61 research outputs found

    Bath Assisted Cooling of Spins

    Get PDF
    A suitable sequence of sharp pulses applied to a spin coupled to a bosonic bath can cool its state, i.e., increase its polarization or ground state occupation probability. Starting from an unpolarized state of the spin in equilibrium with the bath, one can reach very low temperatures or sizeable polarizations within a time shorter than the decoherence time. Both the bath and external fields are necessary for the effect which comes from the backreaction of the spin on the bath. This method can be applied to cool at once a disordered ensemble of spins. Since the bath is crucial for this mechanism, the cooling limits are set by the strength of its interaction with the spin(s).Comment: 4 pages. Accepted in PR

    Modeling IoT-aware Business Processes - A State of the Art Report

    Get PDF
    This research report presents an analysis of the state of the art of modeling Internet of Things (IoT)-aware business processes. IOT links the physical world to the digital world. Traditionally, we would find information about events and processes in the physical world in the digital world entered by humans and humans using this information to control the physical world. In the IoT paradigm, the physical world is equipped with sensors and actuators to create a direct link with the digital world. Business processes are used to coordinate a complex environment including multiple actors for a common goal, typically in the context of administrative work. In the past few years, we have seen research efforts on the possibilities to model IoT- aware business processes, extending process coordination to real world entities directly. This set of research efforts is relatively small when compared to the overall research effort into the IoT and much of the work is still in the early research stage. To create a basis for a bridge between IoT and BPM, the goal of this report is to collect and analyze the state of the art of existing frameworks for modeling IoT-aware business processes.Comment: 42 page

    Metallic spin-glasses beyond mean-field: An approach to the impurity-concentration dependence of the freezing temperature

    Full text link
    A relation between the freezing temperature (TgT^{}_{\rm g}) and the exchange couplings (JijJ^{}_{ij}) in metallic spin-glasses is derived, taking the spin-correlations (GijG^{}_{ij}) into account. This approach does not involve a disorder-average. The expansion of the correlations to first order in Jij/TgJ^{}_{ij}/T^{}_{\rm g} leads to the molecular-field result from Thouless-Anderson-Palmer. Employing the current theory of the spin-interaction in disordered metals, an equation for TgT^{}_{\rm g} as a function of the concentration of impurities is obtained, which reproduces the available data from {\sl Au}Fe, {\sl Ag}Mn, and {\sl Cu}Mn alloys well.Comment: 4 figures. This is a strongly revised version, where several aspects have been improved, and the equation for the freezing temperature has been refined. It is equivalent to the published version in J. Phys.: Condens. Matter 25 (2013) 13600

