Filters








81 Hits in 7.3 sec

ReSSD

Youngjae Lee, Jin-Soo Kim, Seungryoul Maeng
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
ReSSD works as a virtual block device on SSD which does not require any modifications of the operating system kernel and applications.  ...  However, the wide-spread of SSD technology is currently obstructed by the fact that the random write bandwidth is lower than the sequential write bandwidth by several orders of magnitude.  ...  ACKNOWLEDGMENTS SAC'10 March 22-26, 2010, Sierre, Switzerland. Copyright 2010 ACM 978-1-60558-638-0/10/03 ...$10.00.  ... 
doi:10.1145/1774088.1774138 dblp:conf/sac/LeeKM10 fatcat:atxutdivbjgyrai2ky3trvprda

Text line detection and segmentation

Ergina Kavallieratou
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
The experiments have been performed on the dataset of the ICDAR 2007 handwriting segmentation contest in order to be able to compare, objectively, the performance of the two techniques.  ...  The proposed technique is an improved version of an older technique.  ...  Figure 2 . 2 The proposed technique. SAC' 10 , 10 March 22-26, 2010, Sierre, Switzerland. Copyright 2010 ACM 978-1-60558-638-0/10/03…$10.00.  ... 
doi:10.1145/1774088.1774102 dblp:conf/sac/Kavallieratou10 fatcat:pjoxlmk2fnhtrf6h77ldigepby

Towards interactionflows for smart products

Marcus Ständer
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
To advance the design of interactive smart environments, we introduce a concept for describing productinitiated interaction with users and demonstrate, how they can be applied in practice.  ...  This makes it difficult to replace users and products mutually to create really dynamical environments, capable of reducing the amount of interactions, if possible.  ...  Part of this research was conducted within the Smart-Products project funded as part of the Seventh Framework Programme of the EU (grant number 231204).  ... 
doi:10.1145/1774088.1774348 dblp:conf/sac/Stander10 fatcat:ay5ve2jk6ja3ho2675ff5raedq

On the use of patterns to recover business processes

Ricardo Pérez-Castillo, Ignacio García Rodríguez de Guzmán, Mario Piattini
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
Message from the Symposium Chairs On behalf of the Organizing Committee, we welcome you to the 25 th Annual ACM Symposium on Applied Computing (SAC 2010), hosted by University of Applied Sciences Western  ...  These case studies may also help to detect new business structure needs that will allow the definition of more refined patterns. ACKNOWLEDGMENTS SAC'10, March 22-26, 2010, Sierre, Switzerland.  ... 
doi:10.1145/1774088.1774121 dblp:conf/sac/Perez-CastilloGP10 fatcat:3ddhgbmiavfczmd4uxlatflfaa

MOPSI location-based search engine

Pasi Fränti, Juha Kuittinen, Andrei Tabarcea, Lomanzi Sakala
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
We propose an alternative approach based on web search and using ad-hoc georeferencing of web-pages.  ...  We use MySql with spatial extensions, whereas other options were be Figure 1 : 1 The web interface of the MOPSI search engine. SAC' 10 , 10 March 22-26, 2010, Sierre, Switzerland.  ...  Copyright 2010 ACM 978-1-60558-638-0/10/03…$10.00. Figure 2 : 2 Mobile interface (Java for Symbian S60). Figure 3 : 3 Core server software architecture.  ... 
doi:10.1145/1774088.1774268 dblp:conf/sac/FrantiKTS10 fatcat:peguvoklyjgkrlo4rcjrckt7zm

Mining temporal relationships among categories

Saket S. R. Mengle, Nazli Goharian
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
Temporal text mining deals with discovering temporal patterns in text over a period of time.  ...  We focus on identifying such relationships and represent them in Relationship Evolution Graph (REG).  ...  Figure 1 .Figure 2 . 12 Example of Theme Evolution Graph (TEG) Example of Relationship Evolution (REG) Graph for Ө 1 SAC'10, March 22-26, 2010, Sierre, Switzerland.  ... 
doi:10.1145/1774088.1774319 dblp:conf/sac/MengleG10 fatcat:a6iddrbzkzdf5jxah6pad7omhi

Fast file-type identification

Irfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, ManPyo Hong
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
The first is a feature selection technique, which uses a subset of highly-occurring byte patterns in building the representative model of a file type and classifying files.  ...  This paper proposes two techniques to reduce the classification time of content-based file type identification.  ...  SAC'10 March 22-26, 2010, Sierre, Switzerland. Copyright 2010 ACM 978-1-60558-638-0/10/03 ...$10.00. Figure 1 : 1 The average classification accuracies of the six classifiers.  ... 
doi:10.1145/1774088.1774431 dblp:conf/sac/AhmedLSH10 fatcat:4gm2r256knf4fhzud77d7yutvm

MSP algorithm

David Portugal, Rui Rocha
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
Every region is represented by a subgraph extracted from the topological representation of the global environment.  ...  This article addresses the problem of efficient multi-robot patrolling in a known environment. The proposed approach assigns regions to each mobile agent.  ...  ACKNOWLEDGEMENTS This work was financially supported by the Institute of Systems and Robotics -Coimbra under its regular funding by the Portuguese Government's department FCT -Fundação para a Ciência e  ... 
doi:10.1145/1774088.1774360 dblp:conf/sac/PortugalR10 fatcat:k7trct7jafcwbpzs2hwjcwudfu

