|
1-10 of 33 reviews |
Date Reviewed | |
|
Cybersecurity is not very important Odlyzko A. Ubiquity 2019(June): 1-23, 2019. Type: Article
Hardly a day goes by without media reports of dramatic cybersecurity breaches somewhere in the world, and we have come to accept that substantial resources are needed to prevent these attacks. Little thought, however, is generally give...
|
Dec 24 2020 |
|
|
Discovery in the Internet of Things: the Internet of Things Zaslavsky A., Jayaraman P. Ubiquity 2015(October): 1-10, 2015. Type: Article
The challenge of making sense of data collected in the Internet of Things (IoT), such that the “needle” can be found in the digital haystack, is the focus of this work. This is a significant area of research in the ...
|
May 3 2016 |
|
|
Ubiquity symposium: evolutionary computation and the processes of life: towards synthesis of computational life-like processes of functional and evolvable proto-systems via extending evolutionary computation Roglic D. Ubiquity 2013(December): 1-11, 2013. Type: Article
The author, Darko Roglic, presents the intriguing idea that biological evolution uses concepts that go beyond traditional algorithms. Roglic argues that super-recursive algorithms are necessary and sufficient to explain biological proc...
|
May 16 2014 |
|
|
Renovation of minimum spanning tree algorithms of weighted graph Pal S. Ubiquity 9(7): 1-2, 2008. Type: Article
A spanning tree (ST) for a connected graph is a tree subgraph containing all the vertices of the graph. The minimal ST (MST) for a connected weighted graph (CWG) is the ST with the least sum of the edge weights among all STs. The const...
|
May 23 2008 |
|
|
Computational foundations of image interpolation algorithms Acharya T., Tsai P. Ubiquity 8(42): 1-17, 2007. Type: Article
A survey of interpolation algorithms is provided in this article. It shows some typical examples for nonadaptive and adaptive interpolation algorithms. Some experiment results are shown to compare those algorithms. Generally speaking, ...
|
Feb 21 2008 |
|
|
Fault tolerance in Web services Saha G. Ubiquity 7(9): 12006. Type: Article
Adopting a poorly written and off-the-mark approach, this article presents fault-tolerant Web services. It explains code, showing specific requests sent to a hypertext transfer protocol (HTTP) server. The response to these requests and...
|
Dec 28 2007 |
|
|
The next step: privacy invasions by biometrics and ICT implants Weber K. Ubiquity 7(45): 1-18, 2006. Type: Article
It is quite interesting that as I am reviewing this article, I am also reading the novel Next by Michael Crichton. The book delves into the ethical dilemma involved in gene therapy, which parallels the concerns about the use of ...
|
Apr 9 2007 |
|
|
Ethical acts in robotics Irrgang B. Ubiquity 7(34): 2-16, 2006. Type: Article
This philosophical paper was written by a well-known philosopher at the Dresden University of Technology. His specialties are philosophy of technology and ethics. Unfortunately, the paper suffers from two major difficulties. First, it ...
|
Feb 7 2007 |
|
|
Coping with innovative technology: Albert Borgmann on how does technology change learning and teaching in formal and informal education Tripathi A. Ubiquity 7(23): 1-30, 2006. Type: Article, Reviews: (2 of 2)
The advancement of the human computer interface (HCI) is confronted with new challenges as people expand the ways they interact with technology. This is demonstrated by technology that is intelligent, highly mobile, and interactive; th...
|
Sep 7 2006 |
|
|
Coping with innovative technology: Albert Borgmann on how does technology change learning and teaching in formal and informal education Tripathi A. Ubiquity 7(23): 1-30, 2006. Type: Article, Reviews: (1 of 2)
This paper is partly a discussion of Albert Borgmann’s ideas about computer-based education. Borgmann is concerned that the flood of information through digital technology will suffocate actual reality. Technology in educ...
|
Aug 22 2006 |
|
|
|
|
|
|
|
|