This paper addresses the problem of constructing a functional summarization of groups of gene products that are found by clustering a database of such products annotated by the Gene Ontology. Our method builds the &qu...
详细信息
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. This is particularly the case for inter...
详细信息
ISBN:
(纸本)0769522149
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. This is particularly the case for inter-company system coordination applications. A key difficulty in constructing such systems is to meet the security requirements while at the same time respecting the requirements for efficient implementation. In this paper we propose a method that addresses this problem and show an application of the method to a real implemented system, the Environmentally Conscious Product (ECP) design support system. Our approach enables developers to specify several candidate system behaviors that satisfy the security requirements. We use patterns for this purpose. Patterns are abstract templates of system behavior fragments. The patterns include agent migrations, communications between applications and security procedures. We model the performance data associated with each pattern. Developers can then select an efficient implementation using this model to compare the performance data of the candidates. We evaluate our approach with a significant real-world example, the ECP design support system that essentially requires inter-company system coordination.
Image-based electronic editions (IBEEs) encode manuscripts using markup based on digitized images of the manuscript page. Due to the complex nature of editorial annotations, the resulting markup rarely forms a hierarc...
详细信息
Image-based electronic editions (IBEEs) encode manuscripts using markup based on digitized images of the manuscript page. Due to the complex nature of editorial annotations, the resulting markup rarely forms a hierarchical structure - that is, ranges often overlap. To support web-based access to these editions, it is desirable to synchronize the display of markup and related satellite data with the corresponding portions of the image. This goal can be supported by image maps, which associate regions of an image with hyperlinks and actions. These links allow the user to view and manage editorial information and multimedia content associated with the markup. In this paper we present an efficient algorithm for constructing a mapping from overlapping or intersecting markup to regions of an image. This mapping satisfies four properties: (1) Regions are located near the corresponding text. (2) Regions corresponding to nested markup elements are themselves nested. (3) Regions corresponding to intersecting markup elements themselves intersect. (4) If region R contains a collection C of other regions, then R is strictly larger than the union of the regions in C. The fourth property above ensures spatial separation of the regions corresponding to nested markup. An image map satisfying these properties provides a convenient and intuitive linking between image coordinates and the corresponding markup ranges. Copyright 2004 ACM.
This paper presents a new clustering architecture for SNMP agents that supports semi-active replication of managed objects. A cluster of agents provides fault-tolerant object functionality: replicated managed objects ...
详细信息
This paper presents a new clustering architecture for SNMP agents that supports semi-active replication of managed objects. A cluster of agents provides fault-tolerant object functionality: replicated managed objects of a crashed agent of a given cluster may be accessed through a peer cluster. The proposed architecture is structured in three layers. The lower layer corresponds to the managed objects at the network elements. The middle layer contains management entities called clusters that monitor and replicate managed objects. The upper layer allows the definition of management clusters as well as the relationship between clusters. A practical tool was implemented and is presented. The impact of replication on network performance is evaluated as well as a probabilistic analysis of replicated object consistency.
We use a reliably annotated corpus to compare metrics of coherence based on Centering Theory with respect to their potential usefulness for text structuring in natural language generation. Previous corpus-based evalua...
详细信息
In this paper, we present a new three-dimensional object retrieval method. This method employs dept. buffers for representing and comparing the objects. Specifically, multiple dept. buffers per object (computed from d...
详细信息
ISBN:
(纸本)1581139403
In this paper, we present a new three-dimensional object retrieval method. This method employs dept. buffers for representing and comparing the objects. Specifically, multiple dept. buffers per object (computed from different points of view) are compared for surface and volume similarity. Our method is easily extensible for hierarchical comparisons at multiple resolutions and is highly parallelizable. We have employed this method for both inter-class and intra-class retrieval tasks on a gallery of over 3,000 three-dimensional objects of vehicles with very encouraging results. The accuracy of the method depends on the number of dept. buffers and the dept. buffer resolution. Copyright 2004 ACM.
A hearing aid can help the hearing impaired to listen to speech by amplifying its sound. However, amplification cannot always improve speech perception. To improve speech perception in a noisy environment, we proposed...
详细信息
A hearing aid can help the hearing impaired to listen to speech by amplifying its sound. However, amplification cannot always improve speech perception. To improve speech perception in a noisy environment, we proposed a new hearing aid algorithm that combines independent component analysis (ICA) with multi-band loudness compensation. The proposed method was applied to a behind-the-ear type (BTE) dual microphone hearing aid. The proposed method successfully separated a target speech signal from background noise such as babble, car noise, factory noise. This method may help hearing aid users to hear the speech that he or she wishes to hear clearly in noisy conditions.
Several algorithms have been developed for time series forecasting. In this paper, we develop a type of algorithm that makes use of the numerical methods for optimizing on objective function that is the Kullbak-Leible...
详细信息
Several algorithms have been developed for time series forecasting. In this paper, we develop a type of algorithm that makes use of the numerical methods for optimizing on objective function that is the Kullbak-Leibler divergence between the joint probability density function of a time series x1, x2,...,xn and the product of their marginal distributions. The Gram-charlier expansion is used for estimating these distributions. Using the weights that have been obtained by the neural network, and adding to them the Kullback-Leibler divergence of these weights, we obtain new weights that are used for forecasting the new value of xn+k.
E-Learning has become a serious discipline in IT supported management with the aim of enabling life-long learning. Unfortunately, E-Learning is a bottom-up based technical approach and the vision of life-long learning...
详细信息
Ubiquitous and mobile technologies provide opportunities for designing novel learning experiences that move out of the classroom. Information can be presented and interacted with in a variety of ways while exploring a...
详细信息
暂无评论