Search For:

Displaying 1-50 out of 98 total
Capstone project online assessment tool without the paper work
Found in: Proceedings of the 18th ACM conference on Innovation and technology in computer science education (ITiCSE '13)
By David Hall, Gilbert Ravalli, Graham Farrell, Paul Kindler, Vivienne Farrell
Issue Date:July 2013
pp. 201-206
The capstone project is the culmination of a student's academic learning, providing an opportunity to demonstrate and further their knowledge and their organisational, practical, theoretical and communication skills with valuable guidance from industry par...
     
Capstone project: fair, just and accountable assessment
Found in: Proceedings of the 17th ACM annual conference on Innovation and technology in computer science education (ITiCSE '12)
By David Hall, Gilbert Ravalli, Graham Farrell, Paul Kindler, Vivienne Farrell
Issue Date:July 2012
pp. 168-173
Fair, just and accountable assessment for the individual student in the capstone project requires establishing criteria beyond the final project output to meet the objectives of the capstone project experience. Current research is limited and requires solu...
     
PICTIOL: a case study in participatory design
Found in: Proceedings of the 20th conference of the computer-human interaction special interest group (CHISIG) of Australia on Computer-human interaction: design: activities, artefacts and environments (OZCHI '06)
By Chris Pilgrim, Graham Farrell, Kon Mouzakis, Pauline Byrt, Vivienne Farrell
Issue Date:November 2006
pp. 191-198
Participatory design is an essential element of the skill set of professional interface developers and therefore is a significant component of HCI courses at universities. The PICTIVE technique is a 'low-fidelity' collaborative design technique that encour...
     
Why Pervasive Monitoring Is Bad
Found in: IEEE Internet Computing
By Stephen Farrell
Issue Date:July 2014
pp. 4-7
Since June 2013, we've seen numerous revelations about pervasive monitoring (PM). Many consider this a serious abuse, one that doesn't just threaten users' privacy, but also affects important freedoms and public and private enterprise on the Internet. In t...
   
Deformable Part Descriptors for Fine-Grained Recognition and Attribute Prediction
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Ning Zhang,Ryan Farrell,Forrest Iandola,Trevor Darrell
Issue Date:December 2013
pp. 729-736
Recognizing objects in fine-grained domains can be extremely challenging due to the subtle differences between subcategories. Discriminative markings are often highly localized, leading traditional object recognition approaches to struggle with the large p...
 
Information Consensus for Distributed Multi-target Tracking
Found in: 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Ahmed T. Kamal,Jay A. Farrell,Amit K. Roy-Chowdhury
Issue Date:June 2013
pp. 2403-2410
Due to their high fault-tolerance, ease of installation and scalability to large networks, distributed algorithms have recently gained immense popularity in the sensor networks community, especially in computer vision. Multi-target tracking in a camera net...
 
WalkMinder: encouraging an active lifestyle using mobile phone interruptions
Found in: CHI '13 Extended Abstracts on Human Factors in Computing Systems (CHI EA '13)
By Catalina M. Danis, Robert G. Farrell, Sen H. Hirano, Wendy A. Kellogg
Issue Date:April 2013
pp. 1431-1436
Medical research suggests that avoiding lengthy periods of physical inactivity can have significant health benefits. The pervasive nature of mobile phones increasingly allows individuals to track and measure their own physical activity thus creating opport...
     
Dynamic Cloud Deployment of a MapReduce Architecture
Found in: IEEE Internet Computing
By S. Loughran,Jose M. Alcaraz Calero,A. Farrell,J. Kirschnick,J. Guijarro
Issue Date:November 2012
pp. 40-50
Cloud-based MapReduce services process large datasets in the cloud, significantly reducing users' infrastructure requirements. Almost all of these services are cloud-vendor-specific and thus internally designed within their own cloud infrastructures, resul...
 
Integration of modern data management practice with scientific workflows
Found in: 2012 IEEE 8th International Conference on E-Science (e-Science)
By Neil E. B. Killeen,Jason M. Lohrey,Michael Farrell,Wilson Liu,Slavisa Garic,David Abramson,Hoang Nguyen,Gary Egan
Issue Date:October 2012
pp. 1-8
Modern science increasingly involves managing and processing large amounts of distributed data accessed by global teams of researchers. To do this, we need systems that combine data, meta-data and workflows into a single system. This paper discusses such a...
 
