The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: pervasive computing; software infrastructure; mobile computing; semantic Web; security; and innovative application.
In this talk, the author discusses some recent advances in desktop virtualization field. Especially, the author talks about desktop virtualization research work in the National 973 Basic Research Program, The Research on Fundamental Theory and Approach of Computing System Virtualization. These works include multi-platform supported virtual desktop (MSVD) and HVM supported virtual laptop environment...
Summary form only given. "The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it." Seldom has an era begun equally decidedly as the age of Pervasive Computing with these famous words from Mark Weiser has in 1991. However, while computers have almost shrunk to disappearance in the meantime, user...
We propose the use of context-aware smart space technology that is able to monitor physiological signs of a user in real-time. The smart space informs the user when they are stressed and automatically initiate an appropriate stress-relieving response via a selection of scenarios. Using the Nexus-10 we measured on single male subject physiological responses by comparison with baseline music, video,...
Searching is an important procedure in optimization problems. As is an effective clustering method especially in spatial data mining, the role of searching is essential. While many searching methods focus themselves on particle swarm optimization and genetic algorithms, we propose a new searching algorithm based differential evolution (DE). It proves that DE is a simple optimization algorithm effective...
How to select candidate services and compose them is a key problem in Web service composition. In this paper, a response time based load balancing (RTLB) algorithm for service composition is proposed. Aiming at keeping the load balancing of node so as to achieve the largest throughput of the system, RTLB algorithm adopts the service load and node load as the decision-making measures and forwards requests...
Advanced applications in fields such as expert system, real-time process control problem solving, machine learning require the construction, efficient access and management of large, shared knowledge bases. Such knowledge bases cannot be built using existed tools such as expert system shells, because these do not scale up, nor can be built in terms of existing database technology, because such technology...
Naive Bayes classifier, a classification method based on Bayes theory, shows excellent properties in many fields. In practical application, limited to satisfying independence assumption, it is hard to gain better classification. In this paper an simple and intuitive extended Bayes model was constructed, which can get better classification effect. The extended Bayes model replaces primary attribute...
ULTRA GRIDSEC" is a high performance symmetric key cryptography schema used to increase the performance of symmetric key encryption algorithms like DES and TDES by decreasing their execution time and increasing their security by using compression and multithreading techniques and other enhancement points. In this paper we enhancing the performance of a "ULTRA GRIDSEC" by using a pure...
The emerging paradigm of pervasive computing and Web services needs a flexible service discovery and composition infrastructure. The widespread use of Web services in pervasive environments is hindered by the lack of adequate security and privacy support. In this paper, we discuss an access control protocol for conversation-based (composite) Web services. This approach takes into account the conversational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.