Sciweavers

JCST
2010
189views more  JCST 2010»
13 years 6 months ago
Formally Analyzing Expected Time Complexity of Algorithms Using Theorem Proving
Probabilistic techniques are widely used in the analysis of algorithms to estimate the computational complexity of algorithms or a computational problem. Traditionally, such analys...
Osman Hasan, Sofiène Tahar
JAISE
2010
111views Algorithms» more  JAISE 2010»
13 years 6 months ago
The missing ones: Key ingredients towards effective ambient assisted living systems
The population of elderly people keeps increasing rapidly in the past decades, which becomes a predominant aspect of our societies. As such, solutions both efficacious and cost-eff...
Hong Sun, Vincenzo De Florio, Ning Gui, Chris Blon...
JAISE
2010
141views Algorithms» more  JAISE 2010»
13 years 6 months ago
Emulation framework for the design and development of active RFID tag systems
The design and development of active RFID tag systems requires several iterations, and thorough testing in order to ensure that the prototype systems behave as intended. Facilitati...
Razvan Beuran, Junya Nakata, Tetsuya Kawakami, Tak...
JAISE
2010
87views Algorithms» more  JAISE 2010»
13 years 6 months ago
Predicting air quality in smart environments
The pervasive sensing technologies found in smart environments offer unprecedented opportunities for monitoring and assisting the individuals who live and work in these spaces. As ...
Seun Deleawe, Jim Kusznir, Brian Lamb, Diane J. Co...
JAISE
2010
88views Algorithms» more  JAISE 2010»
13 years 6 months ago
Improving user verification by implementing an agent-based security system
Abstract. This paper presents an agent-based, high-level security system for user verification. The system verifies a user's identity by processing data from several low-lever...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
JAISE
2010
169views Algorithms» more  JAISE 2010»
13 years 6 months ago
Responsive environments: User experiences for ambient intelligence
In this paper we review the emerging field of responsive environments as an ambient intelligence system with a focus on user experience. We see responsive environments as a combina...
Jorge Alves Lino, Benjamin Salem, Matthias Rauterb...
JAISE
2010
124views Algorithms» more  JAISE 2010»
13 years 6 months ago
Exploring the responsibilities of single-inhabitant Smart Homes with Use Cases
This paper makes a number of contributions to the field of requirements analysis for Smart Homes. It introduces Use Cases as a tool for exploring the responsibilities of Smart Home...
Paul Lyons, An Tran Cong, H. Joe Steinhauer, Steph...
JAISE
2010
163views Algorithms» more  JAISE 2010»
13 years 6 months ago
Affective negotiation support systems
Negotiation is a process in which two or more parties aim to reach a joint agreement. As such negotiation involves rational decision making about options and issues. However, negot...
Joost Broekens, Catholijn M. Jonker, John-Jules Ch...
JAISE
2010
182views Algorithms» more  JAISE 2010»
13 years 6 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson
JAISE
2010
192views Algorithms» more  JAISE 2010»
13 years 6 months ago
Activity recognition using temporal evidence theory
The ability to identify the behavior of people in a home is at the core of Smart Home functionality. Such environments are equipped with sensors that unobtrusively capture informat...
Susan McKeever, Juan Ye, Lorcan Coyle, Chris Bleak...