A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Guest editor's introduction: Ontology issues and applications
2005
Journal of the Brazilian Computer Society
SIMS model of the application domain includes a hierarchical terminological knowledge base with nodes representing objects, actions and states. ...
connect the knowledge about the enterprise, its domain of action and the types of information available, together with systems to process object-level data, and (c) the application level, where knowledge-intensive ...
doi:10.1590/s0104-65002005000300001
fatcat:jnguchoeqnaabhsmjfe43c6yoa
Ontology Issues and Applications Guest Editors' Introduction
2005
Journal of the Brazilian Computer Society
SIMS model of the application domain includes a hierarchical terminological knowledge base with nodes representing objects, actions and states. ...
connect the knowledge about the enterprise, its domain of action and the types of information available, together with systems to process object-level data, and (c) the application level, where knowledge-intensive ...
doi:10.1007/bf03192372
fatcat:4v655orvdbe6dhobk65mwlqdzu
Leaky Objects
2017
Proceedings of the 2016 ACM Conference Companion Publication on Designing Interactive Systems - DIS '17 Companion
This leaking of implicit information changes our individual interactions with objects to through objects, enabling expressive communication and ambiguous speculation. ...
This paper introduces the concept of leaky objects to describe this phenomenon in which shared objects unintentionally reveal implicit information about individual or collective users. ...
Leaky objects results in interactions with objects being transformed to interactions through objects as implicit information enables expressive communication and ambiguous speculation. ...
doi:10.1145/3064857.3079142
dblp:conf/ACMdis/Helms17
fatcat:gaomt6gfxjcs7or4mwo3larcxy
Trace analysis and mining for smart cities: issues, methods, and applications
2013
IEEE Communications Magazine
In this article, we first give a brief introduction to trace data; then we present six research issues in trace analysis and mining, and survey the state-of-the-art methods; finally, five promising application ...
Traces of moving objects in a city, which depict lots of semantics concerning human mobility and city dynamics, are becoming increasingly important. ...
ACKNOWLEDGMENTS This work is partly supported by the National Key Basic Research Program of China (2013CB329504) and Qianjiang Talent Program of Zhejiang (2011R10078). Dr. Z. ...
doi:10.1109/mcom.2013.6525604
fatcat:57ge66oshbebdc5azxvbyu5hru
Foreword of Special Issue on "E-Service and Applications"
2011
Journal of Computers
This special issue aims to bring together researchers and practitioners to engage in an in-depth discussion on various research and deployment issues regarding ecommerce and e-government. ...
With the healthcare support e-service, life quality for elderly senior citizens and their families could be significantly improved. ...
With his strong encouragement, I have started devoting myself to submitting papers to academic journals. ...
doi:10.4304/jcp.6.3.387-388
fatcat:6uf2oayvbbfibphaobqewpnkx4
Object technology
2002
Companion of the 17th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications - OOPSLA '02
Furthermore, OOPSLA signified a move from object-oriented issues being described in terms from some other area within computer science (programming environments, human-computer interaction, educational ...
Our work points to this as being a pivotal moment when a separate object-oriented community emerged and rapidly developed its own fora for the discussion and dissemination of object issues. ...
doi:10.1145/985072.985119
dblp:conf/oopsla/SharpR02
fatcat:li27xazv3fh6vheufr7lp3ji4e
Application Of Grounded Theory Method In Information Systems Research: Methodological And Practical Issues
2011
Review of Business Information Systems (RBIS)
These issues, which are methodological in nature, and their implications will also be discussed. ...
It also sheds some light on practical issues that information systems (IS) researchers face when applying GTM such as applying theoretical sampling and coding in GTM, concerns of presenting GTM data, and ...
through human interactions and thought. ...
doi:10.19030/rbis.v16i1.6762
fatcat:xopp3us5a5cubfndn3gotovx5a
Embodied data objects
2006
Proceedings of the 44th annual southeast regional conference on - ACM-SE 44
These data objects can be used to interact with information-appliance-like devices that provide specific services as dictated by the context of interaction. ...
The inherent affordances of physical artifacts are leveraged to make the interaction with these service-oriented devices intuitive and natural. ...
In a sense, our data objects embody the data itself and "contain" active information since the object may be used for interacting with information appliances. ...
doi:10.1145/1185448.1185529
dblp:conf/ACMse/TungarePBGZYBH06
fatcat:rwb2vmm5qnhzbeobpa67dnqcum
Crowd-Enhanced Cloud Services: Issues and Directions
2015
International Journal of Computer Applications
Crowdsourcing in combination with the machine automated techniques. ...
