims to contribute to the efficiency and effectiveness of software development of ubiquitous services\\/applications supported on pervasive information systems. Pervasive information systems are comprised of conveniently orchestrated embed- ded or mobile computing devices that offer innovative ways to support existing and new business models. Those systems are characterized

  11. Internet Predictions 16 www.computer.org/internet/ IEEE INTERNET COMPUTING

    E-print Network

    Young, R. Michael

    Internet Predictions 16 www.computer.org/internet/ IEEE INTERNET COMPUTING systems dissipate at mani@cs.caltech.edu. The Play's the Thing R. Michael Young North Carolina State University F or most. As computer and console games continue to exploit new services available via the Internet, the design

  12. Proceedings of the 2004 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology (IEEE CIBCB 2004)

    E-print Network

    Song, Il-Yeol

    and Computational Biology (IEEE CIBCB 2004) 1 Extracting and Mining Protein-Protein Interaction Network from it is essential to understand the fundamental processes that govern cell biology. However, most of the protein-protein to automatically process biomedical literature and to extract important biological relationships such as protein­protein

  13. IEEE Computer Society 43 STARC (2), 2012925()

    E-print Network

    Kasahara, Hironori

    / Toshiba Cell, Fujitsu FR1000, Panasonic Uniphier, NEC/ARM MPCore/MP211/NaviEngine, Renesas 4 core RP1, 8 Society Golden Core Member 226 NEDO NEDO , IT , , JSTJSPSJAXA ES ,, , ES2, IEEE, , ACM Conf.PC, 189, 108, 29, 134, 154, 32 WebTV 443 #12;Multi/Many-core Everywhere Multi-core from embedded

  14. IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 1 Scheduling Second Order Computational Load in

    E-print Network

    Robertazzi, Thomas G.

    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 1 Scheduling Second Order Computational Load. Robertazzi, Fellow, IEEE, Young-Il Kim Abstract Scheduling divisible loads with the nonlinear computational-form expression for processing time and load fractions. In this study, we attempt to address a divisible load

  15. Pervasive Home Security: An Intelligent Domotics Application

    Microsoft Academic Search

    Vincenza Carchiolo; Alessandro Longheu; Michele Malgeri; Giuseppe Mangioni; Danilo Torrisi

    \\u000a The pervasive computing paradigm promotes new applications in several scenarios. Among these, domotics is receiving a considerable\\u000a attention. This work presents an intelligent and pervasive surveillance system for home and corporate security based on the\\u000a ZigBee protocol which detects and classifies intrusions discarding false positives, also providing remote control and cameras\\u000a live streaming. Results of tests in different environments show

  16. Recent Advances in AI for Computational Sustainability AI and Sustainability Department, IEEE Intelligent Systems

    E-print Network

    Fisher, Douglas H.

    Recent Advances in AI for Computational Sustainability AI and Sustainability., "Computing and AI for a Sustainable Future," IEEE Intelligent Systems, vol. 27, no. 4, July/Aug 2012. Though research at the intersection of AI

  17. 22 July/August 2013 Published by the IEEE Computer Society 0272-1716/13/$31.00 2013 IEEE Big-Data Visualization

    E-print Network

    Park, Haesun

    that exploit machine learning and data mining. These meth- ods' natural t and appeal for VA for big data have22 July/August 2013 Published by the IEEE Computer Society 0272-1716/13/$31.00 © 2013 IEEE Big-Data Visualization Customizing Computational Methods for Visual Analytics with Big Data Jaegul Choo and Haesun Park

  18. J. PERVASIVE COMPUT. & COMM. 1 (1), MARCH 2005. c TROUBADOR PUBLISHING LTD) 1 A Context-Aware Preference Database System

    E-print Network

    Pitoura, Evaggelia

    -Aware Preference Database System Kostas Stefanidis Department of Computer Science, University of Ioannina, Greece, kstef@cs.uoi.gr Evaggelia Pitoura Department of Computer Science, University of Ioannina, Greece, pitoura@cs.uoi.gr Panos Vassiliadis Department of Computer Science, University of Ioannina, Greece

  19. 2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any c

    E-print Network

    Pratt, Vaughan

    .ieee.org/web/publications/rights/index.html. MOBILE AND UBIQUITOUS SYSTEMS www.computer.org/pervasive Hacking, Mashing, Gluing: Understanding T I O N Hacking, Mashing, Gluing: Understanding Opportunistic Design Björn Hartmann, Scott Doorley. Although many ubiquitous computing practitioners have engaged in these practices, design tools and software

  20. IEEE Communications Magazine September 201224 ver the past few years, cloud computing has rapidly

    E-print Network

    Jain, Raj

    IEEE Communications Magazine · September 201224 ver the past few years, cloud computing has rapidly (switches and routers) used in creating cloud computing infrastructure. Cloud computing networks must to be addressed for the long-term success of cloud computing. We kept our scope wider to consider all aspects

  1. 19IEEE Network July/August 2010 loud computing has been envisioned as the next-

    E-print Network

    Hou, Y. Thomas

    of Technology Abstract Cloud computing is the long dreamed vision of computing as a utility, where data owners maintenance, and so on [2]. While cloud computing makes these advantages more appealing than ever, it also19IEEE Network · July/August 2010 loud computing has been envisioned as the next- generation

  2. Using IEEE 1394 network for cluster computing

    Microsoft Academic Search

    Yong Yu; Yu-Fai Fung

    2004-01-01

    The Network Of Workstations (NOWs). or Cluster. attract much otterition these years us a more cost- effectiie uption to implement pnrullel computing cumparing with supper computerv. NOWT is uften a collection of network backbone for home (7). A homo,qeneoii.s nodes interconnected by a high performance technolqqy L.7 a key factur which influences the overall cost- effectiveness uf the NOW The

  3. Trust of Medical Devices, Applications, and Users in Pervasive Healthcare

    E-print Network

    Bishop, Matt

    Trust of Medical Devices, Applications, and Users in Pervasive Healthcare Michael Clifford Computer to receive health care through the use of pervasive medical devices, sensors, and applications, even outside, and following policies set by the patient's doctors. Because many medical devices are highly specialized

  4. Trust of Medical Devices, Applications, and Users in Pervasive Healthcare

    E-print Network

    Bishop, Matt

    Trust of Medical Devices, Applications, and Users in Pervasive Healthcare Michael Clifford Computer to receive health care through the use of pervasive medical devices, sensors, and applications, even outside and the patient, and following policies set by the patient's doctors. Because many medical devices are highly

  5. A Survey of Context Modeling for Pervasive Cooperative Learning

    Microsoft Academic Search

    Philip Moore; Bin Hu; Xiaomei Zhu; William Campbell; Martyn Ratcliffe

    2007-01-01

    Context represents a fundamental issue in research into pervasive and cooperative computing applications. This paper presents a survey on context modelling issues, together with a discussion on approaches to context modelling in intelligent context-aware pervasive systems. There is a parametric evaluation of the approaches considered, the conclusion drawn being that ontology-based modelling approach represents the optimal approach. The paper concludes

  6. SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications

    Microsoft Academic Search

    Harry Chen; Filip Perich; Timothy W. Finin; Anupam Joshi

    2004-01-01

    We describe a shared ontology called SOUPA - Stan- dard Ontology for Ubiquitous and Pervasive Applications. SOUPA is designed to model and support pervasive comput- ing applications. This ontology is expressed using the Web Ontology Language OWL and includes modular component vocabularies to represent intelligent agents with associated beliefs, desires, and intentions, time, space, events, user profiles, actions, and policies

  7. Blended Identity: Pervasive IdM for Continuous Authentication

    E-print Network

    Suri, Neeraj

    Blended Identity: Pervasive IdM for Continuous Authentication Patricia Arias-Cabarcos 1 Telematic Engineering Department, University Carlos III of Madrid Avda.de la@cs.tu-darmstadt.de Abstract ­ Pervasive computing requires a proper identity management approach so

  8. Adaptivity in Risk and Emergency Management Applications on Pervasive Grids

    Microsoft Academic Search

    Carlo Bertolli; Gabriele Mencagli; Marco Vanneschi

    2009-01-01

    Pervasive grid computing platforms are composed of a variety of fixed and mobile nodes, interconnected through multiple wireless and wired network technologies. Pervasive grid Applications must adapt themselves to the state of their surrounding environment which includes environmental data (e.g. collected from sensors) and the state of the used resources (e.g. network or node states). Adaptation is especially important if

  9. IEEE TRANSACTIONS ON COMPUTERS 1 Analysis of Backward Congestion Notification

    E-print Network

    Stojmenovic, Ivan

    the performance of Ethernet under the long-lived congestion. To eliminate the long-lived congestion, the end-to-end for Enhanced Ethernet Networks Wanchun Jiang, Fengyuan Ren, Member, IEEE, Chuang Lin, Senior Member, IEEE, Ivan Stojmenovic, Fellow, IEEE, Abstract--At present, companies and standards organizations are enhancing Ethernet

  10. 10 PERVASIVE computing Published by the IEEE CS and IEEE ComSoc 1536-1268/07/$25.00 2007 IEEE Psychotherapy

    E-print Network

    Antunes, Pedro

    Ubiquitous Psychotherapy T herapists commonly use cognitive behavioral therapy to treat anxiety, depression the therapist's presence outside the office, Handheld-based tools let therapists customize psychotherapy

  11. Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'04), IEEE Computer Society Press

    E-print Network

    Cao, Longbing

    in stock marketing often hold some private trading strategies. Evaluation and optimization markets. 1. Introduction Stock traders cantake less risk if they back-test their trading strategies'04), IEEE Computer Society Press Agent Services-Based Infrastructure for Online Assessment of Trading

  12. Pervasive Computing in Schools - Embedding Information Technology into the Ambient Complexities of Physical Group-Learning Environments

    Microsoft Academic Search

    Thomas Winkler; Michael Herczeg

    2005-01-01

    In the KiMM (Kids in Media and Motion) Initiative we are following a generalized approach, which places the emphasis of using digital interactive technology with school students in their daily learning environment. Our world is progressively becoming more complex and computer systems are becoming a more integrated part of our environment, though at the same time, getting more invisible. This

  13. A Framework for Safe Composition of Heterogeneous SOA Services in a Pervasive Computing Environment with Resource Constraints

    ERIC Educational Resources Information Center

    Reyes Alamo, Jose M.

    2010-01-01

    The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…

  14. A Taxonomy of Pervasive Healthcare Systems

    Microsoft Academic Search

    Joanna Alicja Muras; Vinny Cahill; Emma Katherine Stokes

    2007-01-01

    Pervasive computing is a developing area. Due to significant technological developments, assistive devices that were impossible to make or that were not even considered for manufacture are now available. The creation of novel smart environments, context-aware assistive devices, and activity monitoring systems have the capacity to provide people with great opportunities to improve their quality of life and increase independence

  15. 18 PERVASIVE computing Published by the IEEE Computer Society 1536-1268/07/$25.00 2007 IEEE elcome to this special issue on

    E-print Network

    Paulos, Eric

    to understand such urban uses of by-now familiar techno- logies. But we mainly wanted to under- stand how. NAVITIME runs on mobile phones, many of which include integrated GPS. A minority use case is in

  16. Computational Intelligence Meets Game of Go @ IEEE WCCI 2012 Chang-Shing Lee1

    E-print Network

    Paris-Sud XI, Université de

    1 Computational Intelligence Meets Game of Go @ IEEE WCCI 2012 Chang-Shing Lee1 , Olivier Teytaud1 if computers can also outperform humans when the games conditions are slightly in favor of humans, (2) 9x9, 13x13, and 19x19 board games to see how far computers are from humans now, and (3) novel activities

  17. 2 IEEE TRANSACTIONS ON EDUCATION, VOL. 46, NO. 1, FEBRUARY 2003 Review of Computer Vision Education

    E-print Network

    Bebis, George

    2 IEEE TRANSACTIONS ON EDUCATION, VOL. 46, NO. 1, FEBRUARY 2003 Review of Computer Vision Education vision is becoming a mainstream subject of study in computer science and engineering. With the rapid imaging and vision. The purpose of this paper is to review the status of computer vision education today

  18. Vertical Handover Based Adaptation for Multimedia Applications in Pervasive Systems

    Microsoft Academic Search

    Jadwiga Indulska; Sasitharan Balasubramaniam

    2002-01-01

    This paper proposes an architecture for pervasive computing which utilizes context information to provide adaptations based\\u000a on vertical handovers (handovers between heterogeneous networks) while supporting application Quality of Service (QoS). The\\u000a future of mobile computing will see an increase in ubiquitous network connectivity which allows users to roam freely between\\u000a heterogeneous networks. One of the requirements for pervasive computing is

  19. Final version to IEEE Pervasive Computing Magazine ConvenienceProbe: A Phone-based Data Collection and

    E-print Network

    Ouhyoung, Ming

    .e., without disrupting human natural behaviors. Retail Trade Area Analysis and Marketing Research Since Collection and Access System for Retail Trade Area Analysis Chuang-Wen You1 , Hsin-Liu (Cindy) Kao2 , Bo, called ConvenienceProbe, for retail trade area analysis. The proposed method specifically targets local

  20. 4. P. W. Shor, Proceedings of the 35th Annual Symposium on Foundations of Computer Science (IEEE Computer

    E-print Network

    4. P. W. Shor, Proceedings of the 35th Annual Symposium on Foundations of Computer Science (IEEE Computer Society Press, Los Alaminos, CA 1994), pp. 124­134. 5. C. H. Bennett, P. W. Shor, Science 303, Nature 299, 802 (1982). 8. S. Lloyd, Phys. Rev. A 55, 1613 (1997). 9. P. W. Shor, lecture notes from

  1. IEEE guide on human factors engineering of computer-based monitoring and control displays

    SciTech Connect

    Zgliczynski, J.B. (General Atomics, San Diego, CA (United States))

    1993-01-01

    The Institute of Electrical and Electronics Engineers (IEEE) has assigned responsibility for coordination and development of nuclear power plant human factors standards to a subcommittee of the Power Engineering Society Nuclear Power Engineering Committee. The Human Factors and Control Facilities Subcommittee is a consensus standards committee made up of balanced representation of utilities, vendors, consultants, national laboratories, and US Nuclear Regulatory Commission with expertise in instrumentation and controls engineering and human factors engineering. This committee has successfully developed several IEEE human factors engineering (HFE) standards currently in use: IEEE Std 845-1988, [open quotes]IEEE Guide to the Evaluation of Man Machine Performance in Nuclear Power Generating Station Control Rooms and Other Peripheries[close quotes]; and IEEE Std 1023-1988, [open quotes]IEEE Guide for the Application of Human Factors Engineering to Systems, Equipment, and Facilities of Nuclear Power Generating Stations.[close quotes] These standards serve as top-level standards, and other IEEE standards are being developed to provide more detailed HFE guidance to address more specific issues in the nuclear power industry. The objective of this paper is to summarize the status of the committee's efforts to address the specific issue of HFE in the design of computer- based monitoring and control displays used in nuclear power generating stations.

  2. IEEE Computer Society Task Force on Cluster Computing

    NSDL National Science Digital Library

    The TFCC is an international forum promoting cluster computing research and education. It participates in helping to set up and promote technical standards in this area. The Task Force is concerned with issues related to the design, analysis, development and implementation of cluster-based systems. Of particular interest are: cluster hardware technologies, distributed environments, application tools and utilities, as well as the development and optimisation of cluster-based applications.

  3. 2012 IEEE 4th International Conference on Cloud Computing Technology and Science 978-1-4673-4510-1/12/$31.00 2012 IEEE

    E-print Network

    Hone, James

    2012 IEEE 4th International Conference on Cloud Computing Technology and Science 978Reduce applications that couples cloud computing with distributed embedded computing. Specifically, our system as Cloud services. These large- scale centers provide all sorts of computational services to a multiplicity

  4. 0018-9162/02/$17.00 2002 IEEE56 Computer Rover: Scalable

    E-print Network

    Banerjee, Suman

    0018-9162/02/$17.00 © 2002 IEEE56 Computer Rover: Scalable Location-Aware Computing C onsider architecture that scales with user populations. We developed Rover technology to meet this need.1 We have scheduling at the servers and network. ROVER ARCHITECTURE Rover technology tracks the location of system

  5. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Fracturing Rigid Materials

    E-print Network

    Fedkiw, Ron

    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Fracturing Rigid Materials Zhaosheng Bao to fracturing (and denting) brittle materials. To avoid the computational burden imposed by the stringent time mesh upon which finite element analysis can be carried out to provide a stress map for fracture

  6. IEEE Conference on Computer Vision and Pattern Recogntion, June, 1998. Minimax Entropy and Learning by Diffusion

    E-print Network

    Shah, Jayant M.

    IEEE Conference on Computer Vision and Pattern Recogntion, June, 1998. Minimax Entropy and Learning for modelling many prob- lems in Computer Vision is provided by variational calcu- lus. In this approach. It is derived as the gradient flow of 1This work was partially supported by NIH Grant I-R01­NS34189­01 and NSF

  7. In Proceedings of the IEEE 2005 Symposium on Computational Intelligence and Games (CIG'05). Piscataway, NJ: IEEE Winner of the Best Paper Award at CIG'05

    E-print Network

    Meeden, Lisa A.

    In Proceedings of the IEEE 2005 Symposium on Computational Intelligence and Games (CIG'05 Video Game Kenneth O. Stanley Department of Computer Sciences The University of Texas at Austin Austin. In the video game industry, the term Non-player- character (NPC) refers to an autonomous computer- controlled

  8. 2012 IEEE 4th International Conference on Cloud Computing Technology and Science 978-1-4673-4510-1/12/$31.00 2012 IEEE

    E-print Network

    Paris-Sud XI, Université de

    2012 IEEE 4th International Conference on Cloud Computing Technology and Science 978 the use of distributed computing infrastructures such as Grids and Clouds, equipped with GPUs, in order. Keywords-component; Distributed and parallel computing, Grid, Cloud, GPU, OpenCL, machine learning

  9. 5298 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 8, AUGUST 2011 Distributed Scalar Quantization for Computing

    E-print Network

    Goyal, Vivek K

    , IEEE, and Lav R. Varshney, Member, IEEE Abstract--Communication of quantized information is fre@mit.edu). L. R. Varshney was with the Department of Electrical Engineering and Computer Science, the Research of Technology, Cambridge, MA 02139 USA (e-mail: varshney@alum.mit.edu). Communicated by E. Ordentlich, Associate

  10. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 9, SEPTEMBER 2014 1911 A Markov Jump Process Model for Urban

    E-print Network

    Chen, Sheng

    Model for Urban Vehicular Mobility: Modeling and Applications Yong Li, Member, IEEE, Depeng Jin, MemberIEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 9, SEPTEMBER 2014 1911 A Markov Jump Process the industry and research communities. One of the challenges in this area is understanding vehicular mobility

  11. IEEE TRANSACTIONS ON ROBOTICS, VOL. 23, NO. 6, DECEMBER 2007 1117 Fast Computation of Optimal Contact Forces

    E-print Network

    Contact Forces Stephen P. Boyd, Fellow, IEEE, and Ben Wegbreit, Member, IEEE Abstract--We consider the problem of computing the smallest contact forces, with point-contact friction model, that can hold an object in equilibrium against a known external applied force and torque. It is known that the force

  12. IEEE TRANSACTIONS ON COMPUTERS, VOL. C-31, NO. 5, MAY 1982 The Extra Stage Cube: A Fault-Tolerant

    E-print Network

    IEEE TRANSACTIONS ON COMPUTERS, VOL. C-31, NO. 5, MAY 1982 The Extra Stage Cube: A Fault, IEEE Abstract-The Extra Stage Cube (ESC) interconnection network, a fault-tolerant structure interconnecting capabilities of the multistage cube-type networks that have been proposed for many supersystems

  13. IEEE Xplore

    NSDL National Science Digital Library

    IEEE Xplore is an online delivery system providing full text access to technical literature in electrical engineering, computer science, and electronics. IEEE Xplore contains full text documents from IEEE journals, transactions, magazines, letters, conference proceedings, standards, and IEE (Institution of Electrical Engineers) publications.

  14. 96 Published by the IEEE Computer Society 1089-7801/07/$25.00 2007 IEEE IEEE INTERNET COMPUTING Unifying Reasoning

    E-print Network

    van Harmelen, Frank

    them attract a lot of attention. Still, we doubt whether this is the actual path to reasoning on a Web COMPUTING Unifying Reasoning and Search to Web Scale W e recently heard about a telecom project that required reasoning about 10 billion RDF triples (statements of the form

  15. Pervasive Advertising Jrg Mller1

    E-print Network

    Pervasive Advertising Jörg Müller1 , Florian Alt2 , Daniel Michelis3 1 Deutsche Telekom technologies leave the labs, they are starting to be used for the purpose of advertising. Pervasive Advertising shaping this development in a meaningful way. In particular, many marketing and advertising professionals

  16. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 26, NO. 4, APRIL 2007 743 Negative Bias Temperature Instability: Estimation

    E-print Network

    Alam, Muhammad A.

    , Student Member, IEEE, Muhammad A. Alam, Fellow, IEEE, and Kaushik Roy, Fellow, IEEE Abstract America Research Inc., San Jose, CA 95131 USA (e-mail: bpaul@tari.toshiba.com). K. Kang, H. Kufluoglu, M. A. Alam, and K. Roy are with the School of Electrical and Computer Engineering, Purdue University

  17. 436 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 3, MARCH 2008 Quantum Circuit Simplification and

    E-print Network

    Miller, D. Michael

    436 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 3, MARCH 2008 Quantum Circuit Simplification and Level Compaction Dmitri Maslov, Gerhard W. Dueck, Member, IEEE, D. Michael Miller, Member, IEEE, and Camille Negrevergne Abstract--Quantum circuits are time

  18. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. , NO. , 2005 1 Geometry-Dependent Lighting

    E-print Network

    Varshney, Amitabh

    -Dependent Lighting Chang Ha Lee, Xuejun Hao, and Amitabh Varshney, Member, IEEE Abstract-- In this paper we introduce. Lee and A. Varshney are with the Department of Computer Science, University of Maryland, College Park, MD 20742. E-mail: {chlee, varshney}@cs.umd.edu X. Hao is with the Department of Psychiatry, Columbia

  19. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS Visualization Task Performance with 2D, 3D,

    E-print Network

    Tory, Melanie

    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS Visualization Task Performance with 2D, 3D--We describe a series of experiments that compare 2D displays, 3D displays, and combined 2D/3D displays, orientation icon and ExoVis displays were better than strict 2D or 3D displays (displays consisting

  20. IEEE TRANSACTIONS ON MOBILE COMPUTING 1 Verifying Delivered QoS in Multi-hop Wireless

    E-print Network

    Singh, Suresh

    IEEE TRANSACTIONS ON MOBILE COMPUTING 1 Verifying Delivered QoS in Multi-hop Wireless Networks is the following: "How can a source verify the QoS (Quality of Service) ex- perienced by its packet(s) at each hop? Answering this question will enable innovations in multi-hop wireless network deployments where nodes may

  1. Symposium on Intelligent Embedded Systems (IES 2014) at IEEE Symposium Series in Computational Intelligence 2014

    E-print Network

    Alippi, Cesare

    Symposium on Intelligent Embedded Systems (IES 2014) at IEEE Symposium Series in Computational Intelligence 2014 http://ies14-ssci.deib.polimi.it/ Orlando, Florida, December 9 -12, 2014 Organizers Cesare (Italy) Daniele Caltabiano (Italy) Intelligent embedded systems, i.e., embedded processing systems

  2. IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 4, APRIL 1997 425 Parallel Signature Analysis Design

    E-print Network

    Stanford University

    structures that compact response from a single circuit output. Fig. 1. Parallel signature analysis. The finalIEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 4, APRIL 1997 425 Parallel Signature Analysis Design--This paper presents parallel signature design techniques that guarantee the aliasing probability to be less

  3. IEEE TRANSACTIONS ON MOBILE COMPUTING 1 RF-sensing of activities from non-cooperative

    E-print Network

    Beigl, Michael

    , notebooks, media players, printers as well as keyboards, mouses, watches, shoes and rumour has spread aboutIEEE TRANSACTIONS ON MOBILE COMPUTING 1 RF-sensing of activities from non-cooperative subjects the transmitter is either under the control of the system or ambient. For activity detection the application

  4. IEEE TRANSACTION ON VISUALIZATION AND COMPUTER GRAPHICS 1 Water Surface Modeling from A Single

    E-print Network

    Martin, Ralph R.

