Emotions are undeniably a central component of human existence. In recent years, the importance of developing systems which incorporate emotions into human-computer interaction (HCI) has been widely acknowledged. Howe...
详细信息
ISBN:
(纸本)1902956850
Emotions are undeniably a central component of human existence. In recent years, the importance of developing systems which incorporate emotions into human-computer interaction (HCI) has been widely acknowledged. However, research on emotion recognition has been dominated by studies of facial expression of emotion. In comparison, the study of EBL has received relatively little attention. Here we study the phenomena of EBL, specifically of static body postures expressing emotions, from two different perspectives. First, we have built a computational model for the recognition of four basic emotions which achieves a relatively high recognition rate (70 %). Secondly, to study perception of EBL, we examined what body parts attract the observer's attention during the perception of EBL. This is done by tracking eye movements of human subjects during the observation of static postures expressing emotions. Although invaluable information can be inferred from motion, this study will show that information about static body posture is rich enough for both automatic recognition and human perception. The present study contributes in an applicative way both to the development of automatic recognition systems of EBL and provides insight into the nature of human recognition of EBL.
Responsibility for management of the main memory of each machine in a network of workstations has migrated from the paging concept to an object structure. We propose a new hybrid memory management mechanism that combi...
详细信息
Responsibility for management of the main memory of each machine in a network of workstations has migrated from the paging concept to an object structure. We propose a new hybrid memory management mechanism that combines the advantages of both pages and objects while avoiding their disadvantages. Our approach is based on the inherent relationship among objects for caching different type of remote pages and objects. High-profile and low-profile objects with their respective h-cache and h-cache axe introduced. We implemented our technique through simulation and showed that it dramatically reduces miss-penalties and outperforms earlier methods.
We improve the existence results for holey self-orthogonal Latin squares with symmetric orthogonal mates (HSOLSSOMs) and show that the necessary conditions for the existence of a HSOLSSOM of typeh ...
We improve the existence results for holey self-orthogonal Latin squares with symmetric orthogonal mates (HSOLSSOMs) and show that the necessary conditions for the existence of a HSOLSSOM of typeh
n
are also sufficient with at most 28 pairs (h, n) of possible exceptions.
Experiments were conducted to examine the characteristics of internal waves generated by a towing hemispheroid model alongside the side wall of stratified fluid tank with a linear density distribution. By means of the...
Experiments were conducted to examine the characteristics of internal waves generated by a towing hemispheroid model alongside the side wall of stratified fluid tank with a linear density distribution. By means of the measuring results with multi‐channel conductivity‐probe arrays, wave patterns, vertical displacement and correlation velocity for such internal waves were analyzed. The corresponding comparison with towing spheroid model experiments was carried out. It follows that the critical Froude number Frs of the hemispheroid is about 2/3 of the spheroid, and its draining‐water volume and propagating speed are about 2/3 of the spheroid respectively. It is also proved that the mirror‐image experimental method in the tank can increase the effective range of spatio‐temporal evolvement for the body‐generated internal wave.
A weak decomposition of an incompletely specified function f is a decomposition of some completion of f. Using a graph-theoretical characterization of functions that admit such decompositions, we present a technique d...
详细信息
A weak decomposition of an incompletely specified function f is a decomposition of some completion of f. Using a graph-theoretical characterization of functions that admit such decompositions, we present a technique derived from the a priori algorithm that allows a data mining approach to identifying these decompositions.
This paper describes a chat room application suitable for teaching basic network programming and security protocols. A client/server design illustrates the structure of current scalable network services while a multic...
详细信息
This paper describes a chat room application suitable for teaching basic network programming and security protocols. A client/server design illustrates the structure of current scalable network services while a multicast version demonstrates the need for efficient simultaneous distribution of network content to multiple receivers (e.g., as required by video broadcasts). The system also includes implementations of two security protocols, one similar to Kerberos and another based on public key encryption.
Although the classical B-tree and its derivatives are space efficient data structures for small string documents, they require many structures and an excessive amount of pointer manipulations for efficiently processin...
详细信息
Although the classical B-tree and its derivatives are space efficient data structures for small string documents, they require many structures and an excessive amount of pointer manipulations for efficiently processing and searching large documents. In this paper, we propose a new and conceptually powerful data structure, called multidimensional suffix arrays (MSA), for string search. This data structure combines the features of suffix arrays and multilevel structures into a new approach which is very amenable to implementation on both conventional and clustered computers. Algorithms for searching, updating, reorganizing, and distributing multidimensional suffix arrays are discussed. Moreover, MSA achieve a significant improvement over string B-trees.
Active Learning (AL) is increasingly important in a broad range of applications. Two main AL principles to obtain accurate classification with few labeled data are refinement of the current decision boundary and explo...
详细信息
ISBN:
(纸本)9780974903989
Active Learning (AL) is increasingly important in a broad range of applications. Two main AL principles to obtain accurate classification with few labeled data are refinement of the current decision boundary and exploration of poorly sampled regions. In this paper we derive a novel AL scheme that balances these two principles in a natural way. In contrast to many AL strategies, which are based on an estimated class conditional probability p(y|x), a key component of our approach is to view this quantity as a random variable, hence explicitly considering the uncertainty in its estimated value. Our main contribution is a novel math.matical framework for uncertainty-based AL, and a corresponding AL scheme, where the uncertainty in p(y|x) is modeled by a second-order distribution. On the practical side, we show how to approximate such secondorder distributions for kernel density classification. Finally, we find that over a large number of UCI, USPS and Caltech- 4 datasets, our AL scheme achieves significantly better learning curves than popular AL methods such as uncertainty sampling and error reduction sampling, when all use the same kernel density classifier.
We propose a new graphical password scheme. It is defined as a challenge-response identification. Hence, a password in our scheme is time-variant. User who knows the password is able to meet the challenge and to respo...
详细信息
ISBN:
(纸本)1932415165
We propose a new graphical password scheme. It is defined as a challenge-response identification. Hence, a password in our scheme is time-variant. User who knows the password is able to meet the challenge and to respond correctly. As a consequence, our graphical password scheme is shoulder-surfing resistant. An attacker still cannot tell what the password is, even if he/she has filmed a user's login process. Primary experiments on our graphical password scheme showed the scheme is promising.
暂无评论