Search results for "communication technology"

showing 10 items of 360 documents

Broadband Internet Access via Multi-Hop Wireless Mesh Networks: Design, Protocol and Experiments

2010

Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-009-9907-9 While bandwidth for Internet access in urban areas is steadily increasing in recent years, many rural areas are still suffering from the effect of the digital divide. This paper presents a broadband Internet access paradigm developed in the context of the ADHOCSYS project, which was financed by the European Commission under the 6th Framework Program Information and Society Technologies, within the strategic objective of Broadband for All. Aiming at providing reliable Internet access in rural and mountainous regi…

Routing protocolbusiness.product_categoryBroadband networksComputer scienceMesh networkingHop (networking)law.inventionlawVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552BroadbandInternet accessWi-FiElectrical and Electronic EngineeringVDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423Network architectureWireless mesh networkbusiness.industryWireless networkQuality of serviceWireless WANOrder One Network ProtocolComputer Science ApplicationsInternet Connection SharingDigital subscriber lineNetwork access pointHazy Sighted Link State Routing ProtocolRural areabusinessTelecommunicationsMunicipal wireless networkComputer network
researchProduct

A Learning Automata Based Solution to Service Selection in Stochastic Environments

2010

Published version of a paper published in the book: Trends in Applied Intelligent Systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-13033-5_22 With the abundance of services available in today’s world, identifying those of high quality is becoming increasingly difficult. Reputation systems can offer generic recommendations by aggregating user provided opinions about service quality, however, are prone to ballot stuffing and badmouthing . In general, unfair ratings may degrade the trustworthiness of reputation systems, and changes in service quality over time render previous ratings unreliable. In this paper, we provide a novel solution to the above problems based …

Scheme (programming language)Computational complexity theoryComputer sciencemedia_common.quotation_subject0102 computer and information sciences02 engineering and technologyMachine learningcomputer.software_genreComputer security01 natural sciences0202 electrical engineering electronic engineering information engineeringQuality (business)Simplicitymedia_commoncomputer.programming_languageService qualityLearning automatabusiness.industryVDP::Technology: 500::Information and communication technology: 550VDP::Mathematics and natural science: 400::Information and communication science: 420::Knowledge based systems: 425010201 computation theory & mathematics020201 artificial intelligence & image processingStochastic optimizationArtificial intelligencebusinesscomputerReputation
researchProduct

Discretized Bayesian Pursuit – A New Scheme for Reinforcement Learning

2012

Published version of a chapter in the book: Advanced Research in Applied Artificial Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-31087-4_79 The success of Learning Automata (LA)-based estimator algorithms over the classical, Linear Reward-Inaction ( L RI )-like schemes, can be explained by their ability to pursue the actions with the highest reward probability estimates. Without access to reward probability estimates, it makes sense for schemes like the L RI to first make large exploring steps, and then to gradually turn exploration into exploitation by making progressively smaller learning steps. However, this behavior becomes counter-intuitive wh…

Scheme (programming language)Mathematical optimizationDiscretizationLearning automataComputer sciencebusiness.industryVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422estimator algorithmsBayesian probabilityBayesian reasoninglearning automataEstimatorVDP::Technology: 500::Information and communication technology: 550discretized learningBayesian inferenceAction (physics)Reinforcement learningArtificial intelligencepursuit schemesbusinesscomputercomputer.programming_language
researchProduct

Solving Non-Stationary Bandit Problems by Random Sampling from Sibling Kalman Filters

2010

Published version of an article from Lecture Notes in Computer Science. Also available at SpringerLink: http://dx.doi.org/10.1007/978-3-642-13033-5_21 The multi-armed bandit problem is a classical optimization problem where an agent sequentially pulls one of multiple arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Dynamically changing (non-stationary) bandit problems are particularly challenging because each change of the reward distributions may progressively degrade the performance of any fixed strategy. Alt…

Scheme (programming language)Mathematical optimizationOptimization problemComputer scienceBayesian probabilityVDP::Technology: 500::Information and communication technology: 550Kalman filterBayesian inferenceMulti-armed banditVDP::Mathematics and natural science: 400::Information and communication science: 420::Knowledge based systems: 425computerThompson samplingOptimal decisioncomputer.programming_language
researchProduct

Secure and efficient data storage in unattended wireless sensor networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/NTMS.2009.5384753 Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic…

Scheme (programming language)business.industryComputer scienceMobile computingHomomorphic encryptionCryptographyComputer data storageSecrecyVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile telephonybusinesscomputerWireless sensor networkcomputer.programming_languageComputer network
researchProduct

Didactics of ICT in Secondary Education: Conceptual Issues and Practical Perspectives