    IEEE TRANSACTION ON VISUALIZATION AND COMPUTER GRAPHICS 1 Water Surface Modeling from A Single and Phillip Willis Abstract--We introduce a video based approach for producing water surface models. Recent a velocity field that produces complex surface dynamics. We will provide qualitative evaluation of our method

  5. COMPUTATION OF THE EXCITABILITY INDEX FOR LINEAR OSCILLATORS Boris Andrievsky, Member, IEEE

    E-print Network

    COMPUTATION OF THE EXCITABILITY INDEX FOR LINEAR OSCILLATORS Boris Andrievsky, Member, IEEE Abstract: The problem of numerical evaluation of the excitability index for oscillating systems is considered. It is proved that the speed-gradient excitation maximizes the full energy of a linear oscillator

  6. Smart Grid Communication and Co-Simulation Vincenzo Liberatore, Member, IEEE Computer, Ahmad Al-Hammouri

    E-print Network

    Liberatore, Vincenzo

    1 Smart Grid Communication and Co-Simulation Vincenzo Liberatore, Member, IEEE Computer, Ahmad Al in smart grid com- munication, and proposes PowerNet, a system of heterogeneous yet interoperable networks investments in software and hardware. Smart grid communication involves disparate designs and complex issues

  7. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Blood Flow Clustering and Applications in

    E-print Network

    Fluid Dynamics (CFD) simulations of blood flow based on patient-individual data are performed to betterIEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Blood Flow Clustering and Applications, Holger Theisel, Bernhard Preim Abstract--Understanding the hemodynamics of blood flow in vascular

  8. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Robust High-Resolution Cloth Using Parallelism,

    E-print Network

    Fedkiw, Ron

    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 Robust High-Resolution Cloth Using Fedkiw Abstract--In this paper we simulate high resolution cloth consisting of up to 2 million triangles influenced by object collision and self collision, we propose a more accurate model for cloth-object friction

  9. IEEE TRANSACTIONS ON COMPUTERS, VOL. ?, NO. ?, MONTH?? 2004 1 Tree Parity Machine Rekeying Architectures

    E-print Network

    is an approach for symmetric key exchange using the synchronization of Tree Parity Machines. Fast successive keyIEEE TRANSACTIONS ON COMPUTERS, VOL. ?, NO. ?, MONTH?? 2004 1 Tree Parity Machine Rekeying But some of the most effective attacks on a crypto­system involve no ciphertext analysis but instead find

  10. IEEE TRANSACTIONS ON COMPUTERS, VOL. ?, NO. ?, MONTH?? 2004 1 Tree Parity Machine Rekeying Architectures

    E-print Network

    is an approach for symmetric key exchange using the synchronization of Tree Parity Machines. Fast successive keyIEEE TRANSACTIONS ON COMPUTERS, VOL. ?, NO. ?, MONTH?? 2004 1 Tree Parity Machine Rekeying But some of the most effective attacks on a crypto-system involve no ciphertext analysis but instead find

  11. Mutual Anonymity for Mobile P2P Systems Jinsong Han, Member, IEEE Computer Society, and

    E-print Network

    Liu, Yunhao

    Mutual Anonymity for Mobile P2P Systems Jinsong Han, Member, IEEE Computer Society, and Yunhao Liu protocols attempt to provide mutual anonymity for users. Most existing anonymous designs, however, are path based, where the anonymous communications are achieved via a predetermined path. Such a design suffers

  12. Vigil : Providing Trust for Enhanced Security in Pervasive Systems

    Microsoft Academic Search

    Lalana Kagal; Jeffrey Undercoffer; Filip Perich; Anupam Joshi; Tim Finin; Yelena Yesha

    2002-01-01

    Computing today is moving away from the desktop, becoming diffused into our surroundings and onto our personal digital devices. Moreover, ad-hoc networks such as Bluetooth provide for spontaneous connec- tivity between computationally enabled devices within proximity to each other. In such pervasive computing environments, users expect to access resources and services at any time from anywhere. This expectation results in

  13. PREPRINT, TO APPEAR IN IEEE TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS 1 Graphical Models of Residue Coupling

    E-print Network

    Bailey-Kellogg, Chris

    PREPRINT, TO APPEAR IN IEEE TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS 1 Graphical for analysis, diagnosis, and prediction. We present an approach to learning and using probabilistic graphical incorporate information about functional classes, and thereby learn a differential graphical model

  14. PROCEEDINGS OF THE IEEE, FRONTIERS OF AUDIOVISUAL COMMUNICATIONS: CONVERGENCES OF BROADBAND, COMPUTING AND RICH MEDIA 1 Haptic Communications

    E-print Network

    Steinbach, Eckehard

    perspective, we address perceptual coding of haptic information and the transmission of haptic data streams, telepresence, telemanip- ulation, haptic compression, perceptual coding, psychophysics, multimodal integration, COMPUTING AND RICH MEDIA 1 Haptic Communications Eckehard Steinbach, Senior Member, IEEE, Sandra Hirche

  15. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. XX, NO. X, XXX 2012 1 Rich Intrinsic Image Decomposition

    E-print Network

    Drettakis, George

    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. XX, NO. X, XXX 2012 1 Rich Intrinsic the video which illustrates the image manipulation process. Estimating intrinsic images from photographs

  16. IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. XX, NO. X, XXXX 1 Cloud Federations in the Sky: Formation Game

    E-print Network

    Grosu, Daniel

    IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. XX, NO. X, XXXX 1 Cloud Federations in the Sky federation, virtual machine, game theory. 1 INTRODUCTION CLOUDS are large-scale distributed computing sys (VM) instances. Cloud computing systems' ability to provide on de- mand access to always-on computing

  17. Adaptation-Aware Web Caching: Caching in the Future Pervasive Web

    Microsoft Academic Search

    Sven Buchholz; Alexander Schill

    2003-01-01

    In the upcoming world of Pervasive Computing, content adaptation is an essential concept to meet the heterogeneous requirements of web users using various web access technologies. However, content adaptation interferes with the effectiveness of web caching. Leveraging the advantages of web caching even in the world of Pervasive Computing is the subject of this paper. We present an approach that

  18. IEEE Transactions on Computational Intelligence and AI in Games (Special Issue on Brain/Neuronal-Computer Games Interfaces and Interaction), 2013, in press.

    E-print Network

    Kaplan, Alexander

    IEEE Transactions on Computational Intelligence and AI in Games (Special Issue on Brain/Neuronal-Computer, the broader use of the P300 BCI in BCI-controlled video games is recommended. Index Terms--Brain computer interfaces, P300 BCI, games. I. INTRODUCTION HE BRAIN-COMPUTER interface (BCI) is a system that provides

  19. 74 Published by the IEEE Computer Society 1089-7801/09/$26.00 2009 IEEE IEEE INTERNET COMPUTING InternetofThingsTrack

    E-print Network

    to the real world is the Internet of Things,2 which connects such resources with everyday objects's based on the Internet of Things and its technologies. Their framework for integrating Web services-Essen Heinrich Hußmann University of Munich Perci: Pervasive Service Interaction with the Internet of Things #12

  20. SPONSORED BY IEEE COMPUTER SOCIETY VISUALIZATION AND GRAPHICS TECHNICAL COMMITTEE IEEE Conference on Visual Analytics Science

    E-print Network

    with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law, provided the per-copy fee indicated in the code is paid through: Copyright Clearance Center 222 Rosewood Drive Danvers, MA 01923 For other copying, reprint or republication permission, write to: IEEE

  1. The human element as the key enabler of pervasiveness

    Microsoft Academic Search

    Silvia Giordano; Daniele Puccinelli

    2011-01-01

    The recent proliferation of sensor-equipped smartphones has brought sensor networking to the general public in the form of mobile phone sensing. By reaching out to mainstream users, mobile phone sensing has the potential of achieving the pervasive computing vision by putting the human element in the foreground. Because mo- bile phone sensing may require computationally intensive applications, it is impractical

  2. Proc. IEEE Conf. Computer Vision and Pattern Recognition, pp. 338345, 1998. 1 Boundary Finding with Correspondence Using

    E-print Network

    Duncan, James S.

    step in a number of computer vision applications such as stereo disparity, object recognition, motionProc. IEEE Conf. Computer Vision and Pattern Recognition, pp. 338­345, 1998. 1 Boundary Finding and computer vision applications including robot vision, pattern recognition and biomedical image pro­ cessing

  3. Proceedings of the fifth IEEE international symposium on high performance distributed computing

    SciTech Connect

    NONE

    1996-12-31

    This report contains papers from the Fifth IEEE International Symposium on High Performance Distributed Computing. Some of the areas covered are: collaboration tools (multimedia track); applications; distributed and parallel programming; metacomputing track; multimedia applications; tools and practice; networks for distributed applications; multimedia networks; languages and algorithms; networks of workstations; metacomputing track - invited papers; quality of service; distributed shared memory; networks and protocols; I/O systems and storage; wide-area distributed systems; communications - design and architecture; and parallel systems.

  4. Interactive Narrative 30 May/June 2006 Published by the IEEE Computer Society 0272-1716/06/$20.00 2006 IEEE

    E-print Network

    California at Santa Cruz, University of

    Interactive Narrative 30 May/June 2006 Published by the IEEE Computer Society 0272 dramas, story-based experiences where a player interacts with and influences a story. Many modern story branching and merging, and numerous subplots. Figure 1 shows an example of an interactive drama

  5. Simulating the pervasive fracture of materials and structures using randomly close packed Voronoi tessellations

    Microsoft Academic Search

    Joseph E. Bishop

    2009-01-01

    Under extreme loading conditions most often the extent of material and structural fracture is pervasive in the sense that a multitude of cracks are nucleating, propagating in arbitrary directions, coalescing, and branching. Pervasive fracture is a highly nonlinear process involving complex material constitutive behavior, material softening, localization, surface generation, and ubiquitous contact. A pure Lagrangian computational method based on randomly

  6. Meteor: a middleware infrastructure for content-based decoupled interactions in pervasive grid environments

    Microsoft Academic Search

    Nanyan Jiang; Andres Quiroz; Cristina Schmidt; Manish Parashar

    2008-01-01

    SUMMARY Emerging pervasive information and computational environments require a content- based middleware infrastructure that is scalable, self-managing, and asynchronous. In this paper we propose Associative Rendezvous (AR) as a paradigm for content-based decoupled interactions for pervasive grid applications. We also present Meteor, a content- based middleware infrastructure to support AR interactions. The design, implementation and experimental evaluation of Meteor are

  7. Realising management and composition of Self-Managed Cells in pervasive healthcare

    Microsoft Academic Search

    Alberto Schaeffer-Filho; Emil Lupu; Morris Sloman

    2009-01-01

    Research in pervasive and autonomic computing focuses on supporting services for pervasive applications, but often ignores how such applications can be realised through the federation of autonomous entities. In this paper we propose a methodology for designing collaborations between autonomous components, using the Self-Managed Cell (SMC) framework. We focus on the structural, task-allocation and communication aspects of management interactions between

  8. Sociotechnical Settlement and Mediation in a System of Technical Societies: A Relational History of the IEEE Computer Society and ACM, circa 1967-1977

    Microsoft Academic Search

    Brent K. Jesiek

    2009-01-01

    The IEEE Computer Society has long occupied a unique position between its parent organization (the IEEE, formerly IRE and AIEE) and the Association for Computing Machinery (ACM). In this paper I examine how this position was maintained from about 1967 to 1977. More specifically, I show how various structures and processes of sociotechnical settlement and mediation created stability in this

  9. IEEE TRANSACTIONS ON VISUALIZATION & COMPUTER GRAPHICS 1 A Deformable Surface Model for

    E-print Network

    simulation ! 1 INTRODUCTION Water drops appear everywhere in our daily life, from wall panels when we take-Time Water Drop Animation Yizhong Zhang, Student Member, IEEE, Huamin Wang, Member, IEEE Shuai Wang, Member, IEEE, Yiying Tong, Member, IEEE, and Kun Zhou, Member, IEEE Abstract--A water drop behaves differently

  10. Childhood Onset Pervasive Developmental Disorder.

    PubMed

    Burd, L; Fisher, W; Kerbeshian, J

    1988-03-01

    Two male children meeting criteria for Childhood Onset Pervasive Developmental Disorder (COPDD) are described. The current DSM-III category of COPDD may have value in separating these children from others with PDD. The authors suggest that these two children, and other children described in the literature as having dementia infantalis and/or disintegrative psychosis, have a distintegrative disorder resulting in muteness, profound mental retardation and severe autistic symptomatology. The term "pervasive disintegrative disorder" may be appropriate for such children and specific diagnostic criteria are suggested. The disorder appears to be extremely rare, with a prevalence estimate of 0.11 per 10,000. PMID:3372612

  11. 0018-9162/06/$20.00 2006 IEEE February 2006 51Published by the IEEE Computer Society C O V E R F E A T U R E

    E-print Network

    Gray, Jeffrey G.

    0018-9162/06/$20.00 © 2006 IEEE February 2006 51Published by the IEEE Computer Society C O V E R F the representation's correctness. Both these change evolution categories would benefit greatly from automation Environment (GME)--a configurable toolset that supports the creation of domain-specific modeling environments

  12. IEEE TRANS. COMPUT., VOL. C99, NO. 13, JULTOBER 2007 2 Converting to and from Dilated Integers

    E-print Network

    Wise, David Stephen

    Rajeev Raman and David S. Wise Member, IEEE-CS Abstract-- Dilated integers form an ordered group tomography (CAT scans), and the conventional matrix computations of scientific computing. An array in Morton: 2007 May 3, July 5. R. Raman is with the University of Leicester. D. S. Wise is with Indiana University

  13. 1414 IEEE TRANSACTIONS ON MAGNETICS, VOL. 47, NO. 5, MAY 2011 Ships Magnetic Anomaly Computation With Integral Equation and Fast

    E-print Network

    Paris-Sud XI, Université de

    1414 IEEE TRANSACTIONS ON MAGNETICS, VOL. 47, NO. 5, MAY 2011 Ships Magnetic Anomaly Computation) and a fast multipole algorithm (FMM) in order to model ships magnetic anomaly. complex geometries of real to compute the magnetization and the associated magnetic anomaly of the ship before building. This allows

  14. To cite this document: NGUYEN Anh-Dung, SNAC Patrick, RAMIRO Victor and DIAZ, Michel. Pervasive intelligent routing in content centric delay tolerant networks. In: The 9th IEEE

    E-print Network

    Mailhes, Corinne

    intelligent routing in content centric delay tolerant networks. In: The 9th IEEE International Conference Intelligent Routing in Content Centric Delay Tolerant Networks Anh-Dung Nguyen, Patrick S´enac, Victor Ramiro information in content centric Delay Tolerant Networks (CCDTN) also dubbed pocket switched networks. First

  15. A Datalog Model for Context Reasoning in Pervasive Environments

    Microsoft Academic Search

    Ismail Khalil Ibrahim; Mohamed Ali Feki; Gabriele Kotsis

    2008-01-01

    Context is considered by research community in pervasive computing, and particularly in context awareness, to be subject to the available environmental sensors to retrieve the suitable information to the user. For example, the users context is based on location information or even based on other deterministic information, such as time (morning, evening, 11:00 am, etc.). The challenge is to also

  16. The pervasive trust foundation for security in next generation networks

    Microsoft Academic Search

    Leszek Lilien; Adawia Al-Alawneh; Lotfi Ben Othmane

    2010-01-01

    We propose a new paradigm---named the Pervasive Trust Foundation (PTF) ---for computer security in Next Generation Networks, including the Future Internet. We start with a review of basic trust-related terms and concepts. We present motivation for using PTF as the basis for security in ISO OSI networks. The paper includes our five contributions. First, we define trust in the small

  17. ScaleMirror: A Pervasive Device to Aid Weight Analysis

    E-print Network

    Connelly, Kay

    and control weight gain. With the advent of pervasive and ubiquitous computing, there are new opportunities, and perhaps the most prominent among developed nations is obesity. In the United States alone, obesity has risen significantly in the past 20 years. Over 60 million adults and nine million children

  18. ScaleMirror: A Pervasive Device to Aid Weight Analysis

    E-print Network

    and nine million children are considered obese [1]. Obesity is caused by an energy imbalance that results and control weight gain. With the advent of pervasive and ubiquitous computing, there are new opportunities-related health issues that exist today, and perhaps the most prominent among developed nations is obesity

  19. Published by the IEEE Computer Society 0272-1716/07/$25.00 2007 IEEE IEEE Computer Graphics and Applications 43 Computational Photography

    E-print Network

    Jensen, Henrik Wann

    commercial matting approaches use a background with known, constant color. This is called blue screen matting shooting with dig- ital cameras. Unfortunately, blue screen matting is an intrusive, expensive process method that computes alpha mattes using three video cameras that share a common center of projection

  20. SelfRouting in Pervasive Computing Environments using Smart Messages # Cristian Borcea 1 , Chalermek Intanagonwiwat 1 , Akhilesh Saxena 1 , and Liviu Iftode 2

    E-print Network

    Rutgers University

    wireless), creates the possibility of building large scale networks of embedded systems (NES). NES as distributed computing did two decades ago. To program such NES, two main issues have to be solved: (1) how computing [4] as a solution for programming user­ defined distributed applications over NES, while

  1. IEEE TRANSACTIONS ON COMPUTERS, AUGUST 1974 Property 8

    E-print Network

    Stanford University

    , "Dynamic storage allocation system,"Commun. Ass. Comput. Mach., yol. 11, pp. 297-305, May 1968. [3] P. J, and J. D. Ullman, "Principles of optimalgage replacement," J. Ass. Comput. Mach., vol. 18, pp. 80-93, [5] P. J. Denning, "The working set model for program behavior,"Commun. Ass. Comput. Mach., vol. 11, pp

  2. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 16, NO. 3, MARCH 1997 229 Rotation Scheduling: A Loop Pipelining Algorithm

    E-print Network

    Sha, Edwin

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 16, NO. 3, MARCH 1997 229 Rotation Scheduling: A Loop Pipelining Algorithm Liang-Fang Chao, Member, IEEE, Andrea S technique, called rotation scheduling, for scheduling cyclic DFG's using loop pipelining. The rotation

  3. 234 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 20, NO. 2, FEBRUARY 2001 Pipeline Vectorization

    E-print Network

    Luk, Wayne

    234 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 20, NO. 2, FEBRUARY 2001 Pipeline Vectorization Markus Weinhardt and Wayne Luk, Member, IEEE Abstract--This paper presents pipeline vectorization, a method for synthesizing hardware pipelines based on software vector

  4. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 22, NO. 3, MARCH 2003 241 Minimum Buffered Routing With Bounded

    E-print Network

    Kahng, Andrew B.

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 22, NO. 3 Control Charles J. Alpert, Member, IEEE, Andrew B. Kahng, Bao Liu, Ion I. Mandoiu, and Alexander Z is a well-known methodology to im- prove coupling noise immunity, reduce degradation of signal tran- sition

  5. 1077-2626/12/$31.00 2012 IEEE Published by the IEEE Computer Society IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. 18, NO. 12, DECEMBER 2012

    E-print Network

    ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. 18, NO. 12, DECEMBER 2012 #12;2105AHMED ET AL: HUMAN COMPUTATION AND COMPUTER GRAPHICS, VOL. 18, NO. 12, DECEMBER 2012 #12;2107AHMED ET AL: HUMAN COMPUTATION IN VISUALIZATION AND COMPUTER GRAPHICS, VOL. 18, NO. 12, DECEMBER 2012 #12;2109AHMED ET AL: HUMAN COMPUTATION IN VISUALIZATION

  6. Software Aspects of IEEE Floating-Point Computations for Numerical Applications in High Energy Physics

    ScienceCinema

    None

    2011-10-06

    Floating-point computations are at the heart of much of the computing done in high energy physics. The correctness, speed and accuracy of these computations are of paramount importance. The lack of any of these characteristics can mean the difference between new, exciting physics and an embarrassing correction. This talk will examine practical aspects of IEEE 754-2008 floating-point arithmetic as encountered in HEP applications. After describing the basic features of IEEE floating-point arithmetic, the presentation will cover: common hardware implementations (SSE, x87) techniques for improving the accuracy of summation, multiplication and data interchange compiler options for gcc and icc affecting floating-point operations hazards to be avoided About the speaker Jeffrey M Arnold is a Senior Software Engineer in the Intel Compiler and Languages group at Intel Corporation. He has been part of the Digital->Compaq->Intel compiler organization for nearly 20 years; part of that time, he worked on both low- and high-level math libraries. Prior to that, he was in the VMS Engineering organization at Digital Equipment Corporation. In the late 1980s, Jeff spent 2½ years at CERN as part of the CERN/Digital Joint Project. In 2008, he returned to CERN to spent 10 weeks working with CERN/openlab. Since that time, he has returned to CERN multiple times to teach at openlab workshops and consult with various LHC experiments. Jeff received his Ph.D. in physics from Case Western Reserve University.

