1,611 research outputs found

    A method for maintaining document consistency based on similarity contents

    Get PDF
    The advent of the WWW and distributed information systems have made it possible to share documents between different users and organisations. However, this has created many problems related to the security, accessibility, right and most importantly the consistency of documents. It is important that the people involved have access to the most up-to-date version of the documents, retrieve the correct documents and should be able to update the documents repository in such a way that his or her document are known to others. In this paper we propose a method for organising, storing and retrieving documents based on similarity contents. The method uses techniques based on information retrieval, document summarisation and term extraction and indexing. This methodology is developed for the E-cognos project which aims at developing tools for the management and sharing of documents in the construction domain

    Not The Internet, but This Internet: How Othernets Illuminate Our Feudal Internet

    Get PDF
    What is the Internet like, and how do we know? Less tendentiously, how can we make general statements about the Internet without reference to alternatives that help us to understand what the space of network design possibilities might be? This paper presents a series of cases of network alternatives which provide a vantage point from which to reflect upon the ways that the Internet does or does not uphold both its own design goals and our collective imaginings of what it does and how. The goal is to provide a framework for understanding how technologies embody promises, and how these both come to evolve.

    Human computer interaction with a PIM application: Merging activity, location and social setting into context

    Get PDF
    This is the post-print version of the Article. The official published version can be accessed from the link below - Copyright @ 2009 Springer VerlagPersonal Information Managers exploit the ubiquitous paradigm in mobile computing technology to integrate services and programs for business and leisure. Recognizing that every situation is constituted by information and events, this context will vary depending on the situation users are in, and the tasks they are about to commit. The value of context as a source of information is highly recognized and for individual dimensions context has been both conceptually described and prototypes implemented. The novelty in this paper is a new implementation of context by integrating three dimensions of context: social information, activity information and geographical position. Based on an application developed for Microsoft Window Mobile these three dimensions of context are explored and implemented in an application for mobile telephone users. Experiment conducted show the viability of tailoring contextual information in three dimensions to provide user with timely and relevant information

    Analgesic effects of 5-alkyloxy-4-amino-2(5H)-furanones as cholecystokinin-2 antagonists

    Get PDF
    4-Amino-2(5H)-furanones were synthesized in high yields over two synthetic steps from readily available mucochloric acid. These 5-alkyloxy-4-amino-2(5H)-furanones were screened in a ([125]) I-CCK-8 radioligand receptor binding assay for CCK2 affinity and novel active ligands in the nanomolar range were identified. SAR was optimized leading to the cyclohexyl derivative 25 with an IC50 of 27 nM. Furanone 18 was obtained as a stable crystalline material with an IC50 of 85 nM, but had a higher CCK2 selectivity. It was subsequently tested in the isolated guinea pig ileum assay with sulfated CCK8 , and the CCK antagonizing properties of the ligand were confirmed. The CCK2 selective antagonist 18 was found to potentiate analgesia in the tail flick assay in mice, for the strong opiate morphine, the partial opiate agonist tramadol and the tricyclic antidepressant desimipramine

    Mobile technologies and the spatiotemporal configurations of institutional practice

    Get PDF
    One of the most significant contemporary technological trends is institutional adoption and use of mobile and location-based systems and services. We argue that the notion of “location” as it manifests itself in location-based systems is being produced as an object of exchange. Here we are specifically concerned with what happens to institutional roles, power relationships, and decision-making processes when a particular type of information—that of spatiotemporal location of people—is made into a technologically tradable object through the use of location-based systems. We examine the introduction of GPS (Global Positioning Systems) technologies by the California criminal justice system and the institution of parole for monitoring the movements of parolees, with consequences both for the everyday lives of these parolees and the work practices of their parole officers. We document the ways in which broad adoption of location-based and mobile technologies has the capacity to radically reconfigure the spatiotemporal arrangement of institutional processes. The presence of digital location traces creates new forms of institutional accountability, facilitates a shift in the understood relation between location and action, and necessitates new models of interpretation and sense making in practice

    Aesthetic Journeys

    Get PDF
    Researchers and designers are increasingly creating technologies intended to support urban mobility. However, the question of what mobility is remains largely under-examined. In this paper we will use the notion of aesthetic journeys to reconsider the relationship between urban spaces, people and technologies. Fieldwork on the Orange County bus system and in the London Underground leads to a discussion of how we might begin to design for multiple mobilities

    Complexity as Process: Complexity Inspired Approaches to Composition

    Get PDF
    This article examines the use of Complexity Theory as an inspiration for the creation of new musical works, and highlights problems and possible solutions associated with its application as a compositional tool. In particular it explores how the philosophy behind Complexity Theory affects notions of process-based composition, indeterminacy in music and the performer/listener/environment relationship, culminating in providing a basis for the understanding of music creation as an active process within a context. The author presents one of his own sound installations, Cross-Pollination, as an example of a composition inspired and best understood from the philosophical position as described in Complexity Theory

    Information presentation: considering on-line user confidence for effective engagement

    Get PDF
    In order to design on-line services that are able to support the end-user in making informed choices about when and how to disclose personal information, a close understanding of the relationship between privacy and confidence is therefore needed. UK citizens accessing on-line services have privacy concerns about sharing personal information with government organizations. The physical distance between service user and service provider (increased by on-line service delivery) can reduce confidence in the management of personal information. A close understanding of the relationship between user confidence and information presentation can suggest new design principles to support them in making informed choices about when and how to disclose personal information. This paper presents the result of three user studies to understand user confidence with relation to graphical information presentation, which led to three distinct types of confidence: Institutional; Technological; and Relationship. The final study represents the impact of using graphical information presentation on users’ privacy concern and their confidence in using on-line services. The result indicated service users’ privacy concerns decrease when their privacy awareness increase

    User Configuration of Activity Awareness

    Full text link
    This paper describes an approach to user configuration of activity awareness. This approach offers users increased flexibility by allowing the use of multiple methods of configuration to be used within a unified framework; these configuration methods can include context, policy rules and automatic techniques of configuring behaviour. In this paper we describe the benefits of this flexibility and discuss a model of configuration that can be used to support these features
    corecore