• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 80,019
Next 10 →

Table 8 Pervasive computing ontologies

in Pervasive Computing Environment
by Kong Choi Yu, Kong Choi Yu 2004
"... In PAGE 7: ...able 7 Specilized terms ontologies in football domain................................................... 48 Table8 Pervasive computing ontologies .... In PAGE 55: ..., 2004] is included in the experiment as the last set of ontologies. Table 5 - Table8 show the detailed information about the ontologies used. Time.... ..."

Table 1 Gateway types in pervasive computing

in Gateways in Pervasive Computing
by Harri Kauhanen
"... In PAGE 3: ... These three categories are not so closely related to pervasive computing devices, but they enable many services that go along with the concept of pervasive computing. Table1 lists a short explanation and examples of each category. Of course, this kind of categorizing is only one way to see things.... ..."

Table 4: Pervasive Computing and Games, based on [35].

in Classifying Pervasive Games: On Pervasive Computing and Mixed Reality
by Steve Hinske, Matthias Lampe, Carsten Magerkurth, Carsten Röcker 2007
Cited by 2

Table 1: The eighteen Web and pervasive computing projects in 2001-2.

in Students Develop Real-World Web and Pervasive Computing Systems
by unknown authors
"... In PAGE 2: ... However, we believe that our program is unique because it focuses on value skills, serves the community, and is organized on a large scale with supporting project infrastructure. Eighteen projects were completed during the 2001-2 academic year ( Table1 ). Ten were Web interfaces to backend databases, four were medical applications, three concerned VoiceXML or InkXML, and one was a cluster and grid computing system.... In PAGE 8: ... This server was independent and separate from the other CSIS servers so that students could not corrupt data or interfere with operations on CSIS production servers. A variety of database-related software was used by the ten client/server systems and the VoiceXML absentee system that also used a backend database and a Web interface, the latter as an alternative to the telephone input and for displaying the results ( Table1 ). The student teams used three scripting languages (Cold Fusion, PHP, and ASP) to communicate with the databases and two database systems (Microsoft Access and MySQL).... ..."

Table 6.1: Pervasive Computing Comparison Memory

in TABLE OF CONTENTS
by Patrick Wagstrom, Patrick Adam Wagstrom 2003

Table 21. Pervasiveness of the Internet

in unknown title
by unknown authors
"... In PAGE 47: ... PERVASIVENESS One of the most common metrics to measure the state of the Internet is Pervasiveness, the fraction of the total population that uses the Internet regularly. Our usage of the term differs from commonly used Internet growth metrics in that the final measure of pervasiveness is not an absolute number, but a ranking of that number in one of five levels, shown in Table21 . An accurate determination of the number of users is, however, always problematic.... In PAGE 47: ... Nevertheless, tracking the numbers available over time provides an indication of trends. Table21 , which is based on the data in Table 22, indicates that India was at a very high Level 2 (Established) by March 2002, and likely crossed to a Level 3 (Common) by the end of the year. ... ..."

Table 2 - Internet Status Dimensions (April 2002) Dimension Value Pervasiveness 3 Geographic Dispersion 3

in Effectiveness and Applicability of Internet-Based Training
by In The Corporation, Mohamed Ibrahim
"... In PAGE 5: ...0. Figure 2 provides a demonstration of the Internet status in Egypt in June 2000 as well as the updated version shown in Table2 and figure 3 showing the status in April 2002. Figure 2 - Internet Status in Egypt (June 2000) Table 2 - Internet Status Dimensions (April 2002) Dimension Value Pervasiveness 3 Geographic Dispersion 3 ... ..."

Table 2.1: 23

in Computational Models of Similarity in Lexical Ontologies
by Nuno Alexandre Lopes Seco 2005
Cited by 2

TABLE II Input parameters from 44 published scenarios in the proceedings of the MobiHoc conference, 2000-2004, sorted by number of nodes.

in MANET Simulation Studies: The Current State and New Simulation Tools
by unknown authors

Table 2. Switching structure of the optimal trajectory subject to 661:4 C, (tf) = 48:1 deg, max = 64:86 deg; see Figs. 21 and 23.

in Minimizing the Maximum Heating of a Reentering Space Shuttle: An Optimal Control Problem with Multiple Control Constraints
by H. Kreim, B. Kugelmann, H. J. Pesch, M. H. Breitner 1996
"... In PAGE 11: ... If there is no extremum, the function ^ H is strictly monotonic yielding either (vi) or (x). Please insert Table2 here. In order to illustrate this lemma, some results are already presented now.... In PAGE 11: ...3. Table2 presents the succession of control laws, called switching structure, of that trajectory. Note that the switching structure can generally not be determined in advance, but must be computed by a homotopy procedure as explained in Section 4.... In PAGE 12: ...lease insert Figs. 1{6 here. The necessary conditions are completed by the natural boundary conditions and the junction conditions at the switching points. It is su cient to give the natural boundary conditions for the combined functional (21) only, (0) = 0 ; (0) = 0 ; (tf) = 0 ; (tf) = ? quot; ; (tf) = quot; ; Hjt=tf = 0 : (36) Since the switching structure frequently changes in the course of the numerical com- putations, the junction conditions at the switching points for the switching structure of Table2 are given as an example, Cmax L = Cheat L jt=t1 ; (37a) Hjt=t? 2 = Hjt=t+ 2 ; (37b) Hjt=t? 3 = Hjt=t+ 3 ; (37c) max = freejt=t4 ; (37d) Cheat L jt=t5 = Cmax L ; (37e) Cmax L = Cheat L jt=t6 ; (37f) Cheat L jt=t7 = Cload L jt=t7 ; (37g) Cload L jt=t8 = Cfree L jt=t8 : (37h) All these conditions follow from the continuity of the Hamiltonian. With these conditions, the necessary conditions form a well-de ned multipoint boundary-value problem for the unknown state and adjoint variables as well as for the unknown terminal time.... ..."
Cited by 5
Next 10 →
Results 1 - 10 of 80,019
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University