A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
ReSSD works as a virtual block device on SSD which does not require any modifications of the operating system kernel and applications. ...
However, the wide-spread of SSD technology is currently obstructed by the fact that the random write bandwidth is lower than the sequential write bandwidth by several orders of magnitude. ...
ACKNOWLEDGMENTS SAC'10 March 22-26, 2010, Sierre, Switzerland. Copyright 2010 ACM 978-1-60558-638-0/10/03 ...$10.00. ...
doi:10.1145/1774088.1774138
dblp:conf/sac/LeeKM10
fatcat:atxutdivbjgyrai2ky3trvprda
Text line detection and segmentation
2010
Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10
The experiments have been performed on the dataset of the ICDAR 2007 handwriting segmentation contest in order to be able to compare, objectively, the performance of the two techniques. ...
The proposed technique is an improved version of an older technique. ...
Figure 2 . 2 The proposed technique.
SAC' 10 , 10 March 22-26, 2010, Sierre, Switzerland. Copyright 2010 ACM 978-1-60558-638-0/10/03…$10.00. ...
doi:10.1145/1774088.1774102
dblp:conf/sac/Kavallieratou10
fatcat:pjoxlmk2fnhtrf6h77ldigepby
Towards interactionflows for smart products
2010
Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10
To advance the design of interactive smart environments, we introduce a concept for describing productinitiated interaction with users and demonstrate, how they can be applied in practice. ...
This makes it difficult to replace users and products mutually to create really dynamical environments, capable of reducing the amount of interactions, if possible. ...
Part of this research was conducted within the Smart-Products project funded as part of the Seventh Framework Programme of the EU (grant number 231204). ...
doi:10.1145/1774088.1774348
dblp:conf/sac/Stander10
fatcat:ay5ve2jk6ja3ho2675ff5raedq
On the use of patterns to recover business processes
2010
Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10
Message from the Symposium Chairs On behalf of the Organizing Committee, we welcome you to the 25 th Annual ACM Symposium on Applied Computing (SAC 2010), hosted by University of Applied Sciences Western ...
These case studies may also help to detect new business structure needs that will allow the definition of more refined patterns.
ACKNOWLEDGMENTS SAC'10, March 22-26, 2010, Sierre, Switzerland. ...
doi:10.1145/1774088.1774121
dblp:conf/sac/Perez-CastilloGP10
fatcat:3ddhgbmiavfczmd4uxlatflfaa
MOPSI location-based search engine
2010
Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10
We propose an alternative approach based on web search and using ad-hoc georeferencing of web-pages. ...
We use MySql with spatial extensions, whereas other options were be Figure 1 : 1 The web interface of the MOPSI search engine.
SAC' 10 , 10 March 22-26, 2010, Sierre, Switzerland. ...
Copyright 2010 ACM 978-1-60558-638-0/10/03…$10.00.
Figure 2 : 2 Mobile interface (Java for Symbian S60).
Figure 3 : 3 Core server software architecture. ...
doi:10.1145/1774088.1774268
dblp:conf/sac/FrantiKTS10
fatcat:peguvoklyjgkrlo4rcjrckt7zm
Mining temporal relationships among categories
2010
Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10
Temporal text mining deals with discovering temporal patterns in text over a period of time. ...
We focus on identifying such relationships and represent them in Relationship Evolution Graph (REG). ...
Figure 1 .Figure 2 . 12 Example of Theme Evolution Graph (TEG) Example of Relationship Evolution (REG) Graph for Ө 1
SAC'10, March 22-26, 2010, Sierre, Switzerland. ...
doi:10.1145/1774088.1774319
dblp:conf/sac/MengleG10
fatcat:a6iddrbzkzdf5jxah6pad7omhi
Fast file-type identification
2010
Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10
The first is a feature selection technique, which uses a subset of highly-occurring byte patterns in building the representative model of a file type and classifying files. ...
This paper proposes two techniques to reduce the classification time of content-based file type identification. ...
SAC'10 March 22-26, 2010, Sierre, Switzerland. Copyright 2010 ACM 978-1-60558-638-0/10/03 ...$10.00.
Figure 1 : 1 The average classification accuracies of the six classifiers. ...
doi:10.1145/1774088.1774431
dblp:conf/sac/AhmedLSH10
fatcat:4gm2r256knf4fhzud77d7yutvm
MSP algorithm
2010
Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10
Every region is represented by a subgraph extracted from the topological representation of the global environment. ...
This article addresses the problem of efficient multi-robot patrolling in a known environment. The proposed approach assigns regions to each mobile agent. ...
