Search For:

Displaying 1-34 out of 34 total
Defining Computational Resources Prices Based on the Expectations Equilibrium of Consumers and Providers from a Desktop Grid
Found in: 2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA)
By L.A. Gois,G.B. Casella,E.C.M. Ishikawa
Issue Date:May 2014
pp. 305-309
This paper proposes a dynamic approach for price adjustment of computational resources ruled by a Desktop Grid. The adopted strategies are based on the supply and demand law commonly applied in economical markets. Thus, allows one to dynamically set the pr...
 
USABle -- A Communication Framework for Ubiquitous Systems
Found in: 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA)
By Marcio E.F. Maia,Rossana M.C. Andrade,Carlos A.B. de Queiroz Filho,Reinaldo B. Braga,Saulo Aguiar,Bruno Gois Mateus,Rute Nogueira,Fredrik Toorn
Issue Date:May 2014
pp. 81-88
The widespread use of mobile devices is reshaping the way users interact, allowing applications to explore physical proximity of devices to offer intelligent services. Although there are several communication technologies available (e.g., Wi- Fi, Wi-Fi Dir...
 
How Semantic Knowledge can Enhance the Access to PA Online Services
Found in: Proceedings of International Conference on Information Integration and Web-based Applications & Services (IIWAS '13)
By Anna Goy, Diego Magro, Matteo Casu, Vittorio Di Tomaso
Issue Date:December 2013
pp. 714-718
Current e-government initiatives are offering a huge amount of information about available services, which tends to overload citizens, who are often "lost". Intelligent Web-based portals represent a possible solution to this problem, by providing an effect...
     
An authentication framework for peer-to-peer cloud
Found in: Proceedings of the 6th International Conference on Security of Information and Networks (SIN '13)
By Bok-Min Goi, Geong Sen Poh, Maryam Safiyah Shamsudin, Mohd Amril Nurman Mohd Nazir, Raphael Chung-Wei Phan, Syh-Yuan Tan
Issue Date:November 2013
pp. 94-101
Cloud computing provides on demand computation and storage services delivered via applications, system software and hardware rendered as services. Due to its on demand nature, it has high variable workloads and requires real-time efficiency and availabilit...
     
An Approach to Improve the Empathy of Text Interactions in Collaborative Systems
Found in: 2012 Brazilian Symposium on Collaborative Systems (SBSC)
By Methanias Colaco Junior,Janisson Gois de Souza,Carlos Alberto Goncalves
Issue Date:October 2012
pp. 11-15
In general, research on the effects of computer-mediation on collaborative work has concentrated mainly on social-psychological factors such as deindividuation, attitude polarization, social presence and politeness tactics. A new approach for that is the u...
 
Interactive Graphics Applications with OpenGL Shading Language and Qt
Found in: 2012 XXV SIBGRAPI Conference on Graphics, Patterns and Images Tutorials (SIBGRAPI-T)
By Joao Paulo Gois,Harlen Costa Batagelo
Issue Date:August 2012
pp. 1-20
Qt framework allows the easy development of professional cross-platform graphics applications using C++. Qt provides the QtOpenGL Module that makes easy the development of hardware-accelerated graphics applications using OpenGL and OpenGL Shading Language ...
 
Performance Analysis of Fountain-Based Protocol in CSMA/CA Wireless Networks
Found in: 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT)
By Zan-Kai Chong,Hiroyuki Ohsaki,Bok-Min Goi,Hong-Tat Ewe,Cheng-Kuan Bryan Ng
Issue Date:July 2012
pp. 184-189
The recent study (Lopez2007game) on fountain-based protocol (FBP) suggested that TCP nodes have incentive to switch to FBP approach in order to gain higher throughput with the trade-off of redundant packets. Moreover, it is reported that a network of FBP n...
 
