Results 1 - 10
of
5,430
Future Design Mindful of the
"... As human–computer interaction (HCI) expands its scope, the proper context for the design of information technology (IT) is increasingly an interconnected mosaic of responsive adaptive systems (MoRAS) including people’s heads, or-ganizations, communities, markets, and cultures. The introduction of IT ..."
Abstract
- Add to MetaCart
to understand the role of all these different systems in the outcome explains why IT design has become an increasingly interdisciplinary effort. It is likely that our designs will be more successful if we become more mindful of this bigger picture. This article discusses the motivations for the Mo
Essays on Designing Minds
"... Page iii Page iv All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. This book was set in Palatino by Achorn Graphic S ..."
Abstract
- Add to MetaCart
Page iii Page iv All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. This book was set in Palatino by Achorn Graphic Services and was printed and bound in the United States of America. Library of Congress Cataloging-in-Publication Data
A blueprint for introducing disruptive technology into the internet
, 2002
"... This paper argues that a new class of geographically distributed network services is emerging, and that the most effective way to design, evaluate, and deploy these services is by using an overlay-based testbed. Unlike conventional network testbeds, however, we advocate an approach that supports bot ..."
Abstract
-
Cited by 593 (43 self)
- Add to MetaCart
architecture. Towards this end, the paper also briefly describes PlanetLab, an overlay network being designed with these four principles in mind.
Approximate Signal Processing
, 1997
"... It is increasingly important to structure signal processing algorithms and systems to allow for trading off between the accuracy of results and the utilization of resources in their implementation. In any particular context, there are typically a variety of heuristic approaches to managing these tra ..."
Abstract
-
Cited by 538 (2 self)
- Add to MetaCart
number of ideas and approaches to approximate processing as currently being formulated in the computer science community. We then present four examples of signal processing algorithms/systems that are structured with these goals in mind. These examples may be viewed as partial inroads toward the ultimate
Wavelet-based statistical signal processing using hidden Markov models
- IEEE TRANSACTIONS ON SIGNAL PROCESSING
, 1998
"... Wavelet-based statistical signal processing techniques such as denoising and detection typically model the wavelet coefficients as independent or jointly Gaussian. These models are unrealistic for many real-world signals. In this paper, we develop a new framework for statistical signal processing b ..."
Abstract
-
Cited by 415 (50 self)
- Add to MetaCart
based on wavelet-domain hidden Markov models (HMM’s) that concisely models the statistical dependencies and non-Gaussian statistics encountered in real-world signals. Wavelet-domain HMM’s are designed with the intrinsic properties of the wavelet transform in mind and provide powerful, yet tractable
How to improve Bayesian reasoning without instruction: Frequency formats
- Psychological Review
, 1995
"... Is the mind, by design, predisposed against performing Bayesian inference? Previous research on base rate neglect suggests that the mind lacks the appropriate cognitive algorithms. However, any claim against the existence of an algorithm, Bayesian or otherwise, is impossible to evaluate unless one s ..."
Abstract
-
Cited by 396 (29 self)
- Add to MetaCart
Is the mind, by design, predisposed against performing Bayesian inference? Previous research on base rate neglect suggests that the mind lacks the appropriate cognitive algorithms. However, any claim against the existence of an algorithm, Bayesian or otherwise, is impossible to evaluate unless one
Designing Mind-Based Media and Communications Technologies
"... The paper addresses the question of the influence of form of information and technology used to deliver the information on the psychological effects of a single user of technology. First, information is divided into substance and form. Then the interaction of form of information and the technology c ..."
Abstract
- Add to MetaCart
effects and the multimodality of perceptual processing are presented. Finally, the design rules for individualized psychological effects are presented as creating potentially new types of
Evolution: The Computer Systems Engineer Designing Minds 1
"... What we have learnt in the last six or seven decades about virtual machinery, as a result of a great deal of science and technology, enables us to offer Darwin a new defence against critics who argued that only physical form, not mental capabilities and consciousness could be products of evolution b ..."
Abstract
- Add to MetaCart
by natural selection. The defence compares the mental phenomena mentioned by Darwin’s opponents with contents of virtual machinery in computing systems. Objects, states, events, and processes in virtual machinery which we have only recently learnt how to design and build, and could not even have been thought
Iolus: A Framework for Scalable Secure Multicasting
, 1997
"... As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not fit the point-to-point model of most network security protocols which were designed with unicast communications in mind. As we will show, securing ..."
Abstract
-
Cited by 325 (0 self)
- Add to MetaCart
As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not fit the point-to-point model of most network security protocols which were designed with unicast communications in mind. As we will show
Efficient routing in intermittently connected mobile networks: The multiple-copy case
, 2008
"... Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc net ..."
Abstract
-
Cited by 303 (18 self)
- Add to MetaCart
, they waste a lot of energy and suffer from severe contention which can significantly degrade their performance. Furthermore, proposed efforts to reduce the overhead of flooding-based schemes have often been plagued by large delays. With this in mind, we introduce a new family of routing schemes that “spray
Results 1 - 10
of
5,430