961 resultados para Information technology


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Background Prescribing is a complex task, requiring specific knowledge and skills, and the execution of effective, context-specific clinical reasoning. Systematic reviews indicate medical prescribing errors have a median rate of 7% [IQR 2%-14%] of medication orders [1-3]. For podiatrists pursuing prescribing rights, a clear need exists to ensure practitioners develop a well-defined set of prescribing skills, which will contribute to competent, safe and appropriate practice. Aim To investigate the methods employed to teach and assess the principles of effective prescribing in the undergraduate podiatry program and compare and contrast these findings with four other non-medical professions who undertake prescribing after training at Queensland University of Technology. Method The NPS National Prescribing Competency Standards were employed as the prescribing standard. A curriculum mapping exercise was undertaken to determine whether the prescribing principles articulated in the competency standards were addressed by each profession. Results A range of methods are currently utilised to teach prescribing across disciplines. Application of prescribing competencies to the context of each profession appears to influence the teaching methods used. Most competencies were taught using a multimodal format, including interactive lectures, self-directed learning, tutorial sessions and clinical placement. In particular clinical training was identified as the most consistent form of educating safe prescribers across all five disciplines. Assessment of prescribing competency utilised multiple techniques including written and oral examinations and research tasks, case studies, objective structured clinical examination exercises and the assessment of clinical practice. Effective and reliable assessment of prescribing undertaken by students in diverse settings remains challenging e.g. that occurring in the clinical practice environment. Conclusion Recommendations were made to refine curricula and to promote efficient cross-discipline teaching by staff from the disciplines of podiatry, pharmacy, nurse practitioner, optometry and paramedic science. Students now experience a sophisticated level of multidisciplinary learning in the clinical setting which integrates the expertise and skills of experience prescribers combined with innovative information technology platforms (CCTV and live patient assessments). Further work is required to establish a practical, effective approach to the assessment of prescribing competence especially between the university and clinical settings.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Distraction in the workplace is increasingly more common in the information age. Several tasks and sources of information compete for a worker's limited cognitive capacities in human-computer interaction (HCI). In some situations even very brief interruptions can have detrimental effects on memory. Nevertheless, in other situations where persons are continuously interrupted, virtually no interruption costs emerge. This dissertation attempts to reveal the mental conditions and causalities differentiating the two outcomes. The explanation, building on the theory of long-term working memory (LTWM; Ericsson and Kintsch, 1995), focuses on the active, skillful aspects of human cognition that enable the storage of task information beyond the temporary and unstable storage provided by short-term working memory (STWM). Its key postulate is called a retrieval structure an abstract, hierarchical knowledge representation built into long-term memory that can be utilized to encode, update, and retrieve products of cognitive processes carried out during skilled task performance. If certain criteria of practice and task processing are met, LTWM allows for the storage of large representations for long time periods, yet these representations can be accessed with the accuracy, reliability, and speed typical of STWM. The main thesis of the dissertation is that the ability to endure interruptions depends on the efficiency in which LTWM can be recruited for maintaing information. An observational study and a field experiment provide ecological evidence for this thesis. Mobile users were found to be able to carry out heavy interleaving and sequencing of tasks while interacting, and they exhibited several intricate time-sharing strategies to orchestrate interruptions in a way sensitive to both external and internal demands. Interruptions are inevitable, because they arise as natural consequences of the top-down and bottom-up control of multitasking. In this process the function of LTWM is to keep some representations ready for reactivation and others in a more passive state to prevent interference. The psychological reality of the main thesis received confirmatory evidence in a series of laboratory experiments. They indicate that after encoding into LTWM, task representations are safeguarded from interruptions, regardless of their intensity, complexity, or pacing. However, when LTWM cannot be deployed, the problems posed by interference in long-term memory and the limited capacity of the STWM surface. A major contribution of the dissertation is the analysis of when users must resort to poorer maintenance strategies, like temporal cues and STWM-based rehearsal. First, one experiment showed that task orientations can be associated with radically different patterns of retrieval cue encodings. Thus the nature of the processing of the interface determines which features will be available as retrieval cues and which must be maintained by other means. In another study it was demonstrated that if the speed of encoding into LTWM, a skill-dependent parameter, is slower than the processing speed allowed for by the task, interruption costs emerge. Contrary to the predictions of competing theories, these costs turned out to involve intrusions in addition to omissions. Finally, it was learned that in rapid visually oriented interaction, perceptual-procedural expectations guide task resumption, and neither STWM nor LTWM are utilized due to the fact that access is too slow. These findings imply a change in thinking about the design of interfaces. Several novel principles of design are presented, basing on the idea of supporting the deployment of LTWM in the main task.