Search
Search Results
-
When a Bed is not a Bed
In this chapter we present an instance of how organisational knowledge is constructed, collected and used in the setting of a large hospital trust in... -
Designing for Telehealth
In the IEU study, I wanted to explore the usefulness of the Locales Framework for focussing observations of work. In this study of a telehealth... -
Pervasive Computing
Pervasive Computing (PervComp) means different things to different people. For some, pervasive computing is about mobile data access and the... -
Teacher Scaffolding: An Exploration of Exemplary Practice
While computers have increasingly been used in classroom over the last twenty years, their application has often been mundane; being merely used to...
-
Communication: Key to Success on the Web
Much has been written about what constitutes good principles of web design. Significantly less attention has been paid to the related communication... -
A Case Study for Modular Plant Control
This paper reports on an engineering approach to address the growing need for managing highly modular plants. An implemented agent-based... -
Finding a Place for UbiComp in the Home
The movement of design out of the workplace and into the home brings with it the need to develop new analytic concepts to consider how ubiquitous... -
User Interface Components
During this chapter, we’ll embark on extending the currently slim FlashBlog console. We’ll integrate, modify, and skin the ScrollPane component that... -
SoapBox: A Platform for Ubiquitous Computing Research and Applications
Designing, implementing and evaluating prototypes is a normal way of doing technical research. In recent years we have seen lots of research... -
A Proposed Evolutionary, Self-Organizing Automaton for the Control of Dynamic Systems
BOXES is a well known methodology that learns to perform control maneuvers for dynamic systems with only cursory a priori knowledge of the... -
A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shop**
Web technologies provide several means to infringe user privacy. This is especially true when customers buying tangible goods submit orders that... -
Control of Virtual Environments for People with Intellectual Disabilities
Around 25 people in every thousand have mild or moderate intellectual disabilities and about four or five per thousand have severe intellectual... -
Association Rule
This chapter recalls some of the essential concepts related to associ- ation rule mining, which will be utilized throughout the book. Some existing... -
An Analysis of the Motion Signal Distributions Emerging from Locomotion through a Natural Environment
Some 50 years have passed since Gibson drew attention to the characteristic field of velocity vectors generated on the retina when an observer is... -
E-Commerce in the Agribusiness Sector: Present Situation and Future Trends
This article deals with the evolution and prospects of “new information technology”, otherwise known as e-Commerce, in the agribusiness sector. The... -
Extracting local schema from semistructured data based on graph-oriented semantic model
Many modern applications (e-commerce, digital library, etc.) require integrated access to various information sources (from traditional RDBMS to...
-
Designing Work Oriented Infrastructures
Healthcare is making huge investmentsin information systems like Picture Archivingand Communication Systems (PACS) andRadiological Information...
-
Data Fitting Models
Our goal is to estimate parameters in systems of... -
Modeling of a Library with THORNs
Thorns combine the widely used object-oriented programming language C++ with various features of Petri nets for modeling concurrency and time. In...