A robot's ability to correctly recognise landmarks as ones previously seen is a key feature in visual navigation algorithms. Each newly captured scene contains multiple visual features with an unknown number of ne...
详细信息
A robot's ability to correctly recognise landmarks as ones previously seen is a key feature in visual navigation algorithms. Each newly captured scene contains multiple visual features with an unknown number of new features that have never been observed and old features that need to be correctly recognised and identified. this challenge of correctly identifying common features between different frames is also known as the visual correspondence problem. In this article a new algorithm is presented that attempts to solve this problem by using an adapted version of the Harmony Search algorithm. All features are assumed to be static and consistency in the predicted camera movement is taken into account to remove outliers. Initial results show rapid convergence early in the optimisation process. this suggests that DCS could be effectively used as a rapid way of initialising other algorithms like RANSAC.
Optical flow and monocular vision have been used as a means of providing obstacle avoidance to a telerobotics platform. the robotic platform, controlled to avoid obstacles through an unstructured indoor environment, i...
详细信息
Optical flow and monocular vision have been used as a means of providing obstacle avoidance to a telerobotics platform. the robotic platform, controlled to avoid obstacles through an unstructured indoor environment, is of a small two wheeled coaxial robot (inverted pendulum). Suitable digital filtering techniques are developed to remove the effect of the robot's inherent self-stabilizing motion and other effects that corrupt the sensitive optical flow information. the proposed obstacle avoidance method worked well in real-time with some constraints such as slow turning motions and requiring sufficient track-able features in the image.
the paper defines a for specifying authorization and obligation policies of an intelligent agent acting in a changing environment and presents several ASP based algorithms for checking compliance of an event with a po...
详细信息
ISBN:
(纸本)9783540899815
the paper defines a for specifying authorization and obligation policies of an intelligent agent acting in a changing environment and presents several ASP based algorithms for checking compliance of an event with a policy specified in this language. the language allows representation of defeasible policies and is based on theory of action and change.
the management of privacy and security in the context of data stream management systems (DSMS) remains largely an unaddressed problem to date. Unlike in traditional DBMSs where access control policies are persistently...
详细信息
ISBN:
(纸本)9781424418367
the management of privacy and security in the context of data stream management systems (DSMS) remains largely an unaddressed problem to date. Unlike in traditional DBMSs where access control policies are persistently stored on the server and tend to remain stable, in streaming applications the contexts and withthem the access control policies on the real-time data may rapidly change. A person entering a casino may want to immediately block others from knowing his current whereabouts. We thus propose a novel "stream-centric" approach, where security restrictions are not persistently stored on the DSMS server, but rather streamed together withthe data. Here, the access control policies are expressed via security constraints (called security punctuations, or short, sps) and are embedded into data streams. the advantages of the sp model include flexibility, dynamicity and speed of enforcement DSMSs can adapt to not only data-related but also security-related selectivities, which helps reduce the waste of resources, when few subjects have access to data. We propose a security-aware query algebra and new equivalence rules together with cost estimations to guide the security-aware query plan optimization. We have implemented the sp framework in a real DSMS. Our experimental results show the validity and the performance advantages of our sp model as compared to alternative access control enforcement solutions for DSMSs.
Secure Semantic Web applications, particularly those involving access control, are typically focused at the application-domain only, rather than taking a more holistic approach to also include the underlying infrastru...
详细信息
Secure Semantic Web applications, particularly those involving access control, are typically focused at the application-domain only, rather than taking a more holistic approach to also include the underlying infrastructure (for example, firewalls). As a result, infrastructure configurations may unintentionally hinder and prohibit the normal operation of the Semantic Web. this paper, discusses an approach involving Description Logic and the Semantic Web Rule Language to provide synergy and alignment between firewall configurations and semantic-aware application configurations.
the field of systems biology focuses on creating a finely detailed picture of biological mechanisms. Recently, the need has arisen for more and more sophisticated and mathematically well founded computational tools, c...
详细信息
With advances of digital technology two or more organizations form a federation for a temporary purpose. It is possible that an employee of an organization needs to access resource of another organization. While langu...
详细信息
With advances of digital technology two or more organizations form a federation for a temporary purpose. It is possible that an employee of an organization needs to access resource of another organization. While languages like XACML are very good for access control of a single organization, they are not able to address interoperability issues of such federations. Lack of interoperability of access control policies does not allow someone to access remote resources. In this paper we propose an approach by augmenting with knowledge-base, Ontology that will facilitate access control policies to provide resources of remote organizations. In addition, we introduce a new effect of the rule, partial permit in our application domain (Geo-Spatial).
Given a set of d dimensional objects, a skyline query finds the objects ("skyline") that are not dominated by others. However, skylines do not always provide useful query results to users, and existing metho...
详细信息
ISBN:
(纸本)9781424418367
Given a set of d dimensional objects, a skyline query finds the objects ("skyline") that are not dominated by others. However, skylines do not always provide useful query results to users, and existing methods of various skyline queries have at least one of the following drawbacks: (1) the size of skyline objects can not be controlled, or can be only increased or only decreased but not both ; (2) skyline objects do not have built-in ranks; (3) skylines do not reflect users' weights (preferences) at different dimensions. In this paper, we propose a unified approach, the epsiv -skyline, to effectively solve all three drawbacks. We explore the properties of epsiv -skylines and propose two different algorithms to compute epsiv -skylines.
the ability of a database management system (DBMS) to detect problems or problem trends (which have not yet manifested as problems) and either take corrective actions, and/or provide advice or an automated notificatio...
详细信息
the ability of a database management system (DBMS) to detect problems or problem trends (which have not yet manifested as problems) and either take corrective actions, and/or provide advice or an automated notification to the database administrator (DBA) is absolutely crucial to ensure the "always-on" and "always-operational" environments. Any DBMS related failure could be prohibitively expensive and extremely damaging to business prospects. Today's database management systems primarily rely on DBAs to manually take corrective actions to minimize failures and provide robust platform to run applications. this approach is not very efficient, expensive and often not feasible. the goal of this paper is to outline several research directions and approaches that will lead to scalable and efficient self-healing database management systems. In this paper, we propose a general framework design, termed the Self-Healing Framework (SHF), that can enable automatic problem detection and problem resolution inside the database server, thus transforming the DBMS to become self-healing.
We study the problem of auditing a batch of SQL queries: given a forbidden view of a database that should have been kept confidential, a batch of queries that were posed over this database and answered, and a definiti...
详细信息
ISBN:
(纸本)9781424418367;1424418364
We study the problem of auditing a batch of SQL queries: given a forbidden view of a database that should have been kept confidential, a batch of queries that were posed over this database and answered, and a definition of suspiciousness, determine if the query batch is suspicious with respect to the forbidden view. We consider several notions of suspiciousness that span a spectrum both in terms of their disclosure detection guarantees and the tractability of auditing under them for different classes of queries. We identify a particular notion of suspiciousness, weak syntactic suspiciousness, that allows for an efficient auditor for a large class of conjunctive queries. the auditor can be used together with a specific set of forbidden views to detect disclosures of the association between individuals and their private attributes. Further it can also be used to prevent disclosures by auditing queries on the fly in an online setting. Finally, we tie in our work with recent research on query auditing and access control and relate the above definitions of suspiciousness to the notion of unconditional validity of a query introduced in database access control literature.
暂无评论