    Automating unobtrusive personalized services in ambient media environments

    Full text link
    The final publication is available at Springer via http://dx.doi.org/10.1007/s11042-013-1634-2In the age of ambient media, people are surrounded by lots of physical objects (media objects) for rendering the digital world in the natural environment. These media objects should interact with users in a way that is not disturbing for them. To address this issue, this work presents a design and automation strategy for augmenting the world around us with personalized ambient media services that behave in a considerate manner. That is, ambient services are capable of adjusting its obtrusiveness level (i.e., the extent to which each service intrudes the user¿s mind) by using the appropriate media objects for each user¿s situation.This work has been developed with the support of MICINN, under the project EVERYWARE TIN2010-18011, and the support of the Christian Doppler Forschungsgesellschaft and the BMWFJ, Austria.Serral Asensio, E.; Gil Pascual, M.; Valderas Aranda, PJ.; Pelechano Ferragud, V. (2014). Automating unobtrusive personalized services in ambient media environments. Multimedia Tools and Applications. 71(1):159-178. https://doi.org/10.1007/s11042-013-1634-2S159178711Bencomo N, Grace P, Flores-Cortés CA, Hughes D, Blair GS (2008) Genie: supporting the model driven development of reflective, component-based adaptive systems. In: ICSE, pp 811–814Blumendorf M, Lehmann G, Albayrak S (2010) Bridging models and systems at runtime to build adaptive user interfaces. In: Proc. of EICS 2010. ACM, pp 9–18Brown DM (2010) Communicating design: developing web site documentation for design and planning, 2nd edn. New Riders PressCalinescu R (2011) When the requirements for adaptation and high integrity meet. In: Proceedings of the 8th workshop on assurances for self-adaptive systems, ASAS ’11. ACM, New York, pp 1–4Filieri A, Ghezzi C, Tamburrelli G (2011) Run-time efficient probabilistic model checking. In: Proceedings of the 33rd International Conference on Software Engineering, ICSE ’11. ACM, New York, pp 341–350Gershenfeld N, Krikorian R, Cohen D (2004) The internet of things. Sci Am 291(4):46–51Gibbs WW (2005) Considerate computing. Sci Am 292(1):54–61Gulliksen J, Goransson B, Boivie I, Blomkvist S, Persson J, Cajander A (2003) Key principles for user-centred systems design. Behav Inform Technol 22:397–409Hinckley K, Horvitz E (2001) Toward more sensitive mobile phones. In: Proc. of the UIST ’01, pp 191–192Ho J, Intille SS (2005) Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. In: Proc. of CHI ’05. ACM, pp 909–918Horvitz E, Kadie C, Paek T, Hovel D (2003) Models of attention in computing and communication: from principles to applications. Commun ACM 46:52–59Ju W, Leifer L (2008) The design of implicit interactions: making interactive systems less obnoxious. Des Issues 24(3):72–84Kortuem G, Kawsar F, Fitton D, Sundramoorthy V (2010) Smart objects as building blocks for the internet of things. IEEE Internet Comput 14(1):44–51Lewis JR (1995) Ibm computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. Int J Hum Comput Interact 7(1):57–78Lugmayr A, Risse T, Stockleben B, Laurila K, Kaario J (2009) Semantic ambient media—an introduction. Multimed Tools Appl 43(3):337–359Mattern F (2003) From smart devices to smart everyday objects. In: Proc. Smart Objects Conf. (SOC 03). Springer, pp 15–16Morin B, Barais O, Jezequel JM, Fleurey F, Solberg A (2009) Models run.time to support dynamic adaptation. Comput 42(10):44–51Nelson L, Churchill EF (2005) User experience of physical-digital object systems: implications for representation and infrastructure. Paper presented at smart object systems workshop, in cojunction with ubicomp 2005Paternò F (2002) Concurtasktrees: an engineered approach to model-based design of interactive systems. In: L.E. Associates (ed) The handbook of analysis for human-computer interaction, pp 483–500Paternò F (2003) From model-based to natural development. HCI International, pp 592–596Ramchurn SD, Deitch B, Thompson MK, Roure DCD, Jennings NR, Luck M (2004) Minimising intrusiveness in pervasive computing environments using multi-agent negotiation. MobiQuitous ’04, pp 364–372Runeson P, Höst M (2009) Guidelines for conducting and reporting case study research in software engineering. Empir Softw Eng 14(2):131–164Schmidt A (2000) Implicit human computer interaction through context. Pers Technol 4(2–3):191–199Serral E, Valderas P, Pelechano V (2010) Supporting runtime system evolution to adapt to user behaviour. In: Proc. of CAiSE’10, pp 378–392Serral E, Valderas P, Pelechano V (2010) Towards the model driven development of context-aware pervasive systems. PMC 6(2):254–280Siegemund F (2004) A context-aware communication platform for smart objects. In: Proc of the int conf on pervasive computing. Springer, pp 69–86Streitz NA, Rocker C, Prante T, Alphen Dv, Stenzel R, Magerkurth C (2005) Designing smart artifacts for smart environments. Comput 38(3):41–49. doi: 10.1109/MC.2005.92Thiesse F, Kohler M (2008) An analysis of usage-based pricing policies for smart products. Electron Mark 18(3):232–241. doi: 10.1080/10196780802265751Vastenburg MH, Keyson DV, de Ridder H (2008) Considerate home notification systems: a field study of acceptability of notifications in the home. Pers Ubiquit Comput 12(8):555–56

    Work extraction in the spin-boson model

    Full text link
    We show that work can be extracted from a two-level system (spin) coupled to a bosonic thermal bath. This is possible due to different initial temperatures of the spin and the bath, both positive (no spin population inversion) and is realized by means of a suitable sequence of sharp pulses applied to the spin. The extracted work can be of the order of the response energy of the bath, therefore much larger than the energy of the spin. Moreover, the efficiency of extraction can be very close to its maximum, given by the Carnot bound, at the same time the overall amount of the extracted work is maximal. Therefore, we get a finite power at efficiency close to the Carnot bound. The effect comes from the backreaction of the spin on the bath, and it survives for a strongly disordered (inhomogeneously broadened) ensemble of spins. It is connected with generation of coherences during the work-extraction process, and we derived it in an exactly solvable model. All the necessary general thermodynamical relations are derived from the first principles of quantum mechanics and connections are made with processes of lasing without inversion and with quantum heat engines.Comment: 30 pages, 6 figure