  7. Software Aspects of IEEE Floating-Point Computations for Numerical Applications in High Energy Physics

    SciTech Connect

    None

    2010-05-11

    Floating-point computations are at the heart of much of the computing done in high energy physics. The correctness, speed and accuracy of these computations are of paramount importance. The lack of any of these characteristics can mean the difference between new, exciting physics and an embarrassing correction. This talk will examine practical aspects of IEEE 754-2008 floating-point arithmetic as encountered in HEP applications. After describing the basic features of IEEE floating-point arithmetic, the presentation will cover: common hardware implementations (SSE, x87) techniques for improving the accuracy of summation, multiplication and data interchange compiler options for gcc and icc affecting floating-point operations hazards to be avoided About the speaker Jeffrey M Arnold is a Senior Software Engineer in the Intel Compiler and Languages group at Intel Corporation. He has been part of the Digital->Compaq->Intel compiler organization for nearly 20 years; part of that time, he worked on both low- and high-level math libraries. Prior to that, he was in the VMS Engineering organization at Digital Equipment Corporation. In the late 1980s, Jeff spent 2½ years at CERN as part of the CERN/Digital Joint Project. In 2008, he returned to CERN to spent 10 weeks working with CERN/openlab. Since that time, he has returned to CERN multiple times to teach at openlab workshops and consult with various LHC experiments. Jeff received his Ph.D. in physics from Case Western Reserve University.

  8. R E S E A R C H F E A T U R E 78 Computer Published by the IEEE Computer Society 0018-9162/08/$25.002008IEEE

    E-print Network

    Gaj, Krzysztof

    -9162/08/$25.00©2008IEEE The Promise of High-Performance Reconfigurable Computing I n the past few years, high that resemble modern HPC architectures, with added FPGA chips. Two of these machines, the Cray XD1 and SGI Altix, also function as traditional HPCs without the reconfigurable chips. In addition, sev- eral Beowulf

  9. 2 1541-1672/11/$26.00 2011 IEEE IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society

    E-print Network

    and mechanisms from network science as well as attacks that directly target human-network information as a goal and network science W e live in the age of social computing. Social networks are everywhere, exponentially

  10. To appear in IEEE Transactions on Visualization and Computer Graphics Order of Magnitude Markers: An Empirical Study on Large

    E-print Network

    Jones, Mark W.

    To appear in IEEE Transactions on Visualization and Computer Graphics Order of Magnitude Markers: An Empirical Study on Large Magnitude Number Detection Rita Borgo, Joel Dearden, and Mark W. Jones 0 80000, and Order Of Magnitude Markers (OOMMs). Abstract--In this paper we introduce Order of Magnitude Markers

  11. IEEE TRANSACTIONS ON COMPUTERS, VOL. c-24, NO. 5, MAY 1975 Fault Masking in Combinational Logic Circuits

    E-print Network

    Stanford University

    in it. In a circuit with p lines, there are (3P- 1) possible multiple-faults and therefore). The test "X = 0, Y = 1", (which is represented as XY) detects the single-fault "line a stuck-at-1: (a/1IEEE TRANSACTIONS ON COMPUTERS, VOL. c-24, NO. 5, MAY 1975 Fault Masking in Combinational Logic

  12. IEEE TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, TCBB-2014-03-0071 1 A Deep Learning Network Approach to ab

    E-print Network

    Cheng, Jianlin Jack

    IEEE TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, TCBB-2014-03-0071 1 A Deep Learning that have traditionally employed neural networks are experimenting with novel deep learning techniques prediction, we wanted to determine whether deep learning could contribute to the advancement of this field

  13. IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 5, MAY 2003 685 threads, was discussed. In summary, communication servers

    E-print Network

    Latchman, Haniph A.

    . Multimedia Computing and Systems, May 1994. Thinning Schemes for Call Admission Control in Wireless Networks Yuguang Fang, Senior Member, IEEE Abstract--In this paper, we present new call admission control schemes many known call admission control schemes. Index Terms--Call admission control, Resource allocation

  14. PROCEEDINGS OFTHE IEEE, VOL. 55, NO. 11, NOVEMBER 19671801 algebraic systems" (translated by G. J. Tee), Computer Science Dept.,

    E-print Network

    McCalley, James D.

    ," Cornpurer J., vol. 4, pp. 265-271, October, 1961; "The Q-R transformation, pt. 11," Computer J., vol. 4, ppPROCEEDINGS OFTHE IEEE, VOL. 55, NO. 11, NOVEMBER 19671801 algebraic systems" (translated by G. J Trans. Power and Apparatus, vol. 82, pp. 944-950, December 1963. I3O1 W. F. Tinney and J. W. Walker

  15. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 1 Theoretical Fundamentals of Gate Level

    E-print Network

    Sherwood, Tim

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 1 Theoretical. I. Introduction HIGH assurance systems such as flight control networks and financial, military influence a trusted one, e.g., data from passenger network shall never affect the flight control network

  16. IEEE MICROWAVE AND WIRELESS COMPONENTS LETTERS , VOL. 14, NO. 7, JULY 2004 343 Computational and Experimental Study of a

    E-print Network

    Taflove, Allen

    IEEE MICROWAVE AND WIRELESS COMPONENTS LETTERS , VOL. 14, NO. 7, JULY 2004 343 Computational and Experimental Study of a Microwave Electromagnetic Bandgap Structure With Waveguiding Defect for Potential Use within an electromagnetic bandgap structure. Our initial experimental results scaled to 10 GHz have

  17. 13-th IEEE International Conference on Peer-to-Peer Computing Have a Snack, Pay with Bitcoins

    E-print Network

    13-th IEEE International Conference on Peer-to-Peer Computing Have a Snack, Pay with Bitcoins--Cashless payments are nowadays ubiquitous and decentralized digital currencies like Bitcoin are increasingly used as means of payment. However, due to the delay of the transaction confirmation in Bitcoin, it is not used

  18. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 2, NO. 3, SEPTEMBER 1998 97 Fitness Sharing and Niching Methods Revisited

    E-print Network

    Paris-Sud XI, Université de

    IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 2, NO. 3, SEPTEMBER 1998 97 Fitness Sharing of multiple optima in the search space. In this context, fitness sharing has been used widely to maintain empirical results are presented for high and a limited number of fitness function evaluations. Finally

  19. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. XX, NO. X, XXX 2012 1 Rich Intrinsic Image Decomposition

    E-print Network

    Drettakis, George

    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. XX, NO. X, XXX 2012 1 Rich Intrinsic, as was the case for morning and evening sky in the work of Cabral et al. [1]. SUPPLEMENTARY VIDEO A supplementary video is attached. It illustrates some ap- plications of our decomposition in image editing software

  20. IEEE TRANSACTIONS ON COMPUTERS , VOL.XXXX, NO.XXX, XXXX 2010 1 Exploiting Heterogeneity in P2P Video

    E-print Network

    IEEE TRANSACTIONS ON COMPUTERS , VOL.XXXX, NO.XXX, XXXX 2010 1 Exploiting Heterogeneity in P2P Video Streaming Ana Paula Couto da Silva, Emilio Leonardi, Marco Mellia, Michela Meo Abstract to the distribution of the video by delivering the content they have already received to other peers. To do so, peers

  1. 354 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 7, NO. 2, MAY 2011 Neural Network Assisted Computationally Simple

    E-print Network

    Efe, Mehmet Önder

    Computationally Simple PID Control of a Quadrotor UAV Mehmet Önder Efe, Senior Member, IEEE Abstract--The applications of Unmanned Aerial Vehicles (UAVs) require robust control schemes that can alleviate distur.2123906 The history of fractional calculus dates back to the letter from L'Hôpital to Leibniz in 1695 asking

  2. IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, VOL. XX, NO. X, XXXX 20XX 1 Big Data Opportunities and Challenges

    E-print Network

    Jin, Yaochu

    IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, VOL. XX, NO. X, XXXX 20XX 1 Big Data Opportunities, and Graham J. Williams Abstract--"Big Data" as a term has been among the biggest trends of the last three and perspectives of the authors relating to the new opportunities and challenges brought forth by the big data

  3. IEEE TRANSACTIONS ON COMPUTERS, VOL. 51, NO. 5, MAY 2002 1 Architectures for Unified Field Inversion with

    E-print Network

    IEEE TRANSACTIONS ON COMPUTERS, VOL. 51, NO. 5, MAY 2002 1 Architectures for Unified Field two new inversion algorithms for binary extension and prime fields which are slightly mod­ ified is also introduced, in which the field elements are represented us­ ing a multi­word format. This feature

  4. IEEE TRANSACTIONS ON COMPUTERS, VOL. 51, NO. 5, MAY 2002 1 Architectures for Unified Field Inversion with

    E-print Network

    IEEE TRANSACTIONS ON COMPUTERS, VOL. 51, NO. 5, MAY 2002 1 Architectures for Unified Field new inversion algorithms for binary extension and prime fields which are slightly mod- ified versions, in which the field elements are represented us- ing a multi-word format. This feature allows a scalable

  5. J. PERVASIVE COMPUT. & COMM. 1 (1), JANUARY 2006. c TROUBADOR PUBLISHING LTD) 1 Label Routing Protocol: A New Cross-layer

    E-print Network

    Wu, Jie

    Protocol: A New Cross-layer Protocol for Multi-hop Ad hoc Wireless Networks Yu Wang Department of Computer-- Compared to the traditional wireless network, the multi-hop ad hoc wireless network is self networks, especially for ad hoc wireless networks. This paper migrates the label concept into the ad hoc

  6. 2 1541-1672/09/$25.00 2009 IEEE IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society

    E-print Network

    Lieberman, Henry

    .computer.org/intelligent 3 soning engine, AnalogySpace, which uses factor analysis to build a space representing the large-scale background knowledge, which they almost never state explicitly. This follows from the maxim of pragmatics as complete as the human brain, automati- cally acquiring all this frequently unstated knowledge would be dif

  7. in Proc. 11th IEEE International Conference on Computer Vision (ICCV), Rio de Janeiro, Brazil, October 2007 Extracting Texels in 2.1D Natural Textures

    E-print Network

    Ahuja, Narendra

    in Proc. 11th IEEE International Conference on Computer Vision (ICCV), Rio de Janeiro, Brazil to be stochastic. Another impor- tant characteristic of physical elements is their dimension- ality. They may

  8. Enforcing Privacy as Access Control in a Pervasive Context Aurelien Faravelon, Stephanie Chollet, Christine Verdier, Agn`es Front

    E-print Network

    Paris-Sud XI, Université de

    of a medical workflow. Keywords-Service-Oriented Computing (SOC), Security, Ac- cess Control, Model services anywhere using the available resources. However, pervasive applications raises security issuesEnforcing Privacy as Access Control in a Pervasive Context Aur´elien Faravelon, St´ephanie Chollet

  9. Proceedings of the IEEE international conference on computers

    SciTech Connect

    Not Available

    1985-01-01

    This book presents the papers given at a conference on array processors and supercomputers. Topics considered at the conference included fault-tolerant systolic arrays, computer architecture, systolic processing, algorithms, performance, sorting, monitoring, parallel processing, speech recognition, vector processing, VLSI, image processing, and data-flow processing.

  10. IEEE Distributed Systems Online http://computer.org/dsonline

    E-print Network

    Venkatasubramanian, Nalini

    kinds of actors--base-level and meta- level--distributed over a network of processing nodes. Base-level actors carry out application-level computation, while meta-level actors are part of the runtime system v e M i d d l e w a r e A Semantic Framework for Modeling and Reasoning about Reflective Middleware

  11. IEEE TRANSACTIONS ON COMPUTERS, VOL. , NO. -, MONTH YEAR 1 Collaborative Mobile Charging

    E-print Network

    Wu, Jie

    and charging coverage. Index Terms--Collaborative mobile charging, wireless energy transfer, wireless sensor Zhang, Student Member, IEEE, Jie Wu, Fellow, IEEE, and Sanglu Lu, Member, IEEE Abstract--The limited of wireless sensor networks (WSNs). Recent breakthroughs in wireless energy transfer and rechargeable lithium

  12. Simulating the pervasive fracture of materials and structures using randomly close packed Voronoi tessellations

    Microsoft Academic Search

    Joseph E. Bishop

    2009-01-01

    Under extreme loading conditions most often the extent of material and structural fracture is pervasive in the sense that\\u000a a multitude of cracks are nucleating, propagating in arbitrary directions, coalescing, and branching. Pervasive fracture is\\u000a a highly nonlinear process involving complex material constitutive behavior, material softening, localization, surface generation,\\u000a and ubiquitous contact. A pure Lagrangian computational method based on randomly

  13. An approach to domain-based scalable context management architecture in pervasive environments

    Microsoft Academic Search

    Zakwan Jaroucheh; Xiaodong Liu; Sally Smith

    In pervasive environments, context management systems are expected to administrate large volume of contextual information\\u000a that is captured from spatial to nonspatial elements. Research in context-aware computing produced a number of middleware\\u000a systems for context management to intermediate the communications between applications and context providers. In particular,\\u000a in pervasive environments, the design of distributed storage, retrieval and propagation mechanisms of

  14. Pervasive RFID and Near Field Communication Technology

    Microsoft Academic Search

    Florian Michahelles; Frédéric Thiesse; Albrecht Schmidt; John R. Williams

    2007-01-01

    Today, RFID enjoys enormous interest as the first widely deployed pervasive technology, and Near Field Communication will be the first widely deployed technology enabling humans to communicate with physical objects. This article reports on the Pertec (Pervasive RFID\\/Near Field Communication Technology and Applications) workshop, which discussed the future evolution of RFID beyond goods identification, including sensor integration, localization, NFC applications,

  15. 1536-1268/06/$20.00 2006 IEEE Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 25 R F I D T E C H N O L O G Y

    E-print Network

    Han, Richard Y.

    designs take advantage of the EM properties associated with an RF antenna--the near field and the far and privacy concerns must we still address? Roy Want Intel Research About the Review Process This article- ering and communicating with a tag. The tag antenna captures energy and transfers the tag's ID (the tag

  16. 1536-1268/04/$20.00 2004 IEEE I Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 11 Editor: Thad E. Starner I Georgia Institute of Technology I thad@cc.gatech.edu

    E-print Network

    Starner, Thad E.

    while also in auto answer mode, you can set the volume and ringtone to be unnotice- able in most traffic such as subways. Threats against mobile devices are more acute than traditional malware. Mobile

  17. 1536-1268/03/$17.00 2003 IEEE I Published by the IEEE CS and IEEE Communications Society PERVASIVE computing 15 Editor: Thad E. Starner I Georgia Institute of Technology I thad@cc.gatech.edu

    E-print Network

    Starner, Thad E.

    of a trick of the human eye, most users per- ceive "seeing through" the display even though it is opaque. You can see a similar effect by holding your thumb a couple of inches in front of one eye while focusing object, even if your thumb at first seems to obscure the object. Closing first one eye, then the other

  18. 1536-1268/05/$20.00 2005 IEEE Published by the IEEE CS and IEEE ComSoc PERVASIVE computing 51 T H E S M A R T P H O N E

    E-print Network

    Toivonen, Hannu

    and have clues about the current situation. On the other, their various usage contexts will likely benefit from context awareness. Smart phones are a particularly tempting plat- form for building context've designed and developed ContextPhone, a software platform consisting of four interconnected modules provided

  19. Challenges in Securing the Interface Between the Cloud and Pervasive Systems

    SciTech Connect

    Lagesse, Brent J [ORNL] [ORNL

    2011-01-01

    Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources and issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.

  20. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS AND CONTROL INSTRUMENTATION, VOL. JECI-14, NO. 1, APRIL 1967 A Study of the Applications of Analog Computers

    E-print Network

    Leach Jr.,W. Marshall

    1967 A Study of the Applications of Analog Computers V. P. KODALI, MEMBER, IEEE Abstract-An electronic analog computer is a tool for solving mathematical differential equations. The basis for the use of such a computer in the simulation of many scientific and engineering prob- lems is the possibility

  1. In Proceedings of Eleventh Working Conference on Reverse Engineering, Delft, The Netherlands, November 2004, pp. 161-171. Copyright 2004, IEEE Computer Society Press.

    E-print Network

    Lakhotia, Arun

    on itself to create a different variant before propagation. Metamorphic computer viruses thwart current anti-virus from zero form of a virus, and not the original version. 1. Introduction A metamorphic computer virus, November 2004, pp. 161-171. © Copyright 2004, IEEE Computer Society Press. Imposing Order on Program

  2. Proceedings IEEE Real-Time Systems Symposium (RTSS'06) November 13, 2006 Reconciling Distributed Computing Models and Real-Time Systems

    E-print Network

    Computing Models and Real-Time Systems Heinrich Moser and Ulrich Schmid Embedded Computing Systems Group (EProceedings IEEE Real-Time Systems Symposium (RTSS'06) November 13, 2006 Reconciling Distributed Abstract: This paper1 presents a simple real-time dis- tributed computing model for message-passing systems

  3. To appear in Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, 2007 Riemannian Analysis of Probability Density Functions with

    E-print Network

    Srivastava, Anuj

    To appear in Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, 2007 University joshi@eng.fsu.edu Abstract Applications in computer vision involve statisti- cally analyzing shape classification. 1. Introduction Several applications in computer vision, such as tex- ture

  4. Enabling pervasive computing with smart phones

    Microsoft Academic Search

    George Roussos; Andy J. Marsh; Stavroula Maglavera

    2005-01-01

    Mobile telephony's technical and market success in Europe attracted researchers' interest in mobile systems. Some researchers began investigating appropriate architectures for providing information services to cellular mobile telephony users, and the quest for the \\

  5. FROM THE AREA EDITOR Published by the IEEE Computer Society 0018-9162/09/$26.00 2009 IEEE

    E-print Network

    Ramakrishnan, Naren

    IEEE About three years ago, Netflix, the movie rental com- pany, announced a $1 million prize upon Netflix's proprietary system by at least 10 percent. Some have hailed the competition as a clever example of crowd- sourcing, but there is no denying that Netflix's release of a more than 100-million

  6. Hybrid Renewable Energy Used to Power Computer Laboratory: A Project by University of Cape Town IEEE Student Branch

    Microsoft Academic Search

    David. T. Oyedokun; Nana-Ampofo Ampofo-Anti; Saurabh Sinha

    2011-01-01

    Through its IEEE EPICS-High (Engineering Projects in Community Service with High School learners) initiative, the IEEE aims to bring real engineering solutions to challenges facing communities worldwide. IEEE EPICS-High empowers IEEE student members and high school learners by bringing them together to solve community problems. The University of Cape Town IEEE Student Branch has taken up this initiative through its

  7. Sensor Validation within a Pervasive Medical Environment

    Microsoft Academic Search

    John O'Donoghue; John Herbert; Rune Fensli; Stephen Dineen

    2006-01-01

    Pervasive patient sensing devices generate large quantities of wireless data. This data needs to be transmitted to central medical servers or mobile practitioners for real-time analysis. Various factors can affect the \\

  8. Epidemiology of pervasive developmental disorders.

    PubMed

    Fombonne, Eric

    2009-06-01

    This article reviews the results of 43 studies published since 1966 that provided estimates for the prevalence of pervasive developmental disorders (PDDs), including autistic disorder, Asperger disorder, PDD not otherwise specified, and childhood disintegrative disorder. The prevalence of autistic disorder has increased in recent surveys and current estimates of prevalence are around 20/10,000, whereas the prevalence for PDD not otherwise specified is around 30/10,000 in recent surveys. Prevalence of Asperger disorder is much lower than that for autistic disorder and childhood disintegrative disorder is a very rare disorder with a prevalence of about 2/100,000. Combined all together, recent studies that have examined the whole spectrum of PDDs have consistently provided estimates in the 60-70/10,000 range, making PDD one of the most frequent childhood neurodevelopmental disorders. The meaning of the increase in prevalence in recent decades is reviewed. There is evidence that the broadening of the concept, the expansion of diagnostic criteria, the development of services, and improved awareness of the condition have played a major role in explaining this increase, although it cannot be ruled out that other factors might have also contributed to that trend. PMID:19218885

  9. IEEE Transactions on Education, Vol. 40, No. 3, August 1997, pp. 1-7. Advantages and Disadvantages of Using Various Computer Tools

    E-print Network

    Cañizares, Claudio A.

    of Using Various Computer Tools in Electrical Engineering Courses Claudio A. Ca~nizares, Member, IEEE, and Zeno T. Faur Abstract|This paper discusses di erent computer tools used to help deliver, administer in analyzing the results of using these tools in the student learning process. The students' marks

  10. IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 3, NO. 3, SEPTEMBER 2011 201 Tanagra: Reactive Planning and Constraint Solving

    E-print Network

    California at Santa Cruz, University of

    IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 3, NO. 3, SEPTEMBER 2011 201-initiative tool for level design, al- lowing a human and a computer to work together to produce a level for a 2-D of Tanagra's expressive range. Index Terms--Augmented design, constraint programming, games, level design

  11. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN, VOL 9. NO. 12. DECEMBER 1990 I265 A Neural Network Design for Circuit Partitioning

    E-print Network

    Mazumder, Pinaki

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN, VOL 9. NO. 12. DECEMBER 1990 I265 A Neural Network Design for Circuit Partitioning Absfracf-This paper proposes a neural network model for circuit the pos- sibility of utilizing the collective computational properties of neural networks to obtain fast

  12. Bio-sketch of Manish Parashar, Ph.D. Computer Scientist and Electrical Engineer, AAAS Fellow, IEEE Fellow, ACM Senior Member

    E-print Network

    Parashar, Manish

    of Technology) · Google App Engine Education Award for Cloud Computing for Scientific Applications (2013) · IBM and engineering and addresses key conceptual, technological and educational challenges that are criticalBio-sketch of Manish Parashar, Ph.D. Computer Scientist and Electrical Engineer, AAAS Fellow, IEEE

  13. In Proc. Eleventh IEEE International Conference on Computer Vision (ICCV 2007), Rio de Janeiro, Brazil, October 2007 A Database and Evaluation Methodology for Optical Flow

    E-print Network

    Scharstein, Daniel

    and publication of the results at http://vision.middlebury.edu/flow/. 1. Introduction As a subfield of computerIn Proc. Eleventh IEEE International Conference on Computer Vision (ICCV 2007), Rio de Janeiro, Brazil, October 2007 A Database and Evaluation Methodology for Optical Flow Simon Baker Daniel Scharstein

  14. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Anchorage, June 2008 1 A Scalable Graph-Cut Algorithm for N-D Grids

    E-print Network

    Frey, Brendan J.

    In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Anchorage, June 2008 1 cuts is widely used in computer vision and graphics. To obtain high-resolution output, graph cut these graphs do not fit into physical memory, cur- rent max-flow/min-cut algorithms--the workhorse of graph cut

  15. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2000. Robust Stereo Ego-motion for Long Distance Navigation

    E-print Network

    Olson, Clark F.

    Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2000. Robust Stereo, Pasadena CA 91109-8099 Abstract Several methods for computing observer motion from monocular and stereo robust- ness in the context of a maximum-likelihood stereo ego- motion method. We demonstrate that even

  16. 52 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 15, NO. 1, JANUARY 2005 On the Use of Computable Features for Film

    E-print Network

    Treuille, Adrien

    On the Use of Computable Features for Film Classification Zeeshan Rasheed, Yaser Sheikh, Student Member, IEEE films into genres, based only on computable visual cues. We view the work as a step toward high-level semantic film inter- pretation, currently using low-level video features and knowledge of ubiquitous

  17. TO APPEAR IN IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 1 A Model and Framework

    E-print Network

    Jankun-Kelly, T. J.

    for Visualization Exploration T.J. Jankun-Kelly, Member, IEEE, Kwan-Liu Ma, Senior Member, IEEE, and Michael Gertz be developed. A visualization technique with no means of storing its results is wasted. A visualization system. Finally, a software framework manages instances of the model. These three components have been refined

  18. IEEE TRANSACTIONS ON COMPUTERS, MANUSCRIPT ID 1 Scheduling Security-Critical Real-Time

    E-print Network

    Qin, Xiao

    on Clusters Tao Xie, Student Member, IEEE, and Xiao Qin, Member, IEEE Abstract-- Security-critical real running on clusters demand both real-time performance and security, we investigate the problem-critical tasks. Next, we propose a security-aware real-time heuristic strategy for clusters (SAREC), which

  19. Secure and pervasive collaborative platform for medical applications.

    PubMed

    Holub, Petr; Hladká, Eva; Procházka, Michal; Liska, Milos

    2007-01-01

    Providing secure, extensible, pervasive and easy to implement collaborative environment for medical applications poses significant challenge for state-of-the-art computer systems and networks. In this paper, we describe such a collaborative environment developed for Ithanet project, based on Grid authentication mechanisms. Significant effort has been put into developing a system, that is capable of deployment across tightly secured networking environments as implemented in vast majority of hospitals. The environment is extensible enough to incorporate Grid-service based collaborative systems like AccessGrid. PMID:17476065

  20. Kothe, C., Onton, J., Makeig, S. "Emotion Recognition from EEG During Self-Paced Emotional Imagery." In proceedings of: Affective Brain-Computer Interfaces (aBCI) Workshop, IEEE Affective Computing and Intelligent Interaction 2013, Geneva

    E-print Network

    Makeig, Scott

    Kothe, C., Onton, J., Makeig, S. "Emotion Recognition from EEG During Self-Paced Emotional Imagery." In proceedings of: Affective Brain-Computer Interfaces (aBCI) Workshop, IEEE Affective Computing and Intelligent Interaction 2013, Geneva Switzerland, 2013 Emotion Recognition from EEG During Self-Paced Emotional Imagery

  1. [The biological characteristics of pervasive developmental disorder].

    PubMed

    Ohta, Haruhisa

    2011-01-01

    Individuals with Asperger's disorder and high functioning autism often don't have diagnosis during the childhood because of their high intelligence. It is not easy to diagnose adults as pervasive developmental disorder, because the information about their state and episodes in the childhood depends on the retrospective memories by caregivers and themselves. Although some researchers proposed that biological indicators might be useful for diagnosis, they have not found reliable indicators yet. Diagnosis of pervasive developmental disorder based only on biological indicators has limitations, because pervasive developmental disorder is biologically heterogeneous, and the diagnosis criteria were made based on abnormal behaviors, but not on the biological characteristics. However it is expected that the biological indicators that are useful to diagnose will be found in the near future. The outlines of neuroimaging and eye tracking studies that are relatively simple and useful methods, including findings of our studies, are introduced in this review. PMID:22250449

  2. 776 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 16, NO. 7, JULY 1997 [4] M. Diaz, P. Azema, and J. M. Ayache, "Unified design of self-checking

    E-print Network

    Lin, Youn-Long Steve

    circuits," IEEE Design Test Comput., pp. 26­33, Dec. 1985. [12] A. Casimiro, M. Simoes, M. Santos, I] R. A. Parekhji, G. Venkatesh, and S. D. Sherlekar, "A methodology for designing optimal self and S. M. Reddy, "On delay fault testing in logic circuits," in Proc. IEEE Int. Test Conf., 1986, pp

  3. Psi-Pervasive Services Infrastructure

    Microsoft Academic Search

    Dejan S. Milojicic; Alan Messer; Philippe Bernadat; Ira Greenberg; Olaf Spinczyk; Danilo Beuche; Wolfgang Schröder-preikschat

    2001-01-01

    Technology has been advancing in the past century at an incred- ible rate. All predictions about the limits have been consistently broken for processor speed, network bandwidth, and memory size. Nevertheless, the way we use computers has not kept pace with the technology itself. Comput- ers are still being used in a similar way as a couple of decades ago.

  4. Institute of Electrical and Electronics Engineers (IEEE) Careers for Electrical Engineers and Computer Scientists

    NSDL National Science Digital Library

    The Institute of Electrical and Electronic Engineers (IEEE) Careers Website is an excellent jobs resource. Sections provided include Engineering Careers, Finding a Job, Career Planning, Salaries and Compensation, and Employer Database, among a host of others.

  5. Pervasive Sensing: Addressing the Heterogeneity Problem

    NASA Astrophysics Data System (ADS)

    O'Grady, Michael J.; Murdoch, Olga; Kroon, Barnard; Lillis, David; Carr, Dominic; Collier, Rem W.; O'Hare, Gregory M. P.

    2013-06-01

    Pervasive sensing is characterized by heterogeneity across a number of dimensions. This raises significant problems for those designing, implementing and deploying sensor networks, irrespective of application domain. Such problems include for example, issues of data provenance and integrity, security, and privacy amongst others. Thus engineering a network that is fit-for-purpose represents a significant challenge. In this paper, the issue of heterogeneity is explored from the perspective of those who seek to harness a pervasive sensing element in their applications. A initial solution is proposed based on the middleware construct.

  6. 24 CFR 597.102 - Tests of pervasive poverty, unemployment and general distress.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2010-04-01 true Tests of pervasive poverty, unemployment and general distress...Requirements § 597.102 Tests of pervasive poverty, unemployment and general distress. (a) Pervasive poverty. Pervasive poverty shall be...

  7. Pervasive Sensing to Model Political Opinions in Face-to-Face Networks

    E-print Network

    Gatica-Perez, Daniel

    application of pervasive computing based on using mobile phone sensors to measure and model the face phone sensors at an undergraduate community to measure and model physical proximity (via bluetooth be predicted from sensor data. Mobile features can be used to estimate unique individ- ual exposure

  8. Body Sensor Network - A Wireless Sensor Platform for Pervasive Healthcare Monitoring

    Microsoft Academic Search

    Benny P. L. Lo; Surapa Thiemjarus; Rachel King; Guang-Zhong Yang

    With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In addition to providing continuous monitoring and analysis of physiological parameters, the recently proposed Body Sensor Networks (BSN) incorporate context aware sensing for increased sensitivity and specificity. To facilitate research and development in BSN and multi-sensor data fusion, a BSN

  9. Automated Selection of Remote Control User Interfaces in Pervasive Smart Spaces

    Microsoft Academic Search

    Nirali Desai; Khomkrit Kaowthumrong; John Lebsack; Nishant Shah; Richard Han

    2002-01-01

    Pervasive computing offers a vision in which every room in the home and at work will become an interactive smart space filled with wireless and wired devices whose behavior can be remotely controlled by a user, including monitors, speakers, printers, kiosks, soda machines, appliances, toys, sensors, and networked software services. The goal of this paper is to address what we

  10. Resource-Optimized Quality-Assured Ambiguous Context Mediation Framework in Pervasive Environments

    Microsoft Academic Search

    Nirmalya Roy; Sajal K. Das; Christine Julien

    2012-01-01

    Pervasive computing applications often involve sensor-rich networking environments that capture various types of user contexts such as locations, activities, vital signs, and so on. Such context information is useful in a variety of applications, for example, monitoring health information to promote independent living in \\

  11. Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments

    Microsoft Academic Search

    Sheikh Iqbal Ahamed; Munirul M. Haque; Farzana Rahman; Nilothpal Talukder

    2010-01-01

    The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enabled a swift proliferation of small and very capable devices into our daily lives. With such a prevalence of pervasive computing, the interaction among portable devices needs to be continuous and invisible to device users. As these devices become better connected, collaboration among them

  12. Pervasive Restart In MOOSE-based Applications

    SciTech Connect

    Derek Gaston; Cody Permann; David Andrs; John Peterson; Andrew Slaughter; Jason Miller

    2014-01-01

    Multiphysics applications are inherently complicated. Solving for multiple, interacting physical phenomena involves the solution of multiple equations, and each equation has its own data dependencies. Feeding the correct data to these equations at exactly the right time requires extensive effort in software design. In an ideal world, multiphysics applications always run to completion and produce correct answers. Unfortunately, in reality, there can be many reasons why a simulation might fail: power outage, system failure, exceeding a runtime allotment on a supercomputer, failure of the solver to converge, etc. A failure after many hours spent computing can be a significant setback for a project. Therefore, the ability to “continue” a solve from the point of failure, rather than starting again from scratch, is an essential component of any high-quality simulation tool. This process of “continuation” is commonly termed “restart” in the computational community. While the concept of restarting an application sounds ideal, the aforementioned complexities and data dependencies present in multiphysics applications make its implementation decidedly non-trivial. A running multiphysics calculation accumulates an enormous amount of “state”: current time, solution history, material properties, status of mechanical contact, etc. This “state” data comes in many different forms, including scalar, tensor, vector, and arbitrary, application-specific data types. To be able to restart an application, you must be able to both store and retrieve this data, effectively recreating the state of the application before the failure. When utilizing the Multiphysics Object Oriented Simulation Environment (MOOSE) framework developed at Idaho National Laboratory, this state data is stored both internally within the framework itself (such as solution vectors and the current time) and within the applications that use the framework. In order to implement restart in MOOSE-based applications, the total state of the system (both within the framework and without) must be stored and retrieved. To this end, the MOOSE team has implemented a “pervasive” restart capability which allows any object within MOOSE (or within a MOOSE-based application) to be declared as “state” data, and handles the storage and retrieval of said data.

  13. Metrics for Human Driving of Multiple Robots Dan R. Olsen Jr, Member IEEE Computer Society, Stephen Bart Wood, and Jonathan Turner

    E-print Network

    Olsen Jr., Dan R.

    Metrics for Human Driving of Multiple Robots Dan R. Olsen Jr, Member IEEE Computer Society, Stephen Bart Wood, and Jonathan Turner Abstract--A goal of human-robot interaction is to expand the capability of human beings so that they can control multiple robots simultaneously. This provides leverage for human

  14. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 9, SEPTEMBER 2008 1571 Model Order Reduction of Parameterized

    E-print Network

    Bai, Zhaojun

    -Directional Arnoldi Process Yung-Ta Li, Zhaojun Bai, Yangfeng Su, and Xuan Zeng, Member, IEEE Abstract--This paper August 20, 2008 (projected). The work of Y.-T. Li and Z. Bai was supported in part by the National. Bai is with the Department of Computer Science and Department of Mathematics, University of California

  15. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 11, NOVEMBER 2006 2427 Delay Modeling and Statistical Design of Pipelined

    E-print Network

    Bhunia, Swarup

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 11, NOVEMBER 2006 2427 Delay Modeling and Statistical Design of Pipelined Circuit Under Process Variation, the delay of a pipelined circuit follows a statistical distribution. This paper presents analytical models

  16. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 10, OCTOBER 2008 1775 Transforming Cyclic Circuits Into

    E-print Network

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 10, OCTOBER 2008 1775 Transforming Cyclic Circuits Into Acyclic Equivalents Osama Neiroukh, Stephen A. Edwards tools can intro- duce unwanted cycles in digital circuits, and for certain com- binational functions

  17. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 1 On the Scalability and Dynamic Load-Balancing of

    E-print Network

    Tropper, Carl

    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 1 On the Scalability Abstract--As a consequence of Moore's law, the size of in- tegrated circuits has grown extensively, resulting in simulation becoming the major bottleneck in the circuit design process. On the other hand

  18. JULY/AUGUST 2008 110278-6648/08/$25.00 2008 IEEE s a graduate student in computer science, I found myself

    E-print Network

    Gozuacik, Devrim

    in life. You may already know that being a gradu- ate student is stressful. Graduate students deal of graduate students at Berkeley report having emotional or stress-related problems that seriously affectJULY/AUGUST 2008 110278-6648/08/$25.00 © 2008 IEEE s a graduate student in computer science, I

  19. 1176 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 6, JUNE 2006 Reducing Clock Skew Variability via Crosslinks

    E-print Network

    Hu, Jiang

    1176 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 6-cost nontree clock network by inserting crosslinks in a given clock tree. The effects of the link insertion on clock skew variability are analyzed. Based on the analysis, this paper proposes two link insertion

  20. 1288 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 33, NO. 9, SEPTEMBER 2014 Leveraging Gate-Level Properties to Identify

    E-print Network

    Kastner, Ryan

    1288 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 33, NO. 9 devices, airplanes, and automobiles continue to dominate some of the most critical aspects of our lives. In such sys- tems, the movement of information throughout a device must be tightly controlled to prevent

  1. IEEE/ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, VOL. XX, NO. XX, XX 20XX 1 Protein Function Prediction with Incomplete

    E-print Network

    Domeniconi, Carlotta

    of the life process, are not well studied. As such, predicting the biological functions of proteins is one with biological experiments to annotate these proteins are quite demanding. The availability of various proIEEE/ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, VOL. XX, NO. XX, XX 20XX 1

  2. In Proceedings of the 13th International Conference on Computer Vision (ICCV'11), c 2011 IEEE Video Parsing for Abnormality Detection

    E-print Network

    Heermann, Dieter W.

    , abnormality detection is based on videos from a sta- tionary camera (e.g. surveillance videos) where powerfulIn Proceedings of the 13th International Conference on Computer Vision (ICCV'11), c 2011 IEEE Video Detecting abnormalities in video is a challenging prob- lem since the class of all irregular objects

  3. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 5, NO. 1, FEBRUARY 2001 27 Synthesis of Low-Power DSP Systems Using a

    E-print Network

    Arslan, Tughrul

    ]. The authors of this paper have previously demon- strated the application of GAs in low-power synthesis [4], [5IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 5, NO. 1, FEBRUARY 2001 27 Synthesis of Low--This paper presents a new tool for the synthesis of low-power VLSI designs, specifically, those designs

  4. IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 1, NO. 2, JUNE 2009 1 Rapid and Reliable Adaptation of

    E-print Network

    Spronck, Pieter

    IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, VOL. 1, NO. 2, JUNE 2009 1 Rapid and Reliable Adaptation of Video Game AI Sander Bakkes, Pieter Spronck, and Jaap van den Herik Abstract--Current approaches to adaptive game AI typically require numerous trials to learn effective behaviour (i.e., game

  5. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 12, DECEMBER 2006 2965 Statistical Timing Analysis With Coupling

    E-print Network

    Zhou, Hai

    , DECEMBER 2006 2965 Statistical Timing Analysis With Coupling Debjit Sinha, Member, IEEE, and Hai Zhou, the authors establish a theoretical framework for statistical timing analysis with coupling. They prove in comparison to the others mentioned. Index Terms--Coupling, fixpoint computation, statistical timing analysis

  6. Pervasive UWB Sensor Networks for Oil exploration

    E-print Network

    Savazzi, Stefano

    Pervasive UWB Sensor Networks for Oil exploration S. Savazzi1, L. Goratti2, D. Fontanella1,3, M)@elet.polimi.it, leonardo.goratti@jrc.ec.europa.eu, diana.fontanella@unibw.de Abstract-- Ultra-wideband (UWB) technology network applications. One of these applications is represented by land seismic exploration for oil and gas

  7. Pervasive Adaptive Evolution in Primate Seminal Proteins

    E-print Network

    Dean, Matthew D.

    proteins from divergent taxa is unknown. We identified adaptive evolution in primate seminal proteins using semenogelin proteins [2,8­10]. However, the extent of selection in primates remains unknown, and it hasPervasive Adaptive Evolution in Primate Seminal Proteins Nathaniel L. Clark* , Willie J. Swanson

  8. Context Information Refinement for Pervasive Medical Systems

    Microsoft Academic Search

    Dawit Bekele; Birhanu Eshete; Adolfo Villafiorita; Komminist Weldemariam

    2010-01-01

    Emerging technologies like mobile and wireless communication are offering promising opportunities to enable mobile healthcare delivery to citizens. But, enhancing the quality of service of such systems demands systematic improvement of existing service infrastructure. In this paper, we describe a context information refinement architecture proposed to address the shortcomings of existing works in relation to context information refinement in pervasive

  9. Challenges in Data Quality Assurance in Pervasive

    E-print Network

    Kotz, David

    Challenges in Data Quality Assurance in Pervasive Health Monitoring Systems Janani Sriram Minho with the patient. the data may be gathered through a personal mobile device (such as a mobile phone), over and in this manner, we need a holistic system view that inspects contributions to risk and error in medical data

  10. Breaking reality: exploring pervasive cheating in Foursquare

    Microsoft Academic Search

    M. A. J. Glas

    2011-01-01

    This paper explores the notion of cheating in location-based mobile applications. Using the popular smartphone app Foursquare as main case study, I address the question if and how devious practices impact the boundaries between play and reality as a negotiated space of interaction. After establishing Foursquare as a prime example of the gamification phenomenon and pervasive gaming, both of which

  11. Simulating Events to Generate Synthetic Data for Pervasive Spaces

    E-print Network

    Cook, Diane J.

    Simulating Events to Generate Synthetic Data for Pervasive Spaces Abstract Actual data collected spaces. A first step in this direction is trying to simulate a chain of events in the sensor output space of sensor activity in a pervasive space. Keywords Pervasive spaces, synthetic data generation, simulation

  12. Dynamic Pervasive Storytelling in Long Lasting Learning Games

    ERIC Educational Resources Information Center

    Pløhn, Trygve; Louchart, Sandy; Aalberg, Trond

    2015-01-01

    Pervasive gaming is a reality-based gaming genre originating from alternative theatrical forms in which the performance becomes a part of the players' everyday life. In recent years much research has been done on pervasive gaming and its potential applications towards specific domains. Pervasive games have been effective with regards to…

  13. 28 PERVASIVE computing Published by the IEEE CS 1536-1268/08/$25.00 2008 IEEE U S E R -G E N E R A T E D C O N T E N T

    E-print Network

    Amaral, Luis A.N.

    , and involves diverse modes of transport (buses, light rail, cars, trains, planes, subways, and boats- tracking Web site (www.wheresgeorge. com) and trajectories of trackable items (known as travel bugs) r

  14. IT Monoculture 14 Published by the ieee ComPuter soCiety 1540-7993/09/$25.00 2009 ieee ieee seCurity & PrivaCy

    E-print Network

    Schneider, Fred B.

    that an organization's computing infrastruc- ture must be trustworthy for that organization to sur- vive; the second means malware has an efficient way to attack, propagate, and compromise all members of the organization's computing infrastructure. The prospect of a computer monoculture thus terrifies computer security experts

  15. IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS--PART A: SYSTEMS AND HUMANS, VOL. 29, NO. 4, JULY 1999 417 An Improved Constant-Time Algorithm for Computing the

    E-print Network

    Pan, Yi

    IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS--PART A: SYSTEMS AND HUMANS, VOL. 29, NO. 4 is with the Department of Computer Science, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon

  16. Pervasive Healthcare and Wireless Health Monitoring

    Microsoft Academic Search

    Upkar Varshney

    2007-01-01

    Abstract With an increasingly mobile,society and,the worldwide deployment of mobile and wireless networks, the wireless infrastructure can support many,current and emerging,healthcare applications. This could fulfill the vision of “Pervasive Healthcare” or healthcare to anyone, anytime, and anywhere by removing locational, time and other restraints while increasing both the coverage and the quality. In this paper, we present applications and require-

  17. Proceedings of the 2002 IEEE Canadian Conference on Electrical & Computer Engineering

    E-print Network

    Heywood, Malcolm I.

    , which significantly speed the search process. Keywords: Content-based indexing; image clustering frequency based methods are capable of producing index keys that perform relatively well on text documents-7803-7514-9/02/$17.00 © 2002 IEEE EXPLORING CONTENT-BASED IMAGE INDEXING TECHNIQUES IN THE COMPRESSED DOMAIN A. R. Mc

  18. Proceedings of the 2002 IEEE Canadian Conference on Electrical & Computer Engineering

    E-print Network

    Tahar, Sofiène

    -7802-xxxx-x/02/$10 © 2002 IEEE ON THE MODEL CHECKING OF THE RCMP-800 INPUT FIFO Jianping Lu and Sofiène, Monitoring and Policing 800 Mbps (RCMP-800), a product from PMC-Sierra, Inc. RCMP-800 is an integrated checking of the input FIFO of RCMP-800 using the VIS tool. We successfully established the environments

  19. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Design and Implementation of TARF: A

    E-print Network

    Shi, Weisong

    -Aware Routing Framework for WSNs Guoxing Zhan, Weisong Shi, Senior Member, IEEE, and Julia Deng Abstract--The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have

  20. AprilJune 2007 Vol. 14, No. 2 Published by the IEEE Computer Society

    E-print Network

    Drew, Mark S.

    Society. Copyright and reprint permission: Abstracting is permitted with credit to the source. Libraries through the Copyright Clearance Center, 222 Rosewood Dr., Danvers, MA 01923. Instructors are permitted, or republication permission, write to Copyrights and Permissions Department, IEEE Publications Administration, 445

  1. [Pervasive developmental disorders. Clinical and genetics aspects].

    PubMed

    Ruggieri, Victor; Arberas, Claudia

    2007-01-01

    Pervasive developmental disorders (PDD) encompass a heterogeneous group of children with deficits of verbal and non-verbal language, social communication, and with a restricted repertoire of activities or repetitive behaviours. The frequency in general population is considered 27.5/10,000. In this study, we analyzed the clinical and genetic aspects of Autism, Asperger Syndrome, PDD Not Otherwise Specified, Rett Syndrome and Childhood Disintegrative Disorder. We analyzed clinical, behavioural and neuropsychological features. We revised different medical genetics associated conditions and divided the genetics aspects of pervasive developmental disorders into two groups: Syndromic forms (around 20%) and non syndromic forms (currently proposed to be 80%). The early recognition of pervasive developmental disorders and the diagnosis of specific associated syndromes allow early therapy, correct genetic counselling, and follow up anticipating possible complications related to the entity. Finally, although the genetic bases of autism have not yet been identified, the following candidate genes have been proposed: 15q, 2q, 17q, 7q, 12q, and X related genes, among others; which are analyzed in this study and will allow a better understanding of these disorders in the future. PMID:18422083

  2. Spray Computers: Frontiers of Self-Organization for Pervasive Computing

    Microsoft Academic Search

    Franco Zambonelli; Marie-Pierre Gleizes; Marco Mamei; Robert Tolksdorf

    2004-01-01

    We envision a future in which clouds of microcomputers can be sprayed in an environment to provide, by spontaneously networking with each other, an endlessly range of futuristic applications. However, beside the vision, spraying may also act as a powerful metaphor for a range of other scenarios that are already under formation, from ad-hoc networks of embedded and mobile devices

  3. Human Centric Computing School COMSC

    E-print Network

    Martin, Ralph R.