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In the 1990 s the companies utilizing and producing new information technology, especially so-called new media, were also expected to be forerunners in new forms of work and organization. Researchers anticipated that new, more creative forms of work and the changing content of working life were about to replace old industrial and standardized ways of working. However, research on actual companies in the IT sector revealed a situation where only minor changes to existing organizational forms were seen .Many of the independent companies faced great difficulties trying to survive the rapid changes in the products and production forms in the emerging field. Most of the research on the new media field has been conducted as surveys, and an understanding of the actual everyday work process has remained thin. My research is a longitudinal study of the early phases of one new media company in Finland. The study is an analysis of the challenges the company faced in a rapidly changing business field and the attempts to overcome these challenges. The two main analyses in the study focus on the developmental phases of the company and the disturbances in the production process. Based on these analyses, I study changes and learning at work using the methodological framework of developmental work research. Developmental work research is a Finnish variant of the cultural-historical activity theory applied to the study of learning and transformations at work. The data was gathered over a three-year period of ethnographic fieldwork. I documented the production processes and everyday life in the company as a participant observer. I interviewed key persons, video and audio-taped meetings, followed e-mail correspondence and collected various documents, such as agreements and memos. I developed a systematic method for analyzing the disturbances in the production process by combining the various data sources. The systematic analysis of the disturbances depicted a very complex and only partly managed production process. The production process had a long duration, and no single actor had an understanding of it as a whole. Most of the disturbances had to do with the customer relationships. The nature of the disturbances was latent; they were recognized but not addressed. In the particular production processes that I analyzed, the ending life span of a particular product, a CD-ROM, became obvious. This finding can be interpreted in relation to the developmental phase of the production and the transformation of the field as a whole. Based on the analysis of the developmental phases and the disturbances, I formulate a hypothesis of the contradictions and developmental potentials of the activity studied. The conclusions of the study challenge the existing understanding of how to conceptualize and study organizational learning in production work. Most theories of organizational learning do not address qualitative changes in production nor historical challenges of organizational learning itself. My study opens up a new horizon in understanding organizational learning in a rapidly changing field where a learning culture based on craft or mass production work is insufficient. There is a need for anticipatory and proactive organizational learning. Proactive learning is needed to anticipate the changes in production type, and the life cycles of products.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Increased mass migration, as a result of economic hardship, natural disasters and wars, forces many people to arrive on the shores of cultures very different from those they left. How do they manage the legacy of the past and the challenges of their new everyday life? This is a study of immigrant women living in transnational families that act and communicate across national borders on a near-daily basis. The research was carried out amongst immigrant women who were currently living in Finland. The research asks how transnational everyday life is constructed. As everyday life, due to its mundane nature, is difficult to operationalise for research purposes, mixed data collection methods were needed to capture the passing moments that easily become invisible. Thus, the data were obtained from photographic diaries (459 photographs) taken by the research participants themselves. Additionally, stimulated recall discussions, structured questionnaires and participant observation notes were used to complement the photographic data. A tool for analysing the activities devealed in the data was created on the assumption that a family is an active unit that accommodates the current situation in which it is embedded. Everyday life activities were analysed emphasizing social, modal and spatial dimensions. Important daily moments were placed on a continuum: for me , for immediate others and with immediate others . They portrayed everyday routines and exceptions