title_a stringlengths 27 199 | abstract_a stringlengths 43 1.02k | title_b stringlengths 30 199 | abstract_b stringlengths 39 1.02k | id int64 1 186k |
|---|---|---|---|---|
exploration of unknown spaces by people who are blind using a multi-sensory virtual environment | exploration of unknown spaces is essential for the development of efficient orientation and mobility skills. most of the information required for the exploration is gathered through the visual channel. people who are blind lack this crucial information, facing in consequence difficulties in mapping as well as navigatin... | the transfer of spatial knowledge in virtual environment training | many training applications of virtual environments (ves) require people to be able to transfer spatial knowledge acquired in a ve to a real-world situation. using the concept of fidelity, we examine the variables that mediate the transfer of spatial knowledge and discuss the form and development of spatial representati... | 1 |
3d human pose estimation under limited supervision using metric learning. | estimating 3d human pose from monocular images demands large amounts of 3d pose and in-the-wild 2d pose annotated datasets which are costly and require sophisticated systems to acquire. in this regard, we propose a metric learning based approach to jointly learn a rich embedding and 3d pose regression from the embeddin... | structured prediction of 3d human pose with deep neural networks | most recent approaches to monocular 3d pose estimation rely on deep learning. they either train a convolutional neural network to directly regress from image to 3d pose, which ignores the dependencies between human joints, or model these dependencies via a max-margin structured learning framework, which involves a high... | 2 |
acoustic modeling and training of a bilingual asr system when a minority language is involved | this paper describes our work in developing a bilingual speech recognition system using two speechdat databases. the bilingual aspect of this work is of particular importance in the galician region of spain where both languages galician and spanish coexist and one of the languages, the galician one, is a minority langu... | transcrigal: a bilingual system for automatic indexing of broadcast news | this paper describes a broadcast news (bn) database called transcrigal-db. the news shows are mainly in galician language, although around 11% of data is in spanish. this database has been constructed for automatic speech recognition (asr) purposes. a bn-asr reference system is also described and evaluated on the test ... | 3 |
communication networks in geographically distributed software development | in this paper, we seek to shed light on how communication networks in geographically distributed projects evolve in order to address the limits of the modular design strategy. we collected data from a geographically distributed software development project covering 39 months of activity. our analysis showed that over t... | on the criteria to be used in decomposing systems into modules | this paper discusses modularization as a mechanism for improving the flexibility and comprehensibility of a system while allowing the shortening of its development time. the effectiveness of a “modularization” is dependent upon the criteria used in dividing the system into modules. a system design problem is presented ... | 4 |
mother, may i? owl-based policy management at nasa | among the challenges of managing nasa’s information systems is the management (that is, creation, coordination, verification, validation, and enforcement) of many different role-based access control policies and mechanisms. this paper describes an actual data federation use case that demonstrates the inefficiencies cre... | semid: combining semantics with identity management | the need for information security and privacy in today's connected systems is overwhelming. in this paper, we focus on the identity management in corporate environment to access various project resources. capabilities of semantic web technology facilitate the development of proposed semid ontology that formally represe... | 5 |
approach in high precision topic-specific resource discovery on the web | the internet presents numerous sources of useful information nowadays. however, these resources are drowning under the dynamic web, so accurate finding userspecific information is very difficult. in this paper we discuss a semantic graph web search (sgws) algorithm in topicspecific resource discovery on the web. this m... | graph-theoretic web algorithms: an overview | the world wide web is growing rapidly and revolutionizing the means of information access. it can be modeled as a directed graph in which a node represents a web page and an edge represents a hyperlink. currently the number of nodes in this gigantic web graph is over four billion and is growing by more than seven milli... | 6 |
automatic classification of one-dimensional cellular automata | cellular automata, a class of discrete dynamical systems, show a wide range of dynamic behavior, some very complex despite the simplicity of the system’s definition. this range of behavior can be organized into six classes, according to the li-packard system: null, fixed point, two-cycle, periodic, complex, and chaotic... | adaptive façades:an evaluation of cellular automata controlled dynamic shading system using new hourly-based metrics | this research explores utilizing cellular automata patterns as climate-adaptive dynamic shading systems to mitigate the undesirable impacts by excessive solar penetration in cooling-dominant climates. the methodological procedure is realized through two main phases. the first evaluates all 256 elementary cellular autom... | 7 |
comparison and application of time-frequency analysis methods for nonstationary signal processing | most of signals in engineering are nonstationary and time-varying. the fourier transform as a traditional approach can only provide the feature information in frequency domain. the time-frequency techniques may give a comprehensive description of signals in time-frequency planes. based on some typical nonstationary sig... | theory and applications of time-frequency methods for analysis of non-stationary vibration and seismic signal | the classical fourier transform method does not reveal the temporal information of the signal, whereas the time-frequency methods provide the comprehensive information of non-stationary signal over the time-frequency plane. based on the typical non-stationary signals several time-frequency methods such as short time fo... | 8 |
pre-evaluation of invariant layout in functional variable-data documents | layout of content in variable data documents can be computationally expensive. when very large numbers of almost similar copies of a document are required, automated pre-evaluation of invariant sections may increase efficiency of final document generation. if the layout model is functional and combinatorial in nature (... | evaluating invariances in document layout functions | with the development of variable-data-driven digital presses where each document printed is potentially unique there is a need for pre-press optimization to identify material that is invariant from document to document. in this way rasterisation can be confined solely to those areas which change between successive docu... | 9 |
a voice response system for an office information system | one of the major activities in offices is communication. communication involves information exchange in different kinds of media such as text, voice, pictures, and most likely, a mix of these. as such, a successful office information system must provide adequate facilities for handling these kinds of communication medi... | synthesis of speech from unrestricted text | for many applications, it is desirable to be able to convert arbitrary english text to natural and intelligible sounding speech. this transformation between two surface forms is facilitated by first obtaining the common underlying abstract linguistic representation which relates to both text and speech surface represen... | 10 |
a survey on replacement strategies in cache memory for embedded systems | cache is one of the most power-consuming components in computer architecture. power reduction in cache can be achieved by reducing miss rate miss penalty latency per access and power consumption per access. the power reduction can also be achieved by shutting down unused part of the cache by allowing not so recently us... | low-complexity algorithms for static cache locking in multitasking hard real-time systems | cache memories have been extensively used to bridge the gap between high speed processors and relatively slow main memories. however, they are a source of predictability problems because of their dynamic and adaptive behavior and thus need special attention to be used in hard-real time systems. a lot of progress has be... | 11 |
random sampling adc for sparse spectrum sensing | scanning large bandwidths (spectrum sensing) pushes today's analog hardware to its limits since periodic sampling at nyquist rate with sufficient resolution is often prohibitively complex. in this paper, we consider a scenario where the signal to be acquired is sparse in the frequency domain (e.g., spectrum sensing in ... | a 9-bit, 14 μw and 0.06 mm $^{2}$ pulse position modulation adc in 90 nm digital cmos | this work presents a compact, low-power, time-based architecture for nanometer-scale cmos analog-to-digital conversion. a pulse position modulation adc architecture is proposed and a prototype 9 bit ppm adc incorporating a two-step tdc scheme is presented as proof of concept. the 0.06 mm2 prototype is implemented in 90... | 12 |
