Search results for "Ubiquitous computing"

showing 10 items of 108 documents

Towards a methodology for semantic and context-aware mobile learning

2013

International audience; Internet and mobile devices open the way towards mobile learning (m-learning), offering new opportunities to extend learning beyond the traditional teacher-led classroom. M-learning is not only any form of teaching or studying that takes place when the user interacts with a mobile device. It is more than just using a mobile device to access resources and communicate with others. It should take account of the constant mobile situation of the learner. The challenge here is to exploit this continually changing situation with a system that can dynamically recognize and adapt educational resources and services to the "context" in which the learner operates (localization, …

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebExploitComputer science[ INFO.INFO-IU ] Computer Science [cs]/Ubiquitous Computing[ INFO.INFO-WB ] Computer Science [cs]/WebContext (language use)02 engineering and technologycontextWorld Wide Webmobile learning[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-MC]Computer Science [cs]/Mobile ComputingConstant (computer programming)semantic web[INFO.INFO-MC] Computer Science [cs]/Mobile Computing[ INFO.INFO-MC ] Computer Science [cs]/Mobile Computing0202 electrical engineering electronic engineering information engineeringMobile searchSemantic Webbusiness.industry[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing020206 networking & telecommunicationsOpen learning[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR]The Internet[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]businessMobile device
researchProduct

A Mobile Computing Framework for Pervasive Adaptive Platforms

2012

International audience; Ubiquitous computing is now the new computing trend, such systems that interact with their environment require self-adaptability. Bioinspiration is a natural candidate to provide the capability to handle complex and changing scenarios. This paper presents a programming framework dedicated to pervasive platforms programming. This bioinspired and agentoriented framework has been developed within the frame of the PERPLEXUS European project that is intended to provide support for bioinspiration-driven system adaptability. This framework enables the platform to adapt itself to application requirements at high-level while using hardware acceleration at node level. The resu…

[INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR]Context-aware pervasive systemsUbiquitous computingArticle SubjectComputer Networks and CommunicationsComputer scienceDistributed computingmedia_common.quotation_subjectMobile computing02 engineering and technologycomputer.software_genreAdaptabilitylcsh:QA75.5-76.950202 electrical engineering electronic engineering information engineeringAdaptation (computer science)media_commonbusiness.industryFrame (networking)General Engineering020206 networking & telecommunicationsSoftware frameworkEmbedded systemHardware accelerationRobot020201 artificial intelligence & image processinglcsh:Electronic computers. Computer sciencebusinesscomputer
researchProduct

Scheduling independent stochastic tasks under deadline and budget constraints

2018

This article discusses scheduling strategies for the problem of maximizing the expected number of tasks that can be executed on a cloud platform within a given budget and under a deadline constraint. The execution times of tasks follow independent and identically distributed probability laws. The main questions are how many processors to enroll and whether and when to interrupt tasks that have been executing for some time. We provide complexity results and an asymptotically optimal strategy for the problem instance with discrete probability distributions and without deadline. We extend the latter strategy for the general case with continuous distributions and a deadline and we design an ef…

[INFO.INFO-CC]Computer Science [cs]/Computational Complexity [cs.CC]Mathematical optimizationOperations researchComputer science[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]Cloud computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyExpected valueTheoretical Computer ScienceScheduling (computing)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]deadline0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]schedulingComputer Science::Operating SystemsComputingMilieux_MISCELLANEOUSBudget constraint020203 distributed computingcloud platformindependent tasksbusiness.industry[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulationstochastic costAsymptotically optimal algorithmContinuous distributions[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Hardware and ArchitectureProbability distribution[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processingInterrupt[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessSoftwarebudget
researchProduct

Automated detection of contextuality proofs with intermediate numbers of observables

2021

<div style=""&gt<font face="arial, helvetica"&gt<span style="font-size: 13px;"&gtQuantum contextuality takes an important place amongst the concepts of quantum computing that bring an advantage over its classical counterpart. For a large class of contextuality </span&gt</font&gt<span style="font-size: 13px; font-family: arial, helvetica;"&gtproofs, aka. observable-based proofs of the Kochen-Specker Theorem, we first formulate the</span&gt</div&gt<div style=""&gt<font face="arial, helvetica"&gt<span style="font-size: 13px;"&gtcontextuality property as the absence of solutions to a linear system. Then we explain why </span&gt</font&gt<span style="font-size: 13px; font-family: arial, helvetica…

