Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2456270guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
ICPCA/SWS'12: Proceedings of the 2012 international conference on Pervasive Computing and the Networked World
2012 Proceeding
  • Editors:
  • Qiaohong Zu,
  • Bo Hu,
  • Atilla Elçi
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
Istanbul Turkey November 28 - 30, 2012
ISBN:
978-3-642-37014-4
Published:
28 November 2012
Sponsors:
ETH Zurich, CCF

Reflects downloads up to 26 Jan 2025Bibliometrics
Article
Online and offline determination of QT and PR interval and QRS duration in electrocardiography

Duration and dynamic changes of QT and PR intervals as well as QRS complexes of ECG measurements are well established parameters in monitoring and diagnosis of cardiac diseases. Since automated annotations show numerous advantages over manual methods, ...

Article
Predicting reader's emotion on chinese web news articles

Currently, more and more information are spreading on the web. These large amounts of information might influence web users' emotion quite a lot, for example, make people angry. Thus, it is important to analyze web textual content from the aspect of ...

Article
Clustering algorithm based on triple-stranded and 3-armed DNA model

The quality of traditional grid-clustering and pure hierarchical clustering methods suffers from some limitations, especially the inability of hierarchical clustering to perform adjustment on once merge or split decision. However, DNA computations can ...

Article
Synthesis of real-time applications for internet of things

This paper presents the methodology for synthesis of real-time applications working in the Internet of things environment. We propose the client-server architecture, where smart embedded systems act as clients, while the Internet application is a server ...

Article
iScope: viewing biosignals on mobile devices

We developed an iOS based application called iScope to monitor biosignals online. iScope is able to receive different signal types via a wireless network connection and is able to present them in the time or the frequency domain. Thus it is possible to ...

Article
CloudSVM: training an SVM classifier in cloud computing systems

In conventional distributed machine learning methods, distributed support vector machines (SVM) algorithms are trained over pre-configured intranet/internet environments to find out an optimal classifier. These methods are very complicated and costly ...

Article
A document-based data warehousing approach for large scale data mining

Data mining techniques are widely applied and data warehousing is relatively important in this process. Both scalability and efficiency have always been the key issues in data warehousing. Due to the explosive growth of data, data warehousing today is ...

Article
Smart navigation for firefighters in hazardous environments: a ban-based approach

Recent advances in integrated electronic devices motivated the use of Body Area Networks in many applications including monitoring, localization, tracking and navigation. In this paper we introduce an indoor navigation approach based on Body Area ...

Article
Personalized recommendation based on implicit social network of researchers

In this paper we discuss the importance of social network of researchers for personalized recommendation of researchers and papers. We begin by briefly describing collaborative filtering method for personalized recommendation and its cold start problem ...

Article
Effect on generalization of using relational information in list-wise algorithms

Learning to rank became a hot research topic in recent years and utilizing relational information in list-wise algorithms was discovered to be valuable and was widely adopted in various algorithms. These algorithms' empirical performances were usually ...

Article
The optimization of two-stage planetary gear train based on mathmatica

Planetary gear reducer has a lot of advantages, such as high transmission and efficiency, compact structure, and has a variety of applications in construction machinery and equipment, hoisting and conveying machinery and so on. The optimization design ...

Article
Mobi-CoSWAC: an access control approach for collaborative scientific workflow in mobile environment

With the development of mobile technology and popularity of pervasive applications, more and more scientific collaborative research works are carried out in the wild or on the move. How to make an optimal tradeoff between deep collaboration and strict ...

Article
A survey of learning to rank for real-time twitter search

Recently learning to rank has been widely used in real-time Twitter Search by integrating various of evidence of relevance and recency features into together. In real-time Twitter search, whereby the information need of a user is represented by a query ...

Article
An ontology-based information extraction approach for résumés

A Curriculum Vitae (CV) or a résumé, in general, consists of personal information, education information, work experience, qualifications and preferences parts. Scanning or making structural transformation of the millions of free-formatted résumés from ...

Article
Measure method and metrics for network characteristics in service systems

As the development of Service-oriented architecture and service engineering, they have been generally adopted as the architecture and engineering method of software. More and more service applications and systems are constituted by distributed resources ...

