3044 Slices
Medium 9781601322609

Findings of Expert Validation and Review of the Technology Enhanced Interaction Framework

Hamid R. Arabnia, Leonidas Deligiannidis, George Jandieri, Vince Schmidt, Ashu M.G. Solo, Fernando G. Tinetti CSREA Press PDF

268

Int'l Conf. Software Eng. Research and Practice | SERP'13 |

Findings of Expert Validation and Review of the

Technology Enhanced Interaction Framework

K. Angkananon1, M. Wald2, and L. Gilbert2

Electronic and Computer Science, University of Southampton, Southampton, UK direct communication

control, information transmission & storage

Technology

Information retrieval, technology-mediatedcommunication

s

al ev l ro etri r nt co ion at rm fo in

direct interaction

direct interaction

deixis

te c in hn fo ol r m og tra con ati y-m ns tro on ed m l, iss in retr iate io for iev dn m al

& at sto ion ra ge

People

i ix de

Abstract - A Technology Enhanced Interaction Framework has been developed to support designers and developers designing and developing technology enhanced interactions for complex scenarios involving disabled people. Issues of motivation, time, and understanding when validating and evaluating the Technology Enhanced Interaction Framework were identified through a literature review and questionnaires and interviews with experts. Changes to content, system, and approach were made in order to address issues identified. A detailed analysis of the expert review and validation findings supported the view that the TEIF could help designers/developers design technology solutions in complex situations when disabled people are involved. The next step will be to run a motivating experiment to evaluate how and in what ways the framework helps designers/developers.

See All Chapters
Medium 9781601322593

A User-Centric Privacy-Aware Protection System

Kevin Daimi, Hamid R. Arabnia, Michael R. Grimaila, Kathy Liszka, George Markowsky, and Ashu, M. G. Solo CSREA Press PDF

Int'l Conf. Security and Management | SAM'13 |

147

A User-Centric Privacy-Aware Protection System

Li Yang, Travis Tynes

Department of Computer Science, University of West Georgia, Carrollton, GA 30118, USA

Abstract - Nowadays it is increasingly important to protect private information from unintended and unauthorized use.

Traditional access control models generally lack the support for privacy protection. Some studies have been done in the area of integrating privacy control with XML access control.

However, often the focus is placed on organization-specific privacy policies. And how to handle user consent and user preferences are often not addressed. In this paper, we describe our approach based on XACML to integrating XML data access control and privacy control with user consent, preferences and break-glass access procedure considered. We also present a prototype system being developed in the context of health care systems to demonstrate the feasibility of our approach.

Keywords: XML, Privacy Access Control, XACML, User

See All Chapters
Medium 9781601323118

Complex Networks Associated with Positive Selection and Drug Resistance in the Malaria Parasite

Hamid R. Arabnia, Quoc-Nam Tran, Mary Q. Yang, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Bioinformatics and Computational Biology | BIOCOMP'14 |

211

Complex Networks Associated with Positive Selection and

Drug Resistance in the Malaria Parasite

Timothy G. Lilburn1, Hong Cai2, and Yufeng Wang2

1

328 Jamestown Road, Front Royal, Virginia, USA

2

�Department of Biology, South Texas Center for Emerging Infectious Diseases,

University of Texas at San Antonio, San Antonio, TX 78249, USA

Abstract –Mu et al. have published an extensive dataset of

SNPs collected in the context of the response of the malaria parasite to drug treatment. We looked for networks centered on proteins shown to be under positive selection in the face of drug treatments. Thesees proteins were often associated with subnetworks involved in invasion of the host cell by the parasite.

Keywords: malaria, networks, evolutionary analysis

1

Introduction

Malaria is one of the most serious infectious diseases in the world, affecting 300-500 million people, and is responsible for nearly one million deaths every year. The

rapid evolution and spread of drug resistance in parasites has led to an increase in morbidity and mortality rates in malariaafflicted regions. Drugs impose positive selection on the malaria parasite Plasmodium falciparum, leaving genomic signatures. Recent genome-wide association studies (GWAS) of 189 parasite isolates revealed thousands of single nucleotide polymorphisms (SNPs) [1]. Here we explore the protein-protein associations of genes that were under positive selection for drug response. Our network analysis reveals previously uncharacterized proteins that are implicated in a wide variety of cellular processes, including transport, transcriptional regulation, translation, signal transduction, cell cycle, entry to the host, and metabolism. This systems-level analysis allowed us to identify the evolutionary signatures of networks that show genotype-phenotype association, providing new insights into parasite biology, pathogenesis

See All Chapters
Medium 9781939902016

Chapter 8: Routing

Casey Foster, Aidan Feldman, David Tonge, Phil Freo and Tim Branyen Bleeding Edge Press ePub

While Models and Collections exist to keep track of the state of your data, you can think of URLs as keeping track of the state of navigation.  In traditional web development, you would create separate HTML files, where they might be called index.html, about.html, books.html, etc.  Navigating between pages caused the URL to change because it was actually loading a separate HTML file, and thus the URL would explicitly tell you where to access that resource.  This concept is part of Representational State Transfer, or REST.  HTML dynamically generated by a server can work in the same way: mysite.com/users/123 refers to a specific user page.  In short: if you send a URL to a friend, you want them to basically see what you are seeing.

In a single-page application, you are creating and removing views programatically, so you need to explicitly tell the browser when the navigational state has changed, and you need to be able to take a particular state representation (a URL) and render the correct thing on the screen.  This is where the Backbone.Router comes in.

See All Chapters
Medium 9781601322586

Decycling hierarchical cubic networks

Hamid R. Arabnia, Hiroshi Ishii, Minoru Ito, Hiroaki Nishikawa, Fernando G. Tinetti, George A. Gravvanis, George Jandieri, and Ashu M. G. Solo CSREA Press PDF

Int'l Conf. Par. and Dist. Proc. Tech. and Appl. | PDPTA'13 |

417

Decycling hierarchical cubic networks

Antoine Bossard

Faculty of Information Systems Architecture

Advanced Institute of Industrial Technology, Tokyo Metropolitan University

Shinagawa-ku Higashiooi 1-10-40, Tokyo 140-0011, Japan

Abstract— A hierarchical cubic network (HCN) is a topology based on hypercubes which has been introduced as interconnection network for massively parallel systems. Benefiting from interesting properties, it supersedes classic hypercubes networks on several aspects. For example, while retaining a similar diameter, the number of links per node is significantly lower than that of a hypercube of the same size. Finding a node set of minimum size such that removing these nodes from the network also eliminates all the cycles in the network is known as the decycling problem. Solving this problem is critical as it has many important applications, such as preventing resource allocation issues like deadlocks and starvations. In this paper, we describe an efficient algorithm generating in an ndimensional HCN a decycling set of at most 22n−1 −

See All Chapters

See All Slices