[INFO.INFO-ET] Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-DC] Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC][INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MO] Computer Science [cs]/Modeling and Simulation[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

A Route toward Protein Sequencing using Solid-State Nanopores Assisted by Machine Learning

2022

Solid-State Nanopores made of 2-D materials such as MoS2 have emerged as one of the most versatile sensors for single-biomolecule detection, which is essential for early disease diagnosis (biomarker detection). One of the most promising applications of SSN is DNA and protein sequencing, at a low cost and faster than the current standard methods. The detection principle relies on measuring the relatively small variations of ionic current as charged biomolecules immersed in an electrolyte traverse the nanopore, in response to an external voltage applied across the membrane. The passage of a biomolecule through the pore yields information about its structure and chemical properties, as demonst…

[INFO.INFO-ET] Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-DC] Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC][INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MO] Computer Science [cs]/Modeling and Simulation[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Computer-assisted enumeration and classification of multi-qubit doilies

2022

For N ≥ 2, an N-qubit doily is a doily living in the N-qubit symplectic polar space. These doilies are related to operator-based proofs of quantum contextuality. Following and extending the strategy of [SdBHG21] that focused exclusively on three-qubit doilies, we first bring forth several formulas giving the number of both linear and quadratic doilies for any N &gt; 2. Then we present an effective algorithm for the generation of all N-qubit doilies. Using this algorithm for N = 4 and N = 5, we provide a classification of N-qubit doilies in terms of types of observables they feature and number of negative lines they are endowed with.

[INFO.INFO-ET] Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-DC] Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC][INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MO] Computer Science [cs]/Modeling and Simulation[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Agent-based modeling of the social and economic factors affecting the choice of transportation mode : application to the Beirut city

2018

In urban and peri-urban environments, transport and mobility are strongly linked to socio-economic activities. They are influenced by individual's personal psychology, social norms, resistance to change, personal attitude, habits, fears and beliefs. Beirut is a mono-centric city with transport supply poverty. Vehicle ownership has increased rapidly in response to the shortage of public transportation. Currently, there is an opportunity to develop mobility management services and establish sustainable mobility and accessibility in Beirut. This requires that transport modes be affordable, efficient and environmentally friendly, as well as technologies that minimize the energy consumption by f…

[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingComportement de mobilitéSysteme multiagentMultiagent systemsMethodology[INFO.INFO-IU] Computer Science [cs]/Ubiquitous ComputingMobilite urbaineMobility behaviorMethodologieSimulationUrban mobility
researchProduct

Recommandation de parcours de formation dans un contexte mobile

2013

National audience; Les récentes avancées dans les technologies de l'information et de la communication ont vu naître de nouvelles formes d'enseignement. L'apprentissage à distance classique s'enrichit et se transforme pour donner jour à un apprentissage plus flexible, accessible sur de multiples supports, à toute heure et en tout lieu : l'apprentissage mobile. Nos travaux portent sur la conception d'un système de recommandation basé sur le contenu, modélisé en utilisant les technologies du web sémantique. La recommandation prendra en compte l'objectif de formation, mais également les supports disponibles pour dispenser cette formation, les préférences personnelles de l'apprenant, ou encore …

[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-MC]Computer Science [cs]/Mobile Computing[INFO.INFO-MC] Computer Science [cs]/Mobile Computing[ INFO.INFO-MC ] Computer Science [cs]/Mobile Computingplus court chemin multi-modal[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ INFO.INFO-IU ] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]m-learningrecommandationmétaheuristiques
researchProduct

Movement Behavior Analysis of Workers using Spatio-temporal Trajectories for Safety Management

2019

International audience

[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing[INFO]Computer Science [cs][INFO] Computer Science [cs]ComputingMilieux_MISCELLANEOUS
researchProduct

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

2021

International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…

business.industryComputer scienceAnomaly (natural sciences)020206 networking & telecommunications02 engineering and technologyIntrusion detection system[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Computer securitycomputer.software_genre[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe Internet[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputer
researchProduct