A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
A distributed cyber-based information distillation and control architecture for wireless healthcare systems
2009
Proceedings of the 1st ACM international workshop on Medical-grade wireless networks - WiMD '09
The health-care domain presents many promising applications for cyber-physical space, such as patient information management, real-time emergency reporting, elder living assistance, etc. ...
However, although many component technologies needed for realizing such a health-care based cyber-physical space are available, a robust and effective architecture with novel management protocols implemented ...
Acknowledgments The authors are grateful for the help of Baha Alsaify and Anirudh Ladha in writing this paper. This research was supported in part by U.S. NSF grants CNS-0834592 and CNS-0832109. ...
doi:10.1145/1540373.1540382
fatcat:kvjsqy2zvjdode2y4galzzoddy
Position Paper: Turning the Corner with First Nations Telehealth
2005
Journal of Community Informatics
Keewaytinook Okimakanak Telehealth Services is an important contributing partner in the development and sustainability of community networks in remote First Nations across northwestern Ontario, Canada. ...
As the Government of Canada and national Aboriginal organizations develop strategies to address the critical health care system, this paper describes the highlights of a community-based health care initiative ...
the Telehealth Network o share stories, cook healthy meals and visit • Case conferences for Elder care -building support networks for high needs patients -allows them to remain in community • Personal ...
doi:10.15353/joci.v1i3.2035
fatcat:hiyb2m5zinalnn4b3wzgma5chu
Applicability of Neural Networks to Software Security
2012
2012 UKSim 14th International Conference on Computer Modelling and Simulation
Client, Server, LogFile and HardDrive. ...
In a complex distributed application environment, there will be a mixture of security requirements and constraints between clients, servers, and any intermediaries. ...
This pattern describes the actions required to build a secure session between the client and the server, or between the servers. ...
doi:10.1109/uksim.2012.14
dblp:conf/uksim/AdebiyiAI12
fatcat:t4bfxvyzcrbodmpzgrqdxffbt4
Browser-based Harnessing of Voluntary Computational Power
2017
Foundations of Computing and Decision Sciences
We survey the techniques employing the idea of browser-based voluntary computing (BBVC), discuss their commonalities, recognize recurring problems and their solutions and finally we describe a prototype ...
In addition, a standalone Java programs, manager, resided on a web server's site, one for each distributed application. The web was used only for coordination between clients and job creators. ...
Clients could be applets or standalone Java applications. Each client was a chassis, containing an engine. ...
doi:10.1515/fcds-2017-0001
fatcat:mvtpvz4txvgphcfaqcdsfw6mgy
The Independent LifeStyle Assistant: Lessons Learned
2006
Assistive technology
I.L.S.A. is a multiagent system that incorporates a unified sensing model, situation assessments, response planning, real-time responses and machine learning. ...
and include eating, dressing, bathing, toileting, transferring in and out of bed/chair and walking. ...
We also thank LifeLine Systems, Inc. for providing emergency personal response coverage for the Florida-based clients. ...
doi:10.1080/10400435.2006.10131909
pmid:16796244
fatcat:gl2jcx7r6ndv3emdb6unjlhqzu
The digital 'connected' earth: open technology for providing location-based services on degraded communication environments
2017
International Journal of Digital Earth
The libraries that implement it have been used in the development of a LBS application scenario that includes server side (over an Internet server) and client side over an Android platform (the implementation ...
GPS, Wi-Fi, etc.) or server-side (e.g. service position provided by the network operator), and communication networks to transmit information to an application that can process and respond to the request ...
In the work (Ferreira et al. 2013 ) presents an Android application designed for making easier the communication between an elder person and her/his caregiver. ...
doi:10.1080/17538947.2017.1356387
fatcat:bnurb6rml5ewdar724if5tdiiu
Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project
2019
Zenodo
Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project ...
The setup
emulates a network in which data is col-
lected with a sensor and is sent via
WLAN from client to server. ...
Social qualities, based on abilities for communication, networking, and inter-object relationships. ...
doi:10.5281/zenodo.4294256
fatcat:ovybcpqny5eppniw7hb5vcsevy
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network
2012
Journal of Networks
The authors also derive a sufficient stability condition that a SIP server can handle the overload effectively under the retransmission mechanism. ...
