作者:
RAWLING, AGJOHNSON, NLArnold George Rawlings was born 20 December 1921 in Luke
Maryland. He received both a Bachelor's degree in Chemical Engineering and a Master's degree in Applied Mathematics from the University of Maryland. He served overseas as an LST officer in the Amphibious Forces of the United Navy participating in the Pacific campaigns of World War II. His professional experience includes theoretical mechanics at the Naval Ordnance Laboratory at White Oak (1949-52) digital computer design and large scale air defense system engineering at MIT (1952-54) Navy interceptor missile guidance and control system design at the Johns Hopkins Applied Physics Laboratory (1954-60) flight dynamics and currently submarine simulation as a consulting engineer with the General Electric Company. He is a member of the AIAA and Sigma Xi and is author of the papers “Automation and the Scientific Laboratory from a Systems Viewpoint” “Passive Determination of Homing Time” and “On Non-Zero Miss Distance.” Norman L. Johnson was born on 3 December 1937 in Three Falls
Michigan. He received a Bachelor's degree in Engineering Physics (1959) from Michigan Technological University and is currently studying towards a Master's degree. His professional experience at the General Electric Company includes analog and hybrid simulation engineering applications up to 1967. Since then he has held the post of Supervisory Engineer in the same area. Problems investigated during the past nine years include the body dynamics and control system design for interceptor missiles re-entry vehicles satellites and for the last two years submarines. He is co-author of the publication “Temperature Generated by the Flow of Liquids in Pipes.”
In designing the man-multiloop control system for a small submersible, many different types of terminal equipment for manual intervention can interface with the human operator, including handlebars, wheels, joysticks ...
In designing the man-multiloop control system for a small submersible, many different types of terminal equipment for manual intervention can interface with the human operator, including handlebars, wheels, joysticks and pedals. The proper choice of the means to control the boat in attitude and steering, as well as the actual implementation, constitute a major human factors design problem. This paper discusses a particularly promising concept of manual control that has shown superiority over several alternatives, and decribes the real-time simulation employed in verifying its advantages.
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communicatio...
详细信息
ISBN:
(数字)9783642171970
ISBN:
(纸本)9783642171963
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network inter- pendencies as well as human and social factors. It involves decision making on multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. - cision and game theory provides a rich set of analyticalmethods and approaches to address various resource allocation and decision-making problems arising in security. This edited volume contains the contributions presented at the inaugural Conference on Decision and Game Theory for Security - GameSec 2010. These 18 articles (12 full and 6 short papers) are thematically categorized into the following six sections: – “Security investments and planning” contains two articles, which present optimization methods for (security) investments when facing adversaries. – “Privacy and anonymity” has three articles discussing location privacy, - line anonymity, and economic aspects of privacy. – “Adversarial and robust control” contains three articles, which investigate security and robustness aspects of control in networks. – “Networksecurityandbotnets”hasfourarticlesfocusingondefensivestra- giesagainstbotnetsaswellasdetectionofmaliciousadversariesinnetworks. – “Authorizationandauthentication”hasanarticleonpasswordpracticesand another one presenting a game-theoretic authorization model. – “Theory and algorithms for security” containsfour articles on various th- retic and algorithmic aspects of security.
This book and its companion volume, LNCS vols. 7331 and 7332, constitute the Proceedings of the Third International conference on Swarm Intelligence, ICSI 2012, held in Shenzhen, China in June 2012. The 145 full paper...
详细信息
ISBN:
(数字)9783642310201
ISBN:
(纸本)9783642310195
This book and its companion volume, LNCS vols. 7331 and 7332, constitute the Proceedings of the Third International conference on Swarm Intelligence, ICSI 2012, held in Shenzhen, China in June 2012. The 145 full papers presented were carefully reviewed and selected from 247 submissions. The papers are organized in 27 cohesive sections covering all major topics of swarm intelligence research and developments.
The abstracts and papers in this volume were presented at the Fifth Annual International Computing and Combinatorics Conference (COCOON ’99), which was held in Tokyo, Japan from July 26 to 28, 1999. The topics cover ...
详细信息
ISBN:
(数字)9783540486862
ISBN:
(纸本)9783540662006
The abstracts and papers in this volume were presented at the Fifth Annual International Computing and Combinatorics Conference (COCOON ’99), which was held in Tokyo, Japan from July 26 to 28, 1999. The topics cover most aspects of theoretical computer science and combinatorics pertaining to computing. In response to the call for papers, 88 high-quality extended abstracts were submitted internationally, of which 46 were selected for presentation by the p- gram committee. Every submitted paper was reviewed by at least three program committee members. Many of these papers represent reports on continuing - search, and it is expected that most of them will appear in a more polished and complete form in scienti c journals. In addition to the regular papers, this v- ume contains abstracts of two invited plenary talks by Prabhakar Raghavan and Seinosuke Toda. The conference also included a special talk by Kurt Mehlhorn on LEDA (Library of E cient Data types and Algorithms). The Hao Wang Award (inaugurated at COCOON ’97) is given to honor the paper judged by the program committee to have the greatest scienti c merit. The recipients of the Hao Wang Award 1999 were Hiroshi Nagamochi and Tos- hide Ibaraki for their paper \An Approximation for Finding a Smallest 2-Edge- Connected Subgraph Containing a Speci ed Spanning Tree".
The 2010 Pacific-Rim Conference on Multimedia (PCM 2010) was held in Shanghai at Fudan University, during September 21–24, 2010. Since its inauguration in 2000, PCM has been held in various places around the Pacific ...
