Multimedia data, typically image data, is increasing rapidly across the Internet and elsewhere. To keep pace with the increasing volumes of image information, new techniques need to be investigated to retrieve images ...
详细信息
A novel hierarchical approach to image retrieval is proposed. First, a color label histogram is used to effectively filter out the images that are not similar to the query image in color. The proposed color label hist...
详细信息
Consider a network of processors among which elements ina finite field K can be verifiably shared in a constant number of *** furthermore constant-round protocols are available for generat-ing random shared values, fo...
详细信息
A method and system of real-time feedback and analyzing Electroencephalogram (EEG) using short-time Fourier transform (STFT) and coherence analysis is presented in this paper. The system composition of hardware and so...
详细信息
A method and system of real-time feedback and analyzing Electroencephalogram (EEG) using short-time Fourier transform (STFT) and coherence analysis is presented in this paper. The system composition of hardware and software are described. By the utilization of this method and system, the EEG's real-time time-frequency distribution (TFD) is obtained, and the EEG temporal spectral 3-dimension array is displayed on computer's screen for EEG realtime feedback. The time-frequency analysis (TFA) such as Wigner-Ville distribution (WVT) and wavelet transform (WT), has been successfully applied in some biomedical signals to detect both temporal and spectral features of biomedical signals. But real-time realization of TFA is difficult since the computation complication of WVT and WT. By using the STFT algorithm, we develop a system for the EEG feedback and TFA in real-time. This system may be used for EEG biofeedback, and possesses the value of clinical practice.
In this paper, the concept of a 3 layer distributedsensor network for patient monitoring and care is introduced. The envisioned network has a leaf node layer (consisting of patient sensors), a intermediate node layer...
详细信息
ISBN:
(纸本)078036449X
In this paper, the concept of a 3 layer distributedsensor network for patient monitoring and care is introduced. The envisioned network has a leaf node layer (consisting of patient sensors), a intermediate node layer (consisting of the supervisory processor residing with each patient) and the root node processor (residing at a central monitoring facility). The introduced paradigm has the capability of dealing with the bandwidth bottleneck at the wireless patient - root node link and the processing bottleneck at the central processor or root node of the network.
The paper presents an innovative hierarchical feedback adaptation method that efficiently controls the dynamic QoS behavior of real time distributed data flow applications, such as sensor based data streams or mission...
详细信息
The 39;viewpoint39; approach, in which a system is described by several partial specifications, has been proposed as a way of making complex computingsystems more understandable, The ISO39;s Open Distributing P...
详细信息
ISBN:
(纸本)0769508227
The 'viewpoint' approach, in which a system is described by several partial specifications, has been proposed as a way of making complex computingsystems more understandable, The ISO's Open Distributing Processing (ODP) framework is an architecture for open distributedsystems, involving five named viewpoints. This paper compares two partial specifications of a lending library - from the ODP's Enterprise and Information Viewpoints - and discusses the relation between them. Both specifications are written in Object-Z, an object-oriented variant of Z. Examining how such partial specifications might be unified raises broader issues of refinement and mutual consistency of partial specifications in Object-Z.
This paper concerns the formal specification and mechanical verification of transaction processing systems aimed at distributed databases. In such systems, a standard set of ACID properties most be ensured by a combin...
详细信息
ISBN:
(纸本)0769508227
This paper concerns the formal specification and mechanical verification of transaction processing systems aimed at distributed databases. In such systems, a standard set of ACID properties most be ensured by a combination of concurrency control and recovery, protocols. In the existing literature, these protocols are often studied in isolation, making strong assumptions about each other The problem of combining them in a formal way is largely, ignored. To study the formal verification of combined protocols, we specify a transaction processing system, integrating strict two-phase locking, undo/redo recovery and two-phase commit. In our method, the locking and undo/redo mechanism at distributed sites is defined by state machines, whereas the interaction between sites according to the two-phase commit protocol is specified by assertions. We proved with the interactive proof checker of PVS that our system satisfies atomicity, durability and serializability properties.
This paper reports on automated sensing techniques developed for two automated tool systems for clinical application. The examples described are for controlling tool penetration through and on the surface of tissue in...
详细信息
ISBN:
(纸本)078036449X
This paper reports on automated sensing techniques developed for two automated tool systems for clinical application. The examples described are for controlling tool penetration through and on the surface of tissue interfaces in the form of a micro-drill and steerable endoscope tip respectively. As a result of interpreting multi sensory data as information, it is possible to identify the state of the tool/tissue interaction and to judge critical states of processes. These solutions show that integration of information technology can lead to reasonably simple designs.
Smart cards are small embedded devices with strong security requirements. To fulfil those requirements, formal methods appear as promising techniques. The B method has already been used to model smart card components....
详细信息
ISBN:
(纸本)0769508227
Smart cards are small embedded devices with strong security requirements. To fulfil those requirements, formal methods appear as promising techniques. The B method has already been used to model smart card components. However, smart cards have also very strong programming constraints, both for memory usage and computing power. Currently the code generated from a B specification does nor meet those constraints. This paper presents some classical optimisation techniques that are well suited for B specifications, and that need to be included within a code generator to embed this generated code.
暂无评论