Search Constraints
Number of results to display per page
Results for:
Year
2011
Remove constraint Year: 2011
« Previous |
1 - 20 of 31
|
Next »
Search Results
-
Presentation
This video was recorded at Transnational ICT and Security Technology Opportunities, Ljubljana 2007. Wego works in the e-government sector. Its activities consist of consulting and software development for public administration entities, and especially of: business process and administrative proceedings engineering; front end solutions development; electronic document management (EDM).
- Subjects:
- Management and Computing
- Keywords:
- Information resources management Management information systems Internet in public administration
- Resource Type:
- Presentation
-
Presentation
This video was recorded at 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), Washington 2010. Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how to efficiently discover, collect, organize, search and disseminate real-time disaster information. In this paper, we address several key problems which inhibit better information sharing and collaboration between both private and public sector participants for disaster management and recovery. We design and implement a web based prototype implementation of a Business Continuity Information Network (BCIN) system utilizing the latest advances in data mining technologies to create a user-friendly, Internet-based, information-rich service and acting as a vital part of a company's business continuity process. Specifically, information extraction is used to integrate the input data from different sources; the content recommendation engine and the report summarization module provide users personalized and brief views of the disaster information; the community generation module develops spatial clustering techniques to help users build dynamic community in disasters. Currently, BCIN has been exercised at Miami-Dade County Emergency Management.
- Subjects:
- Management and Computing
- Resource Type:
- Presentation
-
Courseware
This course examines human-computer interaction in the context of graphical user interfaces. The course covers human capabilities, design principles, prototyping techniques, evaluation techniques, and the implementation of graphical user interfaces. Deliverables include short programming assignments and a semester-long group project. Students taking the graduate version also have readings from current literature and additional assignments.
- Subjects:
- Computing
- Keywords:
- Human-computer interaction User interfaces (Computer systems)
- Resource Type:
- Courseware
-
Presentation
This video was recorded at COIN / PlanetData Winter School on Knowledge Technologies for Complex Business Environments, Ljubljana 2011. Organized by COIN FP7 Integrated Project and PlanetData FP7 Network of Excellence, the school seeks to bring together students, scholars and researchers from industry in order to foster collaboration and interoperability with innovative services and project large-scale data management in business environments. The main topics of the winter school are: Interoperability and collaboration models and solutions, Enterprise interoperability and collaboration services, Innovative knowledge and semantically powered technologies, Knowledge process and context modelling, Pro-active knowledge tools, Large scale analytics and reasoning tools, Business cases and real case studies.
- Subjects:
- Management and Computing
- Keywords:
- Big data -- Social aspects Big data
- Resource Type:
- Presentation
-
Video
Statistics, Machine Learning and Data Science can sometimes seem like very scary topics, but since each technique is really just a combination of small and simple steps, they are actually quite simple. My goal with StatQuest is to break down the major methodologies into easy to understand pieces. That said, I don't dumb down the material. Instead, I build up your understanding so that you are smarter.
- Course related:
- HTI34016 Introduction to Clinical Research
- Subjects:
- Computing and Mathematics and Statistics
- Keywords:
- Statistics Mathematical analysis Data mining Machine learning
- Resource Type:
- Video
-
Courseware
This course covers the fundamentals of signal and system analysis, focusing on representations of discrete-time and continuous-time signals (singularity functions, complex exponentials and geometrics, Fourier representations, Laplace and Z transforms, sampling) and representations of linear, time-invariant systems (difference and differential equations, block diagrams, system functions, poles and zeros, convolution, impulse and step responses, frequency responses). Applications are drawn broadly from engineering and physics, including feedback and control, communications, and signal processing.