High-Level Synthesis of a Unified 2-D DWT System Architecture for JPEG2000 Using FPGAs
Found in: Image and Video Technology, Pacific-Rim Symposium on
By Ishmaiel Sameen, Yoong Choon Chang, Mow Song Ng, Bok-Min Goi, Chee Siong Lee
Issue Date:November 2010
pp. 226-231
In this paper, a programmable 2-D DWT system architecture designed for the JPEG2000 standard is proposed. The proposed system architecture, developed through an iterative design space exploration methodology using Altera’s C2H compiler, provides a signific...
 
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols
Found in: Network and System Security, International Conference on
By Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi
Issue Date:October 2009
pp. 102-106
Password-Authenticated Key Exchange (PAKE) protocols allow parties to share secret keys in an authentic manner based on an easily memorizable password. Recently, Nam et al. showed that a provably secure three-party passwordbased authenticated key exchange ...
 
Hermite Interpolation of Implicit Surfaces with Radial Basis Functions
Found in: Graphics, Patterns and Images, SIBGRAPI Conference on
By Ives Macêdo, João Paulo Gois, Luiz Velho
Issue Date:October 2009
pp. 1-8
We present the Hermite radial basis function (HRBF) implicits method to compute a global implicit function which interpolates scattered multivariate Hermite data (unstructured points and their corresponding normals). Differently from previous radial basis ...
 
From Service Clouds to User-Centric Personal Clouds
Found in: Cloud Computing, IEEE International Conference on
By Liliana Ardissono, Anna Goy, Giovanna Petrone, Marino Segnan
Issue Date:September 2009
pp. 1-8
We present the Personal Cloud Platform (PCP) for the management of service clouds providing the user with a unified environment for handling her/his activities and collaborations. Within a personal cloud, the PCP enables the definition of global collaborat...
 
Managing Context-Dependent Workspace Awareness in an e-Collaboration Environment
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Liliana Ardissono, Gianni Bosio, Anna Goy, Giovanna Petrone, Marino Segnan
Issue Date:September 2009
pp. 42-45
Users increasingly manage their home and work collaborations by exploiting online applications. However, they have to deal with a fragmented view of their workspaces, because each application separately handles the awareness support. In order to address th...
 
SynCFr: Synchronization Collaboration Framework
Found in: Internet and Web Applications and Services, International Conference on
By L. Ardissono, A. Goy, G. Petrone, M. Segnan
Issue Date:May 2009
pp. 18-23
We present the SynCFr framework (Synchronization Collaboration Framework) supporting the management of composite applications and the synchronization of heterogeneous applications and services cooperating within a shared context. SynCFr supports the manage...
 
Attacks on a Block Based SVD Watermarking Scheme
Found in: Information Technology: New Generations, Third International Conference on
By Huo-Chong Ling, Swee-Huay Heng, Bok-Min Goi
Issue Date:April 2009
pp. 371-375
One major application of a watermarking scheme is to protect the copyright of a content owner by embedding the owner's watermark into the content. Recently, a block based watermarking scheme was proposed by Ghazy et al., which is dependent on singular valu...
 
A Framework for Using Web Services to Enhance QoS for Content Delivery
Found in: IEEE Multimedia
By Francesco Buccafurri, Pasquale De Meo, Gianluca Lax, Domenico Ursino, Mariagrazia Fugini, Stefano Modafferi, Barbara Pernici, Roberto Furnari, Anna Goy, Pasquale Lops, Domenico Redavid, Giovanni Semeraro
Issue Date:January 2009
pp. 26-35
<p>An integrated approach to quality of service for content delivery using Web services includes quality definitions, user contracts, and fault monitoring.</p>
 
(In)Security of Efficient Tree-Based Group Key Agreement Using Bilinear Map
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Raphael C.-W. Phan, Bok-Min Goi
Issue Date:December 2008
pp. 443-446
A group key agreement protocol enables three or more parties to agree on a secret group key to allow for communication of secret messages between them. In this paper, we consider the security of an efficiency-improved version of the tree-based group key ag...
 
Attacks on Improved Key Distribution Protocols with Perfect Reparability
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Raphael C.-W. Phan, Bok-Min Goi
Issue Date:December 2008
pp. 595-599
In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000.
 