    Human Centric Computing School COMSC As information systems become more pervasive and complex. This module takes a systems approach to Human Centric Computing and deals with relevant aspects of Human and Pervasive Computing. #12;· Characterise and analyse systems and understand why humans make errors. · Assess

  4. SEPTEMBER/OCTOBER 2005 1541-1672/05/$20.00 2005 IEEE 17 Published by the IEEE Computer Society

    E-print Network

    events, med- ical personnel at an accident scene, and emergency responders to a natural disaster, as well and situation management in infrastructure-free environments where power, net- work, and other computing as homeland security and military scenarios). Our experience in the PA-UWNT project indicates

  5. 0740-7459/04/$20.00 2004 IEEE Published by the IEEE Computer Society IEEE SOFTWARE 5 9 only a small--but growing--number of sys-

    E-print Network

    Scacchi, Walt

    - nizational contexts they need for success. Academic communities, commercial enter- prises, and government on software development for Web and Internet infrastructure, computer games, software en- gineering design systems, and X-ray and deep- space astronomy. Rather than examining FOSS development practices

  6. 38 NOVEMBER DECEMBER 2000 http://computer.org/internet/ 1089-7801/00/$10.00 2000 IEEE IEEE INTERNET COMPUTING his issue of IEEE Internet Computing presents three articles explor-

    E-print Network

    Sandhu, Ravi

    security emerged with the development of time- sharing and multi-user systems. Security technology research, and suitability to the Internet environment. DEPLOYMENT VERSUS RESEARCH The focus on deployment reflects the frustration, shared by the majority of the computer security research community, over the glaring gap between

  7. Dynamic Privacy Management in Pervasive Sensor Networks

    NASA Astrophysics Data System (ADS)

    Gong, Nan-Wei; Laibowitz, Mathew; Paradiso, Joseph A.

    This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a potentially invasive sensor network (with high resolution video, audio, and motion tracking capabilities) featuring different interactive applications that created incentive for accepting this network as an extension of people's daily social space. A user study was then conducted to evaluate several privacy management approaches - an active badge system for both online and on-site control, on/off power switches for physically disabling the hardware, and touch screen input control. Results from a user study indicated that an active badge for on-site privacy control is the most preferable method among all provided options. We present a set of results that yield insight into the privacy/benefit tradeoff from various sensing capabilities in pervasive sensor networks and how privacy settings and user behavior relate in these environments.

  8. Pervasive Sensing to Model Political Opinions in Face-to-Face Networks

    Microsoft Academic Search

    Anmol Madan; Katayoun Farrahi; Daniel Gatica-Perez

    2011-01-01

    Exposure and adoption of opinions in social networks are important questions in education, business, and government. We de- scribe a novel application of pervasive computing based on using mobile phone sensors to measure and model the face-to-face interactions and subsequent opinion changes amongst undergraduates, during the 2008 US presidential election campaign. We nd that self-reported political discussants have characteristic interaction

  9. Supporting rapid design and evaluation of pervasive applications: challenges and solutions

    Microsoft Academic Search

    Lei Tang; Zhiwen Yu; Xingshe Zhou; Hanbo Wang; Christian Becker

    2011-01-01

    Along with the improvement of the key technologies for pervasive computing, the design of applications itself has emerged\\u000a as a notable research area. A design should decide which features go into the application of supporting its context-awareness\\u000a and ascertaining how well those features add value for users with an acceptable user experience. This paper initially identifies\\u000a the challenges in designing

  10. Dealing with pervasive transcription Torben Heick Jensen1

    E-print Network

    Schierup, Mikkel Heide

    1 Dealing with pervasive transcription Torben Heick Jensen1 , Alain Jacquier2 and Domenico Libri3 1. (2013). Dealing with pervasive transcription. Molecular Cell 52:473-484, which has been published-products of functional, or spurious, transcription events. Cells control the accumulation of many opportunistic

  11. From the Editors IEEE magazines.

    E-print Network

    Schneider, Fred B.

    From the Editors IEEE magazines. Transactions are intended for communicating research results of a year or two between submission and pub- lication is not unusual. An IEEE or Computer Society magazine aggressive word limit and a cap on biblio- graphic citations are intended to further increase the magazine

  12. Abstract--Ubiquitous and pervasive networks and applications include a growing number of research themes. In most use cases,

    E-print Network

    Boyer, Edmond

    -dedicated localization techniques are described. To ease the understanding, first are reviewed fundamental principles, localization algorithms, AOA, TDOA, OTDOA, UTDOA, RSS, GPS, A-GPS, location-aware, pervasive computing and services. Although GPS-based positioning is reliable and accurate for outdoor situations, it does

  13. Domotics Over IEEE 802.15.4 - A Spread Spectrum Home Automation Application

    Microsoft Academic Search

    Caio Augustus; Morais Bolzani; Cristian Montagnoli

    2006-01-01

    This work intends to demonstrate the use of IEEE 802.15.4, a low-rate spread spectrum wireless network protocol, to provide real time environmental sensoring information to the Home Sapiens - a smart home simulator (1). IEEE 802.15.4 fo- cuses on enabling pervasive wireless sensor networks for residen- tial, commercial and industrial applications. The standard is characterized by maintaining a high level

  14. Domotics Over IEEE 802.15.4 - A Spread Spectrum Home Automation Application

    Microsoft Academic Search

    CaioAugustus Morais Bolzani; Cristian Montagnoli; M. L. Netto

    2006-01-01

    This work intends to demonstrate the use of IEEE 802.15.4, a low-rate spread spectrum wireless network protocol, to provide real time environmental sensoring information to the Home Sapiens-a smart home simulator. IEEE 802.15.4 focuses on enabling pervasive wireless sensor networks for residential, commercial and industrial applications. The standard is characterized by maintaining a high level of simplicity, low cost and

  15. Measuring effective capacity of IEEE 802.15.4 beaconless mode

    Microsoft Academic Search

    Tony Sun; Ling-Jyh Chen; Chih-Chieh Han; Guang Yang; Mario Gerla

    2006-01-01

    IEEE 802.15.4 is an emerging wireless standard addressing the needs of low-rate wireless personal area networks with a focus on enabling various pervasive and ubiquitous applications that require interactions with our surrounding environments. In view of the application potential of IEEE 802.15.4, knowing the fundamental network properties soon becomes essential in fasten the interactivity between these devices. Among all, knowing

  16. IEEE TRANS. EVOL. COMPUT. , VOL. X, NO. X, FALL 2005 1 HMM-Based Semantic Learning for a Mobile Robot

    E-print Network

    Squire, Kevin

    Robot Kevin M. Squire, Member, IEEE, and Stephen E. Levinson, Fellow, IEEE, Abstract-- We are developing COGNITIVE development has been studied in various environments--on the playground by the psychologist, under theories and building things to test them. The particular question we are examining is one of the most

  17. p-Democracy a Pervasive Majority Rule

    NASA Astrophysics Data System (ADS)

    Antoniades, Kyriacos A.

    Today, group decision making in our democratic society uses the non-ranked method. What we need is an improved method that allows decision makers to indicate not only their chosen alternative, but also their order of preference by which all alternatives will be placed. We classify this as a particular Social Choice Function, where choice is a group decision-making methodology in an ideal democratic society that gives the expression of the will of the majority. We use the Eigenvector Function to obtain individual priorities of preferences and Borda's Function to obtain the Ranking or otherwise, the Group Choice. Our conclusions give rise to new directions for pervasive democracy with an innovative degenerative quantum scale to allow even for strong to very strong preferences.

  18. Joint Computer Science Department and Electrical and Computer Engineering Department Special Seminar Sponsored by ISTeC

    E-print Network

    Joint Computer Science Department and Electrical and Computer Engineering Security Professor of Computer Science (College of Science) Tue., Sept. 16 IEEE, ACM, NSA and NIST such as the IEEE Computer Society's Technical

  19. Repenning, A., & Citrin, W. (1993). Agentsheets: Applying Grid-Based Spatial Reasoning to Human-Computer Interaction. In 1993 IEEE Workshop on Visual Languages, Bergen, Norway: IEEE Computer

    E-print Network

    Repenning, Alexander

    1993-01-01

    Reprint Repenning, A., & Citrin, W. (1993). Agentsheets: Applying Grid-Based Spatial Reasoning1 , Wayne Citrin2 1 Department of Computer Science and Institute of Cognitive Science 2 Department of Electrical Engineering Campus Box 430 University of Colorado, Boulder CO 80309 303 492-1218, {ralex, citrin

  20. C O V E R F E A T U R E 0018-9162/07/$25.00 2007 IEEE62 Computer Published by the IEEE Computer Society

    E-print Network

    Cybenko, George

    -level sensor events and high-level situational awareness. Database technologies, including extensions to data for extracting situational awareness from sensed data is therefore needed. During the past three years, we have," formally known as situational awareness. In the context of computer security, situational awareness

  1. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 5, MAY 2006 743 Using Simulation and Satisfiability to Compute

    E-print Network

    Brayton, Robert K.

    Brayton, Fellow, IEEE, and Malgorzata Chrzanowska-Jeske, Senior Member, IEEE Abstract, and Synplicity. This paper was recommended by Guest Editor R. I. Bahar. A. Mishchenko and R. Brayton (e-mail: alanmi@eecs.berkeley.edu; brayton@eecs.berkeley.edu). J. S. Zhang and M. Chrzanowska

  2. Sensorized Garment Augmented 3D Pervasive Virtual Reality System

    NASA Astrophysics Data System (ADS)

    Gulrez, Tauseef; Tognetti, Alessandro; de Rossi, Danilo

    Virtual reality (VR) technology has matured to a point where humans can navigate in virtual scenes; however, providing them with a comfortable fully immersive role in VR remains a challenge. Currently available sensing solutions do not provide ease of deployment, particularly in the seated position due to sensor placement restrictions over the body, and optic-sensing requires a restricted indoor environment to track body movements. Here we present a 52-sensor laden garment interfaced with VR, which offers both portability and unencumbered user movement in a VR environment. This chapter addresses the systems engineering aspects of our pervasive computing solution of the interactive sensorized 3D VR and presents the initial results and future research directions. Participants navigated in a virtual art gallery using natural body movements that were detected by their wearable sensor shirt and then mapped the signals to electrical control signals responsible for VR scene navigation. The initial results are positive, and offer many opportunities for use in computationally intelligentman-machine multimedia control.

  3. Editor info 2 May/June 2014 Copublished by the IEEE Computer and Reliability Societies 1540-7993/14/$31.00 2014 IEEE

    E-print Network

    Landau, Susan

    , and Internet companies have privacy counsels. The International Association of Privacy Professionals, which 1540-7993/14/$31.00 © 2014 IEEE Educating Engineers Teaching Privacy in a World of Open Doors Susan Landau Two decades ago, the num- ber of people thinking hard about electronic privacy roughly mirrored

  4. Virtual and Augmented Reality Supported Simulators 48 November/December 2006 Published by the IEEE Computer Society 0272-1716/06/$20.00 2006 IEEE

    E-print Network

    Salisbury, Kenneth

    Virtual and Augmented Reality Supported Simulators 48 November/December 2006 Published by the IEEE ready to perform their first procedure.1 Residents in craniofacial surgery, for example, learn anatomy in the vicinity of target anatomy. Surgeons use a variety of strokes and contact techniques to precisely

  5. IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL. 1, NO. 3, OCTOBER 2007 357 Capacity of Sparse Multipath Channels in the

    E-print Network

    Sayeed, Akbar M.

    Hariharan, Student Member, IEEE, and Akbar M. Sayeed, Senior Member, IEEE Abstract--This paper studies_raghavan@ieee.org). G. Hariharan and A. M. Sayeed are with the Department of Electrical and Computer Engineering

  6. [Pervasive developmental disorders: controversies concerning the classification of autism].

    PubMed

    Pisula, E

    2000-01-01

    Autistic Disorder was described by Leo Kanner in 1943. Since that time not only the name of this disorder (initially early infantile autism) has changed but also it's relation to other disorders. DSM-IV includes autism together with Rett's Disorder, Childhood Disintegrative Disorder, Asperger's Disorder and Pervasive Developmental Disorder Not Otherwise Specified into one category: Pervasive Developmental Disorders. The definition and contents of Pervasive Developmental Disorders raise many controversies. Differentiation between particular disorders within this category is also difficult. This paper discusses some of these problems. PMID:11055183

  7. Examining the Criterion-Related Validity of the Pervasive Developmental Disorder Behavior Inventory

    ERIC Educational Resources Information Center

    McMorris, Carly A.; Perry, Adrienne

    2015-01-01

    The Pervasive Developmental Disorder Behavior Inventory is a questionnaire designed to aid in the diagnosis of pervasive developmental disorders or autism spectrum disorders. The Pervasive Developmental Disorder Behavior Inventory assesses adaptive and maladaptive behaviors associated with pervasive developmental disorders and provides an…

  8. [Non-autistic pervasive developmental disorders: Rett syndrome, disintegrative disorder and pervasive developmental disorder not otherwise specified].

    PubMed

    Mercadante, Marcos T; Van der Gaag, Rutger J; Schwartzman, Jose S

    2006-05-01

    The category "Pervasive Developmental Disorders" includes autistic disorder, Asperger's syndrome, Rett's syndrome, childhood disintegrative disorder, and a residual category, named pervasive developmental disorder not otherwise specified. In this review, Rett's syndrome and childhood disintegrative disorder, which are well-defined categories, will be discussed, as well as the not well defined categories that have been included in the Pervasive Developmental Disorder Not Otherwise Specified group. Different proposals of categorization have been created, some of which based on descriptive phenomenological approach, and others based upon other theoretical perspectives, such as neuropsychology. Current proposals are presented and discussed, followed by critical appraisals on the clinical advantages and disadvantages of these concepts. PMID:16791387

  9. “What Are You Viewing?” Exploring the Pervasive Social TV Experience

    Microsoft Academic Search

    Raimund Schatz; Lynne Baillie; Peter Fröhlich; Sebastian Egger; Thomas Grechenig

    \\u000a The vision of pervasive TV foresees users engaging with interactive video services across a variety of contexts and user interfaces.\\u000a Following this idea, this chapter extends traditional Social TV toward the notion of pervasive Social TV (PSTV) by including\\u000a mobile viewing scenarios. We discuss social interaction enablers that integrate TV content consumption and communication in\\u000a the context of two case

  10. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 67 Computing the Unmeasured: An Algebraic Approach

    E-print Network

    Wool, Avishai

    , Avishai Wool, and Bülent Yener, Senior Member, IEEE Abstract--Distance estimation is important to many-mail: sunxd@ias.edu). A. Wool is with the Department of Electrical Engineering-Systems, Tel-Aviv University

  11. Pervasive domestication of defective prophages by bacteria.

    PubMed

    Bobay, Louis-Marie; Touchon, Marie; Rocha, Eduardo P C

    2014-08-19

    Integrated phages (prophages) are major contributors to the diversity of bacterial gene repertoires. Domestication of their components is thought to have endowed bacteria with molecular systems involved in secretion, defense, warfare, and gene transfer. However, the rates and mechanisms of domestication remain unknown. We used comparative genomics to study the evolution of prophages within the bacterial genome. We identified over 300 vertically inherited prophages within enterobacterial genomes. Some of these elements are very old and might predate the split between Escherichia coli and Salmonella enterica. The size distribution of prophage elements is bimodal, suggestive of rapid prophage inactivation followed by much slower genetic degradation. Accordingly, we observed a pervasive pattern of systematic counterselection of nonsynonymous mutations in prophage genes. Importantly, such patterns of purifying selection are observed not only on accessory regions but also in core phage genes, such as those encoding structural and lysis components. This suggests that bacterial hosts select for phage-associated functions. Several of these conserved prophages have gene repertoires compatible with described functions of adaptive prophage-derived elements such as bacteriocins, killer particles, gene transfer agents, or satellite prophages. We suggest that bacteria frequently domesticate their prophages. Most such domesticated elements end up deleted from the bacterial genome because they are replaced by analogous functions carried by new prophages. This puts the bacterial genome in a state of continuous flux of acquisition and loss of phage-derived adaptive genes. PMID:25092302

  12. PATHOS: Pervasive at Home Sleep Monitoring

    PubMed Central

    Obermiller, Ian; Ahamed, Sheikh I.

    2008-01-01

    Sleeping disorders affect a large percentage of the population, and many of them go undiagnosed each year because the method of diagnosis is to stay overnight at a sleep center. Because pervasive technologies have become so prevalent and affordable, sleep monitoring is no longer confined to a permanent installation, and can therefore be brought directly into the user home. We present a unique solution to the problem of home sleep monitoring that has the possibility to take the place of and expand on the data from a sleep center. PATHOS focuses not only on analyzing patterns during the night, but also on collecting data about the subject lifestyle that is relevant and important to the diagnosis of his/her sleep. PATHOS means “evoking emotion.” Here, we mean Pathos will help us to keep healthy: both mentally and physically. Our solution uses existing technology to keep down cost and is completely wireless in order to provide portability and be easily to customize. The daytime collection also utilizes existing technology and offers a wide range of input methods to suit any type of person. We also include an in-depth look at the hardware we used to implement and the software providing user interaction. Our system is not only a viable alternative to a sleep center, it also provides functions that a static, short-term solution cannot provide, allowing for a more accurate diagnosis and treatment. PMID:18437237

  13. 42 BIBLIOGRAPHY [Seitz 84] C.L. Seitz, Concurrent VLSI Architectures, IEEE Transactions

    E-print Network

    42 BIBLIOGRAPHY [Seitz 84] C.L. Seitz, Concurrent VLSI Architectures, IEEE Transactions­Passing Concurrent Computers, IEEE Computer, pp. 9--24, August 1988. [Dally 87] W.J. Dally, A VLSI Architecture, Deadlock­Free Message Routing in Mul­ tiprocessor Interconnection Networks, IEEE Transactions on Computers

  14. ON THE ARCHITECTURE OF IEEE COMPLIANT FLOATINGPOINT UNITS

    E-print Network

    Seidel, Peter-Michael

    ON THE ARCHITECTURE OF IEEE COMPLIANT FLOATING­POINT UNITS PETER­MICHAEL SEIDEL Computer Science­ point unit (FPU) that is fully compliant with the IEEE floating­point standard. There are a few choices­ per are fully compliant with the IEEE standard, sup­ port both double and single precision

  15. Ethical Responsibility Key to Computer Security.

    ERIC Educational Resources Information Center

    Lynn, M. Stuart

    1989-01-01

    The pervasiveness of powerful computers and computer networks has raised the specter of new forms of abuse and of concomitant ethical issues. Blurred boundaries, hackers, the Computer Worm, ethical issues, and implications for academic institutions are discussed. (MLW)

  16. 1536-1268/02/$17.00 2002 IEEE PERVASIVE computing 59 R E A C H I N G W E I S E R ' S V I S I O N

    E-print Network

    Sukhatme, Gaurav S.

    is so per- vasive that everyday devices can sense their relationship to us and to each other. They could, vibration, heat, light, moisture, pressure, ultrasound, radio, magnetic, and many more exotic modes style, although we use them to observe a variety of unstructured phe- nomena (such as human gestures

  17. High Performance Scientific Computing Using FPGAs with IEEE Floating Point and Logarithmic Arithmetic for Lattice QCD

    Microsoft Academic Search

    Owen Callanan; David Gregg; Andy Nisbet; Mike Peardon

    2006-01-01

    The recent development of large FPGAs along with the availability of a variety of floating point cores have made it possible to implement high-performance matrix and vector kernel operations on FPGAs. In this paper we seek to evaluate the performance of FPGAs for real scientific computations by implementing Lattice QCD, one of the classic scientific computing problems. Lattice QCD is

  18. Thirty-second IEEE computer society international conference (Digest of Papers)

    SciTech Connect

    Not Available

    1987-01-01

    This book presents the papers given at a conference on supercomputers, artificial intelligence, and expert systems. Topics considered at the conference included knowledge processors, connectionist networks, computer architecture, time synchronization, distributed operating systems, object oriented languages, designing a multiprocessor environment, lisp machines, and parallel processing for computer-aided design applications.

  19. Please cite as: F. Ponchio and K. Hormann. Interactive rendering of dynamic geometry. IEEE Transactions on Visual-ization and Computer Graphics, 14(4):914925, July/August 2008.

    E-print Network

    Hormann, Kai

    Please cite as: F. Ponchio and K. Hormann. Interactive rendering of dynamic geometry. IEEE Transactions on Visual- ization and Computer Graphics, 14(4):914­925, July/August 2008. Interactive Rendering of Dynamic Geometry Federico Ponchio Kai Hormann Department of Informatics Clausthal University of Technology

  20. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Puerto Rico, June 1997, pages 457--462 EgoMotion Estimation Using Optical Flow Fields Observed from

    E-print Network

    Hung, Yi-Ping

    In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Puerto Rico, June 1997, pages 457--462 Ego­Motion Estimation Using Optical Flow Fields Observed from Multiple Cameras An, Taiwan Email: hung@iis.sinica.edu.tw Abstract In this paper, we consider a multi­camera vision system

  1. J. Davis and X. Chen, "Calibrating pan-tilt cameras in wide-area surveillance networks," IEEE International Conference on Computer Vision, 2003. Calibrating pan-tilt cameras in wide-area surveillance networks

    E-print Network

    Stanford University

    J. Davis and X. Chen, "Calibrating pan-tilt cameras in wide-area surveillance networks," IEEE International Conference on Computer Vision, 2003. Calibrating pan-tilt cameras in wide-area surveillance to obtain a consistent representation of the entire space. Existing methods for calibrating pan-tilt cameras

  2. 13th IEEE Int. Conf. on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), pp. 232-240 Multiform Time in UML for Real-time Embedded Applications

    E-print Network

    Paris-Sud XI, Université de

    13th IEEE Int. Conf. on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), pp. 232-240 Multiform Time in UML for Real-time Embedded Applications C. Andr´e, F. Mallet, M-A. Peraldi used in the domain of real-time embedded applications, with a concept of time inherited from reactive

  3. Proc. IEEE Computer Vision & Pattern Recognition (CVPR), 2012 1 Example-based Cross-Modal Denoising

    E-print Network

    Schechner, Yoav Yosef

    experiments. 1. Introduction Smartphones, tablets and a range of other devices inte- grate cameras for human and machine hear- ing. The aim is not computational word recognition [11]. #12;D´ej`a Vu + D´

  4. To appear in the November 1994 issue of IEEE Computer: Special Issue on Associative Processing. ASC AN ASSOCIATIVE COMPUTING PARADIGM

    E-print Network

    Scott, Stephen L.