the power of autonomic characteristics in opportunistic networks | autonomic characteristics can dramatically improve the efficiency of opportunistic communications. the main contribution of autonomic communications to opportunistic architectures is to simplify, automate, protect and enhance the knowledge. this allows empowering and making more effective the information handling and e... | impact of human mobility on the design of opportunistic forwarding algorithms | studying transfer opportunities between wireless devices carried by humans, we observe that the distribution of the inter-contact time, that is the time gap separating two contacts of the same pair of devices, exhibits a heavy tail such as one of a power law, over a large range of value. this observation is confirmed o... | 13 |
coping with duplicate bug reports in free/open source software projects | free/open source software (foss) communities often use open bug reporting to allow users to participate by reporting bugs. this practice can lead to more duplicate reports, as users can be less rigorous about researching existing bug reports. this paper examines how foss projects deal with duplicate bug reports. we exa... | are all duplicates value-neutral? an empirical analysis of duplicate issue reports | in open source communities, there are numerous duplicate issue reports, considered as useless and negligible by developers. conversely, some researches argued that duplicates deliver complementary information that could benefit issueresolving. considering all duplicates as value-neutral will result in either overestima... | 14 |
behavioral selection using the utility function method: a case study involving a simple guard robot | in this paper, the performance of the utility function method for behavioral organization is investigated in the framework of a simple guard robot. in order to achieve the best possible results, it was found that high-order polynomials should be used for the utility functions, even though the use of such polynomials, i... | action-selection in hamsterdam: lessons from ethology | a computational model of action-selection is presented, which by drawing on ideas from ethology, addresses a number of problems which have been noted in models proposed to date including the need for greater control over the temporal aspects of behavior, the need for a loose hierarchical structure with information shar... | 15 |
multistage interconnection netwoks a review 1 | multistage interconnection networks (mins) are basic class of switch-based network architectures, which are used for constructing scalable parallel computers or for connecting networks. multistage interconnection networks (mins) are networks providing fast and efficient communication. reliability of mins is used to mea... | irregular class of multistage interconnection network in parallel processing | a major problem in designing a large-scale parallel and distributed system was the construction of an interconnection network (in) to provide inter-processor communication. one of the biggest issues in the development of such a system was the development of an effective architecture and algorithms that have high reliab... | 16 |
backoff protocols for distributed mutual exclusion and ordering | presents a simple and efficient protocol for mutual exclusion in synchronous message-passing distributed systems subject to failures. our protocol borrows design principles from prior work in backoff protocols for multiple access channels such as the ethernet. our protocol is adaptive in that the expected amortized sys... | mutual exclusion in asynchronous systems with failure detectors | this paper considers the fault-tolerant mutual exclusion problem in a message-passing asynchronous system and determines the weakest failure detector to solve the problem, given a majority of correct processes. this failure detector, which we call the trusting failure detector, and which we denote by t, is strictly wea... | 17 |
the organization of distributed problem-solving networks: examining how core and periphery interact together to solve problems in mozilla's community | the emerging empirical literature on open source communities indicates that a majority of code writing and communication activity is concentrated with a few contributors, the “core” (maintainers). however, these communities allow and encourage participation from anybody, the “periphery”. the focus of this work is on ex... | two case studies of open source software development: apache and mozilla | according to its proponents, open source style software development has the capacity to compete successfully, and perhaps in many cases displace, traditional commercial development methods. in order to begin investigating such claims, we examine data from two major open source projects, the apache web server and the mo... | 18 |
sdiva: structural delay insensitivity verification analysis method for bit-level pipelined systolic arrays with early output evaluation | a structural delay-insensitivity verification analysis method, sdiva, is proposed for asynchronous systolic arrays in dual-rail threshold logic style. the sdiva method employs symbolic delays for all output evaluation paths and works at the behavioral specification level. for bit-level pipelined systolic arrays, which ... | application of bit-level pipelining to delay insensitive null convention adders | in this study, two asynchronous delay insensitive adder topologies in null convention logic (fant and brandt, 1997) style are adopted for bit-level pipelining: the reduced null convention logic adder (smith, 2001) and a null convention carry save adder. when pipelined at bit-level, early carry generation feature of bot... | 19 |
user experience design goes agile in lean transformation -- a case study | this paper describes the results of a single-case case study, exploring the role of user experience (ux) work in agile software development. the case study company is a large multinational telecommunication company undergoing a lean transformation process. in this case, lean transformation includes the adoption of agil... | empirical analysis on the satisfaction of it employees comparing xp practices with other software development methodologies | job satisfaction has been studied by economists and psychologists. we believe this factor is very important in that it influences the effectiveness of the software development process. this paper reports the first results of a comparative analytic study on the job satisfaction of developers that use xp practices and ot... | 20 |
c-scrip: collaborative security pattern integration process | collaboration is the act of working together, towards a common goal. collaboration is essential to the success of construction project. in software engineering projects, understanding and supporting collaboration gives the broad impact on product quality. there appears that it is difficult to effectively interact and a... | safe design real-time embedded systems with security patterns | security is a fundamental property in the modeling of real-time embedded systems. unfortunately, integrating this property is a hard task for a designer due to their small background concerning this feature. thankfully, the design pattern can provide a practical solution to integrate security through an abstraction mod... | 21 |
adult content classification through deep convolution neural network | adult content filtering is one of the main challenge in indonesia to prevent children from accessing the adult content. conventional web blocking and filtering through domain name server filtering is not enough to prevent the adult content distribution. mobile phones, tablet, and personal computer can distribute the ad... | the mask-sift cascading classifier for pornography detection | pornography detection using the scale invariant feature transform (sift) has been shown effective in identifying pornographic images. by including automated gaussian skin masking for feature isolation, classifier performance is significantly improved. similarly, utilizing a cascading classifier that pre-filters images ... | 22 |
two approaches for the improvement in testability of communication protocols | protocols have grown larger and more complex with the advent of computer and communication technologies. as a result, the task of conformance testing of protocol implementation has also become more complex. the study of design for testability (dft) is a research area in which researchers investigate design principles t... | testability improvement by narrow input / output ( nio ) sequences | – communication protocol conformance testing has become more complex as protocols have grown larger. the study of design for testability (dft) is a research area to help overcoming the ever increasing complexity of testing distributed systems. in the previous research, we introduced a new metric for testability of comm... | 23 |
ptidej and decor: identification of design patterns and design defects | the ptidej project started in 2001 to study code generation from and identification of patterns. since then, it has evolved into a complete reverse-engineering tool suite that includes several identification algorithms. it is a flexible tool suite that attempts to ease as much as possible the development of new identif... | automatic generation of detection algorithms for design defects | maintenance is recognised as the most difficult and expansive activity of the software development process. numerous techniques and processes have been proposed to ease the maintenance of software. in particular, several authors published design defects formalising "bad" solutions to recurring design problems (e.g., an... | 24 |