CRiSIS 2012 security standards tutorial
Found in: 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS)
By Stephen Farrell
Issue Date:October 2012
pp. 1-4
This tutorial will introduce researchers to security related activities within some Internet standards development organisations (SDOs), mainly the Internet Engineering Task Force and the World Wide Web Consortium. Having reviewed basic sturcture and proce...
 
Pose pooling kernels for sub-category recognition
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Ning Zhang,R. Farrell,T. Darrell
Issue Date:June 2012
pp. 3665-3672
The ability to normalize pose based on super-category landmarks can significantly improve models of individual categories when training data are limited. Previous methods have considered the use of volumetric or morphable models for faces and for certain c...
 
Birdlets: Subordinate categorization using volumetric primitives and pose-normalized appearance
Found in: Computer Vision, IEEE International Conference on
By Ryan Farrell,Om Oza, Ning Zhang,Vlad I. Morariu,Trevor Darrell,Larry S. Davis
Issue Date:November 2011
pp. 161-168
Subordinate-level categorization typically rests on establishing salient distinctions between part-level characteristics of objects, in contrast to basic-level categorization, where the presence or absence of parts is determinative. We develop an approach ...
 
Cloudscape: language support to coordinate and control distributed applications in the cloud
Found in: Proceedings of the compilation of the co-located workshops on DSM'11, TMC'11, AGERE!'11, AOOPES'11, NEAT'11, & VMIL'11 (SPLASH '11 Workshops)
By Andi Bejleri, Andrew Farrell, Patrick Goldsack
Issue Date:October 2011
pp. 183-194
Cloud Computing is an innovative computing proposal, which key feature is the ease and effectiveness of providing a service. There are a number of challenges that a management system for the Cloud will need to address including: scale, reliability (fault-h...
     
A Need for an Integrated Decision Support System for Watershed Management in Developing Countries: Case Studies from Conservation International
Found in: IEEE Global Humanitarian Technology Conference
By Tracy A. Farrell,Leo S´enz,Miroslav Honz´k
Issue Date:November 2011
pp. 263-266
Conservation International (CI) has unveiled a multi-decade plan to enhance freshwater ecosystem function for at least 20 percent of the world's areas with the highest concentrations of freshwater services and biodiversity. CI's priority geographies includ...
 
A Need for an Integrated Decision Support System for Watershed Management in Developing Countries: Case Studies from Conservation International
Found in: IEEE Global Humanitarian Technology Conference
By Tracy A. Farrell,Leo S´enz,Miroslav Honz´k
Issue Date:November 2011
pp. 228-231
Conservation International (CI) has unveiled a multi-decade plan to enhance freshwater ecosystem function for at least 20 percent of the world's areas with the highest concentrations of freshwater services and biodiversity. CI's priority geographies includ...
 
Fusion of anomaly algorithm decision maps and spectrum features for detecting buried explosive Hazards in forward looking infrared imagery
Found in: Applied Image Pattern Recognition Workshop,
By D. T. Anderson,J. Farrell,K. Stone,J. M. Keller,C. Spain
Issue Date:October 2011
pp. 1-8
Remediation of the threat of explosive hazards is an extremely important goal. Such hazards are responsible for an unacceptable number of deaths and injuries to civilians as well as soldiers throughout the world. In this article, we put forth a new method ...
 
DTN trials and router updates
Found in: Proceedings of the 3rd Extreme Conference on Communication: The Amazon Expedition (ExtremeCom '11)
By Aidan Lynch, Alex McMahon, Kerry Hartnett, Stefan Weber, Stephen Farrell
Issue Date:September 2011
pp. 1-5
We describe DTN trials carried out as part of the N4C project over the last year. These trials took place in two locations, Padjelanta national park in northern Sweden between early July and late August 2010 and Galway, on the west coast of Ireland, during...
     
Not Reinventing PKI until We Have Something Better
Found in: IEEE Internet Computing
By Stephen Farrell
Issue Date:September 2011
pp. 95-98
Although X.509-based PKI has some well-known problems, they're being, or can be, addressed. In the past, those problems led to proposals for reinventing PKI based on other technologies. However, none of the proposals provided sufficient additional benefit ...
 
Non-uniform channelization methods for next generation SDR PMR base stations
Found in: Computers and Communications, IEEE Symposium on
By A. P. Navarro,T. Keenan,R. Villing,R. Farrell
Issue Date:July 2011
pp. 620-625
Channelization in multi-standard Software-Defined Radio base stations presents a significant challenge. In this paper, two different channelization structures designed for a multi-standard SDR base station are studied. As a basis for comparing their comput...
 