    Scissors modes in triaxial metal clusters

    Get PDF
    We study the scissors mode (orbital M1 excitations) in small Na clusters, triaxial metal clusters Na12{\rm Na}_{12} and Na16{\rm Na}_{16} and the close-to-spherical Na9+{{\rm Na}_9}^+, all described in DFT with detailed ionic background. The scissors modes built on spin-saturated ground and spin-polarized isomeric states are analyzed in virtue of both macroscopic collective and microscopic shell-model treatments. It is shown that the mutual destruction of Coulomb and the exchange-correlation parts of the residual interaction makes the collective shift small and the net effect can depend on details of the actual excited state. The crosstalk with dipole and spin-dipole modes is studied in detail. In particular, a strong crosstalk with spin-dipole negative-parity mode is found in the case of spin-polarized states. Triaxiality and ionic structure considerably complicate the scissors response, mainly at expense of stronger fragmentation of the strength. Nevertheless, even in these complicated cases the scissors mode is mainly determined by the global deformation. The detailed ionic structure destroys the spherical symmetry and can cause finite M1 response (transverse optical mode) even in clusters with zero global deformation. But its strength turns out to be much smaller than for the genuine scissors modes in deformed systems.Comment: 17 pages, 5 figure

    Enabling High-Level Application Development in the Internet of Things

    Get PDF
    International audienceThe sensor networking field is evolving into the Internet of Things~(IoT), owing in large part to the increased availability of consumer sensing devices, including modern smart phones. However, application development in the IoT still remains challenging, since it involves dealing with several related issues, such as lack of proper identification of roles of various stakeholders, as well as lack of suitable (high-level) abstractions to address the large scale and heterogeneity in IoT systems. Although the software engineering community has proposed several approaches to address the above in the general case, existing approaches for IoT application development only cover limited subsets of above mentioned challenges. In this paper, we propose a multi-stage model-driven approach for IoT application development based on a precise definition of the role to be played by each stakeholder involved in the process -- domain expert, application designer, application developer, device developer, and network manager. The abstractions provided to each stakeholder are further customized using the inputs provided in the earlier stages by other stakeholders. We have also implemented code-generation and task-mapping techniques to support our approach. Our initial evaluation based on two realistic scenarios shows that the use of our techniques/framework succeeds in improving productivity in the IoT application development process

    Identification of Potential Kinase Inhibitors within the PI3K/AKT Pathway of Leishmania Species

