This paper presents an efficient collision detection algorithm for arbitrary polyhedral objects moving randomly within the virtual environment. We decompose the non-convex objects into some convex pieces using the sur...
详细信息
Trip planning search (TPS) represents an important class of queries in Geographic Information Systems (GIS). In many real-world applications, TPS requests are issued with a number of constraints. Unfortunately, most o...
详细信息
ISBN:
(纸本)9781605583235
Trip planning search (TPS) represents an important class of queries in Geographic Information Systems (GIS). In many real-world applications, TPS requests are issued with a number of constraints. Unfortunately, most of these constrained TPS cannot be directly answered by any of the existing algorithms. By formulating each restriction into rules, we propose a novel form of route query, namely the multi-rule partial sequenced route (MRPSR) query. Our work provides a unified framework that also subsumes the well-known trip planning query (TPQ) and the optimal sequenced route (OSR) query. In this paper, we first prove that MRPSR is NP-hard and then present three heuristic algorithms to search for near-optimal solutions for the MRPSR query. Our extensive simulations show that all of the proposed algorithms can answer the MRPSR query effectively and efficiently. Using both real and synthetic datasets, we investigate the performance of our algorithms with the metrics of the route distance and the response time in terms of the percentage of the constrained points of interest (POI) categories. Compared to the LORD-based brute-force solution, the response times of our algorithms are remarkably reduced while the resulting route length is only slightly longer than the shortest route. Copyright 2008 ACM.
High dimensionality of belief space in DEC-POMDPs is one of the major causes that makes the optimal joint policy computation intractable. The belief state for a given agent is a probability distribution over the syste...
详细信息
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred to as location anonymizer) responsible ...
详细信息
This paper deals with a method for semantic keyword detection of web documents. While the document consists of many kinds of part-of-speech, we just consider noun words. We propose a method for measure of relation val...
详细信息
ISBN:
(纸本)1601320892
This paper deals with a method for semantic keyword detection of web documents. While the document consists of many kinds of part-of-speech, we just consider noun words. We propose a method for measure of relation value that represents relationship between words occurred in the document using WordNet. We calculate concept weight that measures semantic importance of words by using term frequency and relation value together. According to the concept weight, we detect the 10 keywords of document in order. Through experiment, we show that our method is possible to extract main keyword semantically from document.
The paper describes the design and implementation of Qplus Smartphone Edition based on embedded Linux. Existing Smartphone platforms entailed royalty expenses and had custornization difficulties due to the closure of ...
详细信息
ISBN:
(纸本)9788955191356
The paper describes the design and implementation of Qplus Smartphone Edition based on embedded Linux. Existing Smartphone platforms entailed royalty expenses and had custornization difficulties due to the closure of their source codes. The Qplus Smartphone Edition requires no royalty because it is based on the embedded Linux. And, it supports key navigation functionality such as moving between folders or running applications with key-only operations. It also provides more user friendly environment through screen interfaces and indicators similar to those of the cellular phones.
This paper describes the vertical handover architecture with Low Latency Handover for mobile terminals which supports interworking between heterogeneous networks. The vertical handover architecture defines handover-re...
详细信息
ISBN:
(纸本)9780769533285
This paper describes the vertical handover architecture with Low Latency Handover for mobile terminals which supports interworking between heterogeneous networks. The vertical handover architecture defines handover-related modules for mobile terminal and the handover switching flows among them. We adapt Low Latency Handover method to Mobile IP for reducing handover time. The architecture is designed to be easily extended to support more than two heterogeneous networks, so that it is easy to apply architecture to terminals that have multiple heterogeneous wireless network interfaces. We analyze the performance of handover method in terms of handover delay time using test bed system.
作者:
Gittens, ShaunAuburn University
Dept. of Computer Science and Software Engineering 3101 Shelby Center Auburn AL 36849-5347 United States
Complex computer-simulated environments are often sought in which autonomous agents can interact and their capabilities can be examined. Creating such simulated environments, however, can often be regarded as a very n...
详细信息
ISBN:
(纸本)9781605581057
Complex computer-simulated environments are often sought in which autonomous agents can interact and their capabilities can be examined. Creating such simulated environments, however, can often be regarded as a very non-trivial undertaking. This work demonstrates how one can construct a smooth and continuous online environment which is easily computable and runs in polynomial time using a finite number of example function input/output pairs. Due to the manner of its construction, the newly created smooth mapping will give the same or similar outputs as the original one-to-one function it was derived from. Also, having no discontinuities, the constructed smooth mapping will not break should it be made to accept out-of-range or erroneous actions from an agent which engages it. Ultimately, this algorithm is used to construct an integral portion of a sequential environment which is utilized in a study to simulate the acquisition of phoneme sequence generating ability thought to occur in the brain. Copyright 2008 ACM.
The project effort calculation with a functional size measurement method such as COSMIC can only be properly performed after the "Requirements Analysis" phase in a Project Life Cycle. The goal of this resear...
详细信息
ISBN:
(纸本)9783540894025
The project effort calculation with a functional size measurement method such as COSMIC can only be properly performed after the "Requirements Analysis" phase in a Project Life Cycle. The goal of this research is to investigate an early and project-level tuned prediction of the product size with the intent to reduce the effect of the 'cone of uncertainty' phenomenon. The lack of size measurement methods which take into account the effect of the product non-functional requirements (NFR) on size also contributes to the above phenomenon. We propose to use the Project Size Unit (PSU) technique for predicting the product (FUR and NFR) size measured in COSMIC functional size units. Such early prediction will lower the cost of size counting the project and minimize the estimation error in the requirements phase. Furthermore, the PSU calculation procedure can be automated, which would further reduce the cost of size counting. The expected advantage of jointly using PSU and COSMIC is the ability to get early estimates of the whole project effort.
In recent decades, multiple application domains emerged that use computational devices embedded in commercial products that are sensitive to safety concerns. They include not only typical areas, such as nuclear techno...
详细信息
暂无评论