Collective Intelligence has received much attention in recent years, as organizations and businesses discover the power of crowds. With new technologies, such as blogs, twitter, wikis, photo sharing, collaborative tag...
详细信息
Human interaction is one of the most important characteristics of group social dynamics in meetings. In this paper, we propose an approach for capture, recognition, and visualization of human interactions. Unlike phys...
详细信息
To meet the increasing needs of home-based healthcare, we propose a novel networked low-cost and wearable healthcare monitoring system, namely TCM-PCA, for pulse analysis in Traditional Chinese Medicine(TCM). The uniq...
详细信息
In cluster file systems, the metadata management is critical to the whole system. Past researches mainly focus on journaling which alone is not enough to provide high-available metadata service. Some others try to use...
详细信息
Style and variation are two vital components of human motion: style differentiates between examples of the same behavior (slow walk vs. fast walk) while variation differentiates between examples of the same style (vig...
详细信息
We research the multimedia information hiding (MIH) which is a technology to overlay digital information on multimedia contents such as picture, sound, document, etc. As application to disaster management of MIH, we h...
详细信息
We research the multimedia information hiding (MIH) which is a technology to overlay digital information on multimedia contents such as picture, sound, document, etc. As application to disaster management of MIH, we have developed a new technology called "PAIH" (Public Address Information Hiding) which is a technology to overlay information such as position or destination on siren sound of urgent vehicles. Siren sound is allowed to degrade of sound quality, but PAIH is required to decode correct information from siren sound with pitch shift (Doppler effect) or under noisy environment.
Critical path selection is very important in delay testing. Critical paths found by conventional static timing analysis (STA) tools are inadequate to represent the real timing of the circuit, since neither the testabi...
详细信息
This paper describes our research on learning browsing behavior model for predicting the current information need of a web user. This inference is based on a parameterized model of how the sequence of browsing behavio...
详细信息
To prevent pornography from spreading on the Internet effectively, we propose a novel method of adult image detection which combines bag-of-visual-words (BoVW) based on region of interest (ROI) and color moments (CM)....
详细信息
With the proliferation of Web services, service engineers demand good automatic service composition algorithms that not only synthesize the correct work plans from thousands of services but also satisfy the quality re...
详细信息
暂无评论