When designing tabletop digital games, designers often draw inspiration from board games because of their similarities (e.g., spatial structure, social setting, and physical interaction). As part of our tabletop handh...
详细信息
eXtensible Business Reporting Language (XBRL) is a language for the electronic communication of business and financial data, which can offer more efficiency and improved accuracy to suppliers and users of the data. Bu...
详细信息
eXtensible Business Reporting Language (XBRL) is a language for the electronic communication of business and financial data, which can offer more efficiency and improved accuracy to suppliers and users of the data. But heterogeneous XBRL taxonomies hinder the interoperability. this paper first gives structural heterogeneity based on Ontology, then analyzes the structural conflictions between one taxonomy which adheres to the base XBRL 2.1 specification and the other which additionally keeps to Dimension 1.0. At last, the paper designs the detection and resolution algorithms. It can help transform a base taxonomy into the dimensional one. It also provide benefits in XBRL data integration, communication and taxonomies mapping.
the proceedings contain 28 papers. the special focus in this conference is on Information Security theory and practice. the topics include: Securing payment on mobile phones;role-based secure inter-operation and resou...
ISBN:
(纸本)9783642210396
the proceedings contain 28 papers. the special focus in this conference is on Information Security theory and practice. the topics include: Securing payment on mobile phones;role-based secure inter-operation and resource usage management in mobile grid systems;SSL/TLS session-aware user authentication using a GAA bootstrapped key;an almost-optimal forward-private RFID mutual authentication protocol with tag control;affiliation-hiding authentication with minimal bandwidth consumption;formal framework for the evaluation of waveform resynchronization algorithms;solving dlp with auxiliary input over an elliptic curve used in TinyTate library;information leakage discovery techniques to enhance secure chip design;a cryptographic processor for low-resource devices: canning ECDSA and AES like sardines;an evaluation of hash functions on a power analysis resistant processor architecture;a comparison of post-processing techniques for biased random number generators;AES variants secure against related-key differential and boomerang attacks;leakage squeezing countermeasure against high-order attacks;differential fault analysis of the advanced encryption standard using a single fault;entropy of selectively encrypted strings;practical attacks on HB and HB+ protocols;attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard;a SMS-Based mobile botnet using flooding algorithm;fault injection for reverse engineering;hardware Trojan side-channels based on physical unclonable functions;formal analysis of security metrics and risk;STORM - collaborative security management environment;trust agreement in wireless mesh networks and secure E-Auction for mobile users with low-capability devices in wireless network.
the proceedings contain 47 papers. the topics discussed include: arbitrary obstacles constrained full coverage in wireless sensor networks;heuristic algorithms for constructing connected dominating sets with minimum s...
ISBN:
(纸本)3642146538
the proceedings contain 47 papers. the topics discussed include: arbitrary obstacles constrained full coverage in wireless sensor networks;heuristic algorithms for constructing connected dominating sets with minimum size and bounded diameter in wireless networks;energy-efficient algorithm for the target Q-coverage problem in wireless sensor networks;approaching the optimal schedule for data aggregation in wireless sensor networks;approximate optimization for proportional fair AP association in multi-rate WLANs;minimum CDS in multihop wireless networks with disparate communication ranges;maximum weighted independent set of links under physical interference model;a QoS-guaranteed energy-efficient packet scheduling algorithm for WiMax mobile devices;and energy-efficient restricted greedy routing for three dimensional random wireless networks.
the proceedings contain 47 papers. the special focus in this conference is on Wireless algorithms, Systems, and Applications. the topics include: On the performance of distributed N-cooperation power allocation via di...
