Filters








1,163 Hits in 2.5 sec

Problem driven CVE technology development

Daphne Economou, William L. Mitchell, Steve R. Pettifer
2002 Journal of Network and Computer Applications  
The need for a real-world driving problem to guide technology development has long been recognised. However, this does not guarantee the identification of requirements for technology development.  ...  This paper argues that a more systematic approach is needed for choosing and making best use of a driving problem for CVE technology.  ...  CVE technology driven by user and application needs.  ... 
doi:10.1006/jnca.2002.0141 fatcat:vs2vqz5guja6vegkptjecehdv4

Model-Driven Generation of Collaborative Virtual Environments for Cultural Heritage [chapter]

Alberto Bucciero, Luca Mainetti
2013 Lecture Notes in Computer Science  
Anyway the traditional and static approach to computer graphics is very limiting because it often requires the development of a Virtual Environment for every new application.  ...  In this paper, we propose a technique for model-driven generation of mixed reality virtual environments, where every modification in contents, visit path and in interactions with the physical surrounding  ...  Section 3 provides readers with an introduction of our model-driven approach to CVEs, stating the design problem, the proposed conceptual solution, and a real case study in the cultural heritage domain  ... 
doi:10.1007/978-3-642-41190-8_29 fatcat:zio4dtkusbeptdenzgjkz2z5eq

User centred virtual actor technology

Daphne Economou, William Mitchell, Steve Pettifer, Jon Cook, James Marsh
2001 Proceedings of the 2001 conference on Virtual reality, archeology, and cultural heritage - VAST '01  
The technology used is the Deva 3D CVE tool developed by Manchester University [31] . User studies of this environment allow the design factors identified previously to be tested.  ...  The result of this study derived a set of design guidelines, which were then used to guide the implementation of a 3D CVE using the Deva CVE technology.  ...  One problem with developing virtual actor technology is that it tends to be driven by technological rather than user concerns (section 2).  ... 
doi:10.1145/584993.585052 dblp:conf/vast/EconomouMPCM01 fatcat:jheobp2gcrcizivkyqvytq55p4

User centred virtual actor technology

Daphne Economou, William Mitchell, Steve Pettifer, Jon Cook, James Marsh
2001 Proceedings of the 2001 conference on Virtual reality, archeology, and cultural heritage - VAST '01  
The technology used is the Deva 3D CVE tool developed by Manchester University [31] . User studies of this environment allow the design factors identified previously to be tested.  ...  The result of this study derived a set of design guidelines, which were then used to guide the implementation of a 3D CVE using the Deva CVE technology.  ...  One problem with developing virtual actor technology is that it tends to be driven by technological rather than user concerns (section 2).  ... 
doi:10.1145/585051.585052 fatcat:tx7jippxjfdkbi3asn7ttblpwq

A Top-Down Methodology for Building Semantic-Rich Service-Oriented Collaborative Virtual Enterprise (CVE)

Gang Chen, Wei Ren, David Chen, Jing Bing Zhang, Chengzheng Sun, Zhonghua Yang, Chor Ping Low, Liqun Zhuang
2007 IECON 2007 - 33rd Annual Conference of the IEEE Industrial Electronics Society  
In this paper, we formalized a top-down methodology for designing and developing service-oriented CVE with rich semantic support.  ...  Collaborative Virtual Enterprise (CVE) is a new paradigm for industry and it imposes significant challenges on effective operation.  ...  ACKNOWLEDGMENT This work was supported in part by the Agency for Science, Technology, and Research (A*STAR) of Singapore under SERC TSRP on IMSS Grants P0520094 and P0520104.  ... 
doi:10.1109/iecon.2007.4460187 fatcat:b72my3qakrclzctnon334vllai

Reflections on the role of the 'users': challenges in a multi-disciplinary context of learner-centred design for children on the autism spectrum

Sarah Parsons, Sue Cobb
2014 International Journal of Research & Method in Education  
Both groups were involved in learner-centred design processes to develop technologies to support social conversation and collaboration.  ...  For more information, please contact eprints@nottingham.ac.uk Challenges in learner-centred design for autism Abstract Technology design in the field of human-computer interaction (HCI) has developed a  ...  The conceptual triple-decker: Theories, Technologies and Thoughts The top slice of the sandwich represents the top-down, theory-driven influences on the development of the educational tasks.  ... 
doi:10.1080/1743727x.2014.890584 fatcat:d5ebspyl7nhwlmtilwf6hqpcda

Development of a method for using AI systems for assessing cyber threats to electric power facilities

Vladimir Karantaev, Vladislav Karpenko, V.A. Golenishchev-Kutuzov
2021 E3S Web of Conferences  
Modern trends in the development of the electric power industry declare the widespread use of information and communication technologies and digital services to improve the operation of relay protection  ...  The report presents the results of the synthesis of a hybrid method for modeling cyber threats with possible cyber-physical consequences and the development of a demonstration prototype of an expert system  ...  The digitalization vector is driven largely by the International Electrotechnical Commission (IEC).  ... 
doi:10.1051/e3sconf/202128801033 fatcat:6gnl4c7cyvhl7cmas5cqxfw24y

Collaborative Virtual Environments to Support Communication and Community in Internet-Based Distance Education

