1,375 research outputs found
Collaborative Categorization on the Web
Collaborative categorization is an emerging direction for research and innovative
applications. Arguably, collaborative categorization on the Web is an especially
promising emerging form of collaborative Web systems because of both, the
widespread use of the conventional Web and the emergence of the Semantic Web
providing with more semantic information on Web data. This paper discusses this issue
and proposes two approaches: collaborative categorization via category merging and
collaborative categorization proper. The main advantage of the first approach is that it
can be rather easily realized and implemented using existing systems such as Web
browsers and mail clients. A prototype system for collaborative Web usage that uses
category merging for collaborative categorization is described and the results of field
experiments using it are reported. The second approach, called collaborative
categorization proper, however, is more general and scales better. The data structure and
user interface aspects of an approach to collaborative categorization proper are
discussed
Surfing the Next Wave: Design and Implementation Challenges of Ubiquitous Computing
As computing becomes more mobile and pervasive, designing and implementing ubiquitous computing environments emerge as key challenges for information systems research and practice. The four short papers in this article report the highlights of the second Ubiquitous Computing Workshop at Case Western Reserve University in October 2003. The objectives of the papers are to set up a research agenda in this emerging interdisciplinary field, to share current level of understanding of leading edge research topics, and to create cumulative research streams in this field. Note: This paper consists of an overview of the second Ubiquitous Computing Workshop by its organizers, Kalle Lyytinen and Youngjin Yoo, followed by four papers summarizing its four major working groups. The four papers were prepared and can be read independently. They are not integrated
Bloom's Filters : Their Types and Analysis
Bloom filtrelerini ve çeşitlerini inceleyen bir çalışmanın özetidir. Bloom filtresi sorgulama üyeliklerini desteklemek amacıyla setleri temsil eden rasgele bir veri yapısıdır. 1970’lerde daha çok veri tabanı optimizasyonlarında kullanılmıştır. Bu yakınlarda bilgisayar ağları ile ilgili çalışma yapanlar daha sık kullanmaya başlamıştır. Bu çalışmada filtrelerin çeşitleri analiz edilecektir.In this paper we discuss Bloom filter in its original form and the varieties of its extensions. A Bloom filter is a randomized data-structure for concisely representing a set in order to support approximate membership queries. Although it was devised in 1970 for the purpose of spell checking, it was seldom used except in database optimization. In recent years, it has been rediscovered by the networking community, and has become a key component in many networking systems applications. In this paper, we will examine and analyse the different types of this filter
Bloom's Filters : Their Types and Analysis
Bloom filtrelerini ve çeşitlerini inceleyen bir çalışmanın özetidir. Bloom filtresi sorgulama üyeliklerini desteklemek amacıyla setleri temsil eden rasgele bir veri yapısıdır. 1970’lerde daha çok veri tabanı optimizasyonlarında kullanılmıştır. Bu yakınlarda bilgisayar ağları ile ilgili çalışma yapanlar daha sık kullanmaya başlamıştır. Bu çalışmada filtrelerin çeşitleri analiz edilecektir.In this paper we discuss Bloom filter in its original form and the varieties of its extensions. A Bloom filter is a randomized data-structure for concisely representing a set in order to support approximate membership queries. Although it was devised in 1970 for the purpose of spell checking, it was seldom used except in database optimization. In recent years, it has been rediscovered by the networking community, and has become a key component in many networking systems applications. In this paper, we will examine and analyse the different types of this filter
Cloudlet computing : recent advances, taxonomy, and challenges
A cloudlet is an emerging computing paradigm that is designed to meet the requirements and expectations of the Internet of things (IoT) and tackle the conventional limitations of a cloud (e.g., high latency). The idea is to bring computing resources (i.e., storage and processing) to the edge of a network. This article presents a taxonomy of cloudlet applications, outlines cloudlet utilities, and describes recent advances, challenges, and future research directions. Based on the literature, a unique taxonomy of cloudlet applications is designed. Moreover, a cloudlet computation offloading application for augmenting resource-constrained IoT devices, handling compute-intensive tasks, and minimizing the energy consumption of related devices is explored. This study also highlights the viability of cloudlets to support smart systems and applications, such as augmented reality, virtual reality, and applications that require high-quality service. Finally, the role of cloudlets in emergency situations, hostile conditions, and in the technological integration of future applications and services is elaborated in detail. © 2013 IEEE
Recommended from our members
2007 Circumvention Landscape Report: Methods, Uses, and Tools
As the Internet has exploded over the past fifteen years, recently reaching over a billion users, dozens of national governments from China to Saudi Arabia have tried to control the network by filtering out content objectionable to the countries for any of a number of reasons. A large variety of different projects have developed tools that can be used to circumvent this filtering, allowing people in filtered countries access to otherwise filtered content. In this report, we describe the mechanisms of filtering and circumvention and evaluate ten projects that develop tools that can be used to circumvent filtering: Anonymizer, Ultrareach, DynaWeb Freegate, Circumventor/CGIProxy, Psiphon, Tor, JAP, Coral, and Hamachi. We evaluated these tools in 2007 -- using both tests from within filtered countries and tests within a lab environment -- for their utility, usability, security, promotion, sustainability, and openness. We find that all of the tools use the same basic mechanisms of proxying and encryption but that they differ in their models of hosting proxies. Some tools use proxies that are centrally hosted, others use proxies that are peer hosted, and others use re-routing methods that use a combination of the two. We find that, in general, the tools work in the sense that they allow users to access pages that are otherwise blocked by filtering countries but that performance of the tools is generally poor and that many tools have significant, unreported security vulnerabilities.
The report was completed in 2007 and released to a group of private sponsors. Many of the findings of the report are now out of date, but we present them now, as is, because we think that the broad conclusions of the report about these tools remain valid and because we hope that other researchers will benefit from access to the methods used to test the tools.
Responses from developers of the tools in question are included in the report
Information Outlook, October 2003
Volume 7, Issue 10https://scholarworks.sjsu.edu/sla_io_2003/1009/thumbnail.jp
Are the Digital Natives Restless? Reaching Out to the Ne(x)t Generation
Outreach programs are meant to expand archival audiences beyond “traditional” users. In her 1978 article, “Education Programs: Outreach as an Administrative Function,” Elsie Freeman Freivogel argues that the archivist’s first job “is to recognize that we have many publics . . . that include, among others, teachers at all levels of the educational system; elementary, secondary school, college and university students; genealogists, avocational historians, government employees, publicists, media professionals, and the merely curious.” Because Web-based and digital projects address “many publics” in relevant and familiar ways, they are easily integrated into archival outreach activities. Although user groups have not changed dramatically since Freivogel compiled her list in 1978, many of their assumptions have. Studies of the uses of new technology in special collections and archives illustrate how the Internet and the World Wide Web have dramatically changed user expectations
- …