The business knowledge for customer relationship management: an ontological perspective
Found in: Proceedings of the first international workshop on Ontology-supported business intelligence (OBI '08)
By Anna Goy, Diego Magro
Issue Date:October 2008
pp. 1-6
This paper presents some results of an ongoing ontological analysis of the CRM field. In particular, it describes a fragment of O-CREAM, an ontology for CRM based on DOLCE and on other three DOLCE-based modules, i.e. DnS (for the representation of roles an...
     
On the Security of an Identity-Based Aggregate Signature Scheme
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Wun-She Yap, Swee-Huay Heng, Bok-Min Goi
Issue Date:March 2008
pp. 1523-1528
In ACISP 2006, Paterson and Schuldt proposed a provably secure identity-based signature scheme. Not long after that, the same authors claimed that their proposed scheme above also allows a form of aggregation in which the multiple signatures from the diffe...
 
Hierarchical Dawson's Summation Generator
Found in: Convergence Information Technology, International Conference on
By Meng-Hui Lim,Bok-Min Goi,SangGon Lee,HoonJae Lee
Issue Date:November 2007
pp. 1395-1401
In 1986, Rueppel has pioneered the notion of summation generator and shown that the proposed summation generator obtained maximum correlation immunity as well as nonlinearity by adding 1 bit of memory to the memoryless nonlinear combiner. Since then, vario...
 
Robust and Adaptive Surface Reconstruction using Partition of Unity Implicits
Found in: Graphics, Patterns and Images, SIBGRAPI Conference on
By Joao Paulo Gois, Valdecir Polizelli-Junior, Tiago Etiene, Eduardo Tejada, Antonio Castelo, Thomas Ertl, Luis Gustavo Nonato
Issue Date:October 2007
pp. 95-104
Implicit surface reconstruction from unorganized point sets has been recently approached with methods based on multi-level partition of unity. We improve this approach by addressing local approximation robustness and iso-surface extraction issues. Our meth...
 
Curvature-driven Modeling and Rendering of Point-Based Surfaces
Found in: Graphics, Patterns and Images, SIBGRAPI Conference on
By Joao Paulo Gois, Eduardo Tejada, Tiago Etiene, Luis Gustavo Nonato, Antonio Castelo, Thomas Ertl
Issue Date:October 2006
pp. 27-36
In this work we address the problem of computing pointbased surface approximations from point clouds. Our approach is based on recently presented methods that define the approximated surface as the set of stationary points for an operator that projects poi...
 
A Framework to Percussive Educational Systems
Found in: Multimedia, International Symposium on
By Suzana Mesquita De Borba Maranhao, Matheus Cabral De Araujo Gois, Erika Pessoa Araujo, Giordano Ribeiro de Eulalio Cabral
Issue Date:December 2005
pp. 747-752
Computers have been used to assist users to learn music concepts and acquire musical skills as soon as they were introduced in people's life. However, even within a specific class of application, such as the Instrument Performance Systems (IPS), that tries...
 
Enhancing Web Services with Diagnostic Capabilities
Found in: Web Services, European Conference on
By Liliana Ardissono, Luca Console, Anna Goy, Giovanna Petrone, Claudia Picardi, Marino Segnan, Daniele Theseider Dupre
Issue Date:November 2005
pp. 182-191
Fault management in Web Services composed by individual services from multiple suppliers currently relies on a local analysis, that does not span across individual services, thus limiting the effectiveness of recovery strategies. We propose to address this...
 
Advanced fault analysis in web service composition
Found in: Special interest tracks and posters of the 14th international conference on World Wide Web (WWW '05)
By A. Goy, C. Picardi, D. Theseider Dupre, G. Petrone, L. Ardissono, L. Console, M. Segnan
Issue Date:May 2005
pp. 1090-1091
Currently, fault management in Web Services orchestrating multiple suppliers relies on a local analysis, that does not span across individual services, thus limiting the effectiveness of recovery strategies. We propose to address this limitation by employi...
     