ACKNOWLEDGEMENTS This work was financially supported by the Institute of Systems and Robotics -Coimbra under its regular funding by the Portuguese Government's department FCT -Fundação para a Ciência e ...
doi:10.1145/1774088.1774360
dblp:conf/sac/PortugalR10
fatcat:k7trct7jafcwbpzs2hwjcwudfu
Spatiotemporal sampling for trajectory streams
2010
Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10
The Spatiotemporal Stream Sampling (STSS) algorithm is a single-pass sampling technique that takes advantage of both the spatial and temporal dimensions inherent to these streams in order to reduce their ...
, OPW-TR and STTrace algorithms using the trucks dataset 1 which is composed of 276 1 available at: http://www.rtreeportal.org/ SAC'10 March 22-26, 2010, Sierre, Switzerland. ...
Copyright 2010 ACM 978-1-60558-638-0/10/03 ...$10.00.
Figure 1 :Figure 2 : 12 Proof of the guaranteed error bound. Average approximation error vs. compression rate real trajectories. ...
doi:10.1145/1774088.1774438
dblp:conf/sac/MahrsiPHR10
fatcat:pkvps2azwvd6vh3yfu5ztvld2a
Our approach addresses dependability by exploiting metadata to support decision making and adaptation based on the dynamic enforcement of explicitly defined policies. ...
We show how this applies to two different systems: (1) a dynamically resilient Web service system; and (2) an industrial assembly system with self-adaptive and SO capabilities. ...
Acknowledgements We are grateful to Yuhui Chen for his work on WS-Mediator. This work has been partially supported by the EPSRC Platform Grant on Trustworthy Ambient Systems (TrAmS). ...
doi:10.1145/1774088.1774184
dblp:conf/sac/SerugendoFR10
fatcat:kpoum2bdxbdgzprla5guqucime
influence on how to assess direct and a transitive trust. ...
However, we have noticed that the trust management systems do not make the most of the subjectivity, more specifically, the notion of Disposition to Trust although this aspect of subjectivity has a strong ...
Our T2D trust model was successfully implemented for trust requirements in pervasive [15] and grid scenarios for the GeenNet project [3] . SAC'10 March 22-26, 2010, Sierre, Switzerland. ...
doi:10.1145/1774088.1774403
dblp:conf/sac/SaadiPB10
fatcat:zwgiwtlkczh5dowfuxw4cirqxa
We give algorithms to construct a g-trie, to list all stored subgraphs, and to find occurrences on another graph of the subgraphs stored in the g-trie. ...
We evaluate the implementation of this structure and its associated algorithms on a set of representative benchmark biological networks in order to find network motifs. ...
Finally, we intend to parallelize the algorithms of g-tries, allowing for its optimized and large scale use. SAC'10 March 22-26, 2010, Sierre, Switzerland. ...
doi:10.1145/1774088.1774422
dblp:conf/sac/RibeiroS10
fatcat:uoivgs24szgy3ezpp7bbcwmiri
User-controlled generalization boundaries forp-sensitivek-anonymity
2010
Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10
While differing in their methods and quality of their results, they all focus first on masking the data, and then protecting the quality of the data as a whole. ...
We consider a new approach, where requirements on the amount of distortion allowed on the initial data are imposed in order to preserve its usefulness. ...
SAC' 10 , 10 March 22-26, 2010, Sierre, Switzerland. Copyright 2010 ACM 978-1-60558-638-0/10/03…$10.00. ...
doi:10.1145/1774088.1774317
dblp:conf/sac/CampanTC10
fatcat:25vrmw42qvhgbnx6g4ddacerdm
Rationale visualization of software architectural design decision using compendium
2010
Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10
This paper investigates how Compendium tool can be employed to visualize architectural design decisions and their rationale, in order to improve the understandability and promote the communication of architectural ...
The justification for software architectural design decisions made throughout the architecting process is necessary for understanding, (re)using, communicating, and modifying an architecture design. ...
This research project has been partially supported by the National Natural Science Foundation of China (NSFC) under Grant No.60903034. ...
doi:10.1145/1774088.1774577
dblp:conf/sac/ShahinLK10
fatcat:lr5qvhqew5ctlpivmccusdwzpq
Gray networking
2010
Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10
We then propose a network design model based on our understanding of the mind, how cognition is achieved, how memory is formed, etc. ...
Researchers have been seeking inspiration in natural observations to help better manage the ever increasing complexity of modern networks. ...
SAC'10 March 22-26, 2010, Sierre, Switzerland. Copyright 2010 ACM 978-1-60558-638-0/10/03 ...$10.00.
Figure 1 :Figure 2 : 12 The The limbic system
http://www.blindspottest.com/ ...
doi:10.1145/1774088.1774371
dblp:conf/sac/HarshCN10
fatcat:nkuzmcm2rnhzlnx7to6qpclvvm
« Previous
Showing results 1 — 15 out of 81 results