Assertions had their origin in program verification. For the systems developed in industry, construction of assertions and their use in showing program correctness is a near-impossible task. However, they can be used ...
详细信息
Assertions had their origin in program verification. For the systems developed in industry, construction of assertions and their use in showing program correctness is a near-impossible task. However, they can be used to show that some key properties are satisfied during program execution. We first present a survey of the special roles that assertions can play in object oriented software construction. We then analyse such assertions by relating them to the case study of an automatic surveillance system. In particular, we address the following two issues: What types of assertions can be used most effectively in the context of object oriented software? How can you discover them and where should they be placed? During maintenance, both the design and the software are continuously changed. These changes can mean that the original assertions, if present, are no longer valid for the new software. Can we automatically derive assertions for the changed software?.
We are currently in a period of upheaval, as many new technologies are emerging that open up new possibilities to shape our everyday lives. Particularly, within the field of Personalized Human-computer Interaction we ...
详细信息
We propose an ensemble technique to train multiple individual models for supervised learning tasks. The new method divides the input space into local regions which are modelled as a set of hyper-ellipsoids. For each l...
详细信息
We propose an ensemble technique to train multiple individual models for supervised learning tasks. The new method divides the input space into local regions which are modelled as a set of hyper-ellipsoids. For each local region an individual model is trained to approximate or classify data efficiently. The idea is to use locality in the input space as an useful constraint to realize diversity in an ensemble. The method automatically determines the size of the ensemble, realises an outlier detection mechanism and shows superiority over comparable methods in a benchmark test. Also, the method was extended to a hierarchical framework allowing a user to solve complex learning tasks by combining different sub-solutions and information sources.
The Future Communication Architecture for Mobile Cloud Services: Mobile Cloud Networking (MCN)1 is a EU FP7 Large-scale Integrating Project (IP) funded by the European Commission. MCN project was launched in November ...
详细信息
In this paper we present a new representation for 3D free-form contours in the conformal geometric algebra G 4, 1 . This new representation allows to extract local geometrical feature information which is used to solv...
详细信息
ISBN:
(纸本)0769525210
In this paper we present a new representation for 3D free-form contours in the conformal geometric algebra G 4, 1 . This new representation allows to extract local geometrical feature information which is used to solve the correspondence problem for pose estimation applications. Under perspective projection, local features are extracted from a projected contour segment and compared with image features obtained from the monogenic signal. We tested our approach using synthetical and real data for several pose estimation algorithms
Discrete-event simulation of computer networks has significant scalability issues, which makes simulating large-scale networks problematic. We propose a high-level abstraction modeling network domains, interdomain lin...
详细信息
This paper revisits the synchronisation problem for second-order multi-agent systems(MASs)under dynamically changing communication *** employing the reference model-based synchronisation algorithm,it is finally shown ...
详细信息
This paper revisits the synchronisation problem for second-order multi-agent systems(MASs)under dynamically changing communication *** employing the reference model-based synchronisation algorithm,it is finally shown that synchronisation for both the position and velocity states can be achieved if the union of the communication topologies has a directed spanning tree frequently *** extends the existing results obtained for second-order MASs which exploits mild communication topology condition guaranteeing the synchronisation to a more general *** analysis is successfully performed by exploiting the product properties of row-stochastic matrices,which can also provide us with an estimate the convergence rate towards the synchronisation.
We show a novel middleware approach for pervasive applications that communicate via an XML-based distributed virtual shared information space. This approach extends some common ideas on XML language binding frameworks...
详细信息
We show a novel middleware approach for pervasive applications that communicate via an XML-based distributed virtual shared information space. This approach extends some common ideas on XML language binding frameworks by a dedicated "merge logic" that lets pervasive devices share their information with low overhead.
This paper concerns randomized leader election in synchronous distributed networks. A distributed leader election algorithm is presented for complete n-node networks that runs in O(1) rounds and (with high probability...
详细信息
暂无评论