One way to broadcast a popular video is to partition the video into segments, which are broadcasted on several streams periodically. The approach lets multiple users share streams;thus, the stress on the scarce bandwi...
详细信息
The kidneys have the important function of filtering waste products and toxins from the blood in the human body. Any problems affecting the kidneys can potentially impact their efficiency and overall function. Kidney ...
详细信息
Possible attacks on mobile smart devices demand higher security for applications handling payments or sensitive information. The introduction of a tamper-proof area on future generations of mobile devices, called Trus...
详细信息
ISBN:
(纸本)9781450315326
Possible attacks on mobile smart devices demand higher security for applications handling payments or sensitive information. The introduction of a tamper-proof area on future generations of mobile devices, called Trusted Execution Environment (TEE), is being implemented. Before devices with embedded TEEs can be dep.oyed to the public, investigations on usability aspects of Trusted User Interfaces (TUI) are needed. This article describes the process we have followed at gathering requirements, prototyping and testing suitable designs for TUIs in combination with a touch-screen biometric system. At the end, we present relevant findings of a pilot study that we have conducted using an Experience Sampling Method (ESM) as part of our ongoing work.
Recent studies have illustrated that social networks are valuable sources of information which can be used for various purposes. In recommender systems, researchers have been motivated to utilize social information no...
详细信息
Semiconductor supply chain industry is spread worldwide to reduce cost and to meet the electronic systems high demand for ICs, and with the era of internet of things (IoT), the estimated numbers of electronic devices ...
详细信息
Background: Power consumption has become one of the most serious obstacles ahead of performance increase. Due to increased power consumption, increasing number of transistors does not seem to be viable anymore. We are...
详细信息
In this paper,we propose an shape-based interpolation algorithm using window *** aim of this algorithm is to reconstruct the three-dimensional object from a group of two-dimensional sets representing sections of that ...
详细信息
ISBN:
(纸本)9781424472369
In this paper,we propose an shape-based interpolation algorithm using window *** aim of this algorithm is to reconstruct the three-dimensional object from a group of two-dimensional sets representing sections of that ***,the window technology and image fusion method are used to get more details what we are interested in of consecutive sets,and then the contour of the image is obtained by using a mathematical morphology morphing approach,for locating the pixels which are corresponding with the interpolation pixels,we employ the relationship between the pixel and the centre of ***,the grey-level of interpolation pixels are the grey-level of the nearest corresponding pixels. Traveling all pixels of the interpolation image,the interpolation image is produced.
The development of a family of applications in a domain can be greatly eased if patterns in the domain are systematically reused. Systematic use of such patterns can be achieved by tools that support the specification...
详细信息
We consider a carries process which is a generalization of that by Holte in the sense that (i) we take various digit sets, and (ii) we also consider negative base. Our results are: (i) eigenvalues and eigenvectors of ...
详细信息
In real world, expert search is not just only name matching. Since each kind of people has their own features, we try two methods to judge whether the person we have found is more likely to be an expert. One method is...
详细信息
In real world, expert search is not just only name matching. Since each kind of people has their own features, we try two methods to judge whether the person we have found is more likely to be an expert. One method is to determine the role of a person by the context of the pages;the other is to judge the authority of a person by the forms of pages where he appears considering the structure of the Intranet. The evaluation results show these new methodologies have been helpful to improve the performance of the expert search on TREC 08 queries.
暂无评论