to it. The data matrix was developed as part of this study. The spatial dimensions formed seven units of activity settings: space for friendship, food, resting, childhood, caring, space to learn and an orderly space. Attention was also paid to the accommodative nature of activities; how women maintain traditions and adapt to Finnish life or re-create new activity patterns. Women s narrations revealed the importance of everyday life. The transnational chain of women across generations and countries, comprised of the daughters, mothers and grandmothers was important. The women showed the need for information technology in their transnational lives. They had an active relationship to religion; the denial or importance of it was obvious. Also arranging one s life in Finnish society was central to their narrations. The analysis exposed everyday activities, showed the importance of social networks and the uniqueness of each woman and family. It revealed everyday life in a structured way. The method of analysis that evolved in this study together with the research findings are of potential use to professionals, allowing the targeting of interventions to improve the everyday lives of immigrants.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Tutkimuksen tavoitteena oli kartoittaa ja kehittää modernia opiskeluympäristöä hyödyntävää kirjallisuuspiiritoimintaa ja sitä kautta edistää oppilaiden mahdollisuuksia osallistua elämyksellistä lukemista painottavaan kirjallisuuspiiriin sekä vahvistaa heidän kiinnostustaan tieto- ja viestintätekniikan käyttöön. Tutkimusaineisto kerättiin lukuvuonna 1997 1998 kyselyin ja haastatteluin sekä observoimalla lähiopetustilanteita ja virtuaaliryhmien sähköpostiviestintää. Lisäksi käytettiin valmiita dokumentteja ja asiakirjoja. Tutkimusjoukkona oli Matildaan osallistuneet 4.-6. luokan oppilaat kuudelta Espoon ala-asteelta sekä neljä tutoria, koordinaattori ja joitakin luokanopettajia Matilda-kouluista. Tutkimusongelmat suuntautuivat pääasiassa matildalaisten kokemuksiin opiskelusta modernissa opiskeluympäristössä, suhteesta tieto- ja viestintätekniikkaan sekä siihen, mitä uutta lukemiseen ja kirjallisuuteen liittyvää he kertoivat oppineensa ja kokeneensa. Koska tutkimuskohteen kaltaisia kokeiluita, joissa yhdistyy kirjallisuuspiiritoiminta ja moderni tieto- ja viestintätekniikka, ei ainakaan Suomessa ole aikaisemmin ollut, päädyttiin tutkimusmetodologian valinnassa kvalitatiiviseen otteeseen. Tutkimusote noudatti tapaustutkimuksen ja kehittämistutkimuksen periaatteita. Vaikka tutkimus oli menetelmältään kvalitatiivinen, aineistoa käsiteltiin myös kvantifioiden, mutta yleistyksiä tehtiin ainoastaan tapauksen suuntaan. Tutkimustulokset osoittivat, että opiskelu oli oppilaille positiivinen kokemus. He pitivät erityisesti etäopiskelun itsenäisestä työskentelystä ja lähiopetuspäivistä. Heidän suhtautumisensa tieto- ja viestintätekniikkaan muuttui positiivisemmaksi ja heidän taitonsa tieto- ja viestintätekniikan käyttäjinä kehittyivät. Oppilaat saivat positiivisia lukukokemuksia, heidän lukualueensa laajeni ja osa heistä kertoi lukutyylinsä muutoksista ja syvenemisestä. Oppilaat kokivat ongelmallisimmaksi hankkeen sekavan tutorointi-systeemin, kiireisen aikataulun sekä tietokoneisiin ja -verkkoon liittyvät ongelmat. kirjallisuuspiiri, kolmilukutaito, lukutaito, kirjallisuus, lukeminen, elämyksellinenlukeminen, kirjallisuudenopetus, moderni opiskeluympäristö, avoin ja joustava opiskeluympäristö, telematiikka, tieto- ja viestintätekniikka reading circle, teaching of literature, tri-literacy, literacy, reading, literature, aestheticreading, modern learning enviroment, open anf flexible learning enviroment, telematics, modern information technology

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Taking an interdisciplinary approach unmatched by any other book on this topic, this thoughtful Handbook considers the international struggle to provide for proper and just protection of Indigenous intellectual property (IP). In light of the United Nations Declaration on the Rights of Indigenous Peoples 2007, expert contributors assess the legal and policy controversies over Indigenous knowledge in the fields of international law, copyright law, trademark law, patent law, trade secrets law, and cultural heritage. The overarching discussion examines national developments in Indigenous IP in the United States, Canada, South Africa, the European Union, Australia, New Zealand, and Indonesia. The Handbook provides a comprehensive overview of the historical origins of conflict over Indigenous knowledge, and examines new challenges to Indigenous IP from emerging developments in information technology, biotechnology, and climate change. Practitioners and scholars in the field of IP will learn a great deal from this Handbook about the issues and challenges that surround just protection of a variety of forms of IP for Indigenous communities. Preface The Legacy of David Unaipon Matthew Rimmer Introduction: Mapping Indigenous Intellectual Property Matthew Rimmer PART I INTERNATIONAL LAW 1. The United Nations Declaration on the Rights of Indigenous Peoples: A Human Rights Framework for Indigenous Intellectual Property Mauro Barelli 2. The WTO, The TRIPS Agreement and Traditional Knowledge Tania Voon 3. The World Intellectual Property Organization and Traditional Knowledge Sara Bannerman 4. The World Indigenous Network: Rio+20, Intellectual Property, Indigenous Knowledge, and Sustainable Development Matthew Rimmer PART II COPYRIGHT LAW AND RELATED RIGHTS 5. Government Man, Government Painting? David Malangi and the 1966 One-Dollar Note Stephen Gray 6. What Wandjuk Wanted Martin Hardie 7. Avatar