Search results for "Computer Networks"
showing 10 items of 860 documents
Integral Imaging Monitors with an Enlarged Viewing Angle
2015
Enlarging the horizontal viewing angle is an important feature of integral imaging monitors. Thus far, the horizontal viewing angle has been enlarged in different ways, such as by changing the size of the elemental images or by tilting the lens array in the capture and reconstruction stages. However, these methods are limited by the microlenses used in the capture stage and by the fact that the images obtained cannot be easily projected into different displays. In this study, we upgrade our previously reported method, called SPOC 2.0. In particular, our new approach, which can be called SPOC 2.1, enlarges the viewing angle by increasing the density of the elemental images in the horizontal …
Three-Dimensional Imaging and Display through Integral Photography
2014
Here, we present a review of the proposals and advances in the field of three-dimensional (3D) imaging acquisition and display made in the last century. The most popular techniques are based on the concept of stereoscopy. However, stereoscopy does not provide real 3D experience, and produces discomfort due to the conflict between convergence and accommodation. For this reason, we focus this paper on integral imaging, which is a technique that permits the codification of 3D information in an array of 2D images obtained from different perspectives. When this array of elemental images is placed in front of an array of microlenses, the perspectives are integrated producing 3D images with full p…
A Logical Architecture for Active Network Management
2006
This paper focuses on improving network management by exploiting the potential of “doing” of the Active Networks technology, together with the potential of “planning,” which is typical of the artificial intelligent systems. We propose a distributed multiagent architecture for Active Network management, which exploits the dynamic reasoning capabilities of the Situation Calculus in order to emulate the reactive behavior of a human expert to fault situations. The information related to network events is generated by programmable sensors deployed across the network. A logical entity collects this information, in order to merge it with general domain knowledge, with a view to identifying the roo…
Applying Real-Time Dynamic Scaffolding Techniques during Tutoring Sessions Using Intelligent Tutoring Systems
2022
An intelligent tutoring system (ITS) is a computer system or software application that is built to replicate human tutors by supporting the theory of “learning by doing.” Even though ITSs have been proven to be successful in academic studies, they still have not found large adoption by the industry due to the complexities of building such systems due to the high technical expertise and domain knowledge requirements. Attempts have been made to build authoring tools that can provide assistance in building tutoring systems; however, most of these tools are targeted toward authors that have considerable programming experience. This research proposes an authoring tool for ITS, which is targeted …
Touchless gestural interfaces for networked public displays
2015
In the near future, we can easily imagine a significant increment in diffusion of networked public displays, as well as novel interaction modalities used in their applications. In the following, we present two of the main challenges related to networked displays we are dealing with, with a particular focus on touchless gestural interfaces: overcoming interaction blindness (i.e. enable users to immediately guess the interactivity of the display, and the gestural nature of it) and performing evaluations in-the-wild (i.e. outside any controlled environment).
A Newcomer's Guide to EICS, the Engineering Interactive Computing Systems Community
2019
[EN] Welcome to EICS, the Engineering Interactive Computing Systems community, PACMHCI/EICS journal, and annual conference! In this short article, we introduce newcomers to the field and to our community with an overview of what EICS is and how it positions with respect to other venues in Human-Computer Interaction, such as CHI, UIST, and IUI, highlighting its legacy and paying homage to past scientific events from which EICS emerged. We also take this opportunity to enumerate and exemplify scientific contributions to the field of Engineering Interactive Computing Systems, which we hope to guide researchers and practitioners towards making their future PACMHCI/EICS submissions successful an…
2020
The growth of cloud-based services is mainly supported by the core networking infrastructures of large-scale data centers, while the scalability of these services is influenced by the performance and dependability characteristics of data centers. Hence, the data center network must be agile and reconfigurable in order to respond quickly to the ever-changing application demands and service requirements. The network must also be able to interconnect the big number of nodes, and provide an efficient and fault-tolerant routing service to upper-layer applications. In response to these challenges, the research community began exploring novel interconnect topologies, namely: Flecube, DCell, Ficonn…
Secondary users selection and sparse narrow-band interference mitigation in cognitive radio networks
2018
Spectrum scarcity is a critical problem that may reduce the effectiveness of wireless technologies and services. To address this problem, different spectrum management techniques have been proposed in the literature such as overlay cognitive radio (CR) where the unlicensed users can share the same spectrum with the licensed users. The main challenges in overlay CR networks are the identification and detection of the Primary User (PU) signals in a multi-source narrow-band interference (NBI) scenario. Therefore, in this paper, we investigate the performance of an orthogonal frequency division multiplexing (OFDM) overlay CR network with Secondary Users (SUs) and subcarriers selection schemes. …
AI-IoT Platform for Blind Estimation of Room Acoustic Parameters Based on Deep Neural Networks
2023
Room acoustical parameters have been widely used to describe sound perception in indoor environments, such as concert halls, conference rooms, etc. Many of them have been standardized and often have a high computational demand. With the increasing presence of deep learning approaches in automatic monitoring systems, wireless acoustic sensor networks (WASNs) offer great potential to facilitate the estimation of such parameters. In this scenario, Convolutional Neural Networks (CNNs) offer significant reductions in the computational requirements for in-node parameter predictions, enabling the so-called Artificial Intelligence-Internet of Things (AI-IoT). In this paper, we describe the design a…
Network Virtualization Based on Effective Packet Transformations
2015
Promocijas darbā ir piedāvātas divas oriģinālas tehnoloģijas, kas paaugstina datortīklu virtualizēšanas efektivitāti: ZERO tunelēšanas protokols, un Pakešu Transformāciju Valoda (Packet Transformation Language, PTL), kas ļauj kompaktā pierakstā formāli aprakstīt ZERO un citus tunelēšanas protokolus. Darbā ir piedāvāts Ethernet-pāri-IP tunelēšanas protokols, kas nodala visus Ethernet kadrus tunelēšanai NICE un UGLY kadros. UGLY kadri tiek tunelēti ar tradicionālām metodēm, kā UDP vai GRE enkapsulācija, kas būtiski palielina kopējo paketes garumu dēļ papildus galvenēm un fragmentēšanas, kas parasti nepieciešama, lai transportētu garus Ethernet kadrus pāri IP datortīklam, kam parasti maksimāla…