    Get PDF
    Leishmaniasis is a public health disease that requires the development of more effective treatments and the identification of novel molecular targets. Since blocking the PI3K/AKT pathway has been successfully studied as an effective anticancer strategy for decades, we examined whether the same approach would also be feasible in Leishmania due to their high amount and diverse set of annotated proteins. Here, we used a best reciprocal hits protocol to identify potential protein kinase homologues in an annotated human PI3K/AKT pathway. We calculated their ligandibility based on available bioactivity data of the reported homologues and modelled their 3D structures to estimate the druggability of their binding pockets. The models were used to run a virtual screening method with molecular docking. We found and studied five protein kinases in five different Leishmania species, which are AKT, CDK, AMPK, mTOR and GSK3 homologues from the studied pathways. The compounds found for different enzymes and species were analysed and suggested as starting point scaffolds for the design of inhibitors. We studied the kinases’ participation in protein–protein interaction networks, and the potential deleterious effects, if inhibited, were supported with the literature. In the case of Leishmania GSK3, an inhibitor of its human counterpart, prioritized by our method, was validated in vitro to test its anti-Leishmania activity and indirectly infer the presence of the enzyme in the parasite. The analysis contributes to improving the knowledge about the presence of similar signalling pathways in Leishmania, as well as the discovery of compounds acting against any of these kinases as potential molecular targets in the parasite.Fil: Ochoa, Rodrigo. Universidad de Antioquia; ColombiaFil: Ortega Pajares, Amaya. University of Melbourne; AustraliaFil: Castello, Florencia Andrea. Consejo Nacional de Investigaciones Científicas y Técnicas. Oficina de Coordinación Administrativa Ciudad Universitaria. Instituto de Química Biológica de la Facultad de Ciencias Exactas y Naturales. Universidad de Buenos Aires. Facultad de Ciencias Exactas y Naturales. Instituto de Química Biológica de la Facultad de Ciencias Exactas y Naturales; Argentina. Universidad de Buenos Aires. Facultad de Ciencias Exactas y Naturales. Instituto de Cálculo; ArgentinaFil: Serral, Federico. Consejo Nacional de Investigaciones Científicas y Técnicas. Oficina de Coordinación Administrativa Ciudad Universitaria. Instituto de Química Biológica de la Facultad de Ciencias Exactas y Naturales. Universidad de Buenos Aires. Facultad de Ciencias Exactas y Naturales. Instituto de Química Biológica de la Facultad de Ciencias Exactas y Naturales; Argentina. Universidad de Buenos Aires. Facultad de Ciencias Exactas y Naturales. Instituto de Cálculo; ArgentinaFil: Fernández Do Porto, Darío Augusto. Consejo Nacional de Investigaciones Científicas y Técnicas. Oficina de Coordinación Administrativa Ciudad Universitaria. Instituto de Química Biológica de la Facultad de Ciencias Exactas y Naturales. Universidad de Buenos Aires. Facultad de Ciencias Exactas y Naturales. Instituto de Química Biológica de la Facultad de Ciencias Exactas y Naturales; Argentina. Universidad de Buenos Aires. Facultad de Ciencias Exactas y Naturales. Instituto de Cálculo; Argentina. Universidad de Buenos Aires. Facultad de Ciencias Exactas y Naturales. Departamento de Química Biológica; ArgentinaFil: Villa Pulgarin, Janny A.. Coorporación Universitaria Remington; ColombiaFil: Varela M., Rubén E.. Universidad Santiago de Cali; ColombiaFil: Muskus, Carlos. Universidad de Antioquia; Colombi

    Reducing the effects of routing inaccuracy by means of prediction and an innovative linkstate cost

    Get PDF
    Abstract-The routing inaccuracy problem is one of the major issues impeding the evolution and deployment of ConstraintBased Routing (CBR) techniques. This paper proposes a promising CBR strategy that combines the strengths of prediction with an innovative link-state cost. The latter explicitly integrates a two-bit counter predictor, with a novel metric that stands for the degree of inaccuracy (seen by the source node) of the state information associated with the links along a path. In our routing model, Link-State Advertisements (LSAs) are only distributed upon topological changes in the network, i.e., the state and availability of network resources along a path are predicted from the source rather than updated through conventional LSAs. As a proof-of-concept, we apply our routing strategy in the context of circuit-switched networks. We show that our approach considerably reduces the impact of routing inaccuracy on the blocking probability, while eliminating the typical LSAs caused by the traffic dynamics in CBR protocols

    Addressing the evolution of automated user behaviour patterns by runtime model interpretation

