the proceedings contain 164 papers. the topics discussed include: performance comparison of ieee802.1Q and ieee802.1 AVB in an Ethernet-based in-vehicle network;a fast seat assignment algorithm based-on bucket data ...
ISBN:
(纸本)9788988678671
the proceedings contain 164 papers. the topics discussed include: performance comparison of ieee802.1Q and ieee802.1 AVB in an Ethernet-based in-vehicle network;a fast seat assignment algorithm based-on bucket data structure;a two-phase iterative pre-copy strategy for live migration of virtual machines;an empirical evaluation and improvement of the item balancing algorithm in P2P systems;towards high performance and usability programming model for heterogeneous HPC platforms;saving streaming bandwidth via wireless sharing for a tree-based live streaming system on public-shared network;a novel pattern of distributed low-rate denial of service attack disrupts Internet routing;achieving maximum performance for matrix multiplication using set associative cache;a user context recognition method for ubiquitous computing systems;the influence factors to the enterprise microblogs - a research of the restaurant enterprise microblogs on ***;and common-sense reasoning in constructive discursive logic.
the proceedings contain 164 papers. the topics discussed include: performance comparison of ieee802.1Q and ieee802.1 AVB in an Ethernet-based in-vehicle network;a fast seat assignment algorithm based-on bucket data ...
ISBN:
(纸本)9788988678671
the proceedings contain 164 papers. the topics discussed include: performance comparison of ieee802.1Q and ieee802.1 AVB in an Ethernet-based in-vehicle network;a fast seat assignment algorithm based-on bucket data structure;a two-phase iterative pre-copy strategy for live migration of virtual machines;an empirical evaluation and improvement of the item balancing algorithm in P2P systems;towards high performance and usability programming model for heterogeneous HPC platforms;saving streaming bandwidth via wireless sharing for a tree-based live streaming system on public-shared network;a novel pattern of distributed low-rate denial of service attack disrupts Internet routing;achieving maximum performance for matrix multiplication using set associative cache;a user context recognition method for ubiquitous computing systems;the influence factors to the enterprise microblogs - a research of the restaurant enterprise microblogs on ***;and common-sense reasoning in constructive discursive logic.
A typical surveillance application involves the use of limited sensing resources to monitor highly dynamic and uncertain environments. As a result, there is increasing demand to develop self-optimizing wireless sensor...
详细信息
ISBN:
(纸本)9781457713798
A typical surveillance application involves the use of limited sensing resources to monitor highly dynamic and uncertain environments. As a result, there is increasing demand to develop self-optimizing wireless sensor networks that are capable of adapting to such conditions. In this paper, we present a modeling framework, TeamSense, for designing and evaluating the performance of autonomous mobile wireless sensor networks for object-tracking applications. We program each sensor node to allow peer communication and collaboration to track several objects concurrently while reducing the network's overall energy consumption. Operating in dynamic, decentralized teams, sensor nodes continuously fuse gathered data to enhance the estimation and prediction of the objects' trajectories and optimally reconfigure the formed teams. the optimal reconfiguration of each team is obtained through solving a mixed-integer program. We perform a set of experiments to examine the performance of the developed network. Our results show that the TeamSense algorithms are computationally efficient and achieve a high level of tracking performance while using limited sensing resources and maintaining desirable energy consumption levels.
Withthe popularity of micro-blogs, more and more enterprises come to make use of micro-blogs to work. While using the new method to communicate with consumers, the enterprises are encountering withthe new problems. ...
详细信息
In ubiquitous computing environment, smart objects get environmental data from sensors, and combine various sensor data. After processing these data, smart object can provide intelligent service to user. To do this, s...
详细信息
For navigating automatic forklift, we proposed an method for locating of the forklift. To improve efficiently of image processing and robust of object identification, the color image is transformed from RGB space into...
详细信息
ISBN:
(纸本)9781612846835;9781612846828
For navigating automatic forklift, we proposed an method for locating of the forklift. To improve efficiently of image processing and robust of object identification, the color image is transformed from RGB space into HSV and YUV space. Afterwards, we find out the mid-point of the pallets, calculate position of pallets relative to forklift by camera space model which builds the relationship between image space and real world space. In order to improve system speed, we use the Kalman filter to decrease the processing data. Experiment results indicate that our method has good performance in improving accuracy and efficiency of localization.
Cloud storage services provide highly scalable, available and pay-as-you-go storage space for individual and enterprise users. Cloud storage services are inherently insecure as the management of the data in the cloud ...
详细信息
ISBN:
(纸本)9781467327404;9781467327404
Cloud storage services provide highly scalable, available and pay-as-you-go storage space for individual and enterprise users. Cloud storage services are inherently insecure as the management of the data in the cloud storage is controlled by third parties beyond the reach of the data owner. To address this problem, a number of data obfuscation techniques have been proposed to conceal data before sending it to the cloud. the secrets keys used for obfuscation are stored in a secure location while obfuscated data is stored in the cloud. In these approaches, the data is as secure as its corresponding keys. However, this still brings a challenging issue where a user needs to manage a large number of (secret) keys in such a way that they are protected against all types of adversaries, and should be as highly available as cloud storage services. To address this issue, we propose a portable key management service that is highly secure and available. In our solution, all keys are stored in a tamper-proof hardware within a portable USB device that users can carry withthem all the time in order to provide high security and availability. We describe the system model, the details of the key management service and a prototype implementation.
An overview of the current state of the formal modeling of cyber-physical systems (CPSs) is presented, and the challenges in developing high-confidence CPSs are discussed. To ensure the dependability of CPSs, CPSs for...
详细信息
ISBN:
(纸本)9781612846835;9781612846828
An overview of the current state of the formal modeling of cyber-physical systems (CPSs) is presented, and the challenges in developing high-confidence CPSs are discussed. To ensure the dependability of CPSs, CPSs formal model (CPSFM) is proposed based on a kind of object-Oriented Petri nets (OPN). CPSFM describes the structure and behaviors of sensors, actuators and controllers. A variety of well-established techniques and supporting tools of Petri nets can be used to analyze, verify and validate CPSFM, and therefore the dependability of CPSs can be significantly improved.
Because the trade-off between discriminative power and invariance varies from task to task, no single kind of feature is optimal in all situations. In this paper we build a generic scene recognition engine based on mu...
详细信息
ISBN:
(纸本)9781612846835;9781612846828
Because the trade-off between discriminative power and invariance varies from task to task, no single kind of feature is optimal in all situations. In this paper we build a generic scene recognition engine based on multiple cues which capture the different characteristics of the images. Our method can be equally applicable to a range of tasks including scene and object category recognition tasks. Experimental results show that the proposed algorithm outperforms the state-of-the-art methods on a large, challenging dataset of fifteen natural scene categories.
H.264 is an up-to-date video coding standard with wide applications. In order to improve the segmentation efficiency for H.264 video, a novel object segmentation approach using background estimation is proposed in thi...
详细信息
ISBN:
(纸本)9781612846835;9781612846828
H.264 is an up-to-date video coding standard with wide applications. In order to improve the segmentation efficiency for H.264 video, a novel object segmentation approach using background estimation is proposed in this paper. Firstly the preprocessing including spatiotemporal filtering and motion field accumulation is used to remove the noisy motion vectors and obtain the dense motion field. then the inter-frame coding modes are applied to estimate the background region, which can reduce the processing time for the subsequent global motion compensation. Finally depending on the residual motion field, the hypothesis testing is exploited to distinguish between moving object region and background region. Experimental results for several video sequences demonstrate high processing speed and good segmentation quality. the proposed approach can effectively extract the objects from H.264 video by using the estimated background.
暂无评论