There is a significant difference between designing a new algorithm, proving its correctness, and teaching it to an audience. When teaching algorithms, the teacher's main goal should be to convey the underlying ideas and to help the students form correct mental models related to the algorithm. This process can often be facilitated by using suitable metaphors. This work provides a set of novel metaphors identified and developed as suitable tools for teaching many of the "classic textbook" algorithms taught in undergraduate courses worldwide. Each chapter provides exercises and didactic...
There is a significant difference between designing a new algorithm, proving its correctness, and teaching it to an audience. When teaching algorit...
Distributed Space-Time Coding (DSTC) is a cooperative relaying scheme that enables high reliability in wireless networks. This brief presents the basic concept of DSTC, its achievable performance, generalizations, code design, and differential use. Recent results on training design and channel estimation for DSTC and the performance of training-based DSTC are also discussed.
Distributed Space-Time Coding (DSTC) is a cooperative relaying scheme that enables high reliability in wireless networks. This brief presents the basi...
This SpringerBrief proposes a general framework for reasoning about inconsistency in a wide variety of logics, including inconsistency resolution methods that have not yet been studied. The proposed framework allows users to specify preferences on how to resolve inconsistency when there are multiple ways to do so. This empowers users to resolve inconsistency in data leveraging both their detailed knowledge of the data as well as their application needs. The brief shows that the framework is well-suited to handle inconsistency in several logics, and provides algorithms to compute preferred...
This SpringerBrief proposes a general framework for reasoning about inconsistency in a wide variety of logics, including inconsistency resolution meth...
Human action analysis and recognition is a relatively mature field, yet one which is often not well understood by students and researchers. The large number of possible variations in human motion and appearance, camera viewpoint, and environment, present considerable challenges. Some important and common problems remain unsolved by the computer vision community. However, many valuable approaches have been proposed over the past decade, including the motion history image (MHI) method. This method has received significant attention, as it offers greater robustness and performance than other...
Human action analysis and recognition is a relatively mature field, yet one which is often not well understood by students and researchers. The large ...
By introducing Semantic Web technologies into geospatial Web services, this book addresses the semantic description of geospatial data and standards-based Web services, discovery of geospatial data and services, and generation of composite services. Semantic descriptions for geospatial data, services, and geoprocessing service chains are structured, organized, and registered in geospatial catalogue services. The ontology-based approach helps to improve the recall and precision of data and services discovery. Semantics-enabled metadata tracking and satisfaction allows analysts to focus on...
By introducing Semantic Web technologies into geospatial Web services, this book addresses the semantic description of geospatial data and standard...
Transformations in wireless connectivity and location-aware technologies hold the promise of bringing a sea-change in the way transportation information is generated and used in the future. Sensors in the transportation system, when integrated with those in other sectors (for example, energy, utility and health) have the potential to foster novel new ways of improving livability and sustainability.
The end-result of these developments has been somewhat contradictory. Although automation in the transportation environment has become increasingly widespread, the level of involvement and...
Transformations in wireless connectivity and location-aware technologies hold the promise of bringing a sea-change in the way transportation inform...
In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient's medical records. This brief provides an overview of such attacks and the new security challenges, defenses, design issues, modeling and performance evaluation in wireless IMDs. While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies and tools for designing...
In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader)...
The Information Systems (IS) discipline was founded on the intersection of computer science and organizational sciences, and produced a rich body of research on topics ranging from database design and the strategic role of IT to website design and online consumer behavior. In this book, the authors provide an introduction to the discipline, its development, and the structure of IS research, at a level that is appropriate for emerging and current IS scholars. Guided by a bibliometric study of all research articles published in eight premier IS research journals over a 20-year period, the...
The Information Systems (IS) discipline was founded on the intersection of computer science and organizational sciences, and produced a rich body of r...
Presents a study of cache replacement strategies designed for static web content. This work describes a novel approach to web proxy cache replacement that uses neural networks for decision making, evaluates its performance and decision structures, and examines its implementation in a real environment, namely, in the Squid proxy server.
Presents a study of cache replacement strategies designed for static web content. This work describes a novel approach to web proxy cache replacement ...
This brief focuses on radio resource allocation in a heterogeneous wireless medium. It presents radio resource allocation algorithms with decentralized implementation, which support both single-network and multi-homing services. The brief provides a set of cooperative networking algorithms, which rely on the concepts of short-term call traffic load prediction, network cooperation, convex optimization, and decomposition theory. In the proposed solutions, mobile terminals play an active role in the resource allocation operation, instead of their traditional role as passive service recipients in...
This brief focuses on radio resource allocation in a heterogeneous wireless medium. It presents radio resource allocation algorithms with decentralize...