We propose two variations of a new image abstraction technique based on signature bit-strings as well as an appropriate similarity metric for color-based image retrieval. Performance evaluation on a heterogeneous data...
详细信息
ISBN:
(纸本)9781581134452
We propose two variations of a new image abstraction technique based on signature bit-strings as well as an appropriate similarity metric for color-based image retrieval. Performance evaluation on a heterogeneous database of 20,000 images demonstrated that the proposed technique outperforms well-known approaches while still saving substantial amount of storage space, making it possible to store/search an image database of reasonable size using a few megabytes of main memory (e.g., 4 Mbytes for 100,000 images).
We study here schedulers for a class of rules that naturally arise in the context of rule-based constraint programming. We systematically derive a scheduler for them from a generic iteration algorithm of Apt. We apply...
详细信息
ISBN:
(纸本)9781581136241
We study here schedulers for a class of rules that naturally arise in the context of rule-based constraint programming. We systematically derive a scheduler for them from a generic iteration algorithm of Apt. We apply this study to so-called membership rules of Apt and Monfroy. This leads to an implementation that yields for these rules a considerably better performance than their execution as standard CHR rules.
Environment-Mediated Communication (EMC) is introduced as new concept for computer-mediated human-to-human communication in mobile settings. EMC is based on highly mobile computing devices such as handhelds, palmtops ...
详细信息
ISBN:
(纸本)1581130864
Environment-Mediated Communication (EMC) is introduced as new concept for computer-mediated human-to-human communication in mobile settings. EMC is based on highly mobile computing devices such as handhelds, palmtops and wearables, and on emerging technologies facilitating interaction of mobile devices with their physical surroundings, for instance smart environments and context-awareness. In EMC, communication between humans is mediated by an instance of the physical environment, at least conceptually if not physically. This short paper presents an analysis of the EMC design space, and reflects on potential applications.
For over a decade Intelligent Help has been an active area of interest for researchers. Producing a system that is capable of displaying the intelligent qualities of a human teacher or coach has been the focus of this...
详细信息
Gaussian similarity is usually used in spectral clustering. It generates the affinity matrix by mainly considering point-to-point distances in a local region with respect to the scaling parameters Δ. As a result, glo...
详细信息
Cloud computing markets arise as an efficient way to allocate resources for the execution of tasks and services within a set of geographically dispersed providers from different organisations. Client applications and ...
详细信息
Program slicing is a technique to extract the part of a program (the slice) that inuences or is inuenced by a set of variables at a given point. computing minimal slices is undecidable in the general case, and obtaini...
详细信息
ISBN:
(纸本)9781450344869
Program slicing is a technique to extract the part of a program (the slice) that inuences or is inuenced by a set of variables at a given point. computing minimal slices is undecidable in the general case, and obtaining the minimal slice of a given program is computationally prohibitive even for very small programs. Hence, no matter what program slicer we use, in general, we cannot be sure that our slices are minimal. In this work, we present a method to automatically produce a new notion of slice that we call super reduced slice because it is constructed with the combination of different slicing techniques, including the composition of standard program slicers. Copyright 2017 acm.
This paper presents ALTER, an adaptive failure detection service, which incorporates the technique of unreliable failure detection service and the idea of R-GMA. ALTER is organized in a hierarchical structure and it c...
详细信息
ISBN:
(纸本)1595931082
This paper presents ALTER, an adaptive failure detection service, which incorporates the technique of unreliable failure detection service and the idea of R-GMA. ALTER is organized in a hierarchical structure and it can be adaptive to the system conditions and user requirements with changing the system parameters and system organizations. With mathematical evaluation, ALTER shows good scalability and flexibility, which is suitable for grid environments. Copyright 2006 acm.
This paper shows the efficiency of prefix and non-prefix codes for searching over compressed handheld databases. Byte Pair Encoding (BPE), Tagged Suboptimal Code (TSC), and Huffman encoding are the compression techniq...
详细信息
ISBN:
(纸本)9781581139648
This paper shows the efficiency of prefix and non-prefix codes for searching over compressed handheld databases. Byte Pair Encoding (BPE), Tagged Suboptimal Code (TSC), and Huffman encoding are the compression techniques used in the evaluation. By compressing handheld databases and searching over compressed text without needing to expand the databases, more data will be stored and more applications can be used. Experimental results show that about 33% more space has been achieved in the compressed handhelds' databases when using Searching over Compressed Text using BPE (SCTB) or Searching over Compressed Text using TSC (SCTT) solutions. Moreover, both solutions are 6.6 times faster than decompressing the databases followed by a linear search in all different sizes of databases. Efficiency performance shows that SCTB is the recommended solution for databases consisting of large-sized records and rarely updated, and SCTT is the recommended method for frequently updated databases or consisting of small-sized records. TSC and BPE compression schemes could also be used to accelerate wireless connectivity, web clipping, or databases transfer between handheld devices and computers, since these databases are usually small in size. Copyright 2005 acm.
暂无评论