This paper gives contribution to the construction of an image mosaic by pasting together a sequence of photographs taken by a regular digital camera from the same position but in different directions. In order to find...
详细信息
This paper gives contribution to the construction of an image mosaic by pasting together a sequence of photographs taken by a regular digital camera from the same position but in different directions. In order to find the best match between two overlapping images, a fuzzy-genetic based algorithm is presented. A translation vector with a minimal difference between the common picture parts has to be found. The difference is defined using the fuzzyfied contours of each images. The search of the optimal translation is considered as a minimization process. This paper proposes a method that uses genetic algorithms to find the minimum point corresponding to the optimal translation. Using the fuzzy based comparison of the two images yields a fast fitness function, while the implementation of the proposed method in a genetic hardware has a low and variable computational cost. The precision of the method is inverse-proportional with the computational time, which makes it ideal to be used in real time systems.
Pen-based user interfaces which leverage the affordances of the pen provide userswith more flexibility and natural interaction. However, it is difficult to construct usable pen-baseduser interfaces because of the lack...
详细信息
Pen-based user interfaces which leverage the affordances of the pen provide userswith more flexibility and natural interaction. However, it is difficult to construct usable pen-baseduser interfaces because of the lack of support for their development. Toolkit-level support has beenexploited to solve this problem, but this approach makes it hard to gain platform independence,easy maintenance and easy extension. In this paper a context-aware infrastructure is created,called WEAVER, to provide pen interaction services for both novel pen-based applications andlegacy GUI-based applications. WEAVER aims to support the pen as another standard interactivedevice along with the keyboard and mouse and present a high-level access interface to pen *** employs application context to tailor its service to different applications. By modeling theapplication context and registering the relevant action adapters, WEAVER can offer services,such as gesture recognition, continuous handwriting and other fundamental ink manipulations, toappropriate applications. One of the distinct features of WEAVER is that off-the-shelf GUI-basedsoftware packages can be easily enhanced with pen interaction without modifying the existing *** this paper, the architecture and components of WEAVER are described. In addition, examplesand feedbacks of its use are presented.
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as O(n2), which is prohibitive in large-scale overlay networks. Several methods have...
详细信息
Business transactions are prone to failure and having to deal with unexpected situations. Some business process specification languages, e.g. StAC, introduce notions like compensation handling. Given the need of verif...
详细信息
The increasing complexity, heterogeneity and dynamism of networks, systems, services applications have made our computational/information infrastructure brittle, unmanageable and insecure. This has necessitated the in...
详细信息
This paper provides some results and analysis of several negotiation algorithms. We have used a tournament-based approach to evaluation and applied this within a community of Buyers and Sellers in a simulated car hire...
详细信息
Many statechart-based testing strategies result in specifying a set of paths to be executed through a (flattened) statechart. These techniques can usually be easily automated so that the tester does not have to go thr...
详细信息
The usual approach to dealing with imperfections in data is to attempt to eliminate them. However, the nature of modern systems means this is often futile. This paper describes an approach which permits applications t...
详细信息
This paper addresses the issue of selective disclosure of verifiable content. It extends previous work relating to Content Extraction Signatures [21] to implement a more complex structure that encodes a richer, more f...
详细信息
暂无评论