Article
AIM: a new privacy preservation algorithm for incomplete microdata based on anatomy

Although many algorithms have been developed to achieve privacy preserving data publishing, few of them can handle incomplete microdata. In this paper, we first show that traditional algorithms based on suppression and generalization cause huge ...

Article
An overview of transfer learning and computational cyberpsychology

Computational CyberPsychology deals with web users' behaviors, and identifying their psychology characteristics using machine learning. Transfer learning intends to solve learning problems in target domain with different but related data distributions ...

Article
A formal approach to model the interaction between user and ami environment

According to the decentralization of modeling tasks caused by user who is essentially nondeterministic and highly individual in Ambient Intelligence (AmI) environment, the mental model, plan model and behavior model are introduced to describe both ...

Article
Multi-Robot traveling problem constrained by connectivity

Multi-robot system provides more advantages over a single robot. In certain situations, robots need to maintain global connectivity while proceeding tasks such as traveling some interested spots in an area. This paper formulates the Multi-Robot ...

Article
An application study on vehicle routing problem based on improved genetic algorithm

The Vehicle Routing Problem of Logistics and Distribution is a hot and difficult issue in current field of combinatorial optimization, therefore this paper presents an improved genetic algorithm. The algorithm which applied the idea of Saving Algorithm ...

Article
Cost-Effective and distributed mobility management scheme in sensor-based PMIPv6 networks with SPIG support

Due to limited resources, the slow progressive development of wireless sensor networks (Wireless Sensor Network) through the development of hardware and power management technology is currently in progress for the development of the latest IP-based IP-...

Article
The research on virtual assembly technology and its application based on OSG

This system is a virtual assembly one of a type of cylinder cover which based on OSG. The system uses OSG the 3Dgraphics engine to realized model rendering, human-computer interaction, stereoscopic displaying, parts dragging, animation path and other ...

Article
An enhanced security mechanism for web service based systems

Web service technologies have been widely used in diverse applications. However, there are still many security challenges in reliability, confidentiality and data nonrepudiation, which are prominent especially in some Web service systems that have ...

Article
Data-Apart hybrid centralized scheduling in coordinated multi-point system with non-ideal backhaul link

Coordinated Multi-Point (CoMP) transmission is a promising technique to improve the coverage of high data rates, the cell-edge throughput in cellular networks, in which centralized CoMP can obtain global optimal cooperation when CU can gather CoMP ...

Article
Geo-Ontology-Based object-oriented spatiotemporal data modeling

Spatiotempoal data model is fundamental to geospatial data representation, organization, analysis and applications. Due to the absence of geospatial semantic modeling and its logical structure, the spatiotemporal data may be interpreted mistakenly by ...

Article
A new object-oriented approach towards GIS seamless spatio-temporal data model construction

Spatio-temporal data model has been recognized as the foundation of the description of spatiotemporal characteristic for geographic entity. In this paper we present a new way to construct seamless spatio-temporal data model and explore the ...

Article
Mechanical research of the planet carrier in wind turbine gear increaser based on co-simulation of ADAMS-ANSYS

As one of the most important parts in the wind turbine gear increaser, the planet carrier plays a role that is irreplaceable in the whole machine equipment. Co-simulation technology is one kind of new method which owes the characteristic of higher ...

Article
PAPR reduction for 802.16e by clipping and tone reservation based on amplitude scale factor

IEEE 802.16e is a widely used standard for mobile broadband wireless access system and Orthogonal Frequency Division Multiplexing (OFDM) is employed in this system. So, it can perform well in anti-multipath fading and spectrum utilization. But there are ...

Article
A DCaaS model of DNA computing for solving a class of nonlinear problems

A class of new cloud computing model DCaaS is proposed. This model combines traditional DNA computing with SaaS model. The main advantage of DCaaS model is to separate biological experiments with DNA computing, and obtain biological operations as a ...

Article
How to dynamically protect data in mobile cloud computing?

Mobile cloud computing (MCC) is introduced as a supporting architecture for mitigating the resources and energy limitations of mobile devices. And security is considered as a key factor which significantly affects MCC's widely deployment. Thus data ...

Contributors
  • Wuhan University of Technology
  • Fujitsu Ltd, London
  • Hasan Kalyoncu University

Recommendations