The second paper is "User-centric Mobility for Multimedia Communications: Experience and Evaluation from a Live Demo", authored by Raffaele Bolla, Riccardo Rapuzzi and Matteo Repetto. ...
ACKNOWLEDGEMENT The authors thank Ontario Centres of Excellence (OCE), Canada, and Alcatel-Lucent, Ottawa, for support. ...
doi:10.4304/jnw.7.1.88-100
fatcat:7atjgdr7hngvfjvvfibte6d3pm
A University-Based Smart and Context Aware Solution for People with Disabilities (USCAS-PWD)
2016
Computers
For instance, Jung [11] proposed an interactive approach by developing social networks between mobile users through collection of a datasets from about two million users. ...
professional network that is required for the establishment of a successful eco-system. ...
Acknowledgments: This Project was funded by The National Plan for Science Technology and Innovation (MARRIFAH), King Abdul-Aziz City for Science and Technology, Kingdom of Saudi Arabia, Award Number (12 ...
doi:10.3390/computers5030018
fatcat:tofdvnnxhvasbgewew6v5t4cjy
Emerging Trends in Management, IT and Education
2019
Zenodo
International Conference on Emerging Trends in Management, IT and Education ...
The business runs a global networked servers and resources on these servers are rented to clients who are looking for significant improvement in the performance of their website. ...
The business runs a global networked servers and resources on these servers are rented to clients who are looking for significant improvement in the performance of their website. ...
doi:10.5281/zenodo.3492020
fatcat:wytrxibqsjegfi6oouvfjcoiia
Machine-to-machine (M2M) communications for e-health applications
[chapter]
2015
Machine-to-machine (M2M) Communications
A broad range of e-Health applications can be conceived, with considerable benefits for both patients and healthcare providers. ...
In this context, we aim to provide a comprehensive overview on M2M systems for e-Health applications from a wireless communication perspective. ...
ACKNOWLEDGEMENTS This work has been funded by the research projects ESEE (324284), WSN4QoL (286047) and GEOCOM (TEC2011-27723-C02-01). ...
doi:10.1016/b978-1-78242-102-3.00020-4
fatcat:eejtocoifbfhfavr47fwp4rmpi
Rich socio-cognitive agents for immersive training environments: case of NonKin Village
2011
Autonomous Agents and Multi-Agent Systems
This is instantiated into a server that then works across a bridge to control the agents in an immersive, platform-specific 3D gameworld (client). ...
This is instantiated into a server that then works across a bridge to control the agents in an immersive, platform-specific 3D gameworld (client). ...
None of these agencies are responsible for the views expressed here. ...
doi:10.1007/s10458-011-9167-4
fatcat:uiu57oldefh3xbzzccleqoisz4
Mils: Business, Legal And Social Acceptance
2015
Zenodo
It has analysed how security requirements vary from a business (companies) and a social (consumer) point of view. ...
The objective of the WP is to analyse the business impact of trustworthy ICT for networked high-criticality systems. ...
Virtualized desktop is another type of virtualization, permitting a server to host multiple clients over a network using minimal client endpoints (thin clients). ...
doi:10.5281/zenodo.47301
fatcat:2njeypzu4jfgjaygciloaj4zae
A Telemonitoring System for Children with Cardiac Arythmias
2010
Zenodo
Patients, after a heart surgery, have to visit the hospital for a small period of time for a routine check which can take only a few minutes. ...
In this thesis we propose a solution that can help and improve the patients' life. ...
efficient client-server communication by simply adding a few server controls to their pages. ...
doi:10.5281/zenodo.2592346
fatcat:q66zk7inybdufax5vys4hclb64
Leveraging Machine Learning and Big Data for Smart Buildings: A Comprehensive Survey
[article]
2019
arXiv
pre-print
In this paper, we survey the area of smart building with a special focus on the role of techniques from machine learning and big data analytics. ...
Machine learning and big data analytics will undoubtedly play a critical role to enable the delivery of such smart services. ...
Spark Streaming can be utilized for a variety of application such as real-time monitoring and analyzing of application server logs. These logs messages are considered time series data. ...
arXiv:1904.01460v2
fatcat:rz2gsyurkradlkqvfankw3zue4
« Previous
Showing results 1 — 15 out of 578 results