The word positions for any given word in the whole collection are arranged in clusters. If we can use the method that can take advantage of clustering, excellent results can be achieved in compression of inverted file...
详细信息
ISBN:
(纸本)0769521088
The word positions for any given word in the whole collection are arranged in clusters. If we can use the method that can take advantage of clustering, excellent results can be achieved in compression of inverted file. However, the mechanisms of decoding in all the well-known compression methods that can exploit clustering are more complex, which reduce the ability of searching performance in information retrieval system (IRS) at some degree. In this paper, we proposed a new method that can facilitate coding and decoding of interpolative code by using the simply applied and high-speed models such as γ code and Golomb code in d-gap technique. This new method can exploit clustering well, and the experimental results confirm that our method can provide fast decoding speed and excellent compression efficiency.
In classes supported by electronic messaging systems, students are required or encouraged to discuss the class topics and share their knowledge by posting text messages and replying to others. When the amount of messa...
详细信息
ISBN:
(纸本)0769521088
In classes supported by electronic messaging systems, students are required or encouraged to discuss the class topics and share their knowledge by posting text messages and replying to others. When the amount of messages is large, it is difficult for the instructor to read through all messages and evaluate student's performance. We apply natural language processing techniques to analyze the course messages to assess student's performance. Students are evaluated from three aspects: knowledge learned from the class, effort devoted to the class, and the activeness of their participation;three measures - keyword density (KD), message length (ML), and message count (MC), are derived from the text messages for each evaluation aspect respectively. The three measures are then combined to compute an overall performance indicator (PI) score for each student. The experiment shows that there is a high correlation between the PI scores and the actual grades;the rank order of students by the PI scores and that by the actual grades are highly correlated as well.
With more embedded systems networked, it becomes an important research problem to effectively defend embedded systems against buffer overflow attacks and efficiently check if systems have been protected. In this paper...
详细信息
ISBN:
(纸本)0769521088
With more embedded systems networked, it becomes an important research problem to effectively defend embedded systems against buffer overflow attacks and efficiently check if systems have been protected. In this paper, we propose the HSDefender (Hardware/Software Defender) technique that considers the protection and checking together to solve this problem. Our basic idea is to design a secure instruction set and require third-party software developers to use secure instructions to call functions. Then the security checking can be easily performed by system integrators even without the knowledge of the source code. We first classify buffer overflow attacks into two categories, stack smashing attacks and function pointer attacks, and then provide two corresponding defending strategies. We analyze the HSDefender technique in respect of hardware cost, security, and performance, and experiment with it on the SimpleScalar/ARM simulator using benchmarks from MiBench. The results show that HSDefender can defend a system against more types of buffer overflow attacks with less overhead compared with the previous work.
The following topics are dealt with: informationtechnology and education; Web/information retrieval; document management/text compression; coding/error control; mobile commerce - enabling technologies; networks; vide...
详细信息
The following topics are dealt with: informationtechnology and education; Web/information retrieval; document management/text compression; coding/error control; mobile commerce - enabling technologies; networks; video processing; modern Web and hypermedia systems; wavelets; image processing; watermarking/image compression; Internet/mobile networking; and data handling and management.
Various ad hoc routing algorithms were proposed to increase the performance in ad hoc network. In order to estimate the performance of routing algorithms, they always simulate in ad hoc network environment, and a mobi...
详细信息
ISBN:
(纸本)0769521088
Various ad hoc routing algorithms were proposed to increase the performance in ad hoc network. In order to estimate the performance of routing algorithms, they always simulate in ad hoc network environment, and a mobility model is also used for network simulation. There are two types of mobility models: trace and synthetic models. Trace models are more accurate than synthetic ones, and their simulation results are more accurate, too. However, new routing network environments are not easily modeled if traces have not yet been created. That is why most of the simulations are based on synthetic models. In this paper, a tool is implemented for generating a special trace model, called ant mobility model. It mimics the ants' movements of an ant colony. The movement is similar to the workers in a store. We focus on the integration between the ant mobility model and the network environment. When users setup the parameters for generating an ant mobility model, the generated model can be used directly in the network environment. In order to illustrate the feasibility of ant mobility model, it is compared with the random waypoint mobility model based on the same routing algorithm, AODV, by using NS-2 simulator. Three major performance metrics, throughput, network latency, and control overhead message, are estimated. As we expected, these three metrics of the ant mobility model are better than that of the random waypoint mobility model. We suggest that a trace model, like ant mobility model, should be integrated quickly with the network environment in the same way.
This letter introduces a new technique for designing and decoding Huffman codes. The key idea is to define a condensed Huffman table (CHT) that is smaller than the ordinary Huffman table and which leads to fast decodi...
详细信息
This letter introduces a new technique for designing and decoding Huffman codes. The key idea is to define a condensed Huffman table (CHT) that is smaller than the ordinary Huffman table and which leads to fast decoding. For example, the new approach has been. shown to reduce the memory consumption by a factor of eight, compared with the single-side grown Huffman table.
We explain the need for formal collaboration between students in the arts and computer science students, and argue that this should be encouraged at an early stage of their education. Specific courses that foster this...
详细信息
We explain the need for formal collaboration between students in the arts and computer science students, and argue that this should be encouraged at an early stage of their education. Specific courses that foster this sort of cooperation are described.
We present new algorithms for data compression, based on adaptive codes of order one and Huffman codes. Several comparisons between our algorithms and the well-known Huffman encoder for various input data strings are ...
详细信息
We present new algorithms for data compression, based on adaptive codes of order one and Huffman codes. Several comparisons between our algorithms and the well-known Huffman encoder for various input data strings are made. Some comparisons are also made with the LZ encoder.
This paper provides a joint source channel coding method based on arithmetic coding. The proposed method gives arithmetic coding error detection capability by using its error propagation property and markers. This pap...
详细信息
This paper provides a joint source channel coding method based on arithmetic coding. The proposed method gives arithmetic coding error detection capability by using its error propagation property and markers. This paper provides theoretical analysis and an experiment with text files.
暂无评论