Publics in practice: ubiquitous computing at a shelter for homeless mothers
Found in: Proceedings of the 2011 annual conference on Human factors in computing systems (CHI '11)
By Christopher A. Le Dantec, Jason B. Ellis, Jim E. Christensen, Mark Bailey, Robert G. Farrell, W. Keith Edwards, Wendy A. Kellogg
Issue Date:May 2011
pp. 1687-1696
Today, commodity technologies like mobile phones - once symbols of status and wealth - have become deeply woven into social and economic participation in Western society. Despite the pervasiveness of these technologies, there remain groups who may not have...
     
Security in the Wild
Found in: IEEE Internet Computing
By Stephen Farrell
Issue Date:May 2011
pp. 86-91
<p>A team from Trinity College Dublin and Intel Labs Europe deployed a delay-tolerant network (DTN) in remote areas of the Swedish mountains for six weeks during the summer of 2010. The network provided Web and email access for reindeer herders worki...
 
Leaky or Guessable Session Identifiers
Found in: IEEE Internet Computing
By Stephen Farrell
Issue Date:January 2011
pp. 88-91
Many Internet and Web applications use session identifiers. Too often, developers of those applications make the bad assumption that all is well because session identifiers are only known to authorized users. However, in many cases, session identifiers can...
 
Social navigation for the spoken web
Found in: Proceedings of the fourth ACM conference on Recommender systems (RecSys '10)
By Catalina Danis, Ketki Dhanesha, Nitendra Rajput, Rajarshi Das, Robert G. Farrell
Issue Date:September 2010
pp. 333-336
This paper describes our experiences deploying a recommender system for a mobile phone-based knowledge sharing application to farmers in rural India. Users of the system record questions and call back for answers left by other users and experts. We used co...
     
A tale of two publics: democratizing design at the margins
Found in: Proceedings of the 8th ACM Conference on Designing Interactive Systems (DIS '10)
By Catalina M. Danis, Christopher A. Le Dantec, Jason B. Ellis, Jim E. Christensen, Mark Bailey, Robert G. Farrell, W. Keith Edwards, Wendy A. Kellogg
Issue Date:August 2010
pp. 11-20
The design and use of Information and Communication Technology (ICT) has now evolved beyond its workplace origins to the wider public, expanding to people who live at the margins of contemporary society. Through field work and participatory co-design with ...
     
Processing Continuous Range Queries with Spatiotemporal Tolerance
Found in: IEEE Transactions on Mobile Computing
By Tobias Farrell, Kurt Rothermel, Reynold Cheng
Issue Date:March 2011
pp. 320-334
Continuous queries are often employed to monitor the locations of mobile objects (MOs), which are determined by sensing devices like GPS receivers. In this paper, we tackle two challenges in processing continuous range queries (CRQs): coping with data unce...
 
Hierarchical DFT with Combinational Scan Compression, Partition Chain and RPCT
Found in: VLSI, IEEE Computer Society Annual Symposium on
By Prakash Srinivasan, Ronan Farrell
Issue Date:July 2010
pp. 52-57
Modular and hierarchical based test architecture are the two of the most common testing techniques used in complex SoC designs. However, modular test architectures uses an expensive (in terms of silicon area) test wrapper around each block. On the other ha...
 
Applications Directly Using Cryptography
Found in: IEEE Internet Computing
By Stephen Farrell
Issue Date:May 2010
pp. 84-87
Sometimes, we need to use cryptographic protection from application layer code. Although requirements for this don't arise that often, when they do, they tend to be met in homegrown, ad hoc ways, and frequently without considering how to best use cryptogra...
 
Why Didn't We Spot That?
Found in: IEEE Internet Computing
By Stephen Farrell
Issue Date:January 2010
pp. 84-87
Recently, a previously unknown, and not particularly complex, man-in-the-middle attack appeared, affecting all versions of the Transport Layer Security (TLS) protocol. TLS and its predecessors have been in widespread use for more than a decade and have bee...
 
Delay- and Disruption-Tolerant Networking
Found in: IEEE Internet Computing
By Alex McMahon, Stephen Farrell
Issue Date:November 2009
pp. 82-87
Delay- and disruption-tolerant networking (DTN) grew out of attempts to develop an Interplanetary Internet but has evolved into an active area of networking research, with applications in space networking, military tactical networking, and networking for v...
 
