The basic concept of smart environment is to be aware of the context information related to environmental and human behavioral changes, and to provide appropriate services accordingly. To obtain the context informatio...
详细信息
The basic concept of smart environment is to be aware of the context information related to environmental and human behavioral changes, and to provide appropriate services accordingly. To obtain the context information, people often use video cameras, microphones, and other devices. These devices can obtain a wealth of environmental information, but could easily lead to privacy issues. Large environmental information also need more computing resources to process the information. In this paper, we study human behavior identification based on simple sensors. Using fuzzy logic we analyze the sensor data and try to identify four different activities. Experimental results show that the proposed method can correctly identify 83.7 % of these four activities. Results given here will be useful for designing smart homes, smart office, and so on.
A bug report contains many fields, such as product, component, severity, priority, fixer, operating system (OS), platform, etc., which provide important information for the bug triaging and fixing process. It is impor...
详细信息
A bug report contains many fields, such as product, component, severity, priority, fixer, operating system (OS), platform, etc., which provide important information for the bug triaging and fixing process. It is important to make sure that bug information is correct since previous studies showed that the wrong assignment of bug report fields could increase the bug fixing time, and even delay the delivery of the software. In this paper, we perform an empirical study on bug report field reassignments in open-source software projects. To better understand why bug report fields are reassigned, we manually collect 99 recent bug reports that had their fields reassigned and emailed their reporters and developers asking why these fields got reassigned. Then, we perform a large-scale empirical study on 8 types of bug report field reassignments in 4 open-source software projects containing a total of 190,558 bug reports. In particular, we investigate 1) the number of bug reports whose fields get reassigned, 2) the difference in bug fixing time between bug reports whose fields get reassigned and those whose fields are not reassigned, 3) the duration a field in a bug report gets reassigned, 4) the number of fields in a bug report that get reassigned, 5) the number of times a field in a bug report gets reassigned, and 6) whether the experience of bug reporters affect the reassignment of bug report fields. We find that a large number (approximately 80%) of bug reports have their fields reassigned, and the bug reports whose fields get reassigned require more time to be fixed than those without field reassignments.
The purpose of this exploratory research was to study the relationship between the mood of computer users and their use of keyboard and mouse to examine the possibility of creating a generic or individualized mood mea...
详细信息
The purpose of this exploratory research was to study the relationship between the mood of computer users and their use of keyboard and mouse to examine the possibility of creating a generic or individualized mood measure. To examine this, a field study (n = 26) and a controlled study (n = 16) were conducted. In the field study, interaction data and self-reported mood measurements were collected during normal PC use over several days. In the controlled study, participants worked on a programming task while listening to high or low arousing background music. Besides subjective mood measurement, galvanic skin response (GSR) data was also collected. Results found no generic relationship between the interaction data and the mood data. However, the re- suits of the studies found significant average correlations be- tween mood measurement and personalized regression models based on keyboard and mouse interaction data. Together the results suggest that individualized mood prediction is pos- sible from interaction behaviour with keyboard and mouse.
This demonstration presents an intelligent information platform MODEST. MODEST will provide enterprises with the services of retrieving news from websites, extracting commercial information, exploring customers' o...
详细信息
Last level cache (LLC) is crucial for the performance of chip multiprocessors (CMPs), while power is a significant design concern for 3D CMPs. In this paper, we focus on the SRAM-based Non-Uniform Cache Architecture (...
详细信息
ISBN:
(纸本)9781479934331
Last level cache (LLC) is crucial for the performance of chip multiprocessors (CMPs), while power is a significant design concern for 3D CMPs. In this paper, we focus on the SRAM-based Non-Uniform Cache Architecture (NUCA) for 3D Multi-core Network-on-Chip (McNoC) systems. A tightly mixed SRAM NUCA for 3D mesh NoC is presented and analyzed. We evaluate the performance and network power with benchmarks based on a full system simulation framework. Experiment results on 16-core 3D NoC systems show that the tightly mixed NUCA could provide up to 31.71% and on average 5.95% performance improvement compared to a base 3D NUCA scheme. The tightly mixed 3D NUCA NoC can reduce network power consumption in 1.07%-15.74% and 9.64% on average compared to a baseline 3D NoCs. Our analysis and experimental results provide a guideline to design efficient 3D NoCs with stacking NUCA.
We fabricated the QD-SOA, which was composed of 20-layer-stacked InAs quantum dots structure with the strain-compensation technique grown by MBE, and evaluated the fundamental gain characteristics and ultra-fast optic...
详细信息
We fabricated the QD-SOA, which was composed of 20-layer-stacked InAs quantum dots structure with the strain-compensation technique grown by MBE, and evaluated the fundamental gain characteristics and ultra-fast optical pulse response for all-optical logic gate devices at a wavelength range around 1550nm. For the device length of 1650 μm, the maximum gain of 34.7 dB was obtained for TE mode. And we also measured femto-second optical pulse response by auto-correlation waveforms to observe a slight pulse broadening of about 55 fs.
There exists two types of developers in Open Source software (OSS) projects: 1) Committers who have permission to commit edited source code to the Version Control System (VCS), 2) Developers who contribute source code...
详细信息
There exists two types of developers in Open Source software (OSS) projects: 1) Committers who have permission to commit edited source code to the Version Control System (VCS), 2) Developers who contribute source code but cannot commit to the VCS directly. In order to develop and evolve high quality OSS, projects are always in search of new committers. OSS projects often promote strong developers to become committers. When existing committers find strong developers, they propose their promotion to a committer role. Delaying the committer-promotion might lead to strong developers departing from an OSS project and the project losing them. However early committer-promotion comes with its own slew of risks as well (e.g., the promotion of inexperienced developers). Hence, committer-promotion decisions are critical for the quality and successful evolution of OSS projects. In this paper, we examine the committer-promotion phenomena for two OSS projects (Eclipse and Firefox). We find that the amount of activities by future committers was higher than the amount of activities by developers who did not become committers). We also find that some developers are promoted to a committer role very rapidly (within a few month) while some of developers take over one year to become a committer. Finally, we develop a committer-identification model to assist OSS projects identifying future committers.
Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negot...
详细信息
Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. This paper describes a secure iden- tity based deniable authentication protocol whose security is based on computational infeasibility of solving Diffe- Hellman Problem on Elliptic Curve (ECDHP).
Using the special wavelength and given power LED light as the detected object, through irradiating human face with a given distance, observing the effect of face heating-up and the blood flow raise, to obtain the best...
详细信息
ISBN:
(纸本)9781479960590
Using the special wavelength and given power LED light as the detected object, through irradiating human face with a given distance, observing the effect of face heating-up and the blood flow raise, to obtain the best irradiation time based on a comprehensive analysis. This will lay the foundation for the research and application in therapy products.
This paper is concerned with tensor clustering with the assistance of dimensionality reduction approaches. A class of formulation for tensor clustering is introduced based on tensor Tucker decomposition models. In thi...
详细信息
ISBN:
(纸本)9781479914821
This paper is concerned with tensor clustering with the assistance of dimensionality reduction approaches. A class of formulation for tensor clustering is introduced based on tensor Tucker decomposition models. In this formulation, an extra tensor mode is formed by a collection of tensors of the same dimensions and then used to assist a Tucker decomposition in order to achieve data dimensionality reduction. We design two types of clustering models for the tensors: PCA Tensor Clustering model and Non-negative Tensor Clustering model, by utilizing different regularizations. The tensor clustering can thus be solved by the optimization method based on the alternative coordinate scheme. Interestingly, our experiments show that the proposed models yield comparable or even better performance compared to most recent clustering algorithms based on matrix factorization.
暂无评论