Over the last years, Ambient Assisted Living (AAL) technologies have seen a remarkable grow up. Although this field has been researched for many years and different projects have investigated and proposed AAL platform...
详细信息
This work proposes a novel way to represent uncertainty on the Lie group of rigid-body motions in the plane. This is achieved by using dual quaternions for representation of a planar rigid-body motion and proposing a ...
详细信息
This work proposes a novel way to represent uncertainty on the Lie group of rigid-body motions in the plane. This is achieved by using dual quaternions for representation of a planar rigid-body motion and proposing a probability distribution from the exponential family of distributions that inherently respects the underlying structure of the representation. This is particularly beneficial in scenarios involving strong measurement noise. A relationship between the newly proposed distributional model and the Bingham distribution is discussed. The presented results involve formulas for computation of the normalization constant, the mode, parameter estimation techniques, and a closed-form Bayesian measurement fusion.
Bring Your Own Device (BYOD) is an information technology (IT) policy that allows employees to use their own wireless devices to access internal network at work. Mobile malware is a major security concern that impedes...
详细信息
ISBN:
(纸本)9781479935734
Bring Your Own Device (BYOD) is an information technology (IT) policy that allows employees to use their own wireless devices to access internal network at work. Mobile malware is a major security concern that impedes BYOD's further adoption in enterprises. Existing works identify the need for better BYOD security mechanisms that balance between the strength of such mechanisms and the costs of implementing such mechanisms. In this paper, based on the idea of self-reinforced feedback loop, we propose a periodic smartphone sampling mechanism that significantly improve BYOD security mechanism's effectiveness without incurring further costs. We quantify the likelihood that “a BYOD smartphone is infected by malware” by two metrics, vulnerability and uncertainty, and base the iterative sampling process on these two metrics; the updated values of these metrics are fed back into future rounds of the mechanism to complete the feedback loop. We validate the efficiency and effectiveness of the proposed strategic sampling via simulations driven by publicly available, real-world collected traces.
This paper evaluates different state-of-the-art approaches for implementing an X-ray view in Augmented Reality (AR). Our focus is on approaches supporting a better scene understanding and in particular a better sense ...
详细信息
ISBN:
(纸本)9781450306539
This paper evaluates different state-of-the-art approaches for implementing an X-ray view in Augmented Reality (AR). Our focus is on approaches supporting a better scene understanding and in particular a better sense of depth order between physical objects and digital objects. One of the main goals of this work is to provide effective X-ray visualization techniques that work in unprepared outdoor environments. In order to achieve this goal, we focus on methods that automatically extract depth cues from video images. The extracted depth cues are combined in ghosting maps that are used to assign each video image pixel a transparency value to control the overlay in the AR view. Within our study, we analyze three different types of ghosting maps, 1) alpha-blending which uses a uniform alpha value within the ghosting map, 2) edge-based ghosting which is based on edge extraction and 3) image-based ghosting which incorporates perceptual grouping, saliency information, edges and texture details. Our study results demonstrate that the latter technique helps the user to understand the subsurface location of virtual objects better than using alpha-blending or the edge-based ghosting. Copyright 2014 ACM.
In this article, we propose a new lifetime task optimization technique for real-time embedded processors considering the electromigration-induced reliability. The new approach is based on a recently proposed physics-b...
详细信息
In this article, we propose a new lifetime task optimization technique for real-time embedded processors considering the electromigration-induced reliability. The new approach is based on a recently proposed physics-based electromigration (EM) model for more accurate EM assessment of a power grid network at the chip level. We apply the dynamic voltage and frequency scaling (DVFS) (by selecting the performance states or p-states of the tasks to manage the power) and thus the lifetime of the processor running different tasks over their periods. We consider both single-rate and multi-rate embedded systems with preemption. To model the mean-time-to-failure (MTTF) of a task for a given p-state, response surface modeling is applied. We then frame the reliability optimization problem as the continuous constrained nonlinear optimization problem in which the system EM-induced reliability is maximized subject to the timing constraints, which is further solved by simulated annealing method. Experimental results show that for low utilization systems, significant reliability improvement can be achieved with even smaller power consumption than existing reliability-ignore scheduling method. The proposed method can lead to near Pareto's front trade-off between the power/energy and the lifetime compared to the existing task scheduling method.
Connectomics is a branch of neuroscience that attempts to create a connectome, i.e., a completemap of the neuronal system and all connections between neuronal structures. This representation can be used to understand ...
详细信息
The protrusions and retrusions observed on the recrystallizing boundaries affect the migration kinetics during recrystallization. Characterization of the boundary roughness is necessary in order to evaluate their effe...
The protrusions and retrusions observed on the recrystallizing boundaries affect the migration kinetics during recrystallization. Characterization of the boundary roughness is necessary in order to evaluate their effects. This roughness has a structure that can be characterized by fractal analysis, and in this study the so-called 'Minkowski sausage' method is adopted. Hereby, two cube-oriented grains in partly recrystallized microstructures are analyzed and quantitative information regarding the dimensions of protrusions/retrusions is obtained.
Protrusions and retrusions typically form on recrystallizing boundaries and thus the boundaries often appear rough. Characterization of the boundary roughness is necessary in order to evaluate the effects of protrusio...
Protrusions and retrusions typically form on recrystallizing boundaries and thus the boundaries often appear rough. Characterization of the boundary roughness is necessary in order to evaluate the effects of protrusions and retrusions on boundary migration. In the current work, a variable termed area integral invariant is employed to provide quantitative information of individual protrusions/retrusions on boundaries surrounding two selected recrystallizing grains in partly recrystallized copper as well as of the overall roughness of the boundaries.
3D display technologies improve perception and interaction with 3D scenes, and hence can make applications more effective and efficient. This is achieved by simulating depth cues used by the human visual system for 3D...
详细信息
As the next generation of networking computing, cloud computing can offer both software and hardware as on-demand resources and services over the Internet and therefore reduce the capital expenditure and operational e...
详细信息
暂无评论