Dreaming: Indigenous Cultural Protocols and Making Films Using Indigenous Content Terri Janke 8. The Australian Resale Royalty for Visual Artists: Indigenous Art and Social Justice Robert Dearn and Matthew Rimmer PART III TRADE MARK LAW AND RELATED RIGHTS 9. Indigenous Cultural Expression and Registered Designs Maree Sainsbury 10. The Indian Arts and Crafts Act: The Limits of Trademark Analogies Rebecca Tushnet 11. Protection of Traditional Cultural Expressions within the New Zealand Intellectual Property Framework: A Case Study of the Ka Mate Haka Sarah Rosanowski 12 Geographical Indications and Indigenous Intellectual Property William van Caenegem PART IV PATENT LAW AND RELATED RIGHTS 13. Pressuring ‘Suspect Orthodoxy’: Traditional Knowledge and the Patent System Chidi Oguamanam, 14. The Nagoya Protocol: Unfinished Business Remains Unfinished Achmad Gusman Siswandi 15. Legislating on Biopiracy in Europe: Too Little, too Late? Angela Daly 16. Intellectual Property, Indigenous Knowledge, and Climate Change Matthew Rimmer PART V PRIVACY LAW AND IDENTITY RIGHTS 17. Confidential Information and Anthropology: Indigenous Knowledge and the Digital Economy Sarah Holcombe 18. Indigenous Cultural Heritage in Australia: The Control of Living Heritages Judith Bannister 19. Dignity, Trust and Identity: Private Spheres and Indigenous Intellectual Property Bruce Baer Arnold 20. Racial Discrimination Laws as a Means of Protecting Collective Reputation and Identity David Rolph PART VI INDIGENOUS INTELLECTUAL PROPERTY: REGIONAL PERSPECTIVES 21. Diluted Control: A Critical Analysis of the WAI262 Report on Maori Traditional Knowledge and Culture Fleur Adcock 22. Traditional Knowledge Governance Challenges in Canada Jeremy de Beer and Daniel Dylan 23. Intellectual Property protection of Traditional Knowledge and Access to Knowledge in South Africa Caroline Ncube 24. Traditional Knowledge Sovereignty: The Fundamental Role of Customary Law in Protection of Traditional Knowledge Brendan Tobin Index

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Department of Forest Resource Management in the University of Helsinki has in years 2004?2007 carried out so-called SIMO -project to develop a new generation planning system for forest management. Project parties are organisations doing most of Finnish forest planning in government, industry and private owned forests. Aim of this study was to find out the needs and requirements for new forest planning system and to clarify how parties see targets and processes in today's forest planning. Representatives responsible for forest planning in each organisation were interviewed one by one. According to study the stand-based system for managing and treating forests continues in the future. Because of variable data acquisition methods with different accuracy and sources, and development of single tree interpretation, more and more forest data is collected without field work. The benefits of using more specific forest data also calls for use of information units smaller than tree stand. In Finland the traditional way to arrange forest planning computation is divided in two elements. After updating the forest data to present situation every stand unit's growth is simulated with different alternative treatment schedule. After simulation, optimisation selects for every stand one treatment schedule so that the management program satisfies the owner's goals in the best possible way. This arrangement will be maintained in the future system. The parties' requirements to add multi-criteria problem solving, group decision support methods as well as heuristic and spatial optimisation into system make the programming work more challenging. Generally the new system is expected to be adjustable and transparent. Strict documentation and free source code helps to bring these expectations into effect. Variable growing models and treatment schedules with different source information, accuracy, methods and the speed of processing are supposed to work easily in system. Also possibilities to calibrate models regionally and to set local parameters changing in time are required. In future the forest planning system will be integrated in comprehensive data management systems together with geographic, economic and work supervision information. This requires a modular method of implementing the system and the use of a simple data transmission interface between modules and together with other systems. No major differences in parties' view of the systems requirements were noticed in this study. Rather the interviews completed the full picture from slightly different angles. In organisation the forest management is considered quite inflexible and it only draws the strategic lines. It does not yet have a role in operative activity, although the need and benefits of team level forest planning are admitted. Demands and opportunities of variable forest data, new planning goals and development of information technology are known. Party organisations want to keep on track with development. One example is the engagement in extensive SIMO-project which connects the whole field of forest planning in Finland.