    Full text link
    The final publication is available at Springer via http://dx.doi.org/10.1007/s10270-013-0371-3The use of high-level abstraction models can facilitate and improve not only system development but also runtime system evolution. This is the idea of this work, in which behavioural models created at design time are also used at runtime to evolve system behaviour. These behavioural models describe the routine tasks that users want to be automated by the system. However, usersÂż needs may change after system deployment, and the routine tasks automated by the system must evolve to adapt to these changes. To facilitate this evolution, the automation of the specified routine tasks is achieved by directly interpreting the models at runtime. This turns models into the primary means to understand and interact with the system behaviour associated with the routine tasks as well as to execute and modify it. Thus, we provide tools to allow the adaptation of this behaviour by modifying the models at runtime. This means that the system behaviour evolution is performed by using high-level abstractions and avoiding the costs and risks associated with shutting down and restarting the system.This work has been developed with the support of MICINN, under the project EVERYWARE TIN2010-18011, and the support of the Christian Doppler Forschungsgesellschaft and the BMWFJ, Austria.Serral Asensio, E.; Valderas Aranda, PJ.; Pelechano Ferragud, V. (2013). Addressing the evolution of automated user behaviour patterns by runtime model interpretation. Software and Systems Modeling. https://doi.org/10.1007/s10270-013-0371-3SWeiser, M.: The computer of the 21st century. Sci. Am. 265, 66–75 (1991)Serral, E., Valderas, P., Pelechano, V.: Context-adaptive coordination of pervasive services by interpreting models during runtime. Comput. J. 56(1), 87–114 (2013)Ajila, S.A., Alam, S.: Using a formal language constructs for software model evolution. In: Third IEEE International Conference on Semantic Computing (IEEE-ICSC 2009). Berkeley, CA, USA, pp. 390–395 (2009)Bennett, K., Rajlich, V.: Software Maintenance and Evolution: A Roadmap. In: 22nd International Conference on Software Engineering (ICSE 2000). Limerick, Ireland, pp. 75–87 (2000)Mens, T.: The ERCIM working group on software evolution: the past and the future. In: Proceedings of the Joint International and Annual ERCIM Workshops on Principles of Software Evolution (IWPSE) and Software Evolution (Evol) Workshops. ACM (2009)Mens, T., Wermelinger, M., Ducasse, S., Demeyer, S., Hirschfeld, R.: Challenges in software evolution. In: Report of the ChaSE 2005 Workshop Organised by the ERCIM Working Group on Software Evolution. IWPSE-05. Lisbon, Portugal, pp. 13–22 (2005)Hirschfeld, R., Kawamura, K., Berndt, H.: Dynamic service adaptation for runtime system extensions. In: Wireless On-Demand Network Systems, pp. 227–240. Springer, Berlin, Heidelberg, Madonna di Campiglio, Italy (2004)Lientz, B.P., Swanson, E.B.: Software maintenance management: a study of the maintenance of computer applications software in 487 data processing organizations. Addison-Wesley, Reading, MA (1980)Buckley, J., Mens, T., Zenger, M., Rashid, A., Kniesel, G.: Towards a taxonomy of software change. J. Softw. Maint. Evolut. Res. Pract. 17(5), 309–332 (2003)Hardian, B., Indulska, J., Henricksen, K.: Balancing autonomy and user control in context-aware systems—a survey. In: CoMoRea, IEEE PerCom Workshops 2006. (2006)Biegel, G., Cahill, V.: A framework for developing mobile, context-aware applications. In: The 2nd IEEE Conference on Pervasive Computing and Communication (PerCom), pp. 361–365 (2004)Hofer, T., Schwinger, W., Pichler, M., Leonhartsberger, G., Altmann, J.: Context-awareness on mobile devices—the hydrogen approach. In: The 36th Annual Hawaii International Conference on System Sciences, pp. 292–302 (2002)Dey, A.K.: Understanding and using context. Pers. Ubiquitous Comput. 5(1), 4–7 (2001)Sheng, Q.Z., Benatallah, B.: ContextUML: a UML-based modelling language for model-driven development of context-aware web services. In: Proceedings of the International Conference on Mobile, Business (ICMB’05). pp. 206–212 (2005)Henricksen, K., Indulska, J.: A software engineering framework for context-aware pervasive computing. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications (PerCom 2004), pp. 77–86. IEEE, Orlando, FL, USA (2004)Baldauf, M., Dustdar, S., Rosenberg, F.: A survey on context-aware systems. Int. J. Ad Hoc Ubiquitous Comput. 2(4), 263–277 (2007)Ye, J., Coyle, L., Dobson, S., Nixon, P.: Ontology-based models in pervasive computing systems. Knowl. Eng. Rev. 22(4), 315–347 (2007)Chen, H., Finin, T., Joshi, A.: An ontology for context-aware pervasive computing environments. Special Issue on Ontologies for Distributed Systems. Knowl. Eng. Rev. 18(3), 197–207 (2004)Welty, C., McGuinness, D.L.: OWL Web Ontology Language Guide. vol. W3C Recomm. W3C Recommendation 10 Feb 2004 (2004)Shepherd, A.: HTA as a framework for task analysis. Ergonomics 41, 1537–1552 (1998)Serral, E., Valderas, P., Pelechano, V.: Towards the model driven development of context-aware pervasive systems. Special Issue on Context Modelling, Reasoning and Management. PMC 6(2), 254–280 (2010)Serral, E.: Automating Routine Tasks in Smart Environments. A Context-aware Model-driven Approach, Technical University of Valencia (2011)Mellor, S.J., Balcer, M.J.: Executable UML: A Foundation for Model Driven Architecture. Addison-Wesley, Indianapolis (2002)Muñoz, J., Ferragud, D.V.P.: Model Driven Development of Pervasive Systems. Building a Software Factory. Universidad PolitĂ©cnica de Valencia, Valencia (2008)Juric, M.B., Sarang, P.: Business Process Execution Language for Web Services: BPEL and BPEL4WS (2006)Loke, S.W., Smanchat, S., Ling, S., Indrawan, M.: Formal mirror models: an approach to just-in-time reasoning for device ecologies. Int. J. Smart Home 2(1), 15–32 (2008)Code Generation conference. http://www.codegeneration.net/cg2010/ (2010)Guy, M.: Report 2: API Good Practice Good practice for provision of and consuming APIs. UKOLN (2009)Bloch, J.: How to design a good API and why it matters. pp. 506–507 (2005)Sirin, E., Parsia, B., Grau, B.C., Kalyanpur, A., Katz, Y.: Pellet: A practical OWL-DL reasoner. J. Web Semant. 5(2), 51–53 (2007)Bernstein, P.: Multiversion concurrency control—theory and algorithms. ACM Trans. Database Syst. 8(4), 465–484 (1983)Cooper, S., Dann, W., Pausch, R.: Alice: a 3-D tool for introductory programming concepts. J. Comput. Sci. Coll. 15, 107–116 (2000)PĂ©rez, F., Valderas, P.: Allowing end-users to actively participate within the elicitation of pervasive system requirements through immediate visualization. In: Fourth International Workshop on Requirements Engineering Visualization (REV), pp. 31–40. IEEE, Atlanta, Georgia, USA (2009)Lieberman, H., PaternĂł, F., Wulf, V.: End User Development. Springer, Dordrecht (2006)Nielsen, J.: Usability Engineering. Morgan Kaufmann Publishers Inc, San Francisco (1993)Van Welie, M., Trætteberg, H.: Interaction Patterns in User, Interfaces. pp. 13–16 (2000)Galitz, W.O.: The Essential Guide to User Interface Design: An Introduction to GUI Design Principles and Techniques. Wiley, New York (2002)Kitchenham, B., Pickard, L., Pfleeger, S.L.: Case studies for method and tool evaluation. Softw. IEEE 12(4), 52–62 (1995)Wohlin, C., Runeson, P., Höst, M., Ohlsson, M.C., Regnell, B., WesslĂ©n, A.: Experimentation in Software Engineering. Springer, Berlin (2012)Jones, J.V.: Applied software measurement: assuring productivity & quality (2nd ed’97). McGraw-Hill, New York (1997)Strang, T., Linnhoff-Popien, C.: A context modeling survey. In: First International Workshop on Advanced Context Modelling, Reasoning And Management at UbiComp (2004)Lewis, J.R.: Psychometric Evaluation of an After-Scenario Questionnaire for Computer Usability Studies? The ASQ. SIGCHI Bulletin (1991)Cook, D.J., Youngblood, M., Heierman, I.I.I.E.O., Gopalratnam, K., Rao, S., Litvin, A., Khawaja, F.: MavHome: An Agent-based Smart Home. In: First IEEE International Conference on Pervasive Computing and, Communications (PerCom’03), pp. 521–524 (2003)Hagras, H., Callaghan, V., Colley, M., Clarke, G., Pounds-Cornish, A., Duman, H.: Creating an ambient-intelligence environment using embedded agents. IEEE Intell. Syst. 19(6), 12–20 (2004)Rashidi, P., Cook, D.J.: Keeping the resident in the loop: adapting the smart home to the user. IEEE Trans. Syst. Man Cybern. 