    ASC ­ AN ASSOCIATIVE COMPUTING PARADIGM by Jerry Potter Johnnie Baker Arvind Bansal potter@mcs.kent.edu jbaker@mcs.kent.edu arvind@mcs.kent.edu (216) 672­4004 x264 (216) 672­4004 x260 (216) 672­4004 x214 Stephen Scott Chokchai Leangsuksun Chandra Asthagiri 1 sscott@mcs.kent.edu chokchai@mcs.kent.edu asthagir@mcs

  5. IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 57, NO. 6, JUNE 2009 2383 Dynamic Field Estimation Using Wireless

    E-print Network

    Moura, José

    , Member, IEEE, José M. F. Moura, Fellow, IEEE, and Bruce Krogh, Fellow, IEEE Abstract--This paper concerns-mail: haotian@ieee.org). J. M. F. Moura and B. Krogh are with the Department of Electrical and Computer Engineering Carnegie Mellon University, Pittsburgh, PA 15213 USA (e-mail: moura@ece.cmu.edu; krogh

  6. NetworkingforPervasiveComputing ResearchfromtheNationalInstituteofStandards

    E-print Network

    Information Technology Laboratory, Douglas Maughan, manager of the Defense Advanced Research Projects Agency for System Adaptability, Dependability and Assurance, and James Puffenbarger of the Advanced Research Kevin L. Mills, Editor C O M P U T E R NETWORKING Advanced Network Technology Division Information

  7. Pervasive computing in play-based occupational therapy for children

    E-print Network

    Chi, Pei-Yu

    Embedding digital technology into playful activity can make play-based occupational therapy more effective. This study proposes two play-based activities to improve children's eating and tooth-brushing behavior.

  8. A distributed object framework for pervasive computing applications

    E-print Network

    Pham, Hubert

    2005-01-01

    This thesis presents a new architectural abstraction for developing dynamic and adaptive software. Separating application logic from implementation mechanism provides developers with a simple API for constructing new ...

  9. Improving the Effectiveness of Medical Treatment with Pervasive Computing

    E-print Network

    , Switzerland {floerkem|siegemun}@inf.ethz.ch 1 Vision Hippocrates, the father of medicine, already realized a challenge more than twenty centuries after Hippocrates. When Sullivan et al. [4] studied the cost

  10. Smart Classroom: Enhancing Collaborative Learning Using Pervasive Computing Technology

    Microsoft Academic Search

    Stephen S. Yau; Sandeep K. S. Gupta; Fariaz Karim; Sheikh I. Ahamed; Yu Wang; Bin Wang

    2003-01-01

    Smart Classroom facilitates collaborative learning among college students. Students in such an environment form small groups to solve a specific problem or develop a group project. In a Smart Classroom, each student has a situation-aware PDA. Students' PDAs dynamically form mobile ad hoc networks for group meetings. Each PDA monitors its situation (locations of PDAs, noise, light, and mobility) and

  11. Huntsville Chapter of the IEEE Computer Society (http://ewh.ieee.org/r3/huntsville/cs/), Department of Electrical and Computer Engineering (http://www.ece.uah.edu/), LaCASA Laboratory

    E-print Network

    Milenkovi, Aleksandar

    system, we have demonstrated the ability to collect physiological data and extract health metrics monitoring prototype system. The prototype consists of multiple intelligent physiological sensor nodes-time signal processing for such feature extraction, describe our communication protocol based on standard IEEE

  12. IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, VOL. 59, NO. 5, MAY 2011 1379 Successive Regeneration and Adaptive Cancellation

    E-print Network

    Hajimiri, Ali

    radios simultaneously: cellular, Bluetooth, wireless local area Manuscript received October 01, 2010 version May 11, 2011.This paper is an expanded paper from the IEEE Radio Frequency Integrated Circuits more pervasive technologies, such as wireless sensor networks [1] and wireless power transfer

  13. 0018-9162/98/$10.00 1998 IEEE24 Computer A New Direction for

    E-print Network

    Kozyrakis, Christos

    transistors on a single chip. This is an exciting opportunity for com- puter architects and designers; their challenge will be to propose microprocessor designs that use this huge transistor budget efficiently for microprocessors and could redirect the emphasis of computer architecture research. BILLION-TRANSISTOR PROCESSORS

  14. IEEE International Conference on Computer Vision (ICCV), Barcelona, Spain, Nov. 2011. Human Activity Prediction

    E-print Network

    Ryoo, Michael S.

    modeling how feature distributions change over time. The new recog- nition methodology named dynamic bag recognition, an automated detection of events performed by humans from video data, is an im- portant computer], and the field is gradually moving towards recognition of complex realistic human activities involving multiple

  15. Proceedings of the 1984 IEEE Computer Society workshop on visual languages

    SciTech Connect

    Not Available

    1984-01-01

    This book presents the papers given at a conference on programming languages for image processing. Topics considered at the conference included algorithms, satellite pictures, a stereo vision method , a robot vision language, computer graphics, data base technology, remote sensing, man-machine systems, interactive display devices, natural language, pattern recognition, artificial intelligence, expert systems, and the nature of visual languages.

  16. August 2005 IEEE Computational Intelligence Society 5 1917 Karl Steinbuch 2005

    E-print Network

    Hartenstein, Reiner

    Konrad Zuse (who developed a functioning pro- gram-controlled computing machine c.1936), Steinbuch has Medicine, the Konrad Adenauer Science Award, the Jakob Fugger Medal, and the Prime Minister's Merit Medal was director of development at the Stuttgart "Informatik-Werk" of Standard Electric Lorenz AG (SEL

  17. Proceedings of the 2007 IEEE Symposium on Foundations of Computational Intelligence (FOCI 2007)

    E-print Network

    ) Random Hypergraph Models of Learning and Memory in Biomolecular Networks: Shorter-Term Adaptability vs it possible to understand the biological networks at the systems level. We aim to develop computational models of learning and memory inspired by the biomolecular networks embedded in their environment. One fundamental

  18. http://www.itee.uq.edu.au/~atc09/ Technically co-sponsored by the IEEE and the IEEE Computer Society Technical

    E-print Network

    Wang, Yan

    possible without human intervention or guidance. Organic Computing (OC) additionally addresses adaptivity in these challenging areas and includes all technical aspects related to autonomic/organic computing (AC

  19. 1712 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 24, NO. 11, NOVEMBER 2005 Power Modeling and Characteristics of Field

    E-print Network

    Chen, Deming

    , Yan Lin, Student Member, IEEE, Lei He, Member, IEEE, Deming Chen, and Jason Cong Abstract--This paper consumption for Xilinx Virtex architecture using an emulation environment. Tuan and Lai [4] studied

  20. Adaptive Process Management in Highly Dynamic and Pervasive Scenarios

    E-print Network

    de Leoni, Massimiliano

    2009-01-01

    Process Management Systems (PMSs) are currently more and more used as a supporting tool for cooperative processes in pervasive and highly dynamic situations, such as emergency situations, pervasive healthcare or domotics/home automation. But in all such situations, designed processes can be easily invalidated since the execution environment may change continuously due to frequent unforeseeable events. This paper aims at illustrating the theoretical framework and the concrete implementation of SmartPM, a PMS that features a set of sound and complete techniques to automatically cope with unplanned exceptions. PMS SmartPM is based on a general framework which adopts the Situation Calculus and Indigolog.

  1. IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 7, JULY 2004 1551 [7] D. Gitchell and N. Tran, "A utility for detecting similarity in computer

    E-print Network

    Kulkarni, Sanjeev

    compression based on approximate pattern matching," IEEE Trans. Inform. Theory, vol. 43, pp. 1439­1451, SeptIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 7, JULY 2004 1551 [7] D. Gitchell and N. Tran algorithms for plagiarism detec- tion," IEEE Trans. Education, vol. 32, pp. 94­99, May 1989. [16] S. C

  2. 1306 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 57, NO. 6, JUNE 2010 Electronic Cleansing for Computed Tomography

    E-print Network

    van Vliet, Lucas J.

    1306 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 57, NO. 6, JUNE 2010 Electronic Cleansing-invariant method to determine material fractions in voxels near such T-junctions. The proposed electronic cleansing the width of the PSF. (b) Electronic cleansing replaces H with L. (c) Transfer function based on thresholds

  3. 1100 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 15, NO. 5, SEPTEMBER 2004 Temporal Codes and Computations for Sensory

    E-print Network

    Cariani, Peter

    1100 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 15, NO. 5, SEPTEMBER 2004 Temporal Codes in nervous systems, and presents examples of neural timing networks that operate in the time-domain. Sensory for transmission and grouping are outlined. Using delays and multiplications (coincidences), neural timing networks

  4. IEEE TRANSACTIONS ON ELECTRON DEVICES, VOL. 47, NO. 6, JUNE 2000 1273 A New Approach for Computing the Bandwidth

    E-print Network

    Hayat, Majeed M.

    the Bandwidth Statistics of Avalanche Photodiodes Majeed M. Hayat, Senior Member, IEEE, and Guoquan Dong on the statistics of the APD random impulse response, or equivalently, on the statistics of the avalanche Abstract--A new approach for characterizing the avalanche- buildup-time-limited bandwidth of avalanche

  5. IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 9, SEPTEMBER 1997 997 Node-covering, Error-correcting Codes

    E-print Network

    Mahapatra, Nihar R.

    R. Mahapatra, Member, IEEE Abstract--Structural fault tolerance (SFT) is the ability interconnection structure. In this paper, we focus on the design of SFT multiprocessors that have low switch tolerance. To achieve this, multiprocessors need to be designed with structural fault tolerance (SFT), which

  6. IEEE TRANSACTIONS ON PLASMA SCIENCE, VOL. 30, NO. 3, JUNE 2002 1265 Advancements in Codes for Computer Aided

    E-print Network

    Valfells, Ágúst

    IEEE TRANSACTIONS ON PLASMA SCIENCE, VOL. 30, NO. 3, JUNE 2002 1265 Advancements in Codes sequentially and feeds data to post processors. This generates charts of important parameters. It finally obtains a chart that summarizes the performance param- eters. Initially, this has been done

  7. IEEE TRANSACTIONS ON NANOBIOSCIENCE, VOL. 5, NO. 1, MARCH 2006 41 Computational Modeling of a New Fluorescent

    E-print Network

    fluorescent protein (YFP), a cleavage recognition sequence, and cyan fluo- rescent protein (CFP). The dynamic fusion of ECFP, calmodulin (Ca sensing protein), a calmodulin binding domain (CBD), and EYFP [3], [4 Truong, Member, IEEE Abstract--The class of fluorescence resonance energy transfer (FRET) protein

  8. IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 7, JULY 2007 3445 Decentralized Inference Over

    E-print Network

    Sayeed, Akbar M.

    Multiple-Access Channels Ke Liu, Member, IEEE, Hesham El Gamal, Senior Member, IEEE, and Akbar Sayeed-mail: kel@qualcomm.com; helgamal@ece.osu.edu). A. Sayeed is with the Department of Electrical and Computer

  9. A TEDS analyzer for testing IEEE 1451 sensors and transducers through serial port

    Microsoft Academic Search

    Wei Liu; D. Wobschall; Wai Sing Poh

    2006-01-01

    This paper presents an implemented system for testing IEEE 1451 standard by using PC computer and an implemented board with various sensors. Communication is according to IEEE 1451 standard through RS232

  10. 1754 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 4, APRIL 2009 Stochastic Differential Equations for

    E-print Network

    Djouadi, Seddik M.

    Mohammed M. Olama, Member, IEEE, Seddik M. Djouadi, Member, IEEE, and Charalambos D. Charalambous, Senior and approving it for publication was H. Xu. M. M. Olama is with the Computational Sciences and Engineering Di

  11. Fragmented Visuospatial Processing in Children with Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    Schlooz, Wim A. J. M.; Hulstijn, Wouter; van den Broek, Pieter J. A.; van der Pijll, Angela C. A. M.; Gabreels, Fons; van der Gaag, Rutger J.; Rotteveel, Jan J.

    2006-01-01

    Children diagnosed with Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS) and Asperger Syndrome (AS) may be characterised by a similar perceptual focus on details as children with autistic disorder (AD). This was tested by analysing their performance in a visuoperceptual task [the Children's Embedded Figure Test (CEFT)] and a…

  12. Practical MANETs for Pervasive Cattle Monitoring Bartosz Wietrzyk, Milena Radenkovic

    E-print Network

    Aickelin, Uwe

    Practical MANETs for Pervasive Cattle Monitoring Bartosz Wietrzyk, Milena Radenkovic School.Kostadinov@nottingham.ac.uk Abstract The application of Mobile Ad Hoc Networks to cattle monitoring has the potential to increase the profitability of cattle production and positively impact the everyday live of farm personnel. The main research

  13. Diagnostic Utility of the Pervasive Developmental Disorder Behavior Inventory

    ERIC Educational Resources Information Center

    Reel, Kristy H.; Lecavalier, Luc; Butter, Eric; Mulick, James A.

    2012-01-01

    This study assessed the diagnostic utility of the Pervasive Developmental Disorder Behavior Inventory (PDDBI) in a sample of 84 children aged 3-12 years of age. Forty-two children with ASD were individually matched on age and non-verbal IQ to 42 children with other disabilities and groups were compared on PDDBI subscales and total score. Results…

  14. Pervasive Developmental Disorders in Individuals with Cerebral Palsy

    ERIC Educational Resources Information Center

    Kilincaslan, Ayse; Mukaddes, Nahit Motavalli

    2009-01-01

    The aim of the present study was to describe the prevalence and associated factors of pervasive developmental disorders (PDD), including autistic disorder and PDD not otherwise specified (NOS), in a clinical sample of 126 children and adolescents (75 males, 51 females; age range 4-18y, mean 8y 8mo, SD 3y 8mo) with tetraplegic, hemiplegic,…

  15. Elevational Rapoport's rule is not pervasive on mountains

    E-print Network

    McCain, Christy M.

    RESEARCH PAPER Elevational Rapoport's rule is not pervasive on mountains Christy M. Mc, University of Colorado, Boulder, CO 80309, USA ABSTRACT Aim Elevational Rapoport's rule, proposed in 1992 by Stevens, predicts that species ranges on mountains become larger in elevational extent with increasing

  16. Injury Treatment among Children with Autism or Pervasive Developmental Disorder

    ERIC Educational Resources Information Center

    McDermott, Suzanne; Zhou, Li; Mann, Joshua

    2008-01-01

    This study examined the differences in the frequency and type of injury for children with autism and pervasive developmental disorder (PDD) compared with typically developing peers, when both groups are insured by Medicaid. The relative rate (RR) of emergency/hospital treatment of injury for children with autism or PDD compared to controls was…

  17. Response to ‘pervasive sequence patents cover the entire human genome’

    PubMed Central

    2014-01-01

    A response toPervasive sequence patents cover the entire human genome by J Rosenfeld and C Mason. Genome Med 2013, 5:27. See related Correspondence by Rosenfeld and Mason, http://genomemedicine.com/content/5/3/27 and related letter by Rosenfeld and Mason, http://genomemedicine.com/content/6/2/15 PMID:25031614

  18. Context-Aware Data Association and Authenticity in Pervasive Healthcare

    Microsoft Academic Search

    M. A. Chowdhury; J. Light

    2009-01-01

    This paper briefly explains the data association and security issues in pervasive health-care and proposes a context aware security approach to overcome these issues. Our algorithm gathers vital physiological, environmental and personal data to generate user context and uses that information to authenticate a specific patient.

  19. Chapter XX: Pervasive Sensing and Monitoring for Situational Awareness

    E-print Network

    and processes which can then be used to gain situational awareness of the activities in the instrumented spaceChapter XX: Pervasive Sensing and Monitoring for Situational Awareness. Situational awareness, in a broad sense, refers to a continuum of knowledge that captures the current state

  20. Handedness and cognitive functions in Pervasive Developmental disorders

    Microsoft Academic Search

    Deborah Fein; Lynn Waterhouse; Dorothy Lucci; Bruce Pennington; Margaret Humes

    1985-01-01

    This paper is concerned with what abnormal handedness in Pervasive Developmental Disorders (PDD) reveals about the presence, lateralization, and severity of cerebral dysfunction in this population. From previous work, it was predicted that left-handedness would be elevated in the sample and that mixed-handedness subjects should be more impaired than those with established hand dominance. A battery of cognitive and motor

  1. Low Cost Intelligent Pervasive Location Tracking (iPLOT)

    E-print Network

    Low Cost Intelligent Pervasive Location Tracking (iPLOT) in All Environments for the Management management where seamless tracking is required. The paper discusses the process for developing the system. The threat of crime leads to great anxiety as people worry about personal safety and that of their property

  2. Early Symptoms and Recognition of Pervasive Developmental Disorders in Germany

    ERIC Educational Resources Information Center

    Noterdaeme, Michele; Hutzelmeyer-Nickels, Anna

    2010-01-01

    Pervasive developmental disorders are characterised by the presence of abnormalities in social interaction and communication as well as repetitive patterns of behaviours. Although early symptoms of the disorder often appear during the first two years of life, its diagnosis is often delayed. The purpose of this study is to analyse the delay between…

  3. Pervasive and Mobile Information Systems UDMS Stuttgart -October 2007 Pr. R. Laurini

    E-print Network

    Laurini, Robert

    proximity (EZ pass, toll watch) #12;Pervasive and Mobile Information Systems UDMS ­ Stuttgart - October 2007Pervasive and Mobile Information Systems UDMS ­ Stuttgart - October 2007 Pr. R. Laurini 1 Pervasive and Mobile Information Systems: Infrastructures for Location-Based Services · I ­ Generalities · II

  4. PHOTO: Bryan Christie Design COMPUTING / SOFTWARE

    E-print Network

    Schaeffer, Jonathan

    're following a gloomy corridor into a large boiler room, dimly lit by a flickering fluorescent lamp and echoing Smart - IEEE Spectrum 3/10/2011http://spectrum.ieee.org/computing/software/bots-get-smart #12;The main

  5. Pervasive properties of the genomic signature

    Microsoft Academic Search

    Robert W Jernigan; Robert H Baran

    2002-01-01

    BACKGROUND: The dinucleotide relative abundance profile can be regarded as a genomic signature because, despite diversity between species, it varies little between 50 kilobase or longer windows on a given genome. Both the causes and the functional significance of this phenomenon could be illuminated by determining if it persists on smaller scales. The profile is computed from the base step

  6. 1070-9908 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

    E-print Network

    Fardad, Makan

    Masazade, Member, IEEE, and Pramod K. Varshney, Fellow, IEEE Abstract--In this paper, a new sparsity-permissions@ieee.org. S. Liu, A. Vempaty, M. Fardad and P. K. Varshney are with the Department of Electrical Engineering and Computer Science, Syracuse University, Syra- cuse, NY, 13244 USA e-mail: {sliu17, avempaty, makan, varshney

  7. Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components

    PubMed Central

    Fragopoulos, Anastasios; Gialelis, John; Serpanos, Dimitrios

    2009-01-01

    Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers. PMID:19132095

  8. Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components.

    PubMed

    Fragopoulos, Anastasios; Gialelis, John; Serpanos, Dimitrios

    2009-01-01

    Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient's privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient's privacy, since there is selective and controlled access to medical data that sent toward the hospital's servers. PMID:19132095

  9. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 0, NO. 0, JANUARY 2000 1 Test Code Quality and Its Relation to Issue

    E-print Network

    Zaidman, Andy

    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 0, NO. 0, JANUARY 2000 1 Test Code Quality and Its Member, IEEE Computer Society and Andy Zaidman Member, IEEE Computer Society Abstract--Automated testing, Metrics, Measurement. ! 1 INTRODUCTION Software testing is well established as an essential part

  10. The pervasive role of biological cohesion in bedform development

    NASA Astrophysics Data System (ADS)

    Malarkey, Jonathan; Baas, Jaco H.; Hope, Julie A.; Aspden, Rebecca J.; Parsons, Daniel R.; Peakall, Jeff; Paterson, David M.; Schindler, Robert J.; Ye, Leiping; Lichtman, Ian D.; Bass, Sarah J.; Davies, Alan G.; Manning, Andrew J.; Thorne, Peter D.

    2015-02-01

    Sediment fluxes in aquatic environments are crucially dependent on bedform dynamics. However, sediment-flux predictions rely almost completely on clean-sand studies, despite most environments being composed of mixtures of non-cohesive sands, physically cohesive muds and biologically cohesive extracellular polymeric substances (EPS) generated by microorganisms. EPS associated with surficial biofilms are known to stabilize sediment and increase erosion thresholds. Here we present experimental data showing that the pervasive distribution of low levels of EPS throughout the sediment, rather than the high surficial levels of EPS in biofilms, is the key control on bedform dynamics. The development time for bedforms increases by up to two orders of magnitude for extremely small quantities of pervasively distributed EPS. This effect is far stronger than for physical cohesion, because EPS inhibit sand grains from moving independently. The results highlight that present bedform predictors are overly simplistic, and the associated sediment transport processes require re-assessment for the influence of EPS.