API Keys to the Kingdom
Found in: IEEE Internet Computing
By Stephen Farrell
Issue Date:September 2009
pp. 91-93
Many Web 2.0 services offer Web 2.0 APIs for developers to use. The author reviews one of the security mechanisms that's often included in such Web 2.0 APIs — the use of API keys — and some of the deployment issues associated with their use.
 
Keys Don't Grow in Threes
Found in: IEEE Internet Computing
By Stephen Farrell
Issue Date:May 2009
pp. 96, 94-95
Many Internet security mechanisms depend on the use of cryptographic algorithms for various forms of authentication and confidentiality. Even when well-known and standardized cryptographic algorithms are used in well-known protocols, some parameters must b...
 
A design evaluation of a user interface for tending long-term tasks
Found in: Proceedings of the 27th international conference extended abstracts on Human factors in computing systems (CHI EA '09)
By Hina Shah, Robert Farrell, Thomas Erickson, Wendy A. Kellogg
Issue Date:April 2009
pp. 1-4
Organizational processes often take place over long periods of time and require intermittent attention. Remembering and reasoning about upcoming process tasks is important, but not adequately supported by existing tools. This paper describes Longitude, a t...
     
Remote real-time trajectory simplification
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Ralph Lange, Tobias Farrell, Frank Durr, Kurt Rothermel
Issue Date:March 2009
pp. 1-10
Moving objects databases (MODs) have been proposed for managing trajectory data, an important kind of information for pervasive applications. To save storage capacity, a MOD generally stores simplified trajectories only. A simplified trajectory approximate...
 
Why Don't We Encrypt Our Email?
Found in: IEEE Internet Computing
By Stephen Farrell
Issue Date:January 2009
pp. 82-85
Today, almost all the programs we use to send and receive email include support for strong security mechanisms that we can apply end-to-end. But we generally don't use those — why is that? In this article, the author briefly reviews the security features a...
 
Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage
Found in: Computer Security Applications Conference, Annual
By Paul Farrell, Simson L. Garfinkel, Douglas White
Issue Date:December 2008
pp. 13-22
Much effort has been expended in recent years to create large sets of hash codes from known files. Distributing these sets has become more difficult as these sets grow larger. Meanwhile the value of these sets for eliminating the need to analyze
 
A Reconfigurable Platform to Drive High Frequency Class S Power Amplifiers Using Multi-gigabit Transceivers
Found in: Electronics and Micro-electronics, International Conference on Advances in
By Armando Astarloa, John Dooley, Alan Canniff, Ronan Farrell
Issue Date:October 2008
pp. 90-95
In this research work we present a reconfigurable platform that implements all the digital processing and RF carrier generation for the class S Power Amplifier proposed by the Institute of Microelectronics and Wireless Systems. This amplifier is a combinat...
 
Portable Storage and Data Loss
Found in: IEEE Internet Computing
By Stephen Farrell
Issue Date:May 2008
pp. 90-93
Data loss or leakage occurs in many organizations, frequently with significant impacts, both in terms of incident-handling costs and of damage to the organization's reputation. The author briefly considers some recent incidents, describes some practical mi...
 
Harvesting with SONAR: the value of aggregating social network information
Found in: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems (CHI '08)
By Elad Shahar, Ido Guy, Michal Jacovi, Noga Meshulam, Stephen Farrell, Vladimir Soroka
Issue Date:April 2008
pp. 49-54
Web 2.0 gives people a substantial role in content and metadata creation. New interpersonal connections are formed and existing connections become evident through Web 2.0 services. This newly created social network (SN) spans across multiple services and a...
     
Tracking Down Under: Following the Satin Bowerbird
Found in: Applications of Computer Vision, IEEE Workshop on
By Aniruddha Kembhavi, Ryan Farrell, Yuancheng Luo, David Jacobs, Ramani Duraiswami, Larry S. Davis
Issue Date:January 2008
pp. 1-7
Sociobiologists collect huge volumes of video to study animal behavior (our collaborators work with 30,000 hours of video). The scale of these datasets demands the development of automated video analysis tools. Detecting and tracking animals is a critical ...
 
Security Boundaries
Found in: IEEE Internet Computing
By Stephen Farrell
Issue Date:January 2008
pp. 93-96
Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data “crosses” each one. In his inaugural column, the author lo...
 