Intelligent User Interfaces for Web-Based Configuration Systems
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By L. Ardissono, A. Goy, G. Petrone, R. Schäfer, M. Holland, G. Friedrich, C. Russ
Issue Date:October 2003
pp. 654
We present a model for the integration of Intelligent User Interfaces and Configuration techniques. This model enhances the capabilities of on-line stores by supporting the development of con.guration systems that assist customers in a personalised way, wh...
 
An Improved Architecture for Java Domain Transformation Applications
Found in: Graphics, Patterns and Images, SIBGRAPI Conference on
By Matheus Cabral de Araújo Gois, Alejandro C. Frery
Issue Date:October 2002
pp. 412
This work suggests an architecture that uses Java Native Interface to improve the performance of Java Domain Transformation applications. It also shows how to make possible the independency between image formats and each domain transformation.
   
Resource Management in Computer Graphics Teaching
Found in: Graphics, Patterns and Images, SIBGRAPI Conference on
By Hedlena M. de A. Bezerra, Börje F. F. Karlsson, Matheus C. de A. Gois, Alejandro C. Frery
Issue Date:October 2002
pp. 435
The present work discusses the importance of using different elements to accomplish a better learning of computer graphics related concepts, and how to make this information available in a way accessible for students that is useful as learning support tool...
   
Software architecture of SETA, an adaptive Web store shell
Found in: Proceedings of the fifth international conference on Autonomous agents (AGENTS '01)
By A. Goy, G. Petrone, L. Ardissono, M. Segnan
Issue Date:May 2001
pp. 214-215
Today, databases are ubiquitous. In factories machine tools are connected to databases that process outstanding orders and log occurring errors. Our industrial partner AMS engineering builds and maintains machine tools for various client companies that ope...
     
Configurability within a multi-agent Web store shell
Found in: Proceedings of the fourth international conference on Autonomous agents (AGENTS '00)
By A. Goy, G. Petrone, L. Ardissono, M. Segnan
Issue Date:June 2000
pp. 146-147
When creating virtual reality environments a large amount of the interaction needs to be programmed. The problem with this is that non-computer expert users lack the programming skills necessary to create useful applications. Specifying interactions remain...
     
An agent architecture for personalized Web stores
Found in: Proceedings of the third annual conference on Autonomous Agents (AGENTS '99)
By A. Goy, C. Barbero, G. Petrone, L. Ardissono
Issue Date:April 1999
pp. 182-189
When creating virtual reality environments a large amount of the interaction needs to be programmed. The problem with this is that non-computer expert users lack the programming skills necessary to create useful applications. Specifying interactions remain...
     
OHMEGA: a VLSI superscalar processor architecture for numerical applications
Found in: Proceedings of the 18th annual international symposium on Computer architecture (ISCA '91)
By Hiraku Nakano, Hiroshi Kadota, Masaitsu Nakajima, Reiji Segawa, Tadahiro Yoshida, Takeshi Kishida, Yasuhiro Nakakura, Yoshiyuki Goi, Yuji Nakai
Issue Date:May 1991
pp. 309-319
In the 1980s, considerable advances were made in both software and hardware technology, and CPUs that can issue no more than one operation per clock cycle are rapidly approaching this barrier. Further improvements to uniprocessor performance can be obtaine...
     
Personalization in business-to-customer interaction
Found in: Communications of the ACM
By Anna Goy, Giovanna Petrone, Liliana Ardissono, Marino Segnan
Issue Date:January 1988
pp. 52-53
The N24 Web site [6] belongs to a network of sites operated by Kirch Group that complement associated television stations in Germany. The relaunch of the N24 site focuses on tighter integration with the N24 cable news brand, targeting managers in need of a...
     
IDDQ Testing Method using a Scan Pattern for Production Testing
Found in: Asian Test Symposium
By Junichi HIRASE, Yoshiyuki GOI, Yoshiyuki TANAKA
Issue Date:December 2005
pp. 18-21
With the miniaturization of the diffusion process, the leak current per transistor tends to increase and the number of transistors per die tends to become larger, thus rendering more difficult the discrimination through the absolute value of IDDQ (Quiescen...
 
 1