  11. Assessing Evidence for a Pervasive Alteration in Tropical Tree Communities

    Microsoft Academic Search

    Jérôme Chave; Richard Condit; Helene C Muller-Landau; Sean C Thomas; Peter S Ashton; Sarayudh Bunyavejchewin; Leonardo L Co; Handanakere S Dattaraja; Stuart J Davies; Shameema Esufali; Corneille E. N Ewango; Kenneth J Feeley; Robin B Foster; Nimal Gunatilleke; Savitri Gunatilleke; Pamela Hall; Terese B Hart; Consuelo Hernández; Stephen P Hubbell; Akira Itoh; Somboon Kiratiprayoon; James V LaFrankie; Suzanne Loo de Lao; Jean-Rémy Makana; Abdul Rahman Kassim; Cristián Samper; Raman Sukumar; Hebbalalu S Suresh; Sylvester Tan; Jill Thompson; Ma. Dolores C Tongco; Renato Valencia; Martha Vallejo; Gorky Villa; Takuo Yamakura; Jess K Zimmerman; Elizabeth C Losos

    2008-01-01

    In Amazonian tropical forests, recent studies have reported increases in aboveground biomass and in primary productivity, as well as shifts in plant species composition favouring fast-growing species over slow-growing ones. This pervasive alteration of mature tropical forests was attributed to global environmental change, such as an increase in atmospheric CO2 concentration, nutrient deposition, temperature, drought frequency, and\\/or irradiance. We used

  12. Early symptoms and recognition of pervasive developmental disorders in Germany.

    PubMed

    Noterdaeme, Michele; Hutzelmeyer-Nickels, Anna

    2010-11-01

    Pervasive developmental disorders are characterised by the presence of abnormalities in social interaction and communication as well as repetitive patterns of behaviours. Although early symptoms of the disorder often appear during the first two years of life, its diagnosis is often delayed. The purpose of this study is to analyse the delay between age at first symptoms and age at diagnosis as well as the characteristics of the first symptoms for the different subcategories of pervasive developmental disorders. The sample consists of 601 children with a diagnosis of a pervasive developmental disorder. Age at first symptoms, age at diagnosis and the type of the first problems are registered. The results show that children with autism show first symptoms at a mean age of 15 months whereas diagnosis is made at a mean age of 76 months. Children with Asperger's syndrome show first symptoms at a mean age of 26 months, while diagnosis is made at the mean age of 110 months. There is still a large delay between the age at which parents first report first symptoms and age at diagnosis. To improve early detection, systematic screening and training of primary care paediatricians should be implemented. PMID:20923894

  13. IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 56, NO. 12, DECEMBER 2008 6017 Quantized Multimode Precoding in Spatially

    E-print Network

    Veeravalli, Venugopal

    . Veeravalli, Fellow, IEEE, and Akbar M. Sayeed, Senior Member, IEEE Abstract--Multimode precoding, where. M. Sayeed is with the Department of Electrical and Computer Engi- neering, University of Wisconsin

  14. A comparison of three rounding algorithms for IEEE oating-point multiplication.

    E-print Network

    Seidel, Peter-Michael

    1 A comparison of three rounding algorithms for IEEE oating-point multiplication. Guy Even and Peter-M. Seidel Abstract| A new IEEE compliant oating-point round- ing algorithm for computing., and 16 logic levels in the algorithm of Yu and Zyner. Keywords| oating-point arithmetic, IEEE 754

  15. Pervasive and Non-Pervasive Conduct Problems in a Clinic Sample Aged 4-8 Years: Child, Family and Day-Care/School Factors

    ERIC Educational Resources Information Center

    Drugli, May Britt; Larsson, Bo; Clifford, Graham; Fossum, Sturla

    2007-01-01

    Differences between pervasive (home and day-care/school) versus non-pervasive (home only) conduct problems were examined in regard to various child, parent/family, and day-care/school characteristics in an outpatient clinic sample of 120 children aged 4-8 years. All children scored above the 90th percentile on the Eyberg Child Behavior Inventory…

  16. Geometry, to appear in 1991. [To92] Toussaint, G. T., ed., Proceedings of the IEEE, Special Issue on Computational Geo-

    E-print Network

    Toussaint, Godfried T.

    Geometry, Berkeley, 1990, pp. 211-215. [Sh78] Shamos, M. I., "Computational geometry," Ph.D. thesis, Yale., Computational Geometry, North-Holland, 1985. [To88a] Toussaint, G. T., ed., Computational Morphology, North-Holland, 1988. [To88b] Toussaint, G. T., ed., The Visual Computer, Special Issue on Computational Geometry, vol

  17. Distributed Weight Balancing over Digraphs Apostolos I. Rikos, Member, IEEE, Themistoklis Charalambous, Member, IEEE, and

    E-print Network

    Hadjicostis, Christoforos

    Distributed Weight Balancing over Digraphs Apostolos I. Rikos, Member, IEEE, Themistoklis-balance Apostolos I. Rikos is with the Department of Electrical and Computer Engineering at the University of Cyprus

  18. 14 May/June 2011 Published by the IEEE Computer Society 0272-1716/11/$26.00 2011 IEEE Visualization Viewpoints

    E-print Network

    McDonnell, Kevin

    --verbal and nonverbal feedback elicited from the sender or receiver, replication--one person understanding what Visualization Viewpoints Editor: Theresa-Marie Rhyne Can Computers Master the Art of Communication? A Focus of the domain model. Obviously, the better a communicator the com- puter is, the more assistance it will elicit

  19. c 2012 IEEE. 2012 27th Annual ACM/IEEE Symposium on Logic in Computer Science The Complete Proof Theory of Hybrid Systems

    E-print Network

    Platzer, André

    Theory of Hybrid Systems Andr´e Platzer Computer Science Department Carnegie Mellon University Pittsburgh, USA aplatzer@cs.cmu.edu Abstract--Hybrid systems are a fusion of continuous dynamical systems, it has often been claimed that hybrid systems are more challenging than continuous dynamical systems

  20. c 2009 IEEE. Pre-print, with permission from IEEE Transactions on Visualization and Computer Graphics, to appear Efficient and Accurate Sound Propagation Using

    E-print Network

    North Carolina at Chapel Hill, University of

    acoustic analysis for architectural design [27]. Nu- merical simulation can provide this realism most at least a hundred-fold performance gain compared to a standard Finite Difference Time Domain (FDTD on a desktop computer. Our work thus enables acoustic analysis on large scenes and auditory display for complex

  1. 60 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES 1540-7993/11/$26.00 2011 IEEE MAY/JUNE 2011 On the Horizon

    E-print Network

    Evans, David

    current understanding of computer security: metrics. Cybersecurity Metrics Despite Lord Kelvin's oft scientifically and making practical decisions are difficult. Metrics can be either analytical or experimen- tal metrics for objec- tively comparing and evaluating the security of system designs and organizations

  2. 2116 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 26, NO. 12, DECEMBER 2007 A Piecewise-Linear Moment-Matching Approach to

    E-print Network

    Daniel, Luca

    examples which contain distributed strong nonlinearities: a diode transmission line, a microelectromechanical switch, and a pulse-narrowing nonlinear transmission line. In most cases, we are able Nonlinear Systems Bradley N. Bond, Student Member, IEEE, and Luca Daniel, Member, IEEE Abstract--This paper

  3. IEEE TRANSACTIONS ON MOBILE COMPUTING, TMC-0168-0605.R2 1 SoftMAC: Layer 2.5 Collaborative MAC

    E-print Network

    Minnesota, University of

    LAN) and Ethernet. Index Terms--Wireless Networks, Media Access Control (MAC), Layer 2.5, Multimedia. Without carefully controlling traffic volume to reduce colli- sion, a multi-hop wireless network with DCF for Multimedia Support in Multi-hop Wireless Networks Haitao Wu, Member, IEEE, Yunxin Liu, Member, IEEE, Qian

  4. ALiCE: A Java-based Grid Computing System

    E-print Network

    Teo, Yong Meng

    A computational grid is a hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities. This talk is divided into three parts. Firstly, ...

  5. Ileal-lymphoid-nodular hyperplasia, non-specific colitis, and pervasive developmental disorder in children

    E-print Network

    Chapman, Michael S.

    Ileal-lymphoid-nodular hyperplasia, non-specific colitis, and pervasive developmental disorder intestinal abnormalities, ranging from lymphoid nodular hyperplasia to aphthoid ulceration. Histology showed

  6. IEEE Builds Better Young Professionals

    E-print Network

    #12;IEEE New Directions #12;Standards knowledge Standards in Education Grants Undergrad and grad $500" Standards in Education Grants Undergrad and grad $500 student/ $300 faculty advisor "gr companies · 6 of the top 7 Computer Services companies Universities · All of the top 100 engineering schools

  7. Geometry, to appear in 1991. [To92] Toussaint, G. T., ed., Proceedings of the IEEE, Special Issue on Computational Geo

    E-print Network

    Toussaint, Godfried T.

    Geometry, Berkeley, 1990, pp. 211­215. [Sh78] Shamos, M. I., ``Computational geometry,'' Ph.D. thesis, Yale] Toussaint, G. T., ed., Computational Geometry, North­Holland, 1985. [To88a] Toussaint, G. T., ed on Computational Geometry, vol. 3, No. 6, May 1988. [To89] Toussaint, G. T., ``Computing geodesic properties

  8. To appear in Empirical Evaluation Techniques in Computer Vision, K.W. Bowyer and P.J. Phillips, eds, IEEE Computer Society Press, Los Alamitos, CA, 1998.

    E-print Network

    Bowyer, Kevin W.

    To appear in Empirical Evaluation Techniques in Computer Vision, K.W. Bowyer and P.J. Phillips, eds of Computer Vision Algorithms Kevin W. Bowyer1 and P. Jonathon Phillips2 1 Department of Computer Science of Standards and Technology Gaithersburg, MD 20899, USA jonathon@nist.gov 1: Introduction Computer vision

  9. IEEE: Power Electronics Society (PELS)

    NSDL National Science Digital Library

    IEEE's Power Electronics Society (PELS) "helps in the development and effective application of power electronics technology." Power electronics is definted as "the application of electronic circuits to energy conversion," which is used "everywhere you look," including in computers automobiles, telecommunications, space systems and satellites motors, lighting, and alternative energy. The PELS newsletter is available free online, but the bimonthly series of peer-reviewed papers (the IEEE Transactions on Power Electronics) is for members only. The website also provide some background information on the main areas of power electronics research and states that volunteers will respond to questions about power electronics. Information on PESL conferences and workshops is also provided.

  10. IEEE Robotics & Automation Magazine42 1070-9932/08/$25.002008 IEEE SEPTEMBER 2008 Series Compliance for

    E-print Network

    Hurst, Jonathan

    computer numeric control (CNC) machining, robotic weld- ing, painting, and pick-and-place circuit boardIEEE Robotics & Automation Magazine42 1070-9932/08/$25.00ª2008 IEEE SEPTEMBER 2008 Series Compliance for an Efficient Running Gait M any robots excel at precise position- ing and trajectory tracking

  11. IEEE TRANSACTIONS ON DEVICE AND MATERIALS RELIABILITY, VOL. 8, NO. 1, MARCH 2008 35 Defect Generation in p-MOSFETs Under

    E-print Network

    Alam, Muhammad A.

    of Technology Bombay, Mumbai 400076, India. M. A. Alam is with the School of Electrical Engineering and Computer Member, IEEE, and Muhammad Ashraful Alam, Fellow, IEEE (Invited Paper) Abstract--In this paper, a focused

  12. 2580 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 12, DECEMBER 2000 A QoS-Aware Multicast Routing Protocol

    E-print Network

    Chen, Shigang

    S-Aware Multicast Routing Protocol Shigang Chen, Member, IEEE, Klara Nahrstedt, Member, IEEE, and Yuval Shavitt. Nahrstedt is with the Department of Computer Science, University of Illi- nois at Urbana-Champaign, Urbana

  13. 1130 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 20, NO. 6, DECEMBER 2012 Fuzzy c-Means Algorithms for Very Large Data

    E-print Network

    Havens, Timothy

    Leckie, Lawrence O. Hall, Fellow, IEEE, and Marimuthu Palaniswami, Fellow, IEEE Abstract--Very large (VL, Australia (e-mail: jcbezdek@gmail.com). C. Leckie is with the Department of Computer Science and Software En

  14. IEEE TRANSACTIONS ON ELECTRON DEVICES, VOL. 53, NO. 9, SEPTEMBER 2006 2243 The Effect of Spacer Thicknesses on Si-Based

    E-print Network

    M. Heyns, Paul R. Berger, Senior Member, IEEE, and Phillip E. Thompson, Senior Member, IEEE Abstract, Columbus, OH 43210 USA. R. M. Heyns was with the Department of Electrical and Computer Engi- neering, Ohio

  15. 104 IEEE TRANSACTIONS ON NANOBIOSCIENCE, VOL. 2, NO. 2, JUNE 2003 A Hybrid Numerical Method to Compute Erythrocyte

    E-print Network

    Sheen, Dongwoo

    to Compute Erythrocyte TMP in Low-Frequency Electric Fields Changjun Liu*, Dongwoo Sheen, and Kama Huang method to compute the transmembrane potential (TMP) of an erythrocyte in a low-frequency electric field. We compute an in vitro erythrocyte's TMP induced by external electric fields by this hybrid method

  16. IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 6, JUNE 2014 3359 Secure Degrees of Freedom of One-Hop

    E-print Network

    Ulukus, Sennur

    IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 6, JUNE 2014 3359 Secure Degrees of Freedom and Computing 2012 and the 2013 IEEE International Symposium on Information Theory. The authors of One-Hop Wireless Networks Jianwei Xie, and Sennur Ulukus, Member, IEEE Abstract--We study the secure

  17. 1772 IEEE PHOTONICS TECHNOLOGY LETTERS, VOL. 16, NO. 7, JULY 2004 Demonstration of Variable-Length Packet Contention

    E-print Network

    Kolner, Brian H.

    , Student Member, IEEE, Haijun Yang, Student Member, IEEE, Zuqing Zhu, Student Member, IEEE, Jing Cao, J. Cao, V. Akella, and S. J. B. Yoo are with the Department of Electrical and Computer Engineering was supported in part by the National Science Foundation (NSF) under Grant ANI-998665. Z. Pan, H. Yang, Z. Zhu

  18. Human-in-the-loop: rethinking security in mobile and pervasive systems

    Microsoft Academic Search

    Vassilis Kostakos; Eamonn O'Neill

    2008-01-01

    In this paper we argue that pervasive systems introduce human-driven security vulnerabilities that traditional usability design cannot address. We claim that there is a need to understand better the appropriate role of humans in the context of pervasive systems security, and to develop quantifiable and measurable concepts that describe humans and their relationship with our systems. Here, we highlight mobility

  19. Pervasive Rehabilitation of Aphasia with an eXtensible Interactive System

    E-print Network

    Boyer, Edmond

    PRAXIS: Pervasive Rehabilitation of Aphasia with an eXtensible Interactive System Phase I: Design Rehabilitation of Aphasia with an eXtensible Interactive System: Phase I (PRAXIS) Supervisors: Mr. Mikael. _____________________ Kiernan Burke Date: #12;iii ABSTRACT PRAXIS: Pervasive Rehabilitation of Aphasia with an e

  20. Genetic architecture of complex traits: Large phenotypic effects and pervasive epistasis

    E-print Network

    Broman, Karl W.

    Genetic architecture of complex traits: Large phenotypic effects and pervasive epistasis Haifeng distinct loci were found. Second, strong epistasis was found among the individual chromosomes. Specifically that strong, pervasive epistasis may reflect the presence of several phenotypically-buff- ered physiological

  1. Hardware development for pervasive healthcare systems: Current status and future directions

    Microsoft Academic Search

    Amit Acharyya; Koushik Maharatna; Bashir M. Al-Hashimi

    2008-01-01

    This paper surveys ongoing research for pervasive healthcare system development, highlights the associated technical challenges and outlines some possible future topics that require innovative research. We present a conceptual high level system overview for pervasive healthcare including a resource constrained architecture for extracting fetal electrocardiogram from maternal composite abdominal signal as a case study.

  2. A Middleware Support for Agent-Based Application Mobility in Pervasive Environments

    Microsoft Academic Search

    Yu Zhou; Jiannong Cao; Vaskar Raychoudhury; Joanna Izabela Siebert; Jian Lu

    2007-01-01

    Application mobility is an efficient way to mask uneven conditioning and reduce users' distractions in pervasive environments. However, since mobility brings more dynamism and uncertainty, it also raises new research issues in developing pervasive applications, including underlying application models, adaptive resource rebinding mechanisms, synchronization and fault tolerance techniques, etc. In this paper, we approach these problems from the middleware perspective.

  3. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2006 211 Microfluidics-Based Biochips: Technology

    E-print Network

    Chakrabarty, Krishnendu

    , FEBRUARY 2006 211 Microfluidics-Based Biochips: Technology Issues, Implementation Platforms, and Design, Fellow, IEEE Abstract--Microfluidics-based biochips are soon expected to revolutionize clinical diagnosis microfluidics offers a scalable system architecture and dynamic reconfigurability; groups of unit cells

  4. IEEE Global History Network

    NSDL National Science Digital Library

    The Institute of Electrical and Electronics Engineers (IEEE) is an industry organization, and its Global History Network (GHN) is a wiki that "fosters the creation of narratives that not only document the history engineering practice but also explain when, how and why these myriad of technologies developed as they did." The homepage of the website for GHN has an "innovation map" and an "interactive timeline", as well as eight rotating featured concepts prominently displayed near the top of the homepage. Visitors should definitely check out the "Innovation Map", which shows what events happened, where, and when, such as the industrialization and commercialization of photovoltaic cells in Japan in 1959. The eight rotating featured concepts have included "Ancient Computers", "Cryptography", and "Memristors" which are resistors with memory. The menu across the top of any page contains the guts of the site, including "Oral Histories" of the most prominent people in the profession, "IEEE Stars", peer-reviewed articles, and "Topic Articles" which has "broad articles on a specific topic" which IEEE members and invited guests can create or modify.

  5. Withdrawal Study of Memantine in Pediatric Patients With Autism, Asperger's Disorder, or Pervasive Developmental Disorder Not Otherwise Specified Previously Treated With Memantine

    ClinicalTrials.gov

    2013-10-31

    Autism Spectrum Disorder (ASD); Autism; Autistic Disorder; Asperger's Disorder; Asperger's; Pediatric Autism; Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS); Pervasive Child Development Disorder

  6. IEEE Network July/August 201356 0890-8044/13/$25.00 2013 IEEE he cloud has long been envisioned as the next gener-

    E-print Network

    Hou, Y. Thomas

    of elastic resources [1]. In this emerging computing platform, the cloud provider, application developers Polytechnic Institute and State University Abstract Cloud computing is envisioned as the next generationIEEE Network · July/August 201356 0890-8044/13/$25.00 © 2013 IEEE he cloud has long been envisioned

  7. 12 PERVASIVE computing Published by the IEEE CS n 1536-1268/12/$31.00 2012 IEEE G u e s t e d i t o r s ' i n t r o d u c t i o n

    E-print Network

    'll take a cue from the earliest pre-mobile-phone days of ubicomp, when office phones rang for people who played across di- verse platforms. Players use interactive tables, mobile phones, smart badges essen- tially any proximate appliance or interface. We witnessed the beginning

  8. Published by the IEEE CS n 1536-1268/13/$31.00 2013 IEEE PERVASIVE computing 17 T r a c k i n g a n d S e n S i n g i n T h e W i l d

    E-print Network

    Hazas, Mike

    understanding of the underlying principles and point to dedi- cated studies of particular aspects of pedestrian localization and mapping (SLAM), and integration with GPS. Despite the increasing popularity of PDR meth- ods principles to es- timate step-by-step positions, using a (digi- tal) compass to measure the heading

  9. Simulating the pervasive fracture and fragmentation of materials and structures using randomly close-packed Voronoi tessellations

    Microsoft Academic Search

    Joseph E

    2008-01-01

    Under extreme loading conditions most often the extent of material and structural fracture is pervasive in the sense that a multitude of cracks are nucleating, propagating in arbitrary directions, coalescing, and branching. Pervasive fracture is a highly nonlinear process involving complex material constitutive behavior, material softening, localization, surface generation, and ubiquitous contact. Two primary applications in which pervasive fracture is

  10. Pervasive developmental disorder, not otherwise specified: primary care perspectives.

    PubMed

    Cascio, R S; Kilmon, C A

    1997-07-01

    Pervasive developmental disorder, not otherwise specified (PDD, NOS), a developmental-neurologic spectrum disorder, occurs in 10 to 12 of every 10,000 children. PDD, NOS is characterized by a spectrum of significant problems that may vary substantially in range and expression. These may include visual/spatial, kinesthetic, verbal/linguistic, and musical/rhythmic problems. Social skill deficits are also common, as are restricted, repetitive patterns of behavior, interests, and activities. Symptoms of PDD, NOS are often expressed differently among children with the disorder and can be mistakenly attributed to other problems such as attention deficits, oppositional behavior, or stress reactions. Clinicians may encounter children in their practice who exhibit symptoms of PDD, NOS and must be familiar with this disorder so that appropriate diagnosis and treatment can be provided. Families also need ongoing, anticipatory guidance to help them cope with the behavioral aspects of the disorder. PMID:9253013

  11. Cascading Policies Provide Fault Tolerance for Pervasive Clinical Communications

    PubMed Central

    Williams, Rose; Jalan, Srikant; Stern, Edie; Lussier, Yves A.

    2010-01-01

    We implemented an end-to-end notification system that pushed urgent clinical laboratory results to Blackberry 7510 devices over the Nextel cellular network. We designed our system to use user roles and notification policies to abstract and execute clinical notification procedures. We anticipated some problems with dropped and non-delivered messages when the device was out-of-network, however, we did not expect the same problems in other situations like device reconnection to the network. We addressed these problems by creating cascading “fault tolerance” policies to drive notification escalation when messages timed-out or delivery failed. This paper describes our experience in providing an adaptable, fault tolerant pervasive notification system for delivering secure, critical, time-sensitive patient laboratory results. PMID:21243107

  12. Epidemiology of autistic disorder and other pervasive developmental disorders.

    PubMed

    Fombonne, Eric

    2005-01-01

    Is the incidence of autistic disorder and other pervasive developmental disorders (PDDs) increasing? Recent epidemiological surveys of autistic disorder and other PDDs have heightened awareness of and concern about the prevalence of these disorders; however, differences in survey methodology, particularly changes in case definition and case identification over time, have made comparisons between surveys difficult to perform and interpret. Recent surveys suggest that the rate of all PDDs is about 60 per 10,000. The prevalence of autism today is estimated at 13 per 10,000, Asperger's disorder is approximately 3 per 10,000, and childhood disintegrative disorder is very rare at about 0.2 per 10,000. The assessment process, sample size, publication year, and geographic location of studies all have an effect on prevalence estimates. In addition, data from many of these surveys indicate correlates of autistic disorder and other PDDs with IQ, gender, and other medical disorders. PMID:16401144

  13. The molecular basis of cognitive deficits in pervasive developmental disorders

    PubMed Central

    Bhattacharya, Aditi; Klann, Eric

    2012-01-01

    Persons with pervasive developmental disorders (PDD) exhibit a range of cognitive deficits that hamper their quality of life, including difficulties involving communication, sociability, and perspective-taking. In recent years, a variety of studies in mice that model genetic syndromes with a high risk of PDD have provided insights into the underlying molecular mechanisms associated with these disorders. What is less appreciated is how the molecular anomalies affect neuronal and circuit function to give rise to the cognitive deficits associated with PDD. In this review, we describe genetic mutations that cause PDD and discuss how they alter fundamental social and cognitive processes. We then describe efforts to correct cognitive impairments associated with these disorders and identify areas of further inquiry in the search for molecular targets for therapeutics for PDD. PMID:22904374

  14. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 89 Computing Blocking Probabilities in Multiclass

    E-print Network

    . S. Ramesh was with the Department of Computer Science, North Carolina State University, Raleigh, NCIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 89 Computing Blocking Probabilities in Multiclass Wavelength-Routing Networks With Multicast Calls Sridhar Ramesh

  15. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 6, NO. 2, APRIL 2002 105 Partial Abductive Inference in Bayesian Belief

    E-print Network

    de Campos, Luis M.

