This article gives a capsule view of research on rough set theory and applications ongoing at universities and laboratories in China. Included in this capsule view of rough set research is a brief description of the f...
详细信息
Many protocols exist for supporting routing in mobile ad hoc networks (MANETs). Selecting a particular protocol for an application or deployment environment involves evaluating many complex inter-dependent tradeoffs a...
详细信息
ISBN:
(纸本)1595934804;9781595934802
Many protocols exist for supporting routing in mobile ad hoc networks (MANETs). Selecting a particular protocol for an application or deployment environment involves evaluating many complex inter-dependent tradeoffs and can be an overwhelming task for an application designer. However, this decision can have a significant impact on the success of a system in terms of performance, cost, and responsiveness. This paper introduces a design tool that automates this evaluation process by controlling for environmental and usage properties of an intended deployment. This provides the foundation for a highly adaptive protocol suite that lever-ages the relative benefits of competing communication paradigms. Copyright 2007 ACM.
In the present paper, the expressions for scalar and vector potentials in lossless isotropic chiral media are analyzed. Propagating eigenvalues of these potentials are then obtained. Furthermore by decomposition of so...
详细信息
In the present paper, the expressions for scalar and vector potentials in lossless isotropic chiral media are analyzed. Propagating eigenvalues of these potentials are then obtained. Furthermore by decomposition of sources and fields in a chiral medium, we introduce the auxiliary right-and left-handed potentials and find the associated fields. These potentials are used to solve the problem of a horizontal electric dipole (HED) above a chiral half space. Auxiliary right and left handed Hertzian vector potentials are introduced and E and H fields in terms of these potentials are obtained. The Hertzian potentials due to VED and/or VMD sources within a chiral half space are determined in terms of two-dimensional Fourier spectral domain and the expressions for EM fields with respect to these potentials are presented.
Offline Chinese handwriting recognition (OCHR)is a typically difficult pattern recognition *** authors have presented various approaches to recognizing its different *** present a survey and an assessment of relevant ...
详细信息
Offline Chinese handwriting recognition (OCHR)is a typically difficult pattern recognition *** authors have presented various approaches to recognizing its different *** present a survey and an assessment of relevant papers appearing in recent publications of relevant conferences and journals,including those appearing in ICDAR,SDIUT,IWFHR,ICPR,PAMI,PR,PRL,SPIE-DRR,and *** methods are assessed in the sense that we document their technical approaches,strengths,and weaknesses,as well as the data sets on which they were reportedly tested and on which results were *** also identify a list of technology gaps with respect to Chinese handwriting recognition and identify technical approaches that show promise in these areas as well as identify the leading researchers for the applicable topics,discussing difficulties associated with any given approach.
A major problem in control over wireless networks is conceiving a joint control and communication system design to optimize a given cost function. To solve this problem we have recently proposed [1] a theoretical fram...
详细信息
Vertically aligned carbon nanotubes, embedded in titanium oxide, have been fabricated and their electron emission behavior has been characterized. The growth of carbon nanotubes was achieved using a dc plasma enhanced...
详细信息
The use of commercial off-the-shelf (COTS) software product can potentially reduce cost and time for software system development. But this promise is often not realized in practice because COTS product does not serve ...
详细信息
The use of commercial off-the-shelf (COTS) software product can potentially reduce cost and time for software system development. But this promise is often not realized in practice because COTS product does not serve organizations' expectations. Thus, decision making on selecting COTS product becomes a critical task which should be performed in a systematic and repeatable manner. The decision analysis and resolution (DAR) process area of capability maturity model integration (CMMI) provides practices for formal evaluation process which could be applied to COTS selection. However, CMMI does not describe how to conduct the process that can achieve its defined goals. This research presents the DAR on COTS selection (DARCS) process model according to DAR process area of the CMMI. The model is consisted of three layers: core workflow layer, workflow details layer, and description layer.
Aspect-oriented programming (AOP) is a new programming paradigm that improves separation of concerns by decomposing the crosscutting concerns in aspect modules. Bad smells are metaphors to describe software patterns t...
详细信息
Aspect-oriented programming (AOP) is a new programming paradigm that improves separation of concerns by decomposing the crosscutting concerns in aspect modules. Bad smells are metaphors to describe software patterns that are generally associated with bad design and bad programming of object-oriented programming (OOP). New notions and different ways of thinking for developing aspect-oriented (AO) software inevitably introduce bad smells which are specific bad design and bad programming in AO software called AO bad smells. software metrics have been used to measure software artifact for a better understanding of its attributes and to assess its quality. Bad-smell metrics should be used as indicators for determining whether a particular fraction of AO code contains bad smells or not. Therefore, this paper proposes definition of metrics corresponding to the characteristic of each AO bad smell as a means to detecting them. The proposed bad-smell metrics are validated and the results show that the proposed bad- smell metrics can preliminarily indicate bad smells hidden in AO software.
Mobile agent systems of the future will be used for secure information delivery and retrieval, off-line searching and purchasing, and even system software updates. As part of such applications, agent and platform inte...
详细信息
One of the highest priorities of system requirements needed in software development industry is security requirements. However, to identify the complete and correct software security requirements are a challenging tas...
详细信息
One of the highest priorities of system requirements needed in software development industry is security requirements. However, to identify the complete and correct software security requirements are a challenging task especially creating enterprise assets security requirements. Enterprise assets security requirements are to identify security basic needs, to assess risks, to establish security approach and service, and to specify external enterprise consideration including confidentiality, integrity, availability, and accountability concerns. Moreover, these may be applied to other security requirements such as identification and authentication, access control, firewall architecture, etc. Security patterns may be used to create this security requirements but understanding, analyzing and transforming from security patterns to security requirements are difficult to accomplish. We proposed a grammar, called ESRMG (enterprise security and risk management grammar), and a prototyping tool based on security patterns in a scope of enterprise asset identification and risk managements which are the fundamental of enterprise security requirements. The proposed grammar and tool are beneficial for any organization to construct enterprise security requirements and may help reduce cost and time in overall of system development.
暂无评论