383,102 research outputs found
An integrated ranking algorithm for efficient information computing in social networks
Social networks have ensured the expanding disproportion between the face of
WWW stored traditionally in search engine repositories and the actual ever
changing face of Web. Exponential growth of web users and the ease with which
they can upload contents on web highlights the need of content controls on
material published on the web. As definition of search is changing,
socially-enhanced interactive search methodologies are the need of the hour.
Ranking is pivotal for efficient web search as the search performance mainly
depends upon the ranking results. In this paper new integrated ranking model
based on fused rank of web object based on popularity factor earned over only
valid interlinks from multiple social forums is proposed. This model identifies
relationships between web objects in separate social networks based on the
object inheritance graph. Experimental study indicates the effectiveness of
proposed Fusion based ranking algorithm in terms of better search results.Comment: 14 pages, International Journal on Web Service Computing (IJWSC),
Vol.3, No.1, March 201
The changing face of human-computer interaction in the age of ubiquitous computing
HCI is reinventing itself. No longer only about being user centered, it has set its sights on pastures new, embracing a much broader and far-reaching set of interests. From emotional, eco-friendly, embodied experiences to context, constructivism and culture, HCI research is changing apace: from what it looks at, the lenses it uses and what it has to offer. Part of this is as a reaction to what is happening in the world; ubiquitous technologies are proliferating and transforming how we live our lives. We are becoming more connected and more dependent on technology. The home, the crèche, outdoors, public places and even the human body are now being experimented with as potential places to embed computational devices, even to the extent of invading previously private and taboo aspects of our lives. In this paper, I examine the diversity of lifestyle and technological transformations in our midst and outline some 'difficult' questions these raise together with alternative directions for HCI research and practice
Energy-efficient task allocation for distributed applications in Wireless Sensor Networks
We consider the scenario of a sensing, computing and communicating infrastructure with a a programmable middleware that allows for quickly deploying different applications running on top of it so as to follow the changing ambient needs. We then face the problem of setting up the desired application in case of hundreds of nodes, which consists in identifying which actions should be performed by each of the nodes so as to satisfy the ambient needs while minimizing the application impact on the infrastructure battery lifetime. We approach the problem by considering every possible decomposition of the application's sensing and computing operations into tasks to be assigned to the each infrastructure component. The contribution of energy consumption due to the performance of each task is then considered to compute a cost function, allowing us to evaluate the viability of each deployment solution. Simulation results show that our framework results in considerable energy conservation with respect to sink-oriented or cluster-oriented deployment approaches, particularly for networks with high node densities, non-uniform energy consumption and initial energy, and complex actions
The Approaching Crisis in Computing Education: Enrollment, Technology, Curricula, Standards, and their Impact on Educational Institutions
The academic computing field is changing rapidly. This paper focuses upon the problems and challenges facing a university computer information systems department in the face of declining enrollments while trying to raise its admission standards and simultaneously implementing new technological packages
The moderating role of prior experience in technological acceptance models for ubiquitous computing services in urban environments
Ubiquitous computing services constitute a new information technology that can be used in
thousands of potential applications and environments. Ubiquitous computing is also changing
the classic paradigm of information technology as it is forcing social and cultural changes.
Determining factors affecting the use of ubiquitous services is essential to correctly define the
characteristics of new value added services. However, this study investigates not only these
factors, but also the moderating effect of previous experience. Due to the technological nature
of ubiquitous services, previous experience alters the way in which potential users face these
services. Findings suggest that previous experience changes the way in which antecedent
relates to basic TAM constructs. The derived research models and empirical results also
provide valuable indicators for future research and managerial guidelines for the successful
adoption of ubiquitous computing servicesJunta de Andalucia. ConsejerÃa de EconomÃa, Innovación, Ciencia y Empleo P12-SEJ-32
Is Cloud Computing in Healthcare Providing a Safe Environment for Storing Protected Health Information? A Systematic Review and Meta-Analysis
Over the past several years, cloud computing has become increasingly more popular for the use of storing, accessing, and maintaining electronic health records (EHRs). In comparison to conventional EHR management tools, such as installed software, cloud computing offers more capabilities for medical facilities and their patients. Experts claim that in addition to changing the face of health information technology, it will also advance healthcare services, and benefit medical research. As the use of cloud computing has increased, so has the amount of healthcare data breaches. This study is proposing that there is a correlation between the increase in cloud computing protected health information (PHI), and healthcare data breaches. This study researches the top five largest healthcare data breaches in 2015 what the organizations’ could have done differently. This study also proposes that current privacy and security laws do not clearly defined cloud computing regulations. Suggestions are also made for organizations to employ a multilevel security framework for cloud-based applications. This information will be valuable to all health information management (HIM) professionals that are involved in migrating and maintaining PHI stored in the cloud
A Faster Counting Protocol for Anonymous Dynamic Networks
We study the problem of counting the number of nodes in a slotted-time
communication network, under the challenging assumption that nodes do not have
identifiers and the network topology changes frequently. That is, for each time
slot links among nodes can change arbitrarily provided that the network is
always connected. Tolerating dynamic topologies is crucial in face of mobility
and unreliable communication whereas, even if identifiers are available, it
might be convenient to ignore them in massive networks with changing topology.
Counting is a fundamental task in distributed computing since knowing the size
of the system often facilitates the design of solutions for more complex
problems. Currently, the best upper bound proved on the running time to compute
the exact network size is double-exponential. However, only linear complexity
lower bounds are known, leaving open the question of whether efficient Counting
protocols for Anonymous Dynamic Networks exist or not. In this paper we make a
significant step towards answering this question by presenting a distributed
Counting protocol for Anonymous Dynamic Networks which has exponential time
complexity. Our algorithm ensures that eventually every node knows the exact
size of the system and stops executing the algorithm. Previous Counting
protocols have either double-exponential time complexity, or they are
exponential but do not terminate, or terminate but do not provide running-time
guarantees, or guarantee only an exponential upper bound on the network size.
Other protocols are heuristic and do not guarantee the correct count
- …