- Subjects:
- Electrical Engineering
- Keywords:
- Signal processing System analysis
- Resource Type:
- Courseware
-
Presentation
This video was recorded at REASE. This is a one-hour video recording of the presentation of John Domingue at the First Asian Autumn School on the Semantic Web. It comprises two videos synchronized with the slides (requires Flash) or the videos alone. Table of Contents: Semantic Web Services: Application Areas Contents DIP DIP Consortium Supporting Emergency Planning for Essex County Council Essex County Council Emergency Planning Context Emergency planning scenario eMerges Ontologies Generic Application Structure Demonstration of Emergency Planning (GIS) Prototype V1 EMerges Prototype Architecture SWS and Business Process Modelling Super Project SUPER Consortium Motivation Querying the Process Space The Critical IT / Process Divide What Are My Services? What are my services? Matching Activities and Port Types Based on Semantics Supporting Business Users Better Matching Model Representations & Semantics The SUPER Stack Modelling Stack Telecommunications Solution Map Content on Demand Digital Rights Management & Content Procurement Modelling Stack Business Process Notations Modelling Stack Programming Model Deploying Applications Business Protocols Modelling Stack WSMO Top Level Notions The SUPER Trinity SUPER Methodology SUPER Architecture SUPER Ontology Stack Super Demo Context Prototype Scenario Digital Asset Management BPMN Service/Process Catalogue Super Demo Video
- Subjects:
- Computing
- Keywords:
- Semantic integration (Computer systems) Semantic Web
- Resource Type:
- Presentation
-
Presentation
This video was recorded at European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Athens 2011. Hierarchical modeling and reasoning are fundamental in machine intelligence, and for this the two-parameter Poisson-Dirichlet Process (PDP) plays an important role. The most popular MCMC sampling algorithm for the hierarchical PDP and hierarchical Dirichlet Process is to conduct an incremental sampling based on the Chinese restaurant metaphor, which originates from the Chinese restaurant process (CRP). In this paper, with the same metaphor, we propose a new table representation for the hierarchical PDPs by introducing an auxiliary latent variable, called table indicator, to record which customer takes responsibility for starting a new table. In this way, the new representation allows full exchangeability that is an essential condition for a correct Gibbs sampling algorithm. Based on this representation, we develop a block Gibbs sampling algorithm, which can jointly sample the data item and its table contribution. We test this out on the hierarchical Dirichlet process variant of latent Dirichlet allocation (HDP-LDA) developed by Teh, Jordan, Beal and Blei. Experiment results show that the proposed algorithm outperforms their "posterior sampling by direct assignment" algorithm in both out-of-sample perplexity and convergence speed. The representation can be used with many other hierarchical PDP models.
- Subjects:
- Computing
- Keywords:
- Machine learning Artificial intelligence
- Resource Type:
- Presentation
-
Presentation
This video was recorded at COIN / PlanetData Winter School on Knowledge Technologies for Complex Business Environments, Ljubljana 2011. Organized by COIN FP7 Integrated Project and PlanetData FP7 Network of Excellence, the school seeks to bring together students, scholars and researchers from industry in order to foster collaboration and interoperability with innovative services and project large-scale data management in business environments. The main topics of the winter school are: Interoperability and collaboration models and solutions, Enterprise interoperability and collaboration services, Innovative knowledge and semantically powered technologies, Knowledge process and context modelling, Pro-active knowledge tools, Large scale analytics and reasoning tools, Business cases and real case studies.
-
Presentation
This video was recorded at COIN / PlanetData Winter School on Knowledge Technologies for Complex Business Environments, Ljubljana 2011. Organized by COIN FP7 Integrated Project and PlanetData FP7 Network of Excellence, the school seeks to bring together students, scholars and researchers from industry in order to foster collaboration and interoperability with innovative services and project large-scale data management in business environments. The main topics of the winter school are: Interoperability and collaboration models and solutions, Enterprise interoperability and collaboration services, Innovative knowledge and semantically powered technologies, Knowledge process and context modelling, Pro-active knowledge tools, Large scale analytics and reasoning tools, Business cases and real case studies. Detailed information can be found here.