saaspia platform: integrating and customizing on-demand applications supporting multi-tenancy | saas applications support multi-tenancy and dedicated service environments by providing multiple tenants with user interface for customizing their own service. on the other hand, existing web-based applications do not support multi-tenancy and configurability. therefore, transforming existing web applications into saas... | multi-tenant saas applications: maintenance dream or nightmare? | multi-tenancy is a relatively new software architecture principle in the realm of the software as a service (saas) business model. it allows to make full use of the economy of scale, as multiple customers - "tenants" - share the same application and database instance. all the while, the tenants enjoy a highly configura... | 25 |
a non-convex relaxation approach to sparse dictionary learning | dictionary learning is a challenging theme in computer vision. the basic goal is to learn a sparse representation from an overcomplete basis set. most existing approaches employ a convex relaxation scheme to tackle this challenge due to the strong ability of convexity in computation and theoretical analysis. in this pa... | online robust dictionary learning | online dictionary learning is particularly useful for processing large-scale and dynamic data in computer vision. it, however, faces the major difficulty to incorporate robust functions, rather than the square data fitting term, to handle outliers in training data. in this paper, we propose a new online framework enabl... | 26 |
locally interacting hybrid systems with embedded graph grammars | in many cooperative control methods, the network topology influences the evolution of its continuous states. in turn, the continuous state may influence the network topology due to local restrictions on connectivity. in this paper we present a grammatical approach to modeling and controlling the switching of a system's... | cooperative exploration and protection of a workspace assisted by information networks | we develop strategies that enable multiple robots to cooperatively explore an unknown workspace while building information networks. every robot deploys information nodes with sensing and communication capabilities while constructing the voronoi diagram as the topological map of the workspace. the resulting information... | 27 |
benefits and drawbacks of asymmetric microwave links | the possibility of introducing asymmetric microwave links in the existing networks is currently under consideration. the main benefit of the concept lies in the fact that it reflects the actual requirement for rf spectrum, which is needed to handle download and upload traffic. currently used frequency plans anticipate ... | analysis of spectrum efficiency when using asymmetric microwave links | asymmetric microwave links have been introduced only recently as a novel concept for wireless networks which should provide higher spectrum efficiency and thus significant savings of radiofrequency spectrum. this paper presents technical assessment of this approach with its main advantages and disadvantages, focusing o... | 28 |
cluster based peers configuration using hcnp in peer-to-peer overlay networks | the paper addresses the need of efficient collaboration of peers with different levels of heterogeneity in order to share resources in p2p overlay networks. here the heterogeneity reflects differences in peers physical resources like free storage space, processor speed etc. a non-hierarchical cluster-based approach has... | overlay networks: a scalable alternative for p2p | overlay networks create a structured virtual topology above the basic transport protocol level that facilitates deterministic search and guarantees convergence. overlay networks are evolving into a critical component for self-organizing systems. here we outline the differences between flooding-style and overlay network... | 29 |
towards precise indoor rf localization | precise indoor localization of wireless nodes remains a challenge today. while there are radio-frequency (rf) methods that offer significant advantages, the balance between accuracy, range, and cost is suboptimal for many applications. radio interferometry has been shown to be effective outdoors, however, its applicabi... | performance analysis of the interferometric ranging system with hopped frequencies against multi-tone jammer | interferometric ranging system with hopped frequencies (irhf) is a novel ranging technique with advanced anti-jamming capability in wireless sensor networks. this paper investigates the ranging performance of maximum likelihood (ml) estimator of irhf under multi-tone jamming (mtj), which is a potential threat faced by ... | 30 |
formal techniques for java programs | this report gives an overview of the second ecoop workshop on formal techniques for java programs. it explains the motivation for such a workshop and summarizes the presentations and discussions. | reasoning about jml: differences between key and openjml | to increase the impact and capabilities of formal verification, it should be possible to apply different verification techniques on the same specification. however, this can only be achieved if verification tools agree on the syntax and underlying semantics of the specification language and unfortunately, in practice, ... | 31 |
gn-dtd: graphical notations for describing xml documents | this paper presents a graphical approach to model xml documents based on a data type documentation called graphical notations-data type documentation (gn-dtd). gn-dtd allows us to capture syntax and semantic of xml documents in a simple way but precise. using various notations, the important features of xml documents s... | developing xml documents with guaranteed ``good'' properties | many xml documents are being produced, but there are no agreed-upon standards formally defining what it means for complying xml documents to have "good" properties. in this paper we present a formal definition for a proposed canonical normal form for xml documents called xnf. xnf guarantees that complying xml documents... | 32 |
datadroplets: a correlation-aware large scale decentralized tuple store | until now, relational database management systems have been the key technology to store and process structured data. however, these systems based on highly centralized and rigid architectures are facing a conundrum: the volume of data currently quadruples every eighteen months while the available performance per proces... | bigtable: a distributed storage system for structured data | bigtable is a distributed storage system for managing structured data that is designed to scale to a very large size: petabytes of data across thousands of commodity servers. many projects at google store data in bigtable, including web indexing, google earth, and google finance. these applications place very different... | 33 |
course practice teaching mode based on the exploration of online and offline integration | in this paper, open university of china (chengdu branch) open education business administration (college) students of "marketing" course as a research vehicle to farm and experience the teaching activities of the main store as discussed based on online and offline phasor fusion practical teaching strategies, put forwar... | research on teaching presence evaluation indexes of online course | online courses are short of face-to-face and direct communication compared with classroom teaching, and the in-depth communication between teachers and students can only occur in the environment of high level of teaching presence. therefore, how to establish and evaluate the presence in online teaching is the research ... | 34 |
mri head segmentation for object based volume visualization | in this paper, we present a new image segmentation approach for mri of the head, which is a semi-automatic process. unlike automatic segmentation or manual segmentation, the semi-automatic segmentation approach is a robust and interactive segmentation process. this approach carries out 3d volume data segmentation based... | image sequence segmentation using 3-d structure tensor and curve evolution | we describe a novel approach for image sequence segmentation. it contains three parts: global motion compensation, robust frame differencing, and curve evolution. it is computationally efficient, does not require dense-field motion estimation, and is insensitive to noise and global/background motion. it works for black... | 35 |
a current-mode approach to cmos neural network implementation | cmos equivalents of the synapse and the neuron are proposed for lsi implementation of an adaptive analog neural network. the synapse is a multiplying digital-to-analog converter based on an r-2r ladder and the neuron consists of the second-generation current conveyor. prototype chips fabricated independently using 0.6 ... | an inherently linear and compact most-only current division technique | a technique is presented that uses the same mos transistors for both division and switching functions, eliminating resistors or capacitors. although an mos-transistor exhibits a nonlinear relation between the current and voltage (even in the linear region), it is shown that the current division is inherently linear. th... | 36 |
optimization of multirate filter banks within the framework of a human visual model | a perfect reconstruction filter optimization based on a human visual model is presented. the optimized filters are compared to a set of published filters for coding at a fixed bit rate. a method is suggested for adapting the filters to change in source statistics. this method is applied to coding of intraframe data and... | the effects of a visual fidelity criterion of the encoding of images | shannon's rate-distortion function provides a potentially useful lower bound against which to compare the rate-versus-distortion performance of practical encoding-transmission systems. however, this bound is not applicable unless one can arrive at a numerically-valued measure of distortion which is in reasonable corres... | 37 |
