نتایج جستجو برای: personal computing
تعداد نتایج: 562810 فیلتر نتایج به سال:
Ubiquitous computing stands to redefine established notions of pr ivacy as it introduces regular, pervasive sensing of personal information such as identity, location, and activity. To effectively and comfortably manage the disclosure of personal information, end-users will require a coherent conceptual model of privacy and convenient user interfaces to manage it. We describe a conceptual frame...
NetWork is an experiment in distributed computing. The idea is to make use of idle time on personal workstations while retaining their advantages of immediate and guarantied availability. NetWork wants to make use of otherwise idle resources only. The performance criterion of NetWork is the net work done per unit time not computing time or other measures of resource utilization. The NetWork mod...
In this paper, we describe the Smart Reminder agent that we developed using our CIA personal agent framework. We first motivate the need for personal assistance and how this need led us to the development of the CIA agent framework. Smart Reminder is composed of a set of personal agents that support their user in all situations where people come together spontaneously, e.g. an encounter on a co...
The Semantic Web through technologies such to support the canonical representation information and presenting it to users in a method by which its meaning can be understood or at least communicated and interpreted by all parties. As the Semantic Web evolves into more of a computing platform rather than an information platform more dynamic structures, interactions and behaviours will evolve lead...
This paper presents the author's personal journey throughout the inception of Soft Computing (SC) and its evolution into Hybrid Soft Computing (HSC). In 1994, Zadeh de ned the concept of Soft Computing as a loose association or partnership of components . Since then, SC has undergone several transformational phases. In our journey, we provide a retrospective view of SC past four phases, its cur...
Recently great attention has been given to point-of-failure swap rerouting, an efficient technique for routing in the presence of transient failures. According to this technique, a message follows the normal routing table information unless the next hop has failed; in this case, it is redirected towards a precomputed link, called swap; once this link has been crossed, normal routing is resumed....
one of the main features of high throughput computing systems is the availability of high power processing resources. cloud computing systems can offer these features through concepts like pay-per-use and quality of service (qos) over the internet. many applications in cloud computing are represented by workflows. quality of service is one of the most important challenges in the context of sche...
A survey was designed to investigate opinions on railway trespassing of people living close to a railway line. The results showed that 89.2% of the respondents (n = 502) recalled that they had seen trespassing in their neighbourhood and, based on their observations, adults are the largest group trespassing. Overall, 68.9% of the respondents had personal experience of trespassing although 83.5% ...
As people use an increasing number of smart devices for their everyday computing, it is surprising that these powerful, internet-enabled devices are rarely connected together to create personal networks. The webinos project is an attempt to make this possible so that resources can easily be shared between devices, regardless of the operating system or network they are using. However, increased ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید