Search
Now showing items 1-10 of 29
Enabling Context-aware Applications In Smart Environments
(Computer Science & Engineering, 2010-07-19)
Recognizing human activities is an important feature for the development of contextaware applications that are so fundamental to enabling assistive environments. Only once these applications are able to determine the ...
Building Bayesian Network Based Expert Systems From Rules
(Computer Science & Engineering, 2010-11-01)
Combining expert knowledge and user explanation with automated reasoning in domains with uncertain information poses significant challenges in terms of representation and reasoning mechanisms. In particular, reasoning ...
Design And Analysis Of Application Architecture For Opportunistic Networks Using Ad Hoc Wi-Fi
(Computer Science & Engineering, 2010-03-03)
In recent years, the number of smartphone users has increased by many folds. In fact, it is estimated to reach 100 million by 2013. Current generation of smartphones has better storage, battery, computing capabilities and ...
Reactive Control Composition For Mobile Manipulators
(Computer Science & Engineering, 2010-07-19)
A mobile manipulator is a manipulator mounted on a mobile platform. Due to this combination it has increased mobility compared to a fixed manipulator and increased dexterity compared to a mobile platform. At the same time ...
Evaluation Of Ferry Based Opportunistic Message Dissemination With Deterministic Inter Contact Times
(Computer Science & Engineering, 2010-07-19)
Opportunistic Networks are characterized by intermittent connectivity and volatile topology. In such a network scenario, traditional Mobile Ad hoc Network (MANET) routing protocols cannot work efficiently. Hence, a novel ...
Web Application Integration Using Mashups
(Computer Science & Engineering, 2010-03-03)
The HTML DOM is the W3C standard data model for HTML documents. A web page may be viewed as a tree structure with data nodes at each level, according to the HTML DOM, to enable web applications to access it dynamically. ...
A Privacy Enhanced Situation-aware Middleware Framework For Ubiquitous Computing Environments
(Computer Science & Engineering, 2010-07-19)
The Ubiquitous Computing paradigm integrates myriads of small, inexpensive, heterogeneous networked devices, including sensors, distributed throughout the environment, with the intent of enabling context awareness in systems ...
Attributes Selection And Package Design To Maximize Visibility Of Objects
(Computer Science & Engineering, 2010-03-03)
In recent years, there has been significant interest in the development of ranking functions and efficient top-k retrieval algorithms to help users in ad-hoc search and retrieval in databases (e.g., buyers searching for ...
The Reputation System For Robust, Structured P2p Systems
(Computer Science & Engineering, 2010-03-03)
Structured peer-to-peer systems are distributed communication systems that typically use Distributed Hash Table (DHT) indexing to efficiently locate the resources. These networks are highly scalable and can route the ...
Data Analytics Over Hidden Databases
(Computer Science & Engineering, 2010-11-01)
Web based access to databases have become a popular method of datadelivery. A multitude of websites provides access to their proprietary datathrough web forms. In order to view this data, customers use the web forminterface ...