Wireless sensor networks aim at a special kind of ad hoc networks, exposing an energy-constrained distributed computing environment. Proposed protocols have tried to incorporate power management schemas of the likes o...
详细信息
Defined softwareengineering processes help to perform and guide softwareengineering course projects. However, several difficult issues are involved in designing a software process for this purpose. This design is ev...
详细信息
ISBN:
(纸本)1595933751
Defined softwareengineering processes help to perform and guide softwareengineering course projects. However, several difficult issues are involved in designing a software process for this purpose. This design is even harder when it must suit time-constrained course projects. Here, we discuss several issues concerning such processes, focusing on an educational setting.
The Dynamical Optimization Evolutionary Algorithms (DOEAs) have been applied to solve Dynamical Optimization Problems which are very common in real-world applications. But little work focused on the convergent DOEAs. ...
详细信息
Grid infrastructure supports services on demand. Computational grids connected in a service oriented way thus forming virtual enterprises need several security measures to be undertaken. We have worked on several secu...
详细信息
In this paper, we propose a general transform for wavelet based data compression in wireless sensor networks. By employing a ring topology, our transform is capable of supporting a broad scope of wavelets rather than ...
详细信息
In this paper, we propose a general transform for wavelet based data compression in wireless sensor networks. By employing a ring topology, our transform is capable of supporting a broad scope of wavelets rather than specified ones. At the same time, the scheme is capable of simultaneously exploring the spatial and temporal correlations among the sensory data. Furthermore, the ring based topology is in particular effective in eliminating the "border effect" generally encountered by wavelet based schemes. Theoretically and experimentally, we show the proposed wavelet transform can effectively explore the spatial and temporal correlation in the sensory data and provide significant reduction in energy consumption compared to other schemes.
The earlier errors are found, the less costly they are to fix. This also holds true of errors in specifications. While research into Static Program Verification (SPV) in general, and Extended Static Checking (ESC) in ...
详细信息
ISBN:
(纸本)159593586X
The earlier errors are found, the less costly they are to fix. This also holds true of errors in specifications. While research into Static Program Verification (SPV) in general, and Extended Static Checking (ESC) in particular, has made great strides in recent years, there is little support for detecting errors in specifications beyond ordinary type checking. This paper reports on recent enhancements that we have made to ESC/Java2, enabling it to report errors in JML specifications due to (method or Java operator) precondition violations and this, at a level of diagnostics that is on par with its ability to report such errors in program code. The enhancements also now make it possible for ESC/Java2 to report errors in specifications for which no corresponding source is available. Applying this new feature to, e.g., the JML specifications of classes in java.*, reveals over 50 errors, including inconsistencies. We describe the adjustment to the assertion semantics necessary to make this possible, and we provide an account of the (rather small) design changes needed to realize the enhancements. Copyright 2006 ACM.
Web personalization aims to provide content and services tailor-made to the needs of individual users usually from the knowledge gained through their (previous) interactions with the site. Typically, an access behavio...
详细信息
Web personalization aims to provide content and services tailor-made to the needs of individual users usually from the knowledge gained through their (previous) interactions with the site. Typically, an access behavior model of users is learnt from the usage of the Web site which is then used to provide personalized recommendations to the current user(s). In this paper, we present a detailed qualitative as well as experimental analysis of various fuzzy clustering techniques used for mining usage profiles. We discuss their algorithmic strategies, requirement of input parameters, noise handling capacity, scalability to large datasets and similarity of partitions. We validate our claims through experiments using a large real life dataset
The OSGi provides a service platform which ensures the interoperability between heterogeneous technologies and various devices in home network environment. Nowadays, user access control is one of the core parts which ...
详细信息
A robust dynamic evolutionary algorithm (labeled RODEA), where both the robust calculation and mutation operator are based on an orthogonal design, is proposed in this paper. Previous techniques calculate the mean eff...
详细信息
ISBN:
(纸本)1595931864
A robust dynamic evolutionary algorithm (labeled RODEA), where both the robust calculation and mutation operator are based on an orthogonal design, is proposed in this paper. Previous techniques calculate the mean effective objective (for robust) by using samples without much evenly distributing over the neighborhood. The samples by using orthogonal array distribute evenly. Therefore the calculation of mean effective objective more robust. The new technique is generalized from the ODEA algorithm [1]. An orthogonal design method is employed on the niches for the mutation operator to find a potentially good solution that may become the representative in the niche. The fitness of the offspring is therefore likely to be higher than that of its parent. We propose a complex benchmark, consisting of moving function peaks, to test our new approach. Numerical experiments show that the moving solutions of the algorithm are a little worse in objective value but robust.
暂无评论