998 resultados para multimedia computing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cloud computing has emerged as a major ICT trend and has been acknowledged as a key theme of industry by prominent ICT organisations. However, one of the major challenges that face the cloud computing concept and its global acceptance is how to secure and protect the data that is the property of the user. The geographic location of cloud data storage centres is an important issue for many organisations and individuals due to the regulations and laws that require data and operations to reside in specific geographic locations. Thus, data owners may need to ensure that their cloud providers do not compromise the SLA contract and move their data into another geographic location. This paper introduces an architecture for a new approach for geographic location assurance, which combines the proof of storage protocol (POS) and the distance-bounding protocol. This allows the client to check where their stored data is located, without relying on the word of the cloud provider. This architecture aims to achieve better security and more flexible geographic assurance within the environment of cloud computing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents Capital Music, a mobile application enabling real-time sharing of song choices with collocated urban dwellers. Due to the real-time, location-based peer-to-peer approach of the application, a user experience study was performed utilising the Wizard of Oz method. The study provides insight into how sharing non-privacy sensitive but personal data in an anonymous way can influence the user experience of people in public urban places. We discuss the findings in relation to how Capital Music influences the process of “cocooning” in public urban places, the practice of designing anonymous interactions between collocated strangers, and how the sharing of song choices can create a sense of commonality between anonymous users in the urban space. The outcomes of this study are relevant for future location-based social networking applications that aim to create interactions between collocated strangers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article discusses the adequacy of copyright protection afforded to multimedia products pursuant to the Copyright Act 1968 (Cth) and in response to international obligations. The paper critically evaluates the effect that the most recent amendments to the Copyright Act have had on the protection of copyright in multimedia products. An outline of some practical measures of protection available to copyright owners as alternatives or complements to the current statutory regime is provided, ultimately concluding that the current legislative protection is ineffective. The paper closes by considering possible future reform by way of statutory amendments to the Copyright Act aimed at increasing protection of copyright in multimedia products.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As ambient computing blends into the fabric of the modern urban environment developing a positive interplay between people, places, and technology to create enlivened, interactive cities becomes a necessary priority in how we imagine, understand, design, and develop cities. Designing technology for art, culture and gastronomic experiences, that are rich in community, can provide the means for collaborative action to (re)create cities that are lively, engaging, and promote a sense of well being as well as belonging.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cloud computing allows for vast computational resources to be leveraged quickly and easily in bursts as and when required. Here we describe a technique that allows for Monte Carlo radiotherapy dose calculations to be performed using GEANT4 and executed in the cloud, with relative simulation cost and completion time evaluated as a function of machine count. As expected, simulation completion time decreases as 1=n for n parallel machines, and relative simulation cost is found to be optimal where n is a factor of the total simulation time in hours. Using the technique, we demonstrate the potential usefulness of cloud computing as a solution for rapid Monte Carlo simulation for radiotherapy dose calculation without the need for dedicated local computer hardware as a proof of principal. Funding source Cancer Australia (Department of Health and Ageing) Research Grant 614217