design knowledge and sequential plans | the application of sequential planning to the design process is discussed, considering design as a search through a space of states which are acted upon by transformation rules. various approaches to goal satisfaction are considered, including forward inference, regression, the satisfaction of implicit goals, and metap... | logic programming as a means of representing semantics in design languages | logic programming is discussed as a method for representing aspects of design language: descriptions of designs, domain knowledge, transformation rules (design grammar), and control mechanisms necessary to implement rules. the applicability of logic programming to the representation of semantics in design is also explo... | 38 |
compression word coding techniques for information retrieval | a description and comparison is presented of four compression techniques for word coding having application to information retrieval. the emphasis is on codes useful in creating directories to large data files. it is further shown how differing application objectives lead to differing measures of optimality for codes, ... | data compression techniques for economic processing of large commercial files | the application of compact coding, differencing and other techniques to indexed sequential files is discussed. the effects on system performance are discussed and reductions of almost 80% in mass storage requirements for a particular file are reported. | 39 |
an expert system framework based on a simulation generator | expert systems (es) implementations automatically perform tasks for which specially trained or talented people have been re quired. fifth generation simulation systems integrate the tools developed in the fourth generation and capture the knowledge of the expert programmer as well as that of the simulation model ing ex... | performing simulation projects with the extended simulation system (tess) | tess, the extended simulation system, provides a comprehen sive, flexible and integrated framework for performing simula tion projects. capabilities include (1) graphically building slam ii networks and schematic models; (2) forms entry for simulation control information, simulation inputs, and anima tion specification... | 40 |
overview of structural reliability analysis methods — part ii: sampling methods | in part ii of the overview of structural reliability analysis methods, the category of sampling methods is reviewed. the basic monte carlo simulation is the foundation for sampling methods of reliability analysis. sampling methods can evaluate the failure probability defined by both explicit and implicit performance fu... | simulation and the monte carlo method | from the publisher: ::: provides the first simultaneous coverage of the statistical aspects of simulation and monte carlo methods, their commonalities and their differences for the solution of a wide spectrum of engineering and scientific problems. contains standard material usually considered in monte carlo simulation... | 41 |
nonlinear model predictive control for stochastic differential equation systems | abstract using the van der pol oscillator model as an example, we provide a tutorial introduction to nonlinear model predictive control (nmpc) for systems governed by stochastic differential equations (sdes) that are observed at discrete times. such systems are called continuous-discrete systems and provides a natural ... | nonlinear model predictive control: theory and algorithms | nonlinear model predictive control is a thorough and rigorous introduction to nonlinear model predictive control (nmpc) for discrete-time and sampled-data systems. nmpc is interpreted as an approximation of infinite-horizon optimal control so that important properties like closed-loop stability, inverse optimality and ... | 42 |
reasoning with multi-modal sensor streams for m-health applications. | musculoskeletal disorders have a long term impact on individuals as well as on the community. they require self-management, typically in the form of maintaining an active lifestyle that adheres to prescribed exercises regimes. in the recent past m-health applications gained popularity by gamification of physical activi... | a deep learning approach to human activity recognition based on single accelerometer | in this paper, we propose an acceleration-based human activity recognition method using popular deep architecture, convolution neural network (cnn). in particular, we construct a cnn model and modify the convolution kernel to adapt the characteristics of tri-axial acceleration signals. also, for comparison, we use some... | 43 |
synchrophasor-based dominant electromechanical oscillation modes extraction using opdmd considering measurement noise | a synchrophasor-based approach for security status monitoring is an effective method of assessing power system stability without models, but the accuracy of this method is greatly affected by noise at the same time. this paper proposes an optimized dynamic mode decomposition algorithm to extract electromechanical oscil... | nonlinear koopman modes and coherency identification of coupled swing dynamics | we perform modal analysis of short-term swing dynamics in multi-machine power systems. the analysis is based on the so-called koopman operator, a linear, infinite-dimensional operator that is defined for any nonlinear dynamical system and captures full information of the system. modes derived through spectral analysis ... | 44 |
a delay-locked loop using a synthesizer-based phase shifter for 3.2 gb/s chip-to-chip communication | a delay-locked loop in 0.18-mum cmos for chip-to-chip communication at 3.2 gb/s is presented. by leveraging the fractional-n synthesizer technique, this architecture provides fine-resolution and infinite-range delay and is less sensitive to process, temperature, and voltage variations than that of conventional techniqu... | adaptive low-power synchronization technique for multiple source-synchronous clocks in high-speed communication systems | advanced high-speed source-synchronous systems such as gddr5 use multiple source-synchronous clocks to increase memory bandwidth. therefore, well-defined phase relationships among multiple clocks are required to perform correct read/write operations. a gddr5 system solves this problem by adaptive clock synchronization ... | 45 |
cross-platform software for the development of sign communication system: dactyl language modelling | the technology, which is implemented using cross-platform tools, is proposed for modeling of gesture units of sign language, dynamic mapping between states of gesture units with a combination of gestures structures (words, sentences). the technology implemented simulated playback of gesture items and constructions usin... | modeling human hand movements, facial expressions, and articulation to synthesize and visualize gesture information | information and mathematical models are proposed for the animation of sign language communication based on a virtual human model. a model is developed to fix sign language morphemes and is used to create a technology and software to generate, store, and reproduce gestures. algorithmic solutions are proposed for the com... | 46 |
blind calibration algorithm for nonlinearity correction based on selective sampling | this paper proposes a blind calibration algorithm for suppressing nonlinearity in analog-to-digital converters (adcs). the proposed algorithm does not need any external calibration signal and is first of its kind. the proposed algorithm relies on the properties of downsampling and orthogonality of sinusoidal signals to... | a 12-bit 20-msample/s pipelined analog-to-digital converter with nested digital background calibration | a 12-bit 20-msample/s pipelined analog-to-digital converter (adc) is calibrated in the background using an algorithmic adc, which is itself calibrated in the foreground. the overall calibration architecture is nested. the calibration overcomes the circuit nonidealities caused by capacitor mismatch and finite operationa... | 47 |
retrieval performance and information theory | abstract this paper challenges the meaningfulness of precision and recall values as a measure of performance of a retrieval system. instead, it advocates the use of a normalised form of shannon's functions (entropy and mutual information). shannon's four axioms are replaced by an equivalent set of five axioms which are... | the knowledge in multiple human relevance judgments | we show first that the pooling of multiple human judgments of relevance provides predictor of relevance that is superior to that obtained from a single human's relevance judgemts. a learning algorithm applied to a set of relevance judgments obtained from a single human would be expected to perform on new material at a ... | 48 |
automatic classification for analogue and digital modulation based on spectrum feature | an automatic recognition algorithm between analogue and digital modulation signals based on spectrum feature is introduced.the detecting value of single frequency which is extracted from the power spectrum of the second power of the signal's envelop is as cha-racter parameter,and then automatically recognize analogue a... | automatic classification of joint analog and digital modulated signal | a typical signal modulation identification method is first to divide a signal into different modulation types, and then to do the within-class identification. in this paper, we propose a method to distinguish the types of analog and digital signals by extracting spectrum feature and cyclostationarity feature of a signa... | 49 |
an anycast routing algorithm supporting qos for service data | an anycast routing algorithm supporting qos for service data (arsd) is proposed.arsd pre-computes path for anycast destination by the reverse path bandwidth,hop number and server load.the path pre-computed can fulfill the qos requirements of datagram transmitted on the path reverse direction and the load of server on t... | a minimum interference anycast qos routing for mpls traffic engineering | anycast is a new service of ipv6. how to guarantee its quality of service(qos) has become an important subject. an anycast qos routing algorithm supporting traffic engineering(art) in multi-protocol label switching(mpls) networks is proposed. in order to select a qos path for client's bandwidth request, information reg... | 50 |