- Subjects:
- Computing
- Keywords:
- Crowd funding Technological innovations Industrial management
- Resource Type:
- Presentation
-
e-book
In this book, you will learn about all three kinds of interaction. In all three cases, interesting software techniques are needed in order to bring the computations into contact, yet keep them suffciently at arm's length that they don't compromise each other's reliability. The exciting challenge, then, is supporting controlled interaction. This includes support for computations that share a single computer and interact with one another, as your email and word processing programs do. It also includes support for data storage and network communication. This book describes how all these kinds of support are provided both by operating systems and by additional software layered on top of operating systems, which is known as middleware. Chapter 1 provides an overview of the text as a whole, explaining what an operating system is, what middleware is, and what sorts of support these systems provide for controlled interaction. The next nine chapters work through the varieties of controlled interac- tion that are exemplified by the scenario at the beginning of the preface: in- teraction between concurrent computations on the same system (as between your email program and your word processor), interaction across time (as between your word processor before your trip and your word processor after your trip), and interaction across space (as between your email program and your service provider's email server). The first of these three topics is controlled interaction between computa- tions operating at one time on a particular computer. Before such interaction can make sense, you need to understand how it is that a single computer can be running more than one program, such as an email program in one window and a word processing program in another. Therefore, Chapter 2 explains the fundamental mechanism for dividing a computer's attention between concurrent computations, known as threads. Chapter 3 continues with the related topic of scheduling. That is, if the computer is dividing its time between computations, it needs to decide which ones to work on at any moment. With concurrent computations explained, Chapter 4 introduces con- trolled interactions between them by explaining synchronization, which is control over the threads' relative timing. For example, this chapter explains how, when your email program sends a document to your word processor, the word processor can be constrained to read the document only after the email program writes it. One particularly important form of synchroniza- tion, atomic transactions, is the topic of Chapter 5. Atomic transactions are groups of operations that take place as an indivisible unit; they are most commonly supported by middleware, though they are also playing an increasing role in operating systems. Other than synchronization, the main way that operating systems con- trol the interaction between computations is by controlling their access to memory. Chapter 6 explains how this is achieved using the technique known as virtual memory. That chapter also explains the many other objectives this same technique can serve. Virtual memory serves as the foundation for Chapter 7's topic, which is processes. A process is the fundamental unit of computation for protected access, just as a thread is the fundamental unit of computation for concurrency. A process is a group of threads that share a protection environment; in particular, they share the same access to virtual memory. The next three chapters move outside the limitations of a single com- puter operating in a single session. First, consider the document stored before a trip and available again after it. Chapter 8 explains persistent storage mechanisms, focusing particularly on the file storage that operat- ing systems provide. Second, consider the interaction between your email program and your service provider's email server. Chapter 9 provides an overview of networking, including the services that operating systems make available to programs such as the email client and server. Chapter 10 ex- tends this discussion into the more sophisticated forms of support provided by communication middleware, such as messaging systems, RMI, and web services. Finally, Chapter 11 focuses on security. Because security is a pervasive issue, the preceding ten chapters all provide some information on it as well. Specifically, the final section of each chapter points out ways in which se- curity relates to that chapter's particular topic. However, even with that coverage distributed throughout the book, a chapter specifically on security is needed, primarily to elevate it out of technical particulars and talk about general principles and the human and organizational context surrounding the computer technology. The best way to use these chapters is in consecutive order. However, Chapter 5 can be omitted with only minor harm to Chapters 8 and 10, and Chapter 9 can be omitted if students are already suffciently familiar with networking.
- Subjects:
- Computing
- Keywords:
- Operating systems (Computers) Computer software -- Development Textbooks Middleware
- Resource Type:
- e-book
-
Video
This youtube playlist included the topic of deep learning for human language processing, linear algebra, deep reinforcement learning, generative adversarial network, deep learning theory, structured learning, and machine learning.
- Course related:
- LGT6801 Guided Study in Logistics I
- Subjects:
- Computing
- Keywords:
- Machine learning Natural language processing (Computer science)
- Resource Type:
- Video
-
Presentation
This video was recorded at COIN / PlanetData Winter School on Knowledge Technologies for Complex Business Environments, Ljubljana 2011. Organized by COIN FP7 Integrated Project and PlanetData FP7 Network of Excellence, the school seeks to bring together students, scholars and researchers from industry in order to foster collaboration and interoperability with innovative services and project large-scale data management in business environments. The main topics of the winter school are: Interoperability and collaboration models and solutions, Enterprise interoperability and collaboration services, Innovative knowledge and semantically powered technologies, Knowledge process and context modelling, Pro-active knowledge tools, Large scale analytics and reasoning tools, Business cases and real case studies. Detailed information can be found here.
- Subjects:
- Management and Computing
- Keywords:
- Data mining Real-time data processing
- Resource Type:
- Presentation
-
Presentation
This video was recorded at COIN / PlanetData Winter School on Knowledge Technologies for Complex Business Environments, Ljubljana 2011. Organized by COIN FP7 Integrated Project and PlanetData FP7 Network of Excellence, the school seeks to bring together students, scholars and researchers from industry in order to foster collaboration and interoperability with innovative services and project large-scale data management in business environments. The main topics of the winter school are: Interoperability and collaboration models and solutions, Enterprise interoperability and collaboration services, Innovative knowledge and semantically powered technologies, Knowledge process and context modelling, Pro-active knowledge tools, Large scale analytics and reasoning tools, Business cases and real case studies.