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Glaucoma is the second leading cause of blindness worldwide. Often, the optic nerve head (ONH) glaucomatous damage and ONH changes occur prior to visual field loss and are observable in vivo. Thus, digital image analysis is a promising choice for detecting the onset and/or progression of glaucoma. In this paper, we present a new framework for detecting glaucomatous changes in the ONH of an eye using the method of proper orthogonal decomposition (POD). A baseline topograph subspace was constructed for each eye to describe the structure of the ONH of the eye at a reference/baseline condition using POD. Any glaucomatous changes in the ONH of the eye present during a follow-up exam were estimated by comparing the follow-up ONH topography with its baseline topograph subspace representation. Image correspondence measures of L-1-norm and L-2-norm, correlation, and image Euclidean distance (IMED) were used to quantify the ONH changes. An ONH topographic library built from the Louisiana State University Experimental Glaucoma study was used to evaluate the performance of the proposed method. The area under the receiver operating characteristic curves (AUCs) was used to compare the diagnostic performance of the POD-induced parameters with the parameters of the topographic change analysis (TCA) method. The IMED and L-2-norm parameters in the POD framework provided the highest AUC of 0.94 at 10 degrees. field of imaging and 0.91 at 15 degrees. field of imaging compared to the TCA parameters with an AUC of 0.86 and 0.88, respectively. The proposed POD framework captures the instrument measurement variability and inherent structure variability and shows promise for improving our ability to detect glaucomatous change over time in glaucoma management.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Previous research identifies various reasons companies invest in information technology (IT), often as a means to generate value. To add to the discussion of IT value generation, this study investigates investments in enterprise software systems that support business processes. Managers of more than 500 Swiss small and medium-sized enterprises (SMEs) responded to a survey regarding the levels of their IT investment in enterprise software systems and the perceived utility of those investments. The authors use logistic and ordinary least squares regression to examine whether IT investments in two business processes affect SMEs' performance and competitive advantage. Using cluster analysis, they also develop a firm typology with four distinct groups that differ in their investments in enterprise software systems. These findings offer key implications for both research and managerial practice.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Large-scale chromosome rearrangements such as copy number variants (CNVs) and inversions encompass a considerable proportion of the genetic variation between human individuals. In a number of cases, they have been closely linked with various inheritable diseases. Single-nucleotide polymorphisms (SNPs) are another large part of the genetic variance between individuals. They are also typically abundant and their measuring is straightforward and cheap. This thesis presents computational means of using SNPs to detect the presence of inversions and deletions, a particular variety of CNVs. Technically, the inversion-detection algorithm detects the suppressed recombination rate between inverted and non-inverted haplotype populations whereas the deletion-detection algorithm uses the EM-algorithm to estimate the haplotype frequencies of a window with and without a deletion haplotype. As a contribution to population biology, a coalescent simulator for simulating inversion polymorphisms has been developed. Coalescent simulation is a backward-in-time method of modelling population ancestry. Technically, the simulator also models multiple crossovers by using the Counting model as the chiasma interference model. Finally, this thesis includes an experimental section. The aforementioned methods were tested on synthetic data to evaluate their power and specificity. They were also applied to the HapMap Phase II and Phase III data sets, yielding a number of candidates for previously unknown inversions, deletions and also correctly detecting known such rearrangements.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Event-based systems are seen as good candidates for supporting distributed applications in dynamic and ubiquitous environments because they support decoupled and asynchronous many-to-many information dissemination. Event systems are widely used, because asynchronous messaging provides a flexible alternative to RPC (Remote Procedure Call). They are typically implemented using an overlay network of routers. A content-based router forwards event messages based on filters that are installed by subscribers and other routers. The filters are organized into a routing table in order to forward incoming events to proper subscribers and neighbouring routers. This thesis addresses the optimization of content-based routing tables organized using the covering relation and presents novel data structures and configurations for improving local and distributed operation. Data structures are needed for organizing filters into a routing table that supports efficient matching and runtime operation. We present novel results on dynamic filter merging and the integration of filter merging with content-based routing tables. In addition, the thesis examines the cost of client mobility using different protocols and routing topologies. We also present a new matching technique called temporal subspace matching. The technique combines two new features. The first feature, temporal operation, supports notifications, or content profiles, that persist in time. The second feature, subspace matching, allows more expressive semantics, because notifications may contain intervals and be defined as subspaces of the content space. We also present an application of temporal subspace matching pertaining to metadata-based continuous collection and object tracking.