In the area of automatic test cases generation, it is challenging to satisfy constraints of complex expressions (such as equations with mathematical functions) in decision statements. This paper proposes a method, whi...
详细信息
The importance of contextual information is widely acknowledged and has become a major topic of interest, investigation, and experimentation for quite some time, generating numerous papers and many scientific works. I...
详细信息
Minimizing the energy consumption of mobile devices for wireless network access is important. In this article, we analyze the energy efficiency of a new set of applications which use Virtual Private Network (VPN) tunn...
详细信息
ISBN:
(纸本)9781450336192
Minimizing the energy consumption of mobile devices for wireless network access is important. In this article, we analyze the energy efficiency of a new set of applications which use Virtual Private Network (VPN) tunnels for secure communication. First, we discuss the energy efficiency of a number of VPN applications from a large scale deployment of 500 K devices. We next measure the energy consumption of some of these applications with different use cases. Finally, we demonstrate that a VPN tunnel can be instrumented for enhanced energy efficiency with multimedia streaming applications. Our results indicate energy savings of 40% for this class of applications.
For billions of people, mobile phones have become essential communication means to produce and share multimedia contents. Most current sharing solutions rely on centralized online solutions, requiring a permanent Inte...
详细信息
For billions of people, mobile phones have become essential communication means to produce and share multimedia contents. Most current sharing solutions rely on centralized online solutions, requiring a permanent Internet connectivity, with the consequence of increasing -and sometimes of overloading-the networks of mobile operators. This paper presents an anycast communication model allowing to offload data in wide intermittently-connected hybrid networks, using a peer-to-peer approach. Such networks combine an infrastructure part that relies on fixed equipments with intermittently or partially connected parts formed by mobile devices. This model has been implemented in a middleware platform called Nephila. Simulation results confirm that, with Nephila, thousands of people roaming a medium-size city center can share multimedia contents, using a combination of stable and transient transmission links. (C) 2015 The Authors. Published by Elsevier B.V.
A search algorithm for role-playing games (RPGs) equipments design is proposed to automatic set the adequate parameter values of weapons and armors. The typical RPGs combat algorithm and their skills are carefully cho...
详细信息
ISBN:
(纸本)9781479986767
A search algorithm for role-playing games (RPGs) equipments design is proposed to automatic set the adequate parameter values of weapons and armors. The typical RPGs combat algorithm and their skills are carefully chosen to be simultaneously simple and expressive. The goal of the proposed system is to provide various sorting lists based on different player characters and boss scenarios to game designer to quickly select the parameter values in RPG's equipments design. At the foundation of the experiment is a simple RPG combat system that allows game developers to generate parameter values of weapons and armors for reference. Experimental results demonstrate that the proposed algorithm can assist game developers to quickly and reasonably design the equipments in RPGs. Furthermore, cooperating with the appropriate naming system and art design, the proposed algorithm also can quickly provide a variety and personalization equipment selection to embed into a game engine. Finally, areas for both PC and APP applications on RPGs of this technique and potential academic research topics for game balance are speculated upon.
Library functions and system calls have been major difficulties faced by automatic test. Input/ output (I/O) functions are a set of common library functions. Testers have to interact with the test procedures if the te...
详细信息
Emerging technologies like Internet and Web services enable a new form of collaboration. An Internet based collaborative environment allows actors with similar profile or interest to publish and share multimedia conte...
详细信息
ISBN:
(纸本)9781479974986
Emerging technologies like Internet and Web services enable a new form of collaboration. An Internet based collaborative environment allows actors with similar profile or interest to publish and share multimedia content. This results in the availability of massive, distributed, heterogeneous and fast-moving streamed multimedia content. In addition, most of the data in the Web describes events associated to people, activities and locations. An event describing a situation might be initiated by a user, followed by a number of users within a specified time period. Extracting events from user contributed multimedia content in collaborative environments is challenging due to three reasons: 1) the content is heterogeneous in source, size and format;2) users might use different vocabulary to describe the same event;3) the collaboration environment contains non-events. In this paper, we have proposed an event extraction approach that will be used to build an event-based collective knowledge management framework that assists the retrieval of multimedia contents from various social media sources. This approach is accompanied by experimental results with future works.
Online Social networks empower users to collaborate with other users through complex interfaces. They enable users to take on various behaviors to achieve an objective or goal together. However, with the rise of smart...
详细信息
The proceedings contain 195 papers. The topics discussed include: detecting pedestrians behavior in building based on Wi-Fi signals;e-health services for elderly care based on Google cloud messaging;on interesting pla...
ISBN:
(纸本)9781509018932
The proceedings contain 195 papers. The topics discussed include: detecting pedestrians behavior in building based on Wi-Fi signals;e-health services for elderly care based on Google cloud messaging;on interesting place finding in social sensing: an emerging smart city application paradigm;collaborative representation-based robust face recognition by discriminative low-rank representation;a self-adaptive video dual watermarking based on the motion characteristic and geometric invariant for ubiquitous multimedia;the role of big data on smart grid transition;sensing information modeling for smart city;exploration of collective pattern to improve location prediction of mobile phone users;performance modeling of preemption-based packet scheduling for data plane in software defined networks;and aspect-oriented customization of the scheduling algorithms and the resource access protocols of a real-time operating system family.
In a prior work, we derived the LLRTD metric for frame synchronization over a binary symmetric channel (BSC), where data frames are of unknown and unequal lengths and with synchronization words aperiodically inserted;...
详细信息
ISBN:
(纸本)9781509001545
In a prior work, we derived the LLRTD metric for frame synchronization over a binary symmetric channel (BSC), where data frames are of unknown and unequal lengths and with synchronization words aperiodically inserted;data symbols have a known, unequal distribution. The performance of the metric was evaluated using simulations. Here we provide an analytical performance evaluation for the LLRTD metric. For the purpose of comparison, we also provide an analytical performance evaluation for the hard correlation (HC) metric in the case where the data has a known, unequal distribution. The results obtained for both metrics are found to be in line with the simulation results earlier obtained and confirm that the LLRTD outperforms the HC metric in all cases considered.
暂无评论