详细信息
ISBN:
(数字)9783642157028
ISBN:
(纸本)9783642157011
The 2010 Pacific-Rim Conference on Multimedia (PCM 2010) was held in Shanghai at Fudan University, during September 21–24, 2010. Since its inauguration in 2000, PCM has been held in various places around the Pacific Rim, namely Sydney (PCM 2000), Beijing (PCM 2001), Hsinchu (PCM 2002), Singapore (PCM 2003), Tokyo (PCM 2004), Jeju (PCM 2005), Zhejiang (PCM 2006), Hong Kong (PCM 2007), Tainan (PCM 2008), and Bangkok (PCM 2009). PCM is a major annual international conference organized as a forum for the dissemination of state-of-the-art technological advances and research results in the fields of theoretical, experimental, and applied multimedia analysis and processing. PCM 2010 featured a comprehensive technical program which included 75 oral and 56 poster presentations selected from 261 submissions from Australia, Canada, China, France, Germany, Hong Kong, India, Iran, Italy, Japan, Korea, Myanmar, Norway, Singapore, Taiwan, Thailand, the UK, and the USA. Three distinguished researchers, Prof. Zhi-Hua Zhou from Nanjing University, Dr. Yong Rui from Microsoft, and Dr. Tie-Yan Liu from Microsoft Research Asia delivered three keynote talks to the conference. We are very grateful to the many people who helped to make this conference a s- cess. We would like to especially thank Hong Lu for local organization, Qi Zhang for handling the publication of the proceedings, and Cheng Jin for looking after the c- ference website and publicity. We thank Fei Wu for organizing the special session on large-scale multimedia search in the social network settings.
This book and its companion volume, LNCS vols. 7331 and 7332, constitute the proceedings of the Third International Conference on Swarm Intelligence, ICSI 2012, held in Shenzhen, China in June 2012. The 145 revised fu...
详细信息
ISBN:
(数字)9783642309762
ISBN:
(纸本)9783642309755
This book and its companion volume, LNCS vols. 7331 and 7332, constitute the proceedings of the Third International Conference on Swarm Intelligence, ICSI 2012, held in Shenzhen, China in June 2012. The 145 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are organized in 27 cohesive sections covering all major topics of swarm intelligence research and developments.
The 2010 Pacific-Rim Conference on Multimedia (PCM 2010) was held in Shanghai at Fudan University, during September 21–24, 2010. Since its inauguration in 2000, PCM has been held in various places around the Pacific ...
详细信息
ISBN:
(数字)9783642156960
ISBN:
(纸本)9783642156953
The 2010 Pacific-Rim Conference on Multimedia (PCM 2010) was held in Shanghai at Fudan University, during September 21–24, 2010. Since its inauguration in 2000, PCM has been held in various places around the Pacific Rim, namely Sydney (PCM 2000), Beijing (PCM 2001), Hsinchu (PCM 2002), Singapore (PCM 2003), Tokyo (PCM 2004), Jeju (PCM 2005), Zhejiang (PCM 2006), Hong Kong (PCM 2007), Tainan (PCM 2008), and Bangkok (PCM 2009). PCM is a major annual international conference organized as a forum for the dissemination of state-of-the-art technological advances and research results in the fields of theoretical, experimental, and applied multimedia analysis and processing. PCM 2010 featured a comprehensive technical program which included 75 oral and 56 poster presentations selected from 261 submissions from Australia, Canada, China, France, Germany, Hong Kong, India, Iran, Italy, Japan, Korea, Myanmar, Norway, Singapore, Taiwan, Thailand, the UK, and the USA. Three distinguished researchers, Prof. Zhi-Hua Zhou from Nanjing University, Dr. Yong Rui from Microsoft, and Dr. Tie-Yan Liu from Microsoft Research Asia delivered three keynote talks to the conference. We are very grateful to the many people who helped to make this conference a s- cess. We would like to especially thank Hong Lu for local organization, Qi Zhang for handling the publication of the proceedings, and Cheng Jin for looking after the c- ference website and publicity. We thank Fei Wu for organizing the special session on large-scale multimedia search in the social network settings.
Iterative inference approaches have shown promising success in the task of multi-view depth estimation. However, these methods put excessive emphasis on the universal inter-view correspondences while neglecting the co...
详细信息
Iterative inference approaches have shown promising success in the task of multi-view depth estimation. However, these methods put excessive emphasis on the universal inter-view correspondences while neglecting the correspondence ambiguity in regions of low texture and depth discontinuous areas. Thus, they are prone to produce inaccurate or even erroneous depth estimations, which is further exacerbated cumulative errors especially in the iterative pipeline, providing unreliable information in many real-world scenarios. In this paper, we revisit this issue from the intra-view Contextual Hints and introduce a novel enhancing iterative approach, named EnIter. Concretely, at the beginning of each iteration, we present a Depth Intercept (DI) modulator to provide more accurate depth by aggregating neighbor uncertainty, correlation volume of reference and normal. This plug and play modulator is effective at intercepting the erroneous depth estimations with implicit guidance from the universal correlation contextual hints, especially for the challenging regions. Furthermore, at the end of each iteration, we refine the depth map with another plug and play modulator termed as Depth Refine (DR). It mines the latent structure knowledge of reference Contextual Hints and establishes one-way dependency using local attention from reference features to depth, yielding delicate depth in details. Extensive experiment demonstrates that our method not only achieves state-of-the-art performance over existing models but also exhibits remarkable universality in popular iterative pipelines, e.g., CasMVS, UCSNet, TransMVS, UniMVS.
We systematically investigate the effects of interlayer, inter-ring dipolar coupling and the number of bilayer repeats on the magnetization reversal process of [Co/Pd]/Au(t)/[Co/Pd] pseudo-spin-valve (PSV) nano-rings....
详细信息
暂无评论