Spatiotemporal sampling for trajectory streams

Mohamed K. El Mahrsi, Christine Potier, Georges Hébrail, Fabrice Rossi
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
The Spatiotemporal Stream Sampling (STSS) algorithm is a single-pass sampling technique that takes advantage of both the spatial and temporal dimensions inherent to these streams in order to reduce their  ...  , OPW-TR and STTrace algorithms using the trucks dataset 1 which is composed of 276 1 available at: http://www.rtreeportal.org/ SAC'10 March 22-26, 2010, Sierre, Switzerland.  ...  Copyright 2010 ACM 978-1-60558-638-0/10/03 ...$10.00. Figure 1 :Figure 2 : 12 Proof of the guaranteed error bound. Average approximation error vs. compression rate real trajectories.  ... 
doi:10.1145/1774088.1774438 dblp:conf/sac/MahrsiPHR10 fatcat:pkvps2azwvd6vh3yfu5ztvld2a

MetaSelf

Giovanna Di Marzo Serugendo, John Fitzgerald, Alexander Romanovsky
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
Our approach addresses dependability by exploiting metadata to support decision making and adaptation based on the dynamic enforcement of explicitly defined policies.  ...  We show how this applies to two different systems: (1) a dynamically resilient Web service system; and (2) an industrial assembly system with self-adaptive and SO capabilities.  ...  Acknowledgements We are grateful to Yuhui Chen for his work on WS-Mediator. This work has been partially supported by the EPSRC Platform Grant on Trustworthy Ambient Systems (TrAmS).  ... 
doi:10.1145/1774088.1774184 dblp:conf/sac/SerugendoFR10 fatcat:kpoum2bdxbdgzprla5guqucime

T2D

Rachid Saadi, Jean-Marc Pierson, Lionel Brunie
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
influence on how to assess direct and a transitive trust.  ...  However, we have noticed that the trust management systems do not make the most of the subjectivity, more specifically, the notion of Disposition to Trust although this aspect of subjectivity has a strong  ...  Our T2D trust model was successfully implemented for trust requirements in pervasive [15] and grid scenarios for the GeenNet project [3] . SAC'10 March 22-26, 2010, Sierre, Switzerland.  ... 
doi:10.1145/1774088.1774403 dblp:conf/sac/SaadiPB10 fatcat:zwgiwtlkczh5dowfuxw4cirqxa

g-tries

Pedro Ribeiro, Fernando Silva
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
We give algorithms to construct a g-trie, to list all stored subgraphs, and to find occurrences on another graph of the subgraphs stored in the g-trie.  ...  We evaluate the implementation of this structure and its associated algorithms on a set of representative benchmark biological networks in order to find network motifs.  ...  Finally, we intend to parallelize the algorithms of g-tries, allowing for its optimized and large scale use. SAC'10 March 22-26, 2010, Sierre, Switzerland.  ... 
doi:10.1145/1774088.1774422 dblp:conf/sac/RibeiroS10 fatcat:uoivgs24szgy3ezpp7bbcwmiri

User-controlled generalization boundaries forp-sensitivek-anonymity

Alina Campan, Traian Marius Truta, Nicholas Cooper
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
While differing in their methods and quality of their results, they all focus first on masking the data, and then protecting the quality of the data as a whole.  ...  We consider a new approach, where requirements on the amount of distortion allowed on the initial data are imposed in order to preserve its usefulness.  ...  SAC' 10 , 10 March 22-26, 2010, Sierre, Switzerland. Copyright 2010 ACM 978-1-60558-638-0/10/03…$10.00.  ... 
doi:10.1145/1774088.1774317 dblp:conf/sac/CampanTC10 fatcat:25vrmw42qvhgbnx6g4ddacerdm

Rationale visualization of software architectural design decision using compendium

Mojtaba Shahin, Peng Liang, Mohammad Reza Khayyambashi
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
This paper investigates how Compendium tool can be employed to visualize architectural design decisions and their rationale, in order to improve the understandability and promote the communication of architectural  ...  The justification for software architectural design decisions made throughout the architecting process is necessary for understanding, (re)using, communicating, and modifying an architecture design.  ...  This research project has been partially supported by the National Natural Science Foundation of China (NSFC) under Grant No.60903034.  ... 
doi:10.1145/1774088.1774577 dblp:conf/sac/ShahinLK10 fatcat:lr5qvhqew5ctlpivmccusdwzpq

Gray networking

Piyush Harsh, Randy Chow, Richard Newman
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
We then propose a network design model based on our understanding of the mind, how cognition is achieved, how memory is formed, etc.  ...  Researchers have been seeking inspiration in natural observations to help better manage the ever increasing complexity of modern networks.  ...  SAC'10 March 22-26, 2010, Sierre, Switzerland. Copyright 2010 ACM 978-1-60558-638-0/10/03 ...$10.00. Figure 1 :Figure 2 : 12 The The limbic system http://www.blindspottest.com/  ... 
doi:10.1145/1774088.1774371 dblp:conf/sac/HarshCN10 fatcat:nkuzmcm2rnhzlnx7to6qpclvvm
« Previous Showing results 1 — 15 out of 81 results