the summarization of research and application of web2.0 | the emergence and development of web2.0 deeply affects the fields of library and information services,electronic government,knowledge management and services in enterprise.this paper sums up the background,conception and characters of web2.0,summarizes the theoretic researches and practices situation of web2.0 from fiv... | research on web2.0-based anti-cheating mechanism for witkey e-commerce | web2.0 brings lots of amazing web applications. as a typical web2.0 application, witkey is an innovative e-commerce model. however, problems such as cheating and intellectual property seriously influence the sound development of witkey e-commerce. based on brief introduction to witkey model and its operational processe... | 51 |
game theory analysis on underground space planning knowledge sharing via web 2.0 | modern underground space planning knowledge sharing no longer depends on face-to-face meetings, lectures or phone calls only. the conventional read-only web 1.0 was designed by html helps us in knowing about the world wide underground space planning. nevertheless, during the era of web 1.0, online users can only read b... | resistance and motivation to share sustainable development knowledge by web 2.0 | the concept of sustainable development — development which meets the needs of the present generation without depriving the needs of the future generation — has been in the lips of many political leaders, educators, ngos and green groups. living in the age of knowledge explosion, we want to receive the most updated info... | 52 |
a transformless electric spring with decoupled real and reactive power control | the electric spring has emerged as a promising technique to stabilize electrical grids with high penetration of renewable energy sources. in response to the grid frequency deviation, electric springs can flexibly regulate the noncritical load power. however, the previous versions of electric springs either suffer from ... | exploration of the relationship between inertia enhancement and dc-link capacitance for grid-connected converters | grid-connected converters (gccs) are showing potential in providing virtual inertia and has attracted wide attention recently. for the virtual inertia emulated by gccs, it is proportional with the dc-link capacitance, and thus, the dc-link capacitance can directly affect the dynamic performance for the gcc emulating in... | 53 |
data detection method from printed images with different resolutions using tablet device | in this paper, we propose a method of embedding and detecting data in printed images with several resolutions using the camera of a tablet device. the proposed method is based on a method that uses block division and code diffusion. to specify the resolution of an image and the number of blocks, invisible markers that ... | a method for data embedding to printed images based on use of original images | data embedding to printed images has become an important issue for several applications. in this paper, we assume an original image to be known and the server based data retrieval model, and a new method for the data embedding to the printed images is proposed. to embed many number of data bits, we adopt “walsh code” f... | 54 |
moving to videokifu: the last steps toward a fully automatic record-keeping of a go game | in a previous paper [ arxiv:1508.03269 ] we described the techniques we successfully employed for automatically reconstructing the whole move sequence of a go game by means of a set of pictures. now we describe how it is possible to reconstruct the move sequence by means of a video stream (which may be provided by an u... | use of the hough transformation to detect lines and curves in pictures | hough has proposed an interesting and computationally efficient procedure for detecting lines in pictures. this paper points out that the use of angle-radius rather than slope-intercept parameters simplifies the computation further. it also shows how the method can be used for more general curve fitting, and gives alte... | 55 |
research on vlsi test compression | this paper explores the recent classic vlsi test compression methods, analyses the characteristics of each methods, make compression among them, the advantages and disadvantages of each proposed approaches are expounded. the main purpose for test compression is to reduce test application time, hardware overhead and tes... | a dictionary-based test data compression method using tri-state coding | with the rapid development of integrated circuit manufacturing processes, the degree of integration of system-on-chip(soc) has increased dramatically. in this paper, a dictionary-based test data compression method with tri-state coding is proposed to reduce the increasing test data volume. firstly the partial input red... | 56 |
towards a faster simulation of systemc designs | accelerating simulation is one of the main reasons beyond the introduction of system level modeling. here systemc is one of the main players proven to speed-up simulation in comparison to classical hdl languages. however, the kernel architecture of the systemc simulator treats the design as a black box. for instance, a... | systemc validation of a low power analog cmos image sensor architecture | in a context of embedded steady camera for video surveillance with high performance requirements and hard power consumption constraints, a low power cmos image sensor architecture allowing sensor's acuity adaptation to the scene activity is considered. in this paper we present an original approach based on systemc mode... | 57 |
imos: enabling voip qos monitoring at intermediate nodes in an openflow sdn | the growing popularity of outsourced enterprise voip services poses a significant quality assurance issue for service providers. voip traffic is very sensitive to network impairments and maintaining high qos across multiple domains can be challenging. we propose to use sdn and our implementation of intermediate voip ca... | experience of developing an openflow sdn prototype for managing iptv networks | iptv is a method of delivering tv content to endusers that is growing in popularity. it is a paid service, hence the implications of poor video quality may ultimately be a loss of revenue for the provider. consequently, it is vital to provide service monitoring and reconfiguration mechanisms to ensure quality requireme... | 58 |
eye movements as implicit relevance feedback | reading detection is an important step in the process of automatic relevance feedback generation based on eye movements for information retrieval tasks. we describe a reading detection algorithm and present a preliminary study to find expressive eye movement measures. | arfled: ability recognition framework for learning and education | learning is one of the vital behaviors of human beings. this paper demonstrates a framework to augment learning activities by packaging two key ideas: eyetifact and hypermind. eyetifact is a system that converts data of eye movements beyond the difference of sensing devices to collect a large amount of training data fo... | 59 |
programmable vision processor/controller for flexible implementation of current and future image compression standards | the vision processor (vp) and vision controller (vc), two integrated products dedicated to video compression, are discussed. the chips implement the p*64, jpeg, and mpeg image compression standards. the vp forms the heart of the image compression system. it performs discrete cosine transform (dct), quantization, and mo... | a case study in pipeline processor farming: parallelising the h.263 encoder | this paper describes the parallelisation of the h.263 hybrid video encoder algorithm based upon a pipelines of processor farms (ppf) paradigm. in addition, a data-farming template, which can be very useful for several image coding algorithms, was incorporated in the ppf model. a variety of parallel topologies were impl... | 60 |
machine translation pre-training for data-to-text generation -- a case study in czech | while there is a large body of research studying deep learning methods for text generation from structured data, almost all of it focuses purely on english. in this paper, we study the effectiveness of machine translation based pre-training for data-to-text generation in non-english languages. since the structured data... | findings of the e2e nlg challenge | this paper summarises the experimental setup and results of the first shared task on end-to-end (e2e) natural language generation (nlg) in spoken dialogue systems. recent end-to-end generation systems are promising since they reduce the need for data annotation. however, they are currently limited to small, delexicalis... | 61 |
design andimplementation of a module generator for low power multipliers | multiplication is an important part of real-time system applications. various hardware parallel multipliers used in such applications have been proposed. however, when the operand sizes of the mult ... | design of efficient add/shift algorithm for multiple constant multiplication | this paper deals with the remarkable linear phase and stability property of fir filter. it is appealing for wide fir filter applications. constant filter coefficients are procured from matlab r2011b and further the optimization operation is performed on the constant coefficients using xilinx ise13.1 tool. constant mult... | 62 |
