383,102 research outputs found

    An integrated ranking algorithm for efficient information computing in social networks

    Full text link
    Social networks have ensured the expanding disproportion between the face of WWW stored traditionally in search engine repositories and the actual ever changing face of Web. Exponential growth of web users and the ease with which they can upload contents on web highlights the need of content controls on material published on the web. As definition of search is changing, socially-enhanced interactive search methodologies are the need of the hour. Ranking is pivotal for efficient web search as the search performance mainly depends upon the ranking results. In this paper new integrated ranking model based on fused rank of web object based on popularity factor earned over only valid interlinks from multiple social forums is proposed. This model identifies relationships between web objects in separate social networks based on the object inheritance graph. Experimental study indicates the effectiveness of proposed Fusion based ranking algorithm in terms of better search results.Comment: 14 pages, International Journal on Web Service Computing (IJWSC), Vol.3, No.1, March 201

    The changing face of human-computer interaction in the age of ubiquitous computing

    Get PDF
    HCI is reinventing itself. No longer only about being user centered, it has set its sights on pastures new, embracing a much broader and far-reaching set of interests. From emotional, eco-friendly, embodied experiences to context, constructivism and culture, HCI research is changing apace: from what it looks at, the lenses it uses and what it has to offer. Part of this is as a reaction to what is happening in the world; ubiquitous technologies are proliferating and transforming how we live our lives. We are becoming more connected and more dependent on technology. The home, the crèche, outdoors, public places and even the human body are now being experimented with as potential places to embed computational devices, even to the extent of invading previously private and taboo aspects of our lives. In this paper, I examine the diversity of lifestyle and technological transformations in our midst and outline some 'difficult' questions these raise together with alternative directions for HCI research and practice

    Energy-efficient task allocation for distributed applications in Wireless Sensor Networks

    Get PDF
    We consider the scenario of a sensing, computing and communicating infrastructure with a a programmable middleware that allows for quickly deploying different applications running on top of it so as to follow the changing ambient needs. We then face the problem of setting up the desired application in case of hundreds of nodes, which consists in identifying which actions should be performed by each of the nodes so as to satisfy the ambient needs while minimizing the application impact on the infrastructure battery lifetime. We approach the problem by considering every possible decomposition of the application's sensing and computing operations into tasks to be assigned to the each infrastructure component. The contribution of energy consumption due to the performance of each task is then considered to compute a cost function, allowing us to evaluate the viability of each deployment solution. Simulation results show that our framework results in considerable energy conservation with respect to sink-oriented or cluster-oriented deployment approaches, particularly for networks with high node densities, non-uniform energy consumption and initial energy, and complex actions

    The Approaching Crisis in Computing Education: Enrollment, Technology, Curricula, Standards, and their Impact on Educational Institutions

    Get PDF
    The academic computing field is changing rapidly. This paper focuses upon the problems and challenges facing a university computer information systems department in the face of declining enrollments while trying to raise its admission standards and simultaneously implementing new technological packages

    The moderating role of prior experience in technological acceptance models for ubiquitous computing services in urban environments

    Get PDF
    Ubiquitous computing services constitute a new information technology that can be used in thousands of potential applications and environments. Ubiquitous computing is also changing the classic paradigm of information technology as it is forcing social and cultural changes. Determining factors affecting the use of ubiquitous services is essential to correctly define the characteristics of new value added services. However, this study investigates not only these factors, but also the moderating effect of previous experience. Due to the technological nature of ubiquitous services, previous experience alters the way in which potential users face these services. Findings suggest that previous experience changes the way in which antecedent relates to basic TAM constructs. The derived research models and empirical results also provide valuable indicators for future research and managerial guidelines for the successful adoption of ubiquitous computing servicesJunta de Andalucia. Consejería de Economía, Innovación, Ciencia y Empleo P12-SEJ-32

    Is Cloud Computing in Healthcare Providing a Safe Environment for Storing Protected Health Information? A Systematic Review and Meta-Analysis

    Get PDF
    Over the past several years, cloud computing has become increasingly more popular for the use of storing, accessing, and maintaining electronic health records (EHRs). In comparison to conventional EHR management tools, such as installed software, cloud computing offers more capabilities for medical facilities and their patients. Experts claim that in addition to changing the face of health information technology, it will also advance healthcare services, and benefit medical research. As the use of cloud computing has increased, so has the amount of healthcare data breaches. This study is proposing that there is a correlation between the increase in cloud computing protected health information (PHI), and healthcare data breaches. This study researches the top five largest healthcare data breaches in 2015 what the organizations’ could have done differently. This study also proposes that current privacy and security laws do not clearly defined cloud computing regulations. Suggestions are also made for organizations to employ a multilevel security framework for cloud-based applications. This information will be valuable to all health information management (HIM) professionals that are involved in migrating and maintaining PHI stored in the cloud

    A Faster Counting Protocol for Anonymous Dynamic Networks

    Get PDF
    We study the problem of counting the number of nodes in a slotted-time communication network, under the challenging assumption that nodes do not have identifiers and the network topology changes frequently. That is, for each time slot links among nodes can change arbitrarily provided that the network is always connected. Tolerating dynamic topologies is crucial in face of mobility and unreliable communication whereas, even if identifiers are available, it might be convenient to ignore them in massive networks with changing topology. Counting is a fundamental task in distributed computing since knowing the size of the system often facilitates the design of solutions for more complex problems. Currently, the best upper bound proved on the running time to compute the exact network size is double-exponential. However, only linear complexity lower bounds are known, leaving open the question of whether efficient Counting protocols for Anonymous Dynamic Networks exist or not. In this paper we make a significant step towards answering this question by presenting a distributed Counting protocol for Anonymous Dynamic Networks which has exponential time complexity. Our algorithm ensures that eventually every node knows the exact size of the system and stops executing the algorithm. Previous Counting protocols have either double-exponential time complexity, or they are exponential but do not terminate, or terminate but do not provide running-time guarantees, or guarantee only an exponential upper bound on the network size. Other protocols are heuristic and do not guarantee the correct count
    • …
    corecore