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Sensor networks represent an attractive tool to observe the physical world. Networks of tiny sensors can be used to detect a fire in a forest, to monitor the level of pollution in a river, or to check on the structural integrity of a bridge. Application-specific deployments of static-sensor networks have been widely investigated. Commonly, these networks involve a centralized data-collection point and no sharing of data outside the organization that owns it. Although this approach can accommodate many application scenarios, it significantly deviates from the pervasive computing vision of ubiquitous sensing where user applications seamlessly access anytime, anywhere data produced by sensors embedded in the surroundings. With the ubiquity and ever-increasing capabilities of mobile devices, urban environments can help give substance to the ubiquitous sensing vision through Urbanets, spontaneously created urban networks. Urbanets consist of mobile multi-sensor devices, such as smart phones and vehicular systems, public sensor networks deployed by municipalities, and individual sensors incorporated in buildings, roads, or daily artifacts. My thesis is that "multi-sensor mobile devices can be successfully programmed to become the underpinning elements of an open, infrastructure-less, distributed sensing platform that can bring sensor data out of their traditional close-loop networks into everyday urban applications". Urbanets can support a variety of services ranging from emergency and surveillance to tourist guidance and entertainment. For instance, cars can be used to provide traffic information services to alert drivers to upcoming traffic jams, and phones to provide shopping recommender services to inform users of special offers at the mall. Urbanets cannot be programmed using traditional distributed computing models, which assume underlying networks with functionally homogeneous nodes, stable configurations, and known delays. Conversely, Urbanets have functionally heterogeneous nodes, volatile configurations, and unknown delays. Instead, solutions developed for sensor networks and mobile ad hoc networks can be leveraged to provide novel architectures that address Urbanet-specific requirements, while providing useful abstractions that hide the network complexity from the programmer. This dissertation presents two middleware architectures that can support mobile sensing applications in Urbanets. Contory offers a declarative programming model that views Urbanets as a distributed sensor database and exposes an SQL-like interface to developers. Context-aware Migratory Services provides a client-server paradigm, where services are capable of migrating to different nodes in the network in order to maintain a continuous and semantically correct interaction with clients. Compared to previous approaches to supporting mobile sensing urban applications, our architectures are entirely distributed and do not assume constant availability of Internet connectivity. In addition, they allow on-demand collection of sensor data with the accuracy and at the frequency required by every application. These architectures have been implemented in Java and tested on smart phones. They have proved successful in supporting several prototype applications and experimental results obtained in ad hoc networks of phones have demonstrated their feasibility with reasonable performance in terms of latency, memory, and energy consumption.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In recent years, XML has been widely adopted as a universal format for structured data. A variety of XML-based systems have emerged, most prominently SOAP for Web services, XMPP for instant messaging, and RSS and Atom for content syndication. This popularity is helped by the excellent support for XML processing in many programming languages and by the variety of XML-based technologies for more complex needs of applications. Concurrently with this rise of XML, there has also been a qualitative expansion of the Internet's scope. Namely, mobile devices are becoming capable enough to be full-fledged members of various distributed systems. Such devices are battery-powered, their network connections are based on wireless technologies, and their processing capabilities are typically much lower than those of stationary computers. This dissertation presents work performed to try to reconcile these two developments. XML as a highly redundant text-based format is not obviously suitable for mobile devices that need to avoid extraneous processing and communication. Furthermore, the protocols and systems commonly used in XML messaging are often designed for fixed networks and may make assumptions that do not hold in wireless environments. This work identifies four areas of improvement in XML messaging systems: the programming interfaces to the system itself and to XML processing, the serialization format used for the messages, and the protocol used to transmit the messages. We show a complete system that improves the overall performance of XML messaging through consideration of these areas. The work is centered on actually implementing the proposals in a form usable on real mobile devices. The experimentation is performed on actual devices and real networks using the messaging system implemented as a part of this work. The experimentation is extensive and, due to using several different devices, also provides a glimpse of what the performance of these systems may look like in the future.