claynet: content adaptation in m-learning | m-learning is the natural evolution of e-learning based on the use of mobile devices. therefore, claynet, as an e-learning platform, is performing this step by means of developing a web service which will allow the users of mobile devices to access the resources of the e-learning platform. | applications of service oriented architecture for the integration of lms and m-learning applications | a fuel injection pump for internal combustion engines which has an rpm-proportional injection onset adjusting device, a pressure control valve controlling the supply pressure (phd f), a cold-start acceleration device having a pressure valve associated with the pressure control valve, and a full-load stop, controlled by... | 63 |
reducing power consumption of wireless networks through collaborative dmc mobile clusters | reducing the energy consumption of the wireless networks is significantly important for the economic and ecological sustainability of the ict industry, as high energy consumption may limit the performance of wireless networks, and is one of the main network costs. to solve the energy consumption problem, especially on ... | a survey on mobile data offloading: technical and business perspectives | over the last few years, data traffic over cellular networks has seen an exponential rise, primarily due to the explosion of smartphones, tablets, and laptops. this increase in data traffic on cellular networks has caused an immediate need for offloading traffic for optimum performance of both voice and data services. ... | 64 |
algorithm of ontology transformation to concept map for usage in semantic web expert system | abstract the main purpose of this paper is to present an algorithm of owl (web ontology language) ontology transformation to concept map for subsequent generation of rules and also to evaluate the efficiency of this algorithm. these generated rules are necessary to supplement and even to develop swes (semantic web expe... | towards the semantic web expert system | towards the semantic web expert systemthe paper presents a conception of the semantic web expert system which is the logical continuation of the expert system development. the semantic web expert system emerges as the result of evolution of expert system concept and it means expert system moving toward the web and usin... | 65 |
a comprehensive mobile e-healthcare system | bio-sensors and communication devices like smart phones witnessed significant progress, to take this advances, we propose a mobile heath-care system that reduce the distance between the patient and the health care center especially for the patient that need long term nursing care. this mobile system provide a good moni... | building long-distance health care network using minimized portable sensors and active alert system | the accelerated aging population around the world will be more obvious. in the usa, there will be about 72 million people aged 65 by 2030, there will have nearly 36.98% of the elderly population in taiwan until 2050. those people will need health care too. nowadays, the current health care focus on the passive home car... | 66 |
secure and efficient search technique in cloud computing | cloud computing is nowadays widely used technology. various advanced technologies in the world are taking cloud computing very seriously as the new era for mobile as well as a steady computing environment. in cloud computing the data privacy and its security is highly recommended, that's why the data which have to be s... | mona: secure multi -owner data sharing for dynamic groups in the cloud | in this paper, we present a secure multi owner data sharing scheme for dynamic groups in the cloud computing. by leveraging on group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. in this propose a new model for sharing secure data in the cloud computing fo... | 67 |
learning to plan probabilistically from neural networks | this paper discusses the learning of probabilistic planning without a priori domain-specific knowledge. different from existing reinforcement learning algorithms that generate only reactive policies and existing probabilistic planning algorithms that requires a substantial amount of a priori knowledge in order to plan,... | planning in a hierarchy of abstraction spaces | a problem domain can be represented as a hierarchy of abstraction spaces in which successively finer levels of detail are introduced. the problem sotver abstrips, a modification of strips, can define an abstraction space hierarchy from the strips representatien of a problem domain, and it can utilize the hierarchy in s... | 68 |
an interactive software package for the investigation of hydrodynamic-slider bearing-lubrication | the temperature dependent character of viscosity complicates the numerical analysis of hydrodynamic slider bearings and the geometry of the flow cavity plays a significant role on the design and performance of the lubrication systems. in this paper, we represent a recent software tool, named as ''hydro-lub,'' capable o... | nonadiabatic and frictional constant area duct flow: a visual software based simulation for compressible systems | numerical investigation of compressible flows in constant area ducts becomes substantially complicated when the surface roughness and heat flux conditions simultaneously act as independent and considerable boundary conditions that create significant influences on the flow and heat transfer characteristics. this article... | 69 |
relation-based file management for portable device | as storage capacity in ce devices has been increased, the number and type of files has been increased accordingly. but traditional file systems generally use hierarchical directory/file structure to organize files. when we want to store and retrieve a file, we should know the name and location of the file exactly. and ... | richer file system metadata using links and attributes | traditional file systems provide a weak and inadequate structure for meaningful representations of file interrelationships and other context-providing metadata. existing designs, which store additional file-oriented metadata either in a database, on disk, or both are limited by the technologies upon which they depend. ... | 70 |
junction tree decomposition for parallel exact inference | we present a junction tree decomposition based algorithm for parallel exact inference. this is a novel parallel exact inference method for evidence propagation in an arbitrary junction tree. if multiple cliques contain evidence, the performance of any state-of-the-art parallel inference algorithm achieving logarithmic ... | global conditioning for probabilistic inference in belief networks | in this paper we propose a new approach to probabilistic inference on belief networks, global conditioning, which is a simple generalization of pearl's (1986b) method of loop-cutset conditioning. we show that global conditioning, as well as loop-cutset conditioning, can be thought of as a special case of the method of ... | 71 |
image deformation based on cubic splines and moving least squares | based on cubic splines, an image deformation method using moving least squares is proposed in this paper. according to shape information or deformation requirement, key points are set to create control curves. the curves are moved to new positions to guide image warping. the transformation functions are deduced to comp... | sketch-based aesthetic product form exploration from existing images using piecewise clothoid curves | we present a new sketch-based product form exploration technique that works from images and sketches of existing products. at the heart of our approach, is a multi-stroke curve beautification method and a curve-based image deformation algorithm. the proposed approach converts groups of strokes into piecewise clothoid c... | 72 |
the analysis of frequency deviation on synchrophasor calculation and correction methods | this paper gave a brief introduction of phasor measurement unit (pmu) in the wide area measurement system (wams) of power systems, and studied the error characteristics of the discrete fourier calculation of phasor in the condition of a sinusoidal signal with frequency deviation from nominal frequency. then, a program ... | fourier averaging algorithm for improving accuracy of basic wave voltages and currents calculations on industrial frequencies | accurately and quickly acquisition of effective values (or amplitudes) and phases of real time basic wave currents and voltages is needed to guarantee the stability, security and economics of power systems. accuracy and speed are also important performance indices of different micro -processor relay protection devices ... | 73 |
application of improved dv-hop localization algorithm in port container positioning | in order to overcome the traditional positioning system has high cost, poor precision, demand for warehouse, container terminal management, using rssi ( received single strength ) technology on the container for initial localization, then introduction of genetic dv-hop localization algorithm on the error correction. th... | research on distance measurement based on rssi of zigbee | distance measurement based on rssi, featuring low communication overhead and low complexity, is widely applied in the range-based localization of the wireless sensor networks. we first analyze the theory of distance measurement based on rssi and the influence of environment on rssi, and then we propose three experiment... | 74 |
a location-aware smart bus guide application for seoul | the goal of our research is to develop a smart context-aware guide system that provides a smart and personalized guide services based on implicit awareness of context. as a context-aware guide application, we have been developing a location-aware smart bus guide system for seoul. it will guide users to the nearby bus s... | developing a context-aware electronic tourist guide: some issues and experiences | in this paper, we describe our experiences of developing and evaluating guide, an intelligent electronic tourist guide. the guide system has been built to overcome many of the limitations of the traditional information and navigation tools available to city visitors. for example, group-based tours are inherently inflex... | 75 |