2009

Article published in the journal: Issues in Informing Science and Information Technology. Also available from the publisher: http://iisit.org/Vol6/IISITv6p153-178Hadjerrouit605.pdf While there is a huge research literature on the field of ICT (Information and Communication Technology) as a tool in teaching and learning, there is much less research on the area of ICT as a subject or similar designations such as school informatics. As a result, there is a lack of theoretical grounding of the didactics of ICT and associated teaching and learning processes. One of the main reasons for the lack of theoretical underpinnings of the didactics of ICT is that there have been in the past and there per…

Secondary educationlcsh:T58.5-58.64business.industryComputer sciencelcsh:Information technologyInformation technologyVDP::Technology: 500::Information and communication technology: 550Information and Communications TechnologyPedagogyComputingMilieux_COMPUTERSANDEDUCATIONbusinessGeneralLiterature_REFERENCE(e.g.dictionariesencyclopediasglossaries)Informing scienceVDP::Social science: 200::Education: 280::Subject didactics: 283Issues in Informing Science and Information Technology
researchProduct

PMG-Pro: A Model-Driven Development Method of Service-Based Applications

2011

Published version of a chapter published in the book: SDL 2011: Integrating System and Software Modeling. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-25264-8_12 In the Internet of Things, billions of networked and software-driven devices will be connected to the Internet. They can communicate and cooperate with each other to form a composite system. In this paper, we propose PMG-pro (present, model, generate and provide), a language independent, bottom-up and model-driven method for the development of such composite system. We envision that all devices in the Internet of Things provide their functionalities as services. From a service description, a service pre…

Service (business)InternetSource codebusiness.industryComputer scienceService delivery frameworkService designmedia_common.quotation_subjectVDP::Technology: 500::Information and communication technology: 550Activity diagramWorld Wide WebCustomer Service AssuranceThe InternetCode generationbusinessSoftware engineeringmedia_common
researchProduct

Media Delivery to Remote Renderers Controlled by the Mobile Phone

2009

In today's content delivery solutions, service delivery and control are still tightly coupled, a service typically being delivered to the same device that controls the session. We present a solution that was designed with the goal to decouple service control and delivery. Using our approach, multimedia streaming services can be delivered to off-the-shelf DLNA devices in visited networks. The service provider receives information about the remote media player and access environment via a mobile phone. Proximity technologies (e.g. barcodes, NFC) of the control device are used for the exchange of required credentials. This paper describes a typical scenario and our prototype implementation.

Service (business)MultimediaComputer sciencebusiness.industryService delivery frameworkMobile computingService providercomputer.software_genreMobile phoneNext-generation networkVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552The InternetSession (computer science)Best-effort deliverybusinesscomputerComputer network
researchProduct

Discovering web services in social web service repositories using deep variational autoencoders

2020

Abstract Web Service registries have progressively evolved to social networks-like software repositories. Users cooperate to produce an ever-growing, rich source of Web APIs upon which new value-added Web applications can be built. Such users often interact in order to follow, comment on, consume and compose services published by other users. In this context, Web Service discovery is a core functionality of modern registries as needed Web Services must be discovered before being consumed or composed. Many efforts to provide effective keyword-based service discovery mechanisms are based on Information Retrieval techniques as services are described using structured or unstructured textdocumen…

Service (systems architecture)Information retrievalbusiness.industryComputer scienceService discovery02 engineering and technologyLibrary and Information SciencesManagement Science and Operations Researchcomputer.software_genreSocial webWeb APIAutoencoderComputer Science Applications020204 information systemsVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 5520202 electrical engineering electronic engineering information engineeringMedia TechnologyWeb application020201 artificial intelligence & image processingWeb servicebusinessFeature learningcomputerInformation Systems
researchProduct

A mutual GrabCut method to solve co-segmentation

2013

Publised version of an article from the journal:Eurasip Journal on Image and Video Processing. Also available on SpringerLink:http://dx.doi.org/10.1186/1687-5281-2013-20. Open Access Co-segmentation aims at segmenting common objects from a group of images. Markov random field (MRF) has been widely used to solve co-segmentation, which introduces a global constraint to make the foreground similar to each other. However, it is difficult to minimize the new model. In this paper, we propose a new Markov random field-based co-segmentation model to solve co-segmentation problem without minimization problem. In our model, foreground similarity constraint is added into the unary term of MRF model ra…

Similarity (geometry)Markov random fieldComputer sciencebusiness.industryVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONVDP::Technology: 500::Information and communication technology: 550Pattern recognitionFunction (mathematics)Term (time)Constraint (information theory)GrabCutComputer Science::Computer Vision and Pattern RecognitionCutSignal ProcessingSegmentationArtificial intelligenceElectrical and Electronic EngineeringbusinessInformation SystemsEURASIP Journal on Image and Video Processing
researchProduct