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The act of computer programming is generally considered to be temporally removed from a computer program’s execution. In this paper we discuss the idea of programming as an activity that takes place within the temporal bounds of a real-time computational process and its interactions with the physical world. We ground these ideas within the context of livecoding – a live audiovisual performance practice. We then describe how the development of the programming environment “Impromptu” has addressed our ideas of programming with time and the notion of the programmer as an agent in a cyber-physical system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the widespread application of healthcare Information and Communication Technology (ICT), constructing a stable and sustainable data sharing circumstance has attracted rapidly growing attention in both academic research area and healthcare industry. Cloud computing is one of long dreamed visions of Healthcare Cloud (HC), which matches the need of healthcare information sharing directly to various health providers over the Internet, regardless of their location and the amount of data. In this paper, we discuss important research tool related to health information sharing and integration in HC and investigate the arising challenges and issues. We describe many potential solutions to provide more opportunities to implement EHR cloud. As well, we introduce the development of a HC related collaborative healthcare research example, thus illustrating the prospective of applying Cloud Computing in the health information science research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Binge drinking is an important issue in Australia and worldwide. Existing studies have shown that mobile tools provide an effective method to self-monitor drink sessions, whereas social tool such as Facebook, can be used to construct social drinker identity (thus normalizing binge drinking), but if used among a peer-support that promotes the importance of responsible drinking, it potentially can be effective in moderating alcohol consumption. To combine mobile and social tool approaches, the study involves two complementary and largely qualitative studies to inform a novel design of an engaging mobile social tool for supporting responsible drinking among young women: (1) a survey of literature and mobile tools on alcohol related studies and interventions; (2) an in-depth focus group interview among young women aged 18 to 24. The results and discussions provide some valuable insights for future research and development in the field.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Science is often considered as one of the cornerstones of human advancement. Despite its importance in our society, science as a subject in schools appears to be losing ground. Lack of relevance, the nature of the curriculum and the pedagogical approach to teaching are some of the reasons which researchers believe are causing a “swing” away from science. This paper will argue for the effectiveness of simple science demonstrations as a feasible pedagogical option with a high task value and which has the potential to reengage and reinvigorate student interest in the subject. This paper describes a case study (N = 25) in which the Integrative problem based learning model for science was implemented in a year nine science class. The study was conducted at a secondary school in Australia. Teacher demonstrations were situated in classroom activities in a “Why is it so?” problem/question format. Qualitative data gathered from students demonstrated a number of benefits of this approach. This paper then explores ways in which Web 2.0 technologies could be incorporated to enhance the value of science demonstrations

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper illustrates a field research performed with a team of experts involved in the evaluation of Trippple, a system aimed at supporting the different phases of a tourist trip, in order to provide feedback and insights, both on the functionalities already implemented (that at the time of evaluation were available only as early and very unstable prototypes), and on the functionalities still to be implemented. We show how the involvement of professionals helped to focus on challenging aspects, instead of less important, cosmetic, issues and resulted profitable in terms of early feedback, issues spotted, and improvements suggested

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Climate change and land use pressures are making environmental monitoring increasingly important. As environmental health is degrading at an alarming rate, ecologists have tried to tackle the problem by monitoring the composition and condition of environment. However, traditional monitoring methods using experts are manual and expensive; to address this issue government organisations designed a simpler and faster surrogate-based assessment technique for consultants, landholders and ordinary citizens. However, it remains complex, subjective and error prone. This makes collected data difficult to interpret and compare. In this paper we describe a work-in-progress mobile application designed to address these shortcomings through the use of augmented reality and multimedia smartphone technology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite the compelling case for moving towards cloud computing, the upstream oil & gas industry faces several technical challenges—most notably, a pronounced emphasis on data security, a reliance on extremely large data sets, and significant legacy investments in information technology infrastructure—that make a full migration to the public cloud difficult at present. Private and hybrid cloud solutions have consequently emerged within the industry to yield as much benefit from cloud-based technologies as possible while working within these constraints. This paper argues, however, that the move to private and hybrid clouds will very likely prove only to be a temporary stepping stone in the industry's technological evolution. By presenting evidence from other market sectors that have faced similar challenges in their journey to the cloud, we propose that enabling technologies and conditions will probably fall into place in a way that makes the public cloud a far more attractive option for the upstream oil & gas industry in the years ahead. The paper concludes with a discussion about the implications of this projected shift towards the public cloud, and calls for more of the industry's services to be offered through cloud-based “apps.”

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the modern connected world, pervasive computing has become reality. Thanks to the ubiquity of mobile computing devices and emerging cloud-based services, the users permanently stay connected to their data. This introduces a slew of new security challenges, including the problem of multi-device key management and single-sign-on architectures. One solution to this problem is the utilization of secure side-channels for authentication, including the visual channel as vicinity proof. However, existing approaches often assume confidentiality of the visual channel, or provide only insufficient means of mitigating a man-in-the-middle attack. In this work, we introduce QR-Auth, a two-step, 2D barcode based authentication scheme for mobile devices which aims specifically at key management and key sharing across devices in a pervasive environment. It requires minimal user interaction and therefore provides better usability than most existing schemes, without compromising its security. We show how our approach fits in existing authorization delegation and one-time-password generation schemes, and that it is resilient to man-in-the-middle attacks.