39(5), 949–959 (2009)Webb, G.I., Pazzani, M.J., Billsus, D.: Machine learning for user modeling. User model. User-Adapt Interact. 11(1–2), 19–29 (2001)Valiant, L.G.: A theory of the learnable. Commun. ACM 27(11), 1134–1142 (1984)Serral, E., Valderas, P., Pelechano, V.: (2011) Improving the cold-start problem in user task automation by using models at runtime. In: Information Systems Development, pp. 671–683. (2011)GarcĂ­a-Herranz, M., Haya, P.A., Esquivel, A., Montoro, G., Alamán, X.: Easing the smart home: semi-automatic adaptation in perceptive environments. J. Univers. Comput. Sci. 14(9), 1529–1544 (2008)Henricksen, K., Indulska, J., Rakotonirainy, A.: Using context and preferences to implement self-adapting pervasive computing applications. Sofw. Pract. Exp. 36(11–12), 1307–1330 (2006)Johnson, P.: Tasks and situations: considerations for models and design principles in human computer interaction, pp. 1199–1204. HCI International. Munich, Germany (1999)Cook, D.J., Das, S.K.: Smart environments: technologies, protocols, and applications, vol. 43. Wiley-Interscience, New York (2005)Paternò, F.: ConcurTaskTrees: an Engineered approach to model-based design of interactive systems. In: The Handbook of Analysis for Human-Computer Interaction, pp. 483–500 (2002)Pribeanu, C., Limbourg, Q., Vanderdonckt1, J.: Task modelling for context-sensitive user interfaces. In: Interactive Systems: Design, Specification, and Verification (DSV-IS), pp. 49–68. Springer, Berlin, Heidelberg 2001, Glasgow, Scotland, UK (2001)Souchon, N., Limbourg, Q., Vanderdonckt., J.: Task modelling in multiple contexts of use. In: Interactive Systems: Design, Specification, and Verification (DSV-IS), pp. 59–73 (2002)Huang, R., Cao, Q., Zhou, J., Sun, D., Su, Q.: Context-aware active task discovery for pervasive computing. In: International Conference on Computer Science and Software Engineering, pp. 463–466. IEEE, Wuhan, China (2008)Sousa, J.P., Poladian, V., Garlan, D., Schmerl, B.: Task-based adaptation for ubiquitous computing. IEEE Trans. Syst. Man Cybern. 36(3), 328–340 (2006)Masuoka, R., Parsia, B., Labrou, Y.: Task Computing—The Semantic Web Meets Pervasive Computing. In: 2nd International Semantic Web Conference on the Semantic Web (ISWC 2003), pp. 866–881. vol. LNCS 2870. Sanibel Island, FL, USA (2003)Oreizy, P., Gorlick, M.M., Taylor, R.N., Heimbigner, D., Johnson, G., Medvidovic, N., Quilici, A., Rosenblum, D.S., Wolf, A.L.: An architecture-based approach to self-adaptive software. IEEE Intell. Syst. Their Appl. 14(3), 54–62 (1999)Floch, J., Hallsteinsen, S., Stav, E., Eliassen, F., Lund, K., Gjørven, E.: Using Architecture Models for Runtime Adaptability. IEEE Software. 23(2), 62–70 (2006)Morin, B., JĂ©zĂ©quel, J.-M., Fleurey, F., Solberg, A.: Models at runtime to support dynamic adaptation. IEEE Comput. Soc. pp. 46–53 (2009)Cetina, C., Giner, P., Fons, J., Pelechano, V.: Using feature models for developing self-configuring smart homes. In: Fifth International Conference on Autonomic and Autonomous Systems, pp. 179–188. IEEE, Valencia, Spain (2009)Garlan, D., Schmerl, B.: Using architectural models at runtime: research challenges. In: Proceedings of the European Workshop on Software Architectures, pp. 200–205. Springer, Berlin, Heidelberg, St Andrews, UK (2004)Blumendorf, M., Lehmann, G., Feuerstack, S., Albayrak, S.: Executable models for human-computer interaction. In: Interactive Systems, Design, Specification, and Verification Workshop (DSV-IS 2008), pp. 238–251. Springer Berlin Heidelberg, Kingston, Canada (2008)Ballagny, C., Hameurlain, N., Barbier, F.: MOCAS: a state-based component model for self-adaptation. In: Third IEEE International Conference on Self-Adaptive and Self-Organizing Systems, pp. 206–215. IEEE, San Francisco, California (2009)Amoui, M., Derakhshanmanesh, M., Ebert, J., Tahvildari, L.: Achieving dynamic adaptation via management and interpretation of runtime models. J. Syst. Softw. 85(12), 2720–2737 (2012)Blair, G., Bencomo, N., France, R.B.: [email protected]. IEEE Comput. 42, 22–27 (2009)Zhang, J., Cheng, B.H.C.: Model based development of dynamically adaptive software. In: International Conference on Software Engineering (ICSE’06), pp. 371–380. ACM, Shanghai, China (2006
    • …
    corecore