Search
Now showing items 31-40 of 40
Efficient data search and synchronization for tree-structured data on mobile devices
(2015-11-01)
We consider two methods about operating data for tree-structured data sets. The first method is to search particular data items and still retains all the important metadata information; the second method is to allow the ...
Spatial peripheral interaction techniques for viewing and manipulating off-screen digital content
(2015-08-01)
When an information space is larger than the display, it is typical for interfaces to only support interacting with content that is rendered within its viewport. To support interacting with off-screen content, our work ...
CORE: a framework for the automatic repair of concurrency bugs
(2015-01-01)
Desktop computers now contain 2, 4 or even 8 processors. To benefit from them programs must be written to work in parallel. If writing good code is hard, writing good parallel code is much harder. Parallelization adds ...
Dynamic probabilistic network protection in large-scale failure scenarios
(2015-01-01)
Large-scale failure resulting from natural disasters or intentional attacks is now considered a serious risk for communication network infrastructure. In these events, simultaneous damages in several links and nodes may ...
Effects of dietary fermentable material on innate and adaptive immune measures in male and female rats under resting and immunized conditions
(2015-02-01)
Sex-based differences in immune parameters are well recognized, and recent evidence suggests differences in microbiota composition between sexes, necessitating assessment of effects of dietary fermentable material (DFM) ...
On the potential of intent-based access control (IBAC) in preventing insider threats
(2015-11-01)
Existing access control mechanisms are based on the concepts of identity enrollment and recognition, and assume that recognized identity is synonymous with ethical actions. However, statistics over the years show that the ...
Towards measuring privacy
(2015-04-01)
The acceptable threshold for privacy is an individual choice, informed by culture, tradition and experience. That it is important, conversely, is self-evident. We use it to moderate personal information disclosure, how ...
Dynamic square patterns in two dimensional neural fields
(2015-07-29)
The goal of this thesis is to study the emergence of spatiotemporal waves in neural field models. Neural field models aim to describe the activity of populations of neurons at a mesoscopic scale, considering averaged ...
Analysis of resistance nodulation division efflux pumps in Acinetobacter baumannii
(2015-01-01)
Strains from Canadian hospitals were classified as A. baumannii, A. pitti, or A. osocomialis and the most commonly expressed resistance nodulation division (RND) efflux pump was adeFGH. A collection of A. baumannii isolates ...
TandemTable: Supporting Conversations and Language Learning Using a Multi-Touch Digital Table
(Association for Computing Machinery, 2015-06-03)
We present TandemTable, a multi-touch tabletop system designed to break down communication barriers between partners, with a special focus on supporting those who are learning languages. The design was guided by a grounding ...