324,300 research outputs found

    Issues in Recording Benchmark Sensor Data

    Get PDF
    Abstract. Sensors are rapidly following computing devices in popularity and widespread use; and as a result, protocols to interface, record and process sensor data have cropped up anywhere. This position paper lists some of the ‘lessons learned’ in the creation and application of sets of embedded sensor data, specifically used as tools in building context aware services where sensor values get classified into context descriptions

    Information system development in a process management environment: the dynamics of improvisation and bricolage during embedded software design

    Get PDF
    The main objective of this thesis is to make a contribution to knowledge regarding the nature of improvisation and bricolage activities in the practice of embedded software design and how the tensional relationship between process management and improvisation and bricolage can be balanced. There is a lack of understanding embedded systems development in practice, and how the difficulties correspond to prescribed and emergent processes in this context. In order to address this knowledge gap I conducted an in‐depth case study of an embedded system development project in the German automobile context between December 2004 and November 2008. The research adopted an interpretive approach, which involved the collection and analysis of qualitative data. Empirical data that was derived through interviews and observation revealed new insights as to how embedded systems are developed in practice. I adopt the position that emergent processes occur not randomly, but as purposeful agents that navigate through a turbulent environment of ongoing need to improvise with the items at hand. The finding indicates that the success to achieve the aims is bound to the capabilities to be continuously reflexive and induce corrective actions as appropriate. A theoretical conceptualisation disclosed measures that may enhance the capacity to be reflexive. The findings implied that process management frameworks help as scaffolding in order to practice improvisation and bricolage as a coping strategy. Moreover, improving the capabilities to cope with challenges means enhancing reflexive capabilities. The original contribution of this research is founded on rich descriptions and interpretations as to how embedded systems are developed in practice, and the theoretical conceptualisation that can aid to balance the tension between process management and improvisation and bricolage

    From Artifacts to Aggregations: Modeling Scientific Life Cycles on the Semantic Web

    Full text link
    In the process of scientific research, many information objects are generated, all of which may remain valuable indefinitely. However, artifacts such as instrument data and associated calibration information may have little value in isolation; their meaning is derived from their relationships to each other. Individual artifacts are best represented as components of a life cycle that is specific to a scientific research domain or project. Current cataloging practices do not describe objects at a sufficient level of granularity nor do they offer the globally persistent identifiers necessary to discover and manage scholarly products with World Wide Web standards. The Open Archives Initiative's Object Reuse and Exchange data model (OAI-ORE) meets these requirements. We demonstrate a conceptual implementation of OAI-ORE to represent the scientific life cycles of embedded networked sensor applications in seismology and environmental sciences. By establishing relationships between publications, data, and contextual research information, we illustrate how to obtain a richer and more realistic view of scientific practices. That view can facilitate new forms of scientific research and learning. Our analysis is framed by studies of scientific practices in a large, multi-disciplinary, multi-university science and engineering research center, the Center for Embedded Networked Sensing (CENS).Comment: 28 pages. To appear in the Journal of the American Society for Information Science and Technology (JASIST

    A BASILar Approach for Building Web APIs on top of SPARQL Endpoints

    Get PDF
    The heterogeneity of methods and technologies to publish open data is still an issue to develop distributed systems on the Web. On the one hand, Web APIs, the most popular approach to offer data services, implement REST principles, which focus on addressing loose coupling and interoperability issues. On the other hand, Linked Data, available through SPARQL endpoints, focus on data integration between distributed data sources. The paper proposes BASIL, an approach to build Web APIs on top of SPARQL endpoints, in order to benefit of the advantages from both Web APIs and Linked Data approaches. Compared to similar solution, BASIL aims on minimising the learning curve for users to promote its adoption. The main feature of BASIL is a simple API that does not introduce new specifications, formalisms and technologies for users that belong to both Web APIs and Linked Data communities

    Esp Research Trends in Asian Context

    Full text link
    Due to the influence of global and regional economic changes, English for Specific Purposes (ESP) plays a more vital role in English language studies worldwide, including in Asian context. A look at any issues relat-ing to Asian ESP will shed light to the needs of English in this content. This present study therefore sur-veyed recent trends of ESP research in this context, with the purpose of the study which aimed to explore recent trends in Asian ESP research from 2005 to 2013. The Asian ESP Journal which has been a flagship in this area was chosen for the content analysis in this study. The results revealed that the research trends in ESP were primarily based on qualitative research method. Future research study may explore International ESP to compare the results of the study with this one. Keywords: ESP, trends in research, Asian contex

    Geometric transitions between Calabi-Yau threefolds related to Kustin-Miller unprojections

    Full text link
    We study Kustin-Miller unprojections between Calabi-Yau threefolds or more precisely the geometric transitions they induce. We use them to connect many families of Calabi-Yau threefolds with Picard number one to the web of Calabi Yau complete intersections. This enables us to find explicit description of a few known families of Calabi-Yau threefolds in terms of equations. Moreover we find two new examples of Calabi-Yau threefolds with Picard group of rank one, described by Pfaffian equations in weighted projective spaces.Comment: to appear in Journal of Geometry and Physic

    Capturing Assumptions while Designing a Verification Model for Embedded Systems

    Get PDF
    A formal proof of a system correctness typically holds under a number of assumptions. Leaving them implicit raises the chance of using the system in a context that violates some assumptions, which in return may invalidate the correctness proof. The goal of this paper is to show how combining informal and formal techniques in the process of modelling and formal verification helps capturing these assumptions. As we focus on embedded systems, the assumptions are about the control software, the system on which the software is running and the system’s environment. We present them as a list written in natural language that supplements the formally verified embedded system model. These two together are a better argument for system correctness than each of these given separately

    Unified Description for Network Information Hiding Methods

    Full text link
    Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe the embedding of hidden information. We introduce the first unified description of hiding methods in network steganography. Our description method is based on a comprehensive analysis of the existing publications in the domain. When our description method is applied by the research community, future publications will be easier to categorize, compare and extend. Our method can also serve as a basis to evaluate the novelty of hiding methods proposed in the future.Comment: 24 pages, 7 figures, 1 table; currently under revie
    corecore