At the end, the modality and challenges of this convergence and its future trends are explored. ...
HITs, show up in our daily life. ...
doi:10.5120/20676-3486
fatcat:lqejfkgvk5attgrn5i5rjp3oni
A Taxonomy Study on Securing Blockchain-based Industrial Applications: An Overview, Application Perspectives, Requirements, Attacks, Countermeasures, and Open Issues
[article]
2021
arXiv
pre-print
application, security and privacy challenges, and requirements of Blockchain-based industrial applications, along with possible security threats and countermeasures. ...
Furthermore, we highlight some open issues in industrial applications that help to design secure Blockchain-based applications as future directions. ...
4.0 applications, in conjunction with attack categories, attackers' objectives, vulnerabilities exploited and target applications. • We identify some open issues of integrating Blockchain technology into ...
arXiv:2105.11665v1
fatcat:bsm7w2shjneajp425oddszr6ju
Intersecting with Unaware Objects
2015
Proceedings of the 2015 ACM SIGCHI Conference on Creativity and Cognition - C&C '15
We adopt a design-oriented approach aimed at motivating and expanding the notion of everyday creativity beyond explicit interactions to also include the implicit, incremental and, at times even, unknowing ...
Through analyzing and synthesizing insights that emerged across our studies, we describe a related set of concepts in support of a more implicit form of everyday creativity, which includes: unaware objects ...
This work is supported in part by a Banting Fellowship, and grants from SSHRC and NSERC. ...
doi:10.1145/2757226.2757240
dblp:conf/candc/OdomW15
fatcat:4zdoqeirmngkpaphdnqeeilqie
Object Wake-up: 3D Object Rigging from a Single Image
[article]
2022
arXiv
pre-print
Comparing with previous efforts on object manipulation, our work goes beyond 2D manipulation and rigid deformation, and involves articulated manipulation. ...
Afterwards, to extract skeletons for generic 3D objects, we develop a novel skeleton prediction method with a multi-head structure for skeleton probability field estimation by utilizing the deep implicit ...
Acknowledgment This research was partly supported by the University of Alberta Start-up Grant, the NSERC Discovery Grants, CFI-JELF grants and the Huawei-UA Joint Lab Project Grant. ...
arXiv:2108.02708v3
fatcat:o4fjt6bvdjhonmxvzzsvl5f4om
Object-Oriented Publics
2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems - CHI '16
Social computing-or computing in a social context-has largely concerned itself with understanding social interaction among and between people. ...
In this paper, we offer examples of projects that utilize the capacity of object-oriented publics to both analyze the conditions and consequences around existing publics and engage with matters of concern ...
The research presented here was supported primarily by the Intel Science and Technology Center for Social Computing and in part by NSF grant IIS-1524380. ...
doi:10.1145/2858036.2858565
dblp:conf/chi/JenkinsDDLA16
fatcat:oym6rnkxkvanhfw3kk2egcs7ue
Sentient Artefacts: Acquiring User's Context Through Daily Objects
[chapter]
2005
Lecture Notes in Computer Science
Also, we discuss expectations and issues on the augmentation through prototyping. ...
A sentient artefact is expected to capture the user's specific context implicitly and naturally from its original usage since such an everyday artefact has inherent roles and functionalities. ...
To address these issues, we are working on augmenting daily objects with computing capabilities like sensors and actuators, which capture a user's situation, context, and provide him/her its awareness ...
doi:10.1007/11596042_35
fatcat:n2y3jzktu5abzl5v3mdv53xsgm
Object-Disoriented Sound
2014
A Peer-Reviewed Journal About
For some time, I have been deeply con- cerned with the mindful potential of listening as the subjective ramification of auditory perception. ...
A nomadic listener is affected by a fleeting sound, which appears and diminishes as it triggers an amorphous stream of subjective contemplation and thoughts bordering on the immediate known-ness of the ...
For example, my smartphone records sound from a place and sends it elsewhere to someone else via applications like whatsapp; one place becomes merged with another as I overhear it on a Skype chat from ...
doi:10.7146/aprja.v3i1.116093
fatcat:gncu46ejrrdvpn4ylvhddtr5si
« Previous
Showing results 1 — 15 out of 84,147 results