    -Specific Genetic Operators Luis M. de Campos, José A. Gámez, and Serafín Moral Abstract--Abductive inference networks, evolutionary computation, genetic operators, most probable explanation, probabilistic reasoning with uncertain reasoning because they required too complex a specification and computation. Never- theless

  16. IEEE History Center

    NSDL National Science Digital Library

    The Institute of Electrical and Electronics Engineers (IEEE) History Center functions "to preserve, research and promote the history of information and electrical technologies." There are many resources on the center's Web site that provide an excellent perspective into some of the original breakthroughs in electrical design and the more recent advancements in computer technology. Historical articles and list of frequently asked questions are given on the site, as well as many transcripts of interviews with influential people of the industry. A Milestones section highlights 45 of the most groundbreaking achievements around the world. Every day, a new electrical engineering-related anniversary is presented on the homepage.

  17. Preprint of a paper to appear in IEEE Computer, Vol. 27, October, 1994 Threedimensional Optical Interconnects for Highdensity Chiptochip and

    E-print Network

    Louri, Ahmed

    on the proposed embedding methodology using computer generated holograms. 2 #12; Contents 1 Introduction 6 1.1 Why Optics for Interconnects? : : : : : : : : : : : : : : : : : : : : : : : : : : : : 8 1.2 Types of Optical

  18. IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 11, NOVEMBER 2011 3051 Computing Steerable Principal Components of a

    E-print Network

    Singer, Amit

    this by pointing out the block circulant struc- ture of the covariance matrix and utilizing that structure to com in a set of images. PCA is typically computed as the singular value decomposi- tion (SVD) of the data

  19. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 5, NO. 5, OCTOBER 2001 1 Guest Editorial: Agent-Based Modelling of

    E-print Network

    Tesfatsion, Leigh

    of technological innovations. The recent advent of powerful new computational tools, in particular the development or old wine in new bottles? Under what con- 1The ACE Web site [1] provides extensive resources related

  20. Computational Systems School COMSC

    E-print Network

    Martin, Ralph R.

    . · Write, test and debug simple assembly language programs. How the module will be delivered Students calculations. · Simple assembly language programming. How the module will be assessed The essay, particularly multi-core architectures and ubiquitous and pervasive aspects of computing. Module Code CMT102

  1. IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 8, NO. 11, NOVEMBER 1999 1593 Data Assimilation in Large

    E-print Network

    Moura, José

    in Large Time-Varying Multidimensional Fields Amir Asif, Member, IEEE, and Jos´e M. F. Moura, Fellow, IEEE-mail: asif@techbc.ca). J. M. F. Moura is with the Department of Electrical and Computer Science and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213-3890 USA (e-mail: moura

  2. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 1 Real-Time Computerized Annotation of Pictures

    E-print Network

    Chang, Edward Y.

    of Pictures Jia Li, Senior Member, IEEE, and James Z. Wang, Senior Member, IEEE Abstract-- Developing effective methods for automated annota- tion of digital pictures continues to challenge computer scientists. The capability of annotating pictures by computers can lead to breakthroughs in a wide range of applications

  3. Human-computer interaction in ubiquitous computing environments

    Microsoft Academic Search

    Jemal H. Abawajy

    2009-01-01

    Purpose – The purpose of this paper is to explore characteristics of human-computer interaction when the human body and its movements become input for interaction and interface control in pervasive computing settings. Design\\/methodology\\/approach – The paper quantifies the performance of human movement based on Fitt's Law and discusses some of the human factors and technical considerations that arise in trying

  4. Usage Management in Cloud Computing

    Microsoft Academic Search

    Pramod A. Jamkhedkar; Christopher C. Lamb; Gregory L. Heileman

    2011-01-01

    User concerns regarding data handling within the cloud will gain increasing importance as cloud computing becomes more pervasive. Existing service level agreement (SLA) frameworks are not designed for flexibly handling even relatively straightforward usage policies. This paper introduces the notion and importance of usage management in cloud computing. It provides an analysis of features and challenges involved in deploying a

  5. Computer forensics laboratory and tools

    Microsoft Academic Search

    Guillermo A. Francia; Keion Clinton

    2005-01-01

    The pervasiveness and the convenience of information technology tend to make most of society deeply dependent on the availability computers and network systems. As our reliance on such systems grows, so does our exposure to its vulnerabilities. Day after day, computers are being attacked and compromised. These attacks are made to steal personal identities, to bring down an entire network

  6. 1077-2626/13/$31.00 2013 IEEE Published by the IEEE Computer Society Accepted for publication by IEEE. 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, includ

    E-print Network

    Andrzejak, Artur

    .g. pelvic bone) from 2D X-ray images. For that purpose, shape and density of a tetrahedral mesh are varied like computed tomography (CT) or magnetic resonance imaging (MRI), traditional 2D X-ray projections (in the following only called X-ray images or X-rays) are widely used for diagnosis or treatment planning

  7. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 5, SEPTEMBER 2007 3111 Selection of a Forwarding Area for Contention-Based

    E-print Network

    Deng, Jing

    , IEEE, Jing Deng, Member, IEEE, and Pramod K. Varshney, Fellow, IEEE Abstract and P. K. Varshney are with the Department of Electrical Engi- neering and Computer Science, Syracuse University, Syracuse, NY 13244 USA (e-mail: dchen02@syr.edu; varshney@syr.edu). J. Deng

  8. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS--I: REGULAR PAPERS, VOL. 51, NO. 11, NOVEMBER 2004 2133 Radix-Based Digital Calibration Techniques for

    E-print Network

    Moon, Un-Ku

    , Member, IEEE, Jipeng Li, Member, IEEE, and Un-Ku Moon, Senior Member, IEEE Abstract--This paper describes phases to do the job. These methods imply slower conversion speed and increased Manuscript received (e-mail: jipeng.li@nsc.com). U. Moon is with the School of Electrical Engineering and Computer

  9. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. 3, NO. 3, JULY-SEPTEMBER 1997 273 Converting Discrete Images

    E-print Network

    Subramanian, Kalpathi R.

    Planning Computer assisted virtual surgery allows rehearsals of an upcoming surgery. For this, the portion of the anatomy that relates to the surgery is first imaged (using CT, MRI, etc.) and a model reconstructed using be the ability to record a virtual surgery for later playback. Finally, tools should be provided to evaluate each

  10. Appearing in IEEE Symposium on Computer Arithmetic (ARITH18, 2007), June 2527, 2007 Optimistic Parallelization of Floating-Point

    E-print Network

    DeHon, André

    Parallelization of Floating-Point Accumulation Nachiket Kapre Computer Science California Institute of Technology of Pennsylvania Philadelphia, PA 19104 andre@acm.org Abstract-- Floating-point arithmetic is notoriously non in the available precision. The resulting cyclic dependency in floating-point ac- cumulation inhibits

  11. Efficient Morse Decompositions of Vector Fields Guoning Chen, Konstantin Mischaikow, Robert S. Laramee, Member, IEEE Computer Society, and

    E-print Network

    Chen, Guoning

    on -maps, which include the use of forward and backward mapping techniques and an adaptive approach in constructing better approximations of the images of the triangles in the meshes used for simulation topology has important applications in Computational Fluid Dynamics (CFD) [15], weather prediction, tsunami

  12. 438 IEEE TRANSACTIONS ON EDUCATION, VOL. 48, NO. 3, AUGUST 2005 Computer-Based Instruction on Multimedia

    E-print Network

    Reisslein, Martin

    that the graphical representation results in statistically significantly higher student performance on practice and post-test problems, shorter learning time, and more positive attitudes toward the computer- based; revised February 1, 2005. J. Reisslein is with the Division of Psychology in Education, Arizona State

  13. IEEE Transactions in Evolution Computation, 5, 93-101, 2001 This paper describes different types of models for the

    E-print Network

    Cangelosi, Angelo

    , symbols, and words for the analysis of evolutionary models of language. In particular, it show how on the emergence of symbol-symbol relationships in evolved languages. Finally, computational models of syntax will help understanding the role of symbols and symbol acquisition in the origin of language. Index Terms

  14. In IEEE conference on Computer Vision and Pattern Recognition (CVPR), Minneapolis, June 2007 p.1 Global Optimization for Shape Fitting

    E-print Network

    Kazhdan, Michael

    high memory cost of graph cuts when comput- ing globally optimal surfaces at high-resolution. Our re to noise, outliers, missing parts, and varying sampling density. 1. Introduction This paper develops a global optimization approach to 3D reconstruction from sparse points containing noise, out- liers

  15. INTERNALTIONAL IEEE CONFERENCE ON COMPUTER SCIENCES -RIVF'06 1 On-line Boosting for Car Detection from Aerial

    E-print Network

    Grabner, Helmut

    car detection from aerial images. The system exploits a robust machine learning method known as boosting for efficient car detection from high resolution aerial images. We propose to use on-line boosting, computer vision, object detection, car detection, aerial image, UltraCamD. I. INTRODUCTION RECENT years

  16. IEEE Workshop on Applications of Computer Vision 3-4 December, 2002, Orlando FL Monocular, Vision Based, Autonomous Refueling System

    E-print Network

    Farag, Aly A.

    . The CCD camera (PULNiX 9700), mounted on the robot's wrist (Figure 1.), provides the sense of vision of very fast filtering and segmenting algorithms, as well as moment's computation. A robotic arm with 6 high-level commands, connects a supercomputing machine and the robot's controller. A practical setup

  17. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 9, NO. 3, AUGUST 2013 1613 QoS-Driven Reconfigurable Parallel Computing for

    E-print Network

    De Micheli, Giovanni

    C services, the runtime QoS middleware API and our ocMPI library and its tracing support which has beenC), parallel computing, quality of service (QoS), runtime reconfiguration. I. INTRODUCTION I N the past, due be affected due to congestion, and therefore parallel programming stacks must be assisted by quality-of-service

  18. IEEE TRANSACTIONS ON COMPUTERS, VOL. c-28, NO. 12, DECEMBER 1979 A Model of SIMD Machines and a Comparison

    E-print Network

    -Algorithmcorrectness, array processors, computer architecture, Illiac IV, interconnection networks, n-cube array, parallel bycomputer architects (e.g., [11]). The five networks evaluated here were chosen because they form the basis as cost and hardware complexity. Therefore, architects must consider the ability of the interconnection

  19. IEEE TRANSACTIONS ON COMPUTERS, VOL. XX, NO. XX, MONTH 200X 2 Group Key Agreement Efficient in

    E-print Network

    Tsudik, Gene

    and well-suited for high-delay networks. Index Terms security, group key agreement, group communication advances in computing power have not been matched by a decrease in network communication delay. Thus, communication latency, especially in high-delay long-haul networks, is increasingly dominating the key setup

  20. IEEE TRANSACTIONS ON COMPUTERS, VOL. XX, NO. XX, MONTH 200X 2 Group Key Agreement Efficient in

    E-print Network

    Perrig, Adrian

    and well­suited for high­delay networks. Index Terms security, group key agreement, group communication advances in computing power have not been matched by a decrease in network communication delay. Thus, communication latency, especially in high­delay long­haul networks, is increasingly dominating the key setup

  1. IEEE TRANSACTIONS ON COMPUTERS, TC-2009-10-0520.R1 1 Caches and Predictors for Real-time,

    E-print Network

    Burtscher, Martin

    -time, Unobtrusive, and Cost-Effective Program Tracing in Embedded Systems Aleksandar Milenkovi, Vladimir Uzelac, Milena Milenkovi, Martin Burtscher Abstract--The increasing complexity of modern embedded computer in real-time. Index Terms--Compression Technologies, Real-time and Embedded Systems, Testing and Debugging

  2. Appears in the Proceedings of the 7 IEEE Intnl. Symposium on High Performance Distributed Computing (HPDC 1998)1

    E-print Network

    Liu, Pangfeng

    Corporation P. O. Box 29257 Los Angeles, CA 90009 raghu@aero.org Abstract Heterogeneous network-based systems be capable of #12;adapting to changing system conditions. In this paper, we develop communication techniques Computing (HPDC 1998)1 Adaptive Communication Algorithms for Distributed Heterogeneous Systems Prashanth B

  3. To appear in Proceedings of the Fourth Workshopon Workstation Operating Systems, IEEE Computer Society, October 1993. Ubiquitous Mobile Host Internetworking

    E-print Network

    Johnson, David B.

    [6] networking support for ``mobile hosts'' in the Internet [1, 2, 3, 4, 9, 10, 11]. However, IP host and computational power, and mobile host users may equally well want to connect their machines to the Internet using that there is nothing ``special'' about a mobile host; every host on the Internet should be a ``mobile capable'' host

  4. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced. PMID:18487810

  5. Design-in-play: improving the variability of indoor pervasive games

    Microsoft Academic Search

    Bin Guo; Ryota Fujimura; Daqing Zhang; Michita Imai

    Treasure is a pervasive game playing in the context of people’s daily living environments. Unlike previous pervasive games\\u000a that are based on the predefined contents and proprietary devices, Treasure exploits the “design-in-play” concept to enhance\\u000a the variability of a game in mixed-reality environments. Dynamic and personalized role design and allocation by players is\\u000a enabled by exploring local smart objects as

  6. Pervasive Learning--Using Games to Tear down the Classroom Walls

    ERIC Educational Resources Information Center

    Pløhn, Trygve

    2014-01-01

    Pervasive gaming is a new and emerging gaming genre where the physical and social aspects of the real world are integrated into the game and blends into the player's everyday life. Given the nature of pervasive games, it may be possible to use that type of game as a tool to support learning in a university course by providing a gameplay where…

  7. Learning from failure in health care: frequent opportunities, pervasive barriers

    PubMed Central

    Edmondson, A

    2004-01-01

    The notion that hospitals and medical practices should learn from failures, both their own and others', has obvious appeal. Yet, healthcare organisations that systematically and effectively learn from the failures that occur in the care delivery process, especially from small mistakes and problems rather than from consequential adverse events, are rare. This article explores pervasive barriers embedded in healthcare's organisational systems that make shared or organisational learning from failure difficult and then recommends strategies for overcoming these barriers to learning from failure, emphasising the critical role of leadership. Firstly, leaders must create a compelling vision that motivates and communicates urgency for change; secondly, leaders must work to create an environment of psychological safety that fosters open reporting, active questioning, and frequent sharing of insights and concerns; and thirdly, case study research on one hospital's organisational learning initiative suggests that leaders can empower and support team learning throughout their organisations as a way of identifying, analysing, and removing hazards that threaten patient safety. PMID:15576689

  8. [Differential diagnosis between pervasive developmental disorder and schizophrenia].

    PubMed

    Ishii, Takashi

    2007-03-01

    Differential diagnosis between schizophrenia and pervasive developmental disorder (PDD) including Asperger's syndrome, needs evaluation of apparently similar symptoms among the two disorders and careful collection of information about developmental history of each patient. Some conditions that have been traditionally regarded as schizophrenia, seem to have overlapping parts with those of PDD. An example of them is schizophrenia--like symptoms observed occasionally in individuals with PDD. The relationship of the two disorders remains to be investigated. I present a case of an adolescent with early symptoms of schizophrenia, in whom there seems to have been PDD symptoms in his early childhood. The issue of the differential diagnosis of the two disorders is discussed on the basis of the case. It is sometimes difficult to diagnose PDD in mildest cases in adolescence or adulthood, presumably because they show subtle symptoms in their early childhood in terms of interpersonal relationships and caretakers of them are likely to fail to recognize their problems, which may cause difficulty in sufficient collection of information about their early childhood. PMID:17354565

  9. Pervasive genetic integration directs the evolution of human skull shape.

    PubMed

    Martínez-Abadías, Neus; Esparza, Mireia; Sjøvold, Torstein; González-José, Rolando; Santos, Mauro; Hernández, Miquel; Klingenberg, Christian Peter

    2012-04-01

    It has long been unclear whether the different derived cranial traits of modern humans evolved independently in response to separate selection pressures or whether they resulted from the inherent morphological integration throughout the skull. In a novel approach to this issue, we combine evolutionary quantitative genetics and geometric morphometrics to analyze genetic and phenotypic integration in human skull shape. We measured human skulls in the ossuary of Hallstatt (Austria), which offer a unique opportunity because they are associated with genealogical data. Our results indicate pronounced covariation of traits throughout the skull. Separate simulations of selection for localized shape changes corresponding to some of the principal derived characters of modern human skulls produced outcomes that were similar to each other and involved a joint response in all of these traits. The data for both genetic and phenotypic shape variation were not consistent with the hypothesis that the face, cranial base, and cranial vault are completely independent modules but relatively strongly integrated structures. These results indicate pervasive integration in the human skull and suggest a reinterpretation of the selective scenario for human evolution where the origin of any one of the derived characters may have facilitated the evolution of the others. PMID:22486686

  10. Moral judgment in high-functioning pervasive developmental disorders.

    PubMed

    Takeda, Toshinobu; Kasai, Kiyoto; Kato, Nobumasa

    2007-08-01

    Individuals with pervasive developmental disorder (PDD) are characterized by deficits in socialization. To date, moral judgment, which may have a considerable influence on socialization, has not been fully investigated in high-functioning PDD (HFPDD), particularly from a viewpoint of practical adjustment with peers. Human External Action and its internal Reasoning Type (HEART), a standardized test for evaluating moral judgment in school children developed in Japan, was used to compare various aspects of moral judgment between 23 students with HFPDD (6-14 years old) and 23 students with typical development matched for age, intelligence, and socioeconomic status. Students with HFPDD scored significantly lower on Internal Moral Reasoning than control students. As for the level of Internal Moral Reasoning, while both groups reached a conventional (third) level in almost all items, fewer students with HFPDD achieved an autonomous (fourth) level and more students with HFPDD remained at a heteronomous (second) level than did control students. In the HFPDD group there were significant positive correlations between some items of Internal Moral Reasoning and verbal ability-related items of Wechsler Intelligence Scale for Children-III. A comparatively lower score in students with HFPDD may relate to difficulty in socialization. PMID:17610666

  11. Submitted to IEEE Conference on Field-programmable Custom Computing Machines: FCCM-04 Page 1 Custom Computing for Phylogenetics: Exploring the Solution Space for UPGMA

    E-print Network

    Davis, James P.

    this implementation, we present results of experiments on system performance, as measured and compared against of CCM platforms (relative to comparable HPC or supercomputing machines), and the availability of many commercial products--from add-in boards to entire systems--custom computing as a paradigm for realizing

  12. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 18, NO. 4, APRIL 1999 463 Critical Area Computation via

    E-print Network

    Papadopoulou, Evanthia

    hav- ing the same statistical features as the nominal itegrated circuit (IC) layout. The virtual for shorts in a circuit layout. The critical area calculation is the main computational problem in very large) time, where n is the size of the input. The method is presented for rectilinear layouts and layouts

  13. Slovak High School Students' Attitudes toward Computers

    ERIC Educational Resources Information Center

    Kubiatko, Milan; Halakova, Zuzana; Nagyova, Sona; Nagy, Tibor

    2011-01-01

    The pervasive involvement of information and communication technologies and computers in our daily lives influences changes of attitude toward computers. We focused on finding these ecological effects in the differences in computer attitudes as a function of gender and age. A questionnaire with 34 Likert-type items was used in our research. The…

  14. 1045-9219 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

    E-print Network

    Stojmenovic, Ivan

    .1109/TPDS.2014.2342740, IEEE Transactions on Parallel and Distributed Systems 1 Small Cluster in Cyber Nayak, Ivan Stojmenovic, Fellow, IEEE Abstract--In cyber physical system (CPS), computational resources networks, cause the system more fragile than single network. Besides widely used metric giant component, we

  15. 826 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 33, NO. 6, JUNE 2014 LumiNOC: A Power-Efficient, High-Performance,

    E-print Network

    Palermo, Sam

    Member, IEEE, Mark Browning, Student Member, IEEE, Paul V. Gratz, Member, IEEE, and Samuel Palermo high bandwidth and low latency, however, prior techniques have required high static power for the laser@ece.tamu.edu). Color versions of one or more of the figures in this paper are available online at http

  16. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. 12, NO. 5, SEPTEMBER/OCTOBER 2006 Saliency-guided Enhancement for Volume Visualization

    E-print Network

    Varshney, Amitabh

    Saliency-guided Enhancement for Volume Visualization Youngmin Kim and Amitabh Varshney, Member, IEEE Park, E-mail: ymkim@cs.umd.edu. · Amitabh Varshney is with University of Maryland, College Park, E-mail: varshney@cs.umd.edu. Manuscript received 31 March 2006; accepted 1 August 2006; posted online 6 November

  17. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 11, NO. 3, SEPTEMBER 2010 753 [8] P. Viola and M. Jones, "Robust real-time face detection," Int. J. Comput.

    E-print Network

    Yuan, Ya-xiang

    detection and counting at bus stops," in Proc. IEEE Latin Amer. Robot. Symp., Oct. 2008, pp. 158­163. [12] F.g., low cost, real time, and no cumulative errors) [1], it is often used in car-navigation systems [2

  18. 0018-9162/04/$20.00 2004 IEEE44 Computer C O V E R F E A T U R E

    E-print Network

    Dahlin, Michael D.

    Society Scaling to the End of Silicon with EDGE Architectures I nstruction set architectures have long aggressive pipelining and, with careful compiler scheduling, RISC processors attained high perfor- mance of Texas at Austin © 2004 IEEE. Personal use of this material is permitted. However, permission to reprint

  19. 1064 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 6, JUNE 2006 Gate-Size Optimization Under Timing Constraints

    E-print Network

    Zhou, Hai

    perturbations [5], [6], buffer insertion [7], and driver sizing. In the postrouting stage, coupling noise, JUNE 2006 Gate-Size Optimization Under Timing Constraints for Coupling-Noise Reduction Debjit Sinha and Hai Zhou, Senior Member, IEEE Abstract--This paper presents a gate-sizing algorithm for coupling-noise

  20. 100 IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. XX, NO. Y, MONTH 200X Wavelet-Based Multiresolution Analysis of Irregular

    E-print Network

    Paris-Sud XI, Université de

    -Based Multiresolution Analysis of Irregular Surface Meshes S´ebastien Valette and R´emy Prost, Member, IEEE CREATIS, Lyon, France Abstract-- This paper extends Lounsbery's multiresolution analysis wavelet-based theory meshes, wavelets, multiresolution. I. INTRODUCTION MULTIRESOLUTION analysis of 3D objects is receiv- ing