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Ubiquitous computing is about making computers and computerized artefacts a pervasive part of our everyday lifes, bringing more and more activities into the realm of information. The computationalization, informationalization of everyday activities increases not only our reach, efficiency and capabilities but also the amount and kinds of data gathered about us and our activities. In this thesis, I explore how information systems can be constructed so that they handle this personal data in a reasonable manner. The thesis provides two kinds of results: on one hand, tools and methods for both the construction as well as the evaluation of ubiquitous and mobile systems---on the other hand an evaluation of the privacy aspects of a ubiquitous social awareness system. The work emphasises real-world experiments as the most important way to study privacy. Additionally, the state of current information systems as regards data protection is studied. The tools and methods in this thesis consist of three distinct contributions. An algorithm for locationing in cellular networks is proposed that does not require the location information to be revealed beyond the user's terminal. A prototyping platform for the creation of context-aware ubiquitous applications called ContextPhone is described and released as open source. Finally, a set of methodological findings for the use of smartphones in social scientific field research is reported. A central contribution of this thesis are the pragmatic tools that allow other researchers to carry out experiments. The evaluation of the ubiquitous social awareness application ContextContacts covers both the usage of the system in general as well as an analysis of privacy implications. The usage of the system is analyzed in the light of how users make inferences of others based on real-time contextual cues mediated by the system, based on several long-term field studies. The analysis of privacy implications draws together the social psychological theory of self-presentation and research in privacy for ubiquitous computing, deriving a set of design guidelines for such systems. The main findings from these studies can be summarized as follows: The fact that ubiquitous computing systems gather more data about users can be used to not only study the use of such systems in an effort to create better systems but in general to study phenomena previously unstudied, such as the dynamic change of social networks. Systems that let people create new ways of presenting themselves to others can be fun for the users---but the self-presentation requires several thoughtful design decisions that allow the manipulation of the image mediated by the system. Finally, the growing amount of computational resources available to the users can be used to allow them to use the data themselves, rather than just being passive subjects of data gathering.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This thesis studies optimisation problems related to modern large-scale distributed systems, such as wireless sensor networks and wireless ad-hoc networks. The concrete tasks that we use as motivating examples are the following: (i) maximising the lifetime of a battery-powered wireless sensor network, (ii) maximising the capacity of a wireless communication network, and (iii) minimising the number of sensors in a surveillance application. A sensor node consumes energy both when it is transmitting or forwarding data, and when it is performing measurements. Hence task (i), lifetime maximisation, can be approached from two different perspectives. First, we can seek for optimal data flows that make the most out of the energy resources available in the network; such optimisation problems are examples of so-called max-min linear programs. Second, we can conserve energy by putting redundant sensors into sleep mode; we arrive at the sleep scheduling problem, in which the objective is to find an optimal schedule that determines when each sensor node is asleep and when it is awake. In a wireless network simultaneous radio transmissions may interfere with each other. Task (ii), capacity maximisation, therefore gives rise to another scheduling problem, the activity scheduling problem, in which the objective is to find a minimum-length conflict-free schedule that satisfies the data transmission requirements of all wireless communication links. Task (iii), minimising the number of sensors, is related to the classical graph problem of finding a minimum dominating set. However, if we are not only interested in detecting an intruder but also locating the intruder, it is not sufficient to solve the dominating set problem; formulations such as minimum-size identifying codes and locating dominating codes are more appropriate. This thesis presents approximation algorithms for each of these optimisation problems, i.e., for max-min linear programs, sleep scheduling, activity scheduling, identifying codes, and locating dominating codes. Two complementary approaches are taken. The main focus is on local algorithms, which are constant-time distributed algorithms. The contributions include local approximation algorithms for max-min linear programs, sleep scheduling, and activity scheduling. In the case of max-min linear programs, tight upper and lower bounds are proved for the best possible approximation ratio that can be achieved by any local algorithm. The second approach is the study of centralised polynomial-time algorithms in local graphs these are geometric graphs whose structure exhibits spatial locality. Among other contributions, it is shown that while identifying codes and locating dominating codes are hard to approximate in general graphs, they admit a polynomial-time approximation scheme in local graphs.