- Subjects:
- Management and Computing
- Keywords:
- Linked data Application program interfaces (Computer software)
- Resource Type:
- Presentation
-
e-book
Foundations of Computation is a free textbook for a one-semester course in theoretical computer science. It has been used for several years in a course at Hobart and William Smith Colleges. The course has no prerequisites other than introductory computer programming. The first half of the course covers material on logic, sets, and functions that would often be taught in a course in discrete mathematics. The second part covers material on automata, formal languages, and grammar that would ordinarily be encountered in an upper level course in theoretical computer science.
- Subjects:
- Computing
- Keywords:
- Computer science Textbooks
- Resource Type:
- e-book
-
e-book
Essentials of Geographic Information Systems integrates key concepts behind the technology with practical concerns and real-world applications. Recognizing that many potential GIS users are nonspecialists or may only need a few maps, this book is designed to be accessible, pragmatic, and concise. Essentials of Geographic Information Systems also illustrates how GIS is used to ask questions, inform choices, and guide policy. From the melting of the polar ice caps to privacy issues associated with mapping, this book provides a gentle, yet substantive, introduction to the use and application of digital maps, mapping, and GIS.
In today's world, learning involves knowing how and where to search for information. In some respects, knowing where to look for answers and information is arguably just as important as the knowledge itself. Because Essentials of Geographic Information Systems is concise, focused, and directed, readers are encouraged to search for supplementary information and to follow up on specific topics of interest on their own when necessary. Essentials of Geographic Information Systems provides the foundations for learning GIS, but readers are encouraged to construct their own individual frameworks of GIS knowledge. The benefits of this approach are two-fold. First, it promotes active learning through research. Second, it facilitates flexible and selective learning—that is, what is learned is a function of individual needs and interest.
Since GIS and related geospatial and navigation technology change so rapidly, a flexible and dynamic text is necessary in order to stay current and relevant. Though essential concepts in GIS tend to remain constant, the situations, applications, and examples of GIS are fluid and dynamic. Though this book is intended for use in introductory GIS courses, Essentials of Geographic Information Systems will also appeal to the large number of certificate, professional, extension, and online programs in GIS that are available today. In addition to providing readers with the tools necessary to carry out spatial analyses, Essentials of Geographic Information Systems outlines valuable cartographic guidelines for maximizing the visual impact of your maps. The book also describes effective GIS project management solutions that commonly arise in the modern workplace.
- Subjects:
- Land Surveying and Geo-Informatics and Computing
- Keywords:
- Geographic information systems Textbooks
- Resource Type:
- e-book
-
Courseware
The course addresses dynamic systems, i.e., systems that evolve with time. Typically these systems have inputs and outputs; it is of interest to understand how the input affects the output (or, vice-versa, what inputs should be given to generate a desired output). In particular, this course will concentrates on systems that can be modeled by Ordinary Differential Equations (ODEs), and that satisfy certain linearity and time-invariance conditions.
- Subjects:
- Computing
- Keywords:
- Mathematical models Dynamics System theory
- Resource Type:
- Courseware
-
Video
Welcome to Control Systems Lectures! This collection of videos is intended to supplement a first year controls class, not replace it. My goal is to take specific concepts in controls and expand on them in order to provide an intuitive understanding which will ultimately make you a better controls engineer.
- Course related:
- BSE4510 Building Automation and Control
- Subjects:
- Mechanical Engineering
- Keywords:
- Automatic control Systems engineering
- Resource Type:
- Video
-
Presentation
This video was recorded at COIN / PlanetData Winter School on Knowledge Technologies for Complex Business Environments, Ljubljana 2011. Organized by COIN FP7 Integrated Project and PlanetData FP7 Network of Excellence, the school seeks to bring together students, scholars and researchers from industry in order to foster collaboration and interoperability with innovative services and project large-scale data management in business environments. The main topics of the winter school are: Interoperability and collaboration models and solutions, Enterprise interoperability and collaboration services, Innovative knowledge and semantically powered technologies, Knowledge process and context modelling, Pro-active knowledge tools, Large scale analytics and reasoning tools, Business cases and real case studies. Detailed information can be found here.
- Subjects:
- Management and Computing
- Keywords:
- Online social networks Computer software -- Development -- Social aspects Computer networks -- Social aspects Social networks
- Resource Type:
- Presentation
-
e-book
This open textbook aims to fill the gap between the open-source implementations and the open-source network specifications by providing a detailed but pedagogical description of the key principles that guide the operation of the Internet.
- Subjects:
- Computing
- Keywords:
- Computer network protocols Textbooks
- Resource Type:
- e-book