ISBN:
(纸本)9783642146534
the proceedings contain 47 papers. the special focus in this conference is on Wireless algorithms, Systems, and Applications. the topics include: On the performance of distributed N-cooperation power allocation via differential game in cognitive radio system;energy-efficient restricted greedy routing for three dimensional random wireless networks;adaptive energy and location aware routing in wireless sensor network;utilizing temporal highway for data collection in asynchronous duty-cycling sensor networks;the impact of reader to tag collision on RFID tag identification;A desynchronization tolerant RFID private authentication protocol;study of joint routing and wireless charging strategies in sensor networks;page size optimization for code dissemination in wireless sensor networks;dynamic routing algorithm for priority guarantee in low duty-cycled wireless sensor networks;heuristic algorithms for constructing connected dominating sets with minimum size and bounded diameter in wireless networks;heterogeneity of device contact process in pocket switched networks;delay minimization of tree-based neighbor discovery in mobile robot networks;Two-stage target locating algorithm in three dimensional WSNs under typical deployment schemes;Interference analysis for FH-based multi-radio wireless mesh networks;interference-aware gossiping scheduling in uncoordinated duty-cycled multi-hop wireless networks;a game theoretic approach to multi-radio multi-channel assignment in wireless networks;PAPR analysis for SOFDM and NC-SOFDM systems in cognitive radio;application of compressed sensing for secure image coding;efficient wireless broadcasting using onion decoding;a spectrally efficient anti-jamming technique based on message driven frequency hopping;energy-efficient algorithm for the target Q-coverage problem in wireless sensor networks;Secure RFID application data management using all-Or-nothing transform encryption.
this paper proposes a multiple-pedestrian-tracking method that uses robust inlier features. Our system consists of pedestrian detection, data association, a multiple track management method, and particle tracking. thi...
详细信息
this paper proposes a multiple-pedestrian-tracking method that uses robust inlier features. Our system consists of pedestrian detection, data association, a multiple track management method, and particle tracking. this study primarily focuses on robust motion prediction algorithms for particle tracking. the results of the prediction are used for a motion model of a particle filter framework and the assignment cost of data association. Robust feature-based motion tracking algorithms are proposed as a means for predicting the target position. It is important to extract distinguished features and remove outlier features to estimate the region of interest (ROI) in an accurate and reliable manner. Motion prediction should be reliable in order to associate the observation-to-track pairs correctly and update the ROI accurately in a particle filter framework. the results of this study show that our motion tracking algorithm estimates the ROI more accurately than previous methods.
We discuss two different ways of having fun with two different kinds of games: On the one hand, we present a framework for developing multiplayer pervasive games that rely on the use of mobile sensor networks. On the ...
详细信息
ISBN:
(纸本)9783642131219
We discuss two different ways of having fun with two different kinds of games: On the one hand, we present a framework for developing multiplayer pervasive games that rely on the use of mobile sensor networks. On the other hand, we show how to exploit game theoretic concepts in order to study the graph-theoretic problem of vertex coloring.
In this paper we introduce new algebraic forms, SOP+ and DSOP+, to represent functions f : {0, 1}(n) -> N, based on arithmetic sums of products. these expressions are a direct generalization of the classical SOP an...
详细信息
ISBN:
(纸本)9783642131219
In this paper we introduce new algebraic forms, SOP+ and DSOP+, to represent functions f : {0, 1}(n) -> N, based on arithmetic sums of products. these expressions are a direct generalization of the classical SOP and DSOP forms. We propose optimal and heuristic algorithms for minimal SOP+ and DSOP+ synthesis. We then show how the DSOP+ form can be exploited for Data Mining applications. In particular we propose a new compact representation for the database of transactions to be used by the LCM algorithms for mining frequent closed itemsets.
the way memory hierarchy has evolved in recent decades has opened new challenges in the development of indexing structures in general and spatial access methods in particular. In this paper we propose an original appr...
详细信息
ISBN:
(纸本)9783642131219
the way memory hierarchy has evolved in recent decades has opened new challenges in the development of indexing structures in general and spatial access methods in particular. In this paper we propose an original approach to represent geographic data based on compact data structures used in other fields such as text or image compression. A wavelet tree-based structure allows us to represent minimum bounding rectangles solving geographic range queries in logarithmic time. A comparison with classical spatial indexes, such as the R-tree, shows that our structure can be considered as a fun, yet seriously competitive, alternative to these classical approaches.
暂无评论