Learning Higher-order Transition Models in Medium-scale Camera Networks
Found in: Computer Vision, IEEE International Conference on
By Ryan Farrell, David Doermann, Larry S. Davis
Issue Date:October 2007
pp. 1-8
We present a Bayesian framework for learning higher-order transition models in video surveillance networks. Such higher-order models describe object movement between cameras in the network and have a greater predictive power for multi-camera tracking than ...
 
SAWSDL: Semantic Annotations for WSDL and XML Schema
Found in: IEEE Internet Computing
By Jacek Kopecký, Tomas Vitvar, Carine Bournez, Joel Farrell
Issue Date:November 2007
pp. 60-67
Web services are important for creating distributed applications on the Web. In fact,they're a key enabler for service-oriented architectures that focus on service reuse and interoperability. The World Wide Web Consortium (W3C) has recently finished work o...
 
Energy-Efficient Monitoring of Mobile Objects with Uncertainty-Aware Tolerances
Found in: Database Engineering and Applications Symposium, International
By Tobias Farrell, Reynold Cheng, Kurt Rothermel
Issue Date:September 2007
pp. 129-140
In location-based services, continuous queries are often employed to monitor the locations of mobile objects that are determined by sensing devices like GPS receivers. Due to limited battery resources, it is important for these objects to acquire and repor...
 
Energy-efficient Tracking of Mobile Objects with Early Distance-based Reporting
Found in: Mobile and Ubiquitous Systems, Annual International Conference on
By Tobias Farrell, Ralph Lange, Kurt Rothermel
Issue Date:August 2007
pp. 1-8
Many location-based systems rely on fine-grained tracking of mobile objects that determine their own locations with sensing devices like GPS receivers. For these objects, energy is a very valuable and limited resource. A distance-based reporting protocol c...
 
MAGICAL demonstration: system for automated metadata generation for instructional content
Found in: Proceedings of the 14th annual ACM international conference on Multimedia (MULTIMEDIA '06)
By Amy Katriel, Chitra Dorai, Galina Kofman, Robert Farrell, Ying Li, Youngja Park
Issue Date:October 2006
pp. 491-492
The "Tools for Automatic Generation of Learning Object Metadata" project addresses the requirement of developing advanced distributed learning delivery architecture and services for a large US government agency. We have developed a Webbased system called M...
     
Security Considerations in Space and Delay Tolerant Networks
Found in: Space Mission Challenges for Information Technology, IEEE International Conference on
By Stephen Farrell, Vinny Cahill
Issue Date:July 2006
pp. 29-38
This paper reviews the Internet-inspired security work on delay tolerant networking, in particular, as it might apply to space missions, and identifies some challenges arising, for both the Internet security community and for space missions. These challeng...
 
When TCP Breaks: Delay- and Disruption- Tolerant Networking
Found in: IEEE Internet Computing
By Stephen Farrell, Vinny Cahill, Dermot Geraghty, Ivor Humphreys, Paul McDonald
Issue Date:July 2006
pp. 72-78
The authors give an overview of current work on delay- and disruption-tolerant networking and review the overall architecture proposed by the Internet Research Task Force's Delay Tolerant Networking Research Group. Their approach to networking makes no ass...
 
Sample-Based HZD Control for Robustness and Slope Invariance of Planar Passive Bipedal Gaits
Found in: Mediterranean Conference on Control and Automation
By E.R. Westervelt, B. Morris, K.D. Farrell
Issue Date:June 2006
pp. 1-6
Controllers are developed that extend the hybrid zero dynamics (HZD) control approach to the control of planar biped walking by allowing constraints to be designed by sampling a gait of interest, rather than by optimization. The technique is used to enlarg...
 
HCI Techniques from idea to deployment: a case study for a dynamic learning environment
Found in: CHI '06 extended abstracts on Human factors in computing systems (CHI '06)
By John C. Thomas, Robert Farrell
Issue Date:April 2006
pp. 207-212
Ihis paper describes the plan and execution HCI techniques that were used in the iterative design and evaluation of a "Dynamic Learning Environment." This system is now operational for IBM software group employees and is being extended to other venues and ...
     
Embedded Built-In-Test Detection Circuit for Radio Frequency Systems and Circuits
Found in: Design and Diagnostics of Electronic Circuits and Systems
By Guoyan Zhang, R. Farrell
Issue Date:April 2006
pp. 87-88
No summary available.
 
 1  2 Next >>