84,147 Hits in 7.2 sec

Guest editor's introduction: Ontology issues and applications

Fred Freitas, Heiner Stuckenschmidt, Natalya F. Noy
2005 Journal of the Brazilian Computer Society  
SIMS model of the application domain includes a hierarchical terminological knowledge base with nodes representing objects, actions and states.  ...  connect the knowledge about the enterprise, its domain of action and the types of information available, together with systems to process object-level data, and (c) the application level, where knowledge-intensive  ... 
doi:10.1590/s0104-65002005000300001 fatcat:jnguchoeqnaabhsmjfe43c6yoa

Ontology Issues and Applications Guest Editors' Introduction

Fred Freitas, Heiner Stuckenschmidt, Natalya F. Noy
2005 Journal of the Brazilian Computer Society  
SIMS model of the application domain includes a hierarchical terminological knowledge base with nodes representing objects, actions and states.  ...  connect the knowledge about the enterprise, its domain of action and the types of information available, together with systems to process object-level data, and (c) the application level, where knowledge-intensive  ... 
doi:10.1007/bf03192372 fatcat:4v655orvdbe6dhobk65mwlqdzu

Leaky Objects

Karey Helms
2017 Proceedings of the 2016 ACM Conference Companion Publication on Designing Interactive Systems - DIS '17 Companion  
This leaking of implicit information changes our individual interactions with objects to through objects, enabling expressive communication and ambiguous speculation.  ...  This paper introduces the concept of leaky objects to describe this phenomenon in which shared objects unintentionally reveal implicit information about individual or collective users.  ...  Leaky objects results in interactions with objects being transformed to interactions through objects as implicit information enables expressive communication and ambiguous speculation.  ... 
doi:10.1145/3064857.3079142 dblp:conf/ACMdis/Helms17 fatcat:gaomt6gfxjcs7or4mwo3larcxy

Trace analysis and mining for smart cities: issues, methods, and applications

Gang Pan, Guande Qi, Wangsheng Zhang, Shijian Li, Zhaohui Wu, Laurence Yang
2013 IEEE Communications Magazine  
In this article, we first give a brief introduction to trace data; then we present six research issues in trace analysis and mining, and survey the state-of-the-art methods; finally, five promising application  ...  Traces of moving objects in a city, which depict lots of semantics concerning human mobility and city dynamics, are becoming increasingly important.  ...  ACKNOWLEDGMENTS This work is partly supported by the National Key Basic Research Program of China (2013CB329504) and Qianjiang Talent Program of Zhejiang (2011R10078). Dr. Z.  ... 
doi:10.1109/mcom.2013.6525604 fatcat:57ge66oshbebdc5azxvbyu5hru

Foreword of Special Issue on "E-Service and Applications"

Jason C. Hung, Hsing-I Wang
2011 Journal of Computers  
This special issue aims to bring together researchers and practitioners to engage in an in-depth discussion on various research and deployment issues regarding ecommerce and e-government.  ...  With the healthcare support e-service, life quality for elderly senior citizens and their families could be significantly improved.  ...  With his strong encouragement, I have started devoting myself to submitting papers to academic journals.  ... 
doi:10.4304/jcp.6.3.387-388 fatcat:6uf2oayvbbfibphaobqewpnkx4

Object technology

Helen Sharp, Hugh Robinson
2002 Companion of the 17th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications - OOPSLA '02  
Furthermore, OOPSLA signified a move from object-oriented issues being described in terms from some other area within computer science (programming environments, human-computer interaction, educational  ...  Our work points to this as being a pivotal moment when a separate object-oriented community emerged and rapidly developed its own fora for the discussion and dissemination of object issues.  ... 
doi:10.1145/985072.985119 dblp:conf/oopsla/SharpR02 fatcat:li27xazv3fh6vheufr7lp3ji4e

Application Of Grounded Theory Method In Information Systems Research: Methodological And Practical Issues

Mohanad Halaweh
2011 Review of Business Information Systems (RBIS)  
These issues, which are methodological in nature, and their implications will also be discussed.  ...  It also sheds some light on practical issues that information systems (IS) researchers face when applying GTM such as applying theoretical sampling and coding in GTM, concerns of presenting GTM data, and  ...  through human interactions and thought.  ... 
doi:10.19030/rbis.v16i1.6762 fatcat:xopp3us5a5cubfndn3gotovx5a

Embodied data objects

Manas Tungare, Pardha S. Pyla, Pradyut Bafna, Vladimir Glina, Wenjie Zheng, Xiaoyan Yu, Umut Balli, Steven Harrison
2006 Proceedings of the 44th annual southeast regional conference on - ACM-SE 44  
These data objects can be used to interact with information-appliance-like devices that provide specific services as dictated by the context of interaction.  ...  The inherent affordances of physical artifacts are leveraged to make the interaction with these service-oriented devices intuitive and natural.  ...  In a sense, our data objects embody the data itself and "contain" active information since the object may be used for interacting with information appliances.  ... 
doi:10.1145/1185448.1185529 dblp:conf/ACMse/TungarePBGZYBH06 fatcat:rwb2vmm5qnhzbeobpa67dnqcum

