12 resultados para mobile computing, tecnologie web, Tizen

em Bulgarian Digital Mathematics Library at IMI-BAS


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Advergame is a new marketing concept that has appeared due to the fact that young people are always connected to the Internet, are using mobile services such as SMS and MMS, or are chatting with instant messenger services and they spend too much time just playing in a stand alone way or in a network game. A new revolutionary service is the advergame one; that is a game with advertisment capabilities. Any company can develop an advergame that is, a game with some kind of advertising process of this company. This paper introduces some idea and concepts when developping an advergame.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The main focus of attention in this paper is the access to websites of leading regional, national and world museums. Their accessibility from desktop and mobile devices is hereby evaluated. The paper covers a detailed analysis of the mobile operating systems, their market share in Bulgaria and the opportunities they offer to the users. The need for contemporary cultural and historical heritage websites which maintain lighter but fully-functioning mobile versions, facilitating and making their access from portable devices easier, is also well-grounded here.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Composite Web Services (CWS) aggregate multiple Web Services in one logical unit to accomplish a complex task (e.g. business process). This aggregation is achieved by defining a workflow that orchestrates the underlying Web Services in a manner consistent with the desired functionality. Since CWS can aggregate atomic and other CWS they foster the development of service layers and reuse of already existing functionality. An important issue in the deployment of services is their run-time performance under various loads. Due to the complex interactions of the underlying services, a CWS they can exhibit problematic and often difficult to predict behaviours in overload situations. This paper focuses on the use of request scheduling for improving CWS performance in overload situations. Different scheduling policies are investigated in regards to their effectiveness in helping with bulk arrivals.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With the development of the Internet culture applications are becoming simpler and simpler, users need less IT knowledge than earlier; from the ‘reader’ status they have reached that of the content creator and editor. In our days, the effects of the web are becoming stronger and stronger— computer-aided work is conventional almost everywhere. The spread of the Internet applications has several reasons: first of all, their accessibility is widespread; second, their use is not limited to only one computer or network on which they have been installed. Also, the quantity of accessible information now and earlier is not even comparable. Not counting the applications which need high broadband or high counting capacity (for example video editing), Internet applications are reaching the functionality of the thick clients associates. The most serious disadvantage of Internet applications – for security reasons — is that the resources of the client computer are not fully accessible or accessible only to a restricted extent. Still thick clients do have some advantages: better multimedia perdormance with more flexibility due to local resources and the possibility for offline working.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article presents the principal results of the doctoral thesis “Semantic-oriented Architecture and Models for Personalized and Adaptive Access to the Knowledge in Multimedia Digital Library” by Desislava Ivanova Paneva-Marinova (Institute of Mathematics and Informatics), successfully defended before the Specialised Academic Council for Informatics and Mathematical Modelling on 27 October, 2008.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Search engines sometimes apply the search on the full text of documents or web-pages; but sometimes they can apply the search on selected parts of the documents only, e.g. their titles. Full-text search may consume a lot of computing resources and time. It may be possible to save resources by applying the search on the titles of documents only, assuming that a title of a document provides a concise representation of its content. We tested this assumption using Google search engine. We ran search queries that have been defined by users, distinguishing between two types of queries/users: queries of users who are familiar with the area of the search, and queries of users who are not familiar with the area of the search. We found that searches which use titles provide similar and sometimes even (slightly) better results compared to searches which use the full-text. These results hold for both types of queries/users. Moreover, we found an advantage in title-search when searching in unfamiliar areas because the general terms used in queries in unfamiliar areas match better with general terms which tend to be used in document titles.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper is a reflection on the history and future of technology-enhanced learning. Over the last century various new technologies were introduced in education. Often, educational revolutions were proclaimed. Unfortunately, most of these new technologies failed to meet the high expectations. This paper reviews the rise and fall of various "revolutionary" learning technologies and analyses what went wrong. Three main driving factors are identified that influence the educational system: 1) educational practice, 2) educational research, and 3) educational technology. The role and position of these factors is elaborated and critically reviewed. Today, again many promising new technologies are being put in place for learning: gaming, social web, and mobile technologies, for example. Inevitably, these are once again proclaimed by its supporters to revolutionise teaching and learning. The paper concludes with identifying a number of relevant factors that substantiate a favourable future outlook of technology-enhanced learning.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Distributed and/or composite web applications are driven by intercommunication via web services, which employ application-level protocols, such as SOAP. However, these protocols usually rely on the classic HTTP for transportation. HTTP is quite efficient for what it does — delivering web page content, but has never been intended to carry complex web service oriented communication. Today there exist modern protocols that are much better fit for the job. Such a candidate is XMPP. It is an XML-based, asynchronous, open protocol that has built-in security and authentication mechanisms and utilizes a network of federated servers. Sophisticated asynchronous multi-party communication patterns can be established, effectively aiding web service developers. This paper’s purpose is to prove by facts, comparisons, and practical examples that XMPP is not only better suited than HTTP to serve as middleware for web service protocols, but can also contribute to the overall development state of web services.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper concerns the application of recent information technologies for creating a software system for numerical simulations in the domain of plasma physics and in particular metal vapor lasers. The presented work is connected with performing modernization of legacy physics software for reuse on the web and inside a Service-Oriented Architecture environment. Applied and described is the creation of Java front-ends of legacy C++ and FORTRAN codes. Then the transformation of some of the scientific components into web services, as well as the creation of a web interface to the legacy application, is presented. The use of the BPEL language for managing scientific workflows is also considered.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

ACM Computing Classification System (1998): J.2.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

ACM Computing Classification System (1998): H.5.2, H.2.8, J.2, H.5.3.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Our modular approach to data hiding is an innovative concept in the data hiding research field. It enables the creation of modular digital watermarking methods that have extendable features and are designed for use in web applications. The methods consist of two types of modules – a basic module and an application-specific module. The basic module mainly provides features which are connected with the specific image format. As JPEG is a preferred image format on the Internet, we have put a focus on the achievement of a robust and error-free embedding and retrieval of the embedded data in JPEG images. The application-specific modules are adaptable to user requirements in the concrete web application. The experimental results of the modular data watermarking are very promising. They indicate excellent image quality, satisfactory size of the embedded data and perfect robustness against JPEG transformations with prespecified compression ratios. ACM Computing Classification System (1998): C.2.0.