on scheduling 3d model transmission in network virtual environments | view dependent 3d-geometry streaming allows navigation of large virtual environments without requiring replication of the entire database at the client. we present scheduling policies for optimal transmission of multiple multiresolution 3d-geometry objects over congested network links. using multiresolution objects all... | multi-resolution next location prediction for distributed virtual environments | computing performance of today's graphics hardware grows fast as well as amount of rendered data. modern graphics engines enable a possibility to use an arbitrary number of textures with arbitrary resolutions. on the other hand, high quality distributed 3d virtual environments can't exploit the computation power due to... | 76 |
structured ontology and ir for email search discovery | this paper discusses an email discovery and infor-mation retrieval tool based on formal concept anal-ysis. the program allows users to navigate emailusing a visual lattice metaphor rather than a tree.it implements a virtual le structure over emailwhere les and entire directories can appear in mul-tiple positions in a g... | formal concept analysis: mathematical foundations | from the publisher: ::: this is the first textbook on formal concept analysis. it gives a systematic presentation of the mathematical foundations and their relation to applications in computer science, especially in data analysis and knowledge processing. above all, it presents graphical methods for representing concep... | 77 |
myanmar phrases translation model with morphological analysis for statistical myanmar to english translation system | this paper presents myanmar phrases translation model with morphological analysis. the system is based on statistical approach. in statistical machine translation, large amount of information is needed to guide the translation process. when small amount of training data is available, morphological analysis is needed es... | modeling with structures in statistical machine translation | most statistical machine translation systems employ a word-based alignment model. in this paper we demonstrate that word-based alignment is a major cause of translation errors. we propose a new alignment model based on shallow phrase structures, and the structures can be automatically acquired from parallel corpus. thi... | 78 |
named data networking for priority-based content dissemination in vanets | name-based communication and in-network caching make named data networking (ndn) a promising solution for content dissemination in vehicular ad hoc networks (vanets). so far, different ndn packet forwarding mechanisms have been proposed, but none of them have considered the idea of a prioritized traffic treatment based... | enhancing content-centric networking for vehicular environments | content-centric networking (ccn) is a new popular communication paradigm that achieves information retrieval and distribution by using named data instead of end-to-end host-centric communications. this innovative model particularly fits mobile wireless environments characterized by dynamic topologies, unreliable broadc... | 79 |
loop quasi-invariant chunk detection | several techniques for analysis and transformations are used in compilers. among them, the peeling of loops for hoisting quasi-invariants can be used to optimize generated code, or simply ease developers’ lives. in this paper, we introduce a new concept of dependency analysis borrowed from the field of implicit computa... | global common subexpression elimination | when considering compiler optimization, there are two questions that immediately come to mind; one, why and to what extent is optimization necessary and two, to what extent is it possible. ::: when considering the second question, one might immediately become discouraged since it is well known that the program equivale... | 80 |
influence of the surrounded tissue in the detection of microcalcifications using wavelets | breast cancer is the most common cancer in women. many clinical decision support systems aimed to help in the diagnosis of breast cancer have been developed because an early diagnosis is fundamental to improve the results of the treatment. most of the developments are aimed to detect microcalcifications using the same ... | representative frame decoration using unsharp filter in video summarization | representative frames are vital and attractive key components in providing internet users a way to swiftly browse a video clip in different levels of detail, without the need to view entire video clip. past study reveals that several schemes have been developed for representative frame extraction however all schemes ar... | 81 |
image denoising based on the bivariate model of dual tree complex wavelet transform | in our study, we designed a algorithm of image de-noising using the local adaptive window bivariate model based on dual tree complex wavelet transform (dtcwt). in the algorithm, we used the advantages of dtcwt with approximate shift invariance and well direction selectivity, and then according to the correlation of nei... | improved image denoising based on haar wavelet transform | the wavelet decomposing levels and the selection of the thresholding function affect the performance of image denoising using the wavelet thresholding method. in this paper, a new method to identify the wavelet decomposing levels using the 2d haar wavelet thresholding method is presented to denoise an image. it uses th... | 82 |
character-based parsing with convolutional neural network | we describe a novel convolutional neural network architecture with k-max pooling layer that is able to successfully recover the structure of chinese sentences. this network can capture active features for unseen segments of a sentence to measure how likely the segments are merged to be the constituents. given an input ... | parsing the internal structure of words: a new paradigm for chinese word segmentation | lots of chinese characters are very productive in that they can form many structured words either as prefixes or as suffixes. previous research in chinese word segmentation mainly focused on identifying only the word boundaries without considering the rich internal structures of many words. in this paper we argue that ... | 83 |
improved spectrum agility in narrow-band plc with cyclic block fmt modulation | narrow-band power line communications (nb-plc) operate in portions of the 3–500 khz spectrum and have to obey certain spectral masks for emc and coexistence issues. although orthogonal frequency division multiplexing (ofdm) allows simple spectrum management by switching on-off the subchannels, its poor sub-channel freq... | power line network topology identification using admittance measurements and total least squares estimation | in this paper, we consider the identification of a smart grid network topology by means of admittance measurements performed at the network nodes. we show how the application of the transmission line theory allows the identification of the node-to-node connections. thereby, a topology identification algorithm is presen... | 84 |
mining a new fault-tolerant pattern type as an alternative to formal concept discovery | formal concept analysis has been proved to be useful to support knowledge discovery from boolean matrices. in many applications, such 0/1 data have to be computed from experimental data and it is common to miss some one values. therefore, we extend formal concepts towards fault-tolerance. we define the dr-bi-set patter... | constraint programming for mining n-ary patterns | the aim of this paper is to model and mine patterns combining several local patterns (n-ary patterns). first, the user expresses his/her query under constraints involving n-ary patterns. second, a constraint solver generates the correct and complete set of solutions. this approach enables to model in a flexible way set... | 85 |
human resources information systems improvement: involving financial systems and other sources data | human resources management systems are having a wide audience at present. however, no truly integrate solution has been proposed yet to improve the systems concerned. possible approaches to extra data collection for decision-making are considered including psychological testing and fixed assets information as well as p... | enterprise resource planning systems: the integrated approach | enterprise resource planning (erp) systems enjoy an increasingly wide coverage. however, no truly integrate solution has been proposed as yet. erp classification is given. recent trends in commercial systems are analyzed on the basis of human resources (hr) management software. an innovative "straight through" design a... | 86 |
understanding relaxed memory consistency through interactive visualization | we present rasho, a tool that extracts and depicts execution scenarios from upc source code, then allows learners to intervene in the scenarios, manipulating them to explore hypotheses about consistent and inconsistent code. this approach allows learners to play with relaxed consistency inside a responsive, informative... | nemos: a framework for axiomatic and executable specifications of memory consistency models | summary form only given. conforming to the underlying memory consistency rules is a fundamental requirement for implementing shared memory systems and developing multiprocessor programs. in order to promote understanding and enable automated verification, it is highly desirable that a memory model specification be both... | 87 |