Crowd-Enhanced Cloud Services: Issues and Directions

Saeed Arbabi, Mohammad Allah Bakhsh, Mohsen Sharifi
2015 International Journal of Computer Applications  
Crowdsourcing in combination with the machine automated techniques.  ...  At the end, the modality and challenges of this convergence and its future trends are explored.  ...  HITs, show up in our daily life.  ... 
doi:10.5120/20676-3486 fatcat:lqejfkgvk5attgrn5i5rjp3oni

A Taxonomy Study on Securing Blockchain-based Industrial Applications: An Overview, Application Perspectives, Requirements, Attacks, Countermeasures, and Open Issues [article]

Khizar Hameed, Mutaz Barika, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang
2021 arXiv   pre-print
application, security and privacy challenges, and requirements of Blockchain-based industrial applications, along with possible security threats and countermeasures.  ...  Furthermore, we highlight some open issues in industrial applications that help to design secure Blockchain-based applications as future directions.  ...  4.0 applications, in conjunction with attack categories, attackers' objectives, vulnerabilities exploited and target applications. • We identify some open issues of integrating Blockchain technology into  ... 
arXiv:2105.11665v1 fatcat:bsm7w2shjneajp425oddszr6ju

Intersecting with Unaware Objects

William Odom, Ron Wakkary
2015 Proceedings of the 2015 ACM SIGCHI Conference on Creativity and Cognition - C&C '15  
We adopt a design-oriented approach aimed at motivating and expanding the notion of everyday creativity beyond explicit interactions to also include the implicit, incremental and, at times even, unknowing  ...  Through analyzing and synthesizing insights that emerged across our studies, we describe a related set of concepts in support of a more implicit form of everyday creativity, which includes: unaware objects  ...  This work is supported in part by a Banting Fellowship, and grants from SSHRC and NSERC.  ... 
doi:10.1145/2757226.2757240 dblp:conf/candc/OdomW15 fatcat:4zdoqeirmngkpaphdnqeeilqie

Object Wake-up: 3D Object Rigging from a Single Image [article]

Ji Yang and Xinxin Zuo and Sen Wang and Zhenbo Yu and Xingyu Li and Bingbing Ni and Minglun Gong and Li Cheng
2022 arXiv   pre-print
Comparing with previous efforts on object manipulation, our work goes beyond 2D manipulation and rigid deformation, and involves articulated manipulation.  ...  Afterwards, to extract skeletons for generic 3D objects, we develop a novel skeleton prediction method with a multi-head structure for skeleton probability field estimation by utilizing the deep implicit  ...  Acknowledgment This research was partly supported by the University of Alberta Start-up Grant, the NSERC Discovery Grants, CFI-JELF grants and the Huawei-UA Joint Lab Project Grant.  ... 
arXiv:2108.02708v3 fatcat:o4fjt6bvdjhonmxvzzsvl5f4om

Object-Oriented Publics

Tom Jenkins, Christopher A. Le Dantec, Carl DiSalvo, Thomas Lodato, Mariam Asad
2016 Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems - CHI '16  
Social computing-or computing in a social context-has largely concerned itself with understanding social interaction among and between people.  ...  In this paper, we offer examples of projects that utilize the capacity of object-oriented publics to both analyze the conditions and consequences around existing publics and engage with matters of concern  ...  The research presented here was supported primarily by the Intel Science and Technology Center for Social Computing and in part by NSF grant IIS-1524380.  ... 
doi:10.1145/2858036.2858565 dblp:conf/chi/JenkinsDDLA16 fatcat:oym6rnkxkvanhfw3kk2egcs7ue

Sentient Artefacts: Acquiring User's Context Through Daily Objects [chapter]

Kaori Fujinami, Tatsuo Nakajima
2005 Lecture Notes in Computer Science  
Also, we discuss expectations and issues on the augmentation through prototyping.  ...  A sentient artefact is expected to capture the user's specific context implicitly and naturally from its original usage since such an everyday artefact has inherent roles and functionalities.  ...  To address these issues, we are working on augmenting daily objects with computing capabilities like sensors and actuators, which capture a user's situation, context, and provide him/her its awareness  ... 
doi:10.1007/11596042_35 fatcat:n2y3jzktu5abzl5v3mdv53xsgm

Object-Disoriented Sound

Budhaditya Chattopadhyay
2014 A Peer-Reviewed Journal About  
For some time, I have been deeply con- cerned with the mindful potential of listening as the subjective ramification of auditory perception.  ...  A nomadic listener is affected by a fleeting sound, which appears and diminishes as it triggers an amorphous stream of subjective contemplation and thoughts bordering on the immediate known-ness of the  ...  For example, my smartphone records sound from a place and sends it elsewhere to someone else via applications like whatsapp; one place becomes merged with another as I overhear it on a Skype chat from  ... 
doi:10.7146/aprja.v3i1.116093 fatcat:gncu46ejrrdvpn4ylvhddtr5si
« Previous Showing results 1 — 15 out of 84,147 results