Sam Redfern, Niall Galway
2002 Journal of Information Technology Education  
We discuss the current developments in the areas of CVEs in particular and in computer supported co-operative work (CSCW) in general.  ...  With proper design, a CVE should greatly assist the development of a productive learning community in which students' social, academic, and collaborative needs are met.  ...  By focusing solely on work effectiveness, we risk missing out on social richness -this has indeed been a problem with technologies such as video conferencing, which typically provide spaces for interaction  ... 
doi:10.28945/356 fatcat:i72ot4t46fbpnjjzjaaowpusfu

Managing vulnerabilities in networked systems

R.A. Martin
2001 Computer  
THE CVE SOLUTION Driven by our desire to develop an integrated picture of what was happening in our own networks and to select some new tools, the MITRE Corporation (http://www.mitre.org) began designing  ...  An increasing number of organizations-all listed on the CVE Web site-are developing CVE-compatible products and services.  ... 
doi:10.1109/2.963441 fatcat:35xtmmp5ffgwdivdad3mveg2rm

A Framework for Prototyping Collaborative Virtual Environments [chapter]

Clinton Jeffery, Akshay Dabholkar, Kosta Tachtevrenidis, Yosep Kim
2005 Lecture Notes in Computer Science  
Numerous students assisted with early Unicron development; Wynn Winkler and Nolan Clayton developed noteworthy prototypes.  ...  Acknowledgments Joe Pfeiffer developed our electronic classroom's whiteboard application, with a Linux device driver written by Mike Wilder.  ...  CVE's have a classic problem for event-driven systems, namely, that they have multiple event streams.  ... 
doi:10.1007/11560296_2 fatcat:jndwgkzqjraejgq4j7i77xai3a

Revealing the realities of collaborative virtual reality

Mike Fraser, Tony Glover, Ivan Vaghi, Steve Benford, Chris Greenhalgh, Jon Hindmarsh, Christian Heath
2000 Proceedings of the third international conference on Collaborative virtual environments - CVE '00  
Of course, advances in the technology may alleviate some of these problems.  ...  Research has been driven by a commitment to build environments and interfaces through a complex array of technologies which aim to provide the illusion of, simulate, or are even indistinguishable from  ... 
doi:10.1145/351006.351010 fatcat:5ha3jdh3affgvmkmeflbpe4cyq

A Security, Privacy and Trust Methodology for IIoT

2021 Tehnički Vjesnik  
Relevant data-driven methodologies are typically concentrated on the scoring systems of CVE prioritization schemes, the scoring formulas of CVSS metrics, and other vulnerability impact factors.  ...  This study then developed an exploits factors-embedded regression model to statistically access the significant relationships between security, privacy, and trust-based vulnerability attributes.  ...  With the maturation of SCADA and related technologies, IIoT would logically become a new development trend in the era of Industry 4.0.  ... 
doi:10.17559/tv-20210122095638 fatcat:n5dzevjfofgg7p7crisinyhpcq

Strategic Alignment of ICT Projects with Community Values in Local Government

Marcus Vogt, Kieth Hales
2010 2010 43rd Hawaii International Conference on System Sciences  
A new methodology: Community Value Estimation (CVE), which combines the Analytic Hierarchy Process (AHP) and the Delphi technique, is introduced and demonstrated as an important method of combining public  ...  (CVE) In recognition of the alignment and prioritisation problem described above, this research proposes a novel solution that combines two well known methodologies: the Analytical Hierarchy Processes  ...  This underscores the view that financially driven tools such as BVIT cannot cope with non-financially (and politically driven) priorities [6, 15, 16, 19, 39, 41] The Community Value Estimation Method  ... 
doi:10.1109/hicss.2010.350 dblp:conf/hicss/VogtH10 fatcat:jqx2ait4mfeivaj7vskbssvkni

Developing Rule-Enhanced Dynamic Virtual Enterprise Integration Frameworks

G. Chen, W. Ren, J.B. Zhang, Z. Yang, C.P. Low, C. Sun, D. Chen
2008 2008 IEEE 8th International Conference on Computer and Information Technology Workshops  
A hierarchically-structured software system has been designed and developed in order to address the challenge of dynamic service composition.  ...  IEEE 8th International Conference on Computer and Information Technology Workshops 978-0-7695-3242-4/08 $25.00  ...  Acknowledgment This work was supported in part by the Agency for Science, Technology, and Research (A*STAR) of Singapore under SERC TSRP on IMSS Project 0521160070.  ... 
doi:10.1109/cit.2008.workshops.57 fatcat:pcvysrjkrzatldxakmxsf75ehu

Staging a Public Poetry Performance in a Collaborative Virtual Environment [chapter]

Steve Benford, Chris Greenhalgh, Dave Snowdon, Adrian Bullock
1997 Proceedings of the Fifth European Conference on Computer Supported Cooperative Work  
We discuss the design of a CVE poetry performance and experiences arising from staging it to two hundred members of the public.  ...  navigation interfaces; temporal structure of the event; and mixed reality presentation Experiences include virtual audience members often ignoring the poets and conflicting attitudes towards embodiment New CVE  ...  Ackno wl edgements We would like to thank the EPSRC and the European Commission (ACTS programme) for funding the development of the underlying technologies and The University of Nottingham and Nottingham  ... 
doi:10.1007/978-94-015-7372-6_9 fatcat:ybvfqxw7yzg7vb6f23632hpvzy
« Previous Showing results 1 — 15 out of 1,163 results