topic models and metadata for visualizing text corpora | effectively exploring and analyzing large text corpora requires visualizations that provide a high level summary. past work has relied on faceted browsing of document metadata or on natural language processing of document text. in this paper, we present a new web-based tool that integrates topics learned from an unsupe... | exploratory search: from finding to understanding | research tools critical for exploratory search success involve the creation of new interfaces that move the process beyond predictable fact retrieval. | 88 |
visualizing the thematic update status of web and wap sites on mobile phones * | the primary goal of people accessing the web from mobile phones is to find specific pieces of information (poi, hereinafter), not to surf. well-designed sites for mobile users help them by minimizing the path needed to reach the desired poi. we propose a further improvement, based on visualizing thematic update status ... | building usable wireless applications for mobile phones | building usable wap applications is not simple. wireless devices have many limitations, and the average user of a wap application is not technically oriented (and possibly not even used to the internet). finally, the interpretation of wml varies greatly between devices from different vendors. this poses an extra challe... | 89 |
nina - navigating and interacting with notation and audio | this article deals with an xml-based format that allows an integrated representation of music, as well as with a working software demo that demonstrates the power of the format. the format itself is the basis of an ieee international standard for a comprehensive description of music contents and their synchronisation. ... | the representation levels of music information | the purpose of this article is to characterize the various kinds and specificities of music representations in technical systems. it shows that an appropriate division derived from existing applications relies in four main types, which are defined as the physical, signal, symbolic and knowledge levels. this fair simple... | 90 |
single frequency-based visual servoing for microrobotics applications | recently, high resolution visual methods based on direct-phase measurement of periodic patterns has been proposed with successful applications to microrobotics. this paper proposes a new implementation of direct-phase measurement methods to achieve 3-dof (degrees of freedom) visual servoing. the proposed algorithm reli... | pseudo-periodic encryption of extended 2-d surfaces for high accurate recovery of any random zone by vision | this article presents a binary position encoding method for extended two-dimensional surfaces. position encryption is based on linear feedback shift register sequences inserted within a periodic frame of spots. the position and orientation of any local view is retrieved accurately with respect to the encrypted surface.... | 91 |
low power cross-domain high-voltage transmitters for battery management systems | this work presents a pair of low power high-voltage (hv) transmitters for battery management systems (bms). besides, the hv transmitter is designed using cmos transistors without any isolator. to realize a solution on silicon, the proposed hv transmitter shall be fabricated using an advanced hv semiconductor process, w... | a stackable, 6-cell, li-ion, battery management ic for electric vehicles with 13, 12-bit σδ adcs, cell balancing, and direct-connect current-mode communications | battery monitoring systems are a critical aspect of electric vehicles. to interface with the high voltages in these systems a stacked ic approach is used. in this work we present an ic suitable for monitoring 6 cells which can be stacked to monitor a total of 192 cells. the ic has 13 parallel σδ adcs (12 bit, 5mv accur... | 92 |
best-first vs. depth-first and/or search for multi-objective constraint optimization | in this paper we present and evaluate the power of best-first search over and/or search spaces for multi-objective constraint optimization. the main virtue of the and/or representation of the search space is its sensitivity to problem structure, which can translate into significant time savings. we introduce a linear-s... | optimal paths in graphs with stochastic or multidimensional weights | this paper explores computationally tractable formulations of stochastic and multidimensional optimal path problems, each as an extension of the shortest path problem. a single formulation encompassing both problems is considered, in which a utility function defines preference among candidate paths. the result is the a... | 93 |
security, liberty, and electronic communications | we live in perilous times. we live in times where a dirty bomb going off in lower manhattan is not unimaginable. we live in times where the cia interrogations of al qaeda leaders were so harsh that the fbi would not let its agent participate [36]. we live in times when security and liberty are both endangered. | preserving privacy versus data retention | the retention of communication data has recently attracted much public interest, mostly because of the possibility of its misuse. in this paper, we present protocols that address the privacy concerns of the communication partners. our data retention protocols store streams of encrypted data items, some of which may be ... | 94 |
neural network topological evolvement | in order to obtain instance response from evolving neural networks, we separate the evolving procedure and the output procedure in the traditional ga approach, and make them simultaneously. thanks to the support from database system, this modified ga has three characteristics, namely serialized storage, persistent evol... | on the use of biologically-inspired adaptive mutations to evolve artificial neural network structures | evolutionary algorithms have been used to successfully evolve artificial neural network structures. normally the evolutionary algorithm has several different mutation operators available to randomly change the number and location of neurons or connections. the scope of any mutation is typically limited by a user-select... | 95 |
adaptive customer profile configuration in mass customization | in the twenty-first century, a company has to organize around the customer in order to be a successful and viable firm. today, the marketplace is customer driven. customers expect to get what they would like, with a side order of customization. this alteration of traditional organization of a company through the involv... | true/false questions analysis using computerized certainty-based marking tests | writing effective and efficient exams is a crucial component of the teaching and learning process. exams are a common approach to assess student learning and the results are useful in a variety of ways. most often, results are used to provide students with feedback on what they have learnt or to evaluate the instructio... | 96 |
pattern matching in music and its use for automated composition | it is something of a truism to say that self-reference abounds in ‘classical’ music. that is, given a single piece of music, it will most likely contain instances of verbatim repetition as well as more subtle variation. why then, when programming a computer to generate music, is little attention paid to ensuring the pr... | algorithms for discovering repeated patterns in multidimensional representations of polyphonic music | in previous approaches to repetition discovery in music, the music to be analysed has been represented using strings. however, there are certain types of interesting musical repetitions that cannot be discovered using string algorithms. we propose a geometric approach to repetition discovery in which the music is repre... | 97 |
on practical results of the differential power analysis | this paper describes practical differential power analysis attacks. there are presented successful and unsuccessful attack attempts with the description of the attack methodology. it provides relevant information about oscilloscope settings, optimization possibilities and fundamental attack principles, which are import... | a dpa resistant dual rail préchargé logic cell | this paper presents a novel differential pass-transistor precharge logic (dppl) based on the complementary pass-transistor logic (cpl). in the aspect of circuit-level countermeasure, the power consumption of dppl is more constant. the dppl also solves the problem of early propagation effects (epe) effectively and has a... | 98 |
the design of a language-directed editor for block-structured languages | a language-directed editor combines the text manipulation functions of a general-purpose editor with the syntax-checking functions of a compiler. it allows a user to create and modify a program in terms of its syntactic structure. the design of a user interface and an implementation for one such editor is described in ... | grammar-based definition of metaprogramming systems | description d'une approche basee sur la grammaire de la specification des composants de manipulation syntactique d'un systeme de meta-programmation. la methode est applicable a tout langage de programmation et est illustree dans son application particuliere au pascal | 99 |
digital filtering in pcm telephone systems | the advent of cheap and fast digital integrated circuits permits, at least in principle, the application of digital processing directly to pcm coded telephone signals. at present, the following applications look most promising: channel filters; digital conference circuits; receivers for mfc or touch-tone signals; and s... | optocoupler-based extension-line circuit for electronic pabx's | a new approach for an extension-line circuit of a private automatic branch exchange (pabx), which does not depend on a line transformer and high-power feeder resistors, is described. a matched pair of electrooptical couplers is used in place of the transformed they provide high-voltage-protected signal transmission wit... | 100 |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 2