SuperParent-One-Dependence Estimators (SPODEs) loosen Naive-Bayes' attribute independence assumption by allowing each attribute to depend on a common single attribute (superparent) in addition to the class. An ens...
详细信息
Windows operating systems (NT, 2000, XP, 2003) were not designed for real-time and time-critical applications. But, due to the market requirements, many of the monitoring and control applications are to use Windows NT...
详细信息
Inoue et al. introduced an automaton on a two-dimensional tape, which decides acceptance or rejection of an input tape by scanning the tape from various sides by various automata which move one way, and investigated t...
详细信息
The executive that is presented in this paper is part of a system of programs designed for rapid development and execution of handheld computer applications. The executive has two versions, one that executes applicati...
详细信息
A Printed Circuit Board (PCB) testing method using infrared thermal signatures is presented. The concept of thermal signature for PCBs is introduced. Based on this concept, the testing method is able to classify the i...
详细信息
We present a unique Geographical Information System (GIS) that seamlessly integrates 2D and 3D views of the same spatial and aspatial data. Multiple layers of information are continuously transformed between the 2D an...
详细信息
AS Encryption / Decryption algorithm depends on the use of linear feedback shift registers (LFSR) in order to generate the key-stream bits. The A5-1 algorithm uses three different LFSRs with a majority function to add...
详细信息
ISBN:
(纸本)3905673207
AS Encryption / Decryption algorithm depends on the use of linear feedback shift registers (LFSR) in order to generate the key-stream bits. The A5-1 algorithm uses three different LFSRs with a majority function to add non-linearity, while A5-2 uses four LFSRs. In this paper a new multi-configurable LFSR design variant of the A5 algorithm is proposed, in which the inverse taps of the LFSR are used to generate the output key-stream bits. The new LFSR design, called a Complex LFSR, techniques can be effectively applied in software or hardware to a communications stream to provide a low cost and high speed encryption capability.
This paper describes the fundamental concept of analysis and design strategy for an effective deployment of wireless communications for innovative universities or colleges campus that insistently deploys the wireless ...
详细信息
ISBN:
(纸本)972886521X
This paper describes the fundamental concept of analysis and design strategy for an effective deployment of wireless communications for innovative universities or colleges campus that insistently deploys the wireless networks. The extensive use of wireless technologies in university campus has made various respective computer applications such as electronic transactions and electronic learning (e-learning) environments become more energetic. Usually, for the innovative campus network, when deploying wireless communications, most IT Managers/Engineers begin the project by jumping into technical matters, such as deciding upon which approach, technique or standard to use, which vendor to select, and how to overcome the various limitations. These are important elements of implementing wireless communications for innovative campus;however prior to getting too far with the project, the respective IT Managers/Engineers must give vigilant attention to analysis and design strategy in order to wind up with an effective deployment.
Fault Tree Analyses (FTA) are embedded into UML component models. The UML component models are constructed by employing UML's extension mechanisms in conjunction with component-based software techniques. Taking an...
详细信息
Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collaboration is ad-hoc, and virtual workspac...
详细信息
ISBN:
(纸本)9781604235531
Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collaboration is ad-hoc, and virtual workspaces are set up anew for each new instance of collaboration. We propose that much of the ad-hoc collaboration can be captured and transformed into patterns for reuse in future collaboration. This paper presents the results of the past five years of our work in this area. We introduce the notion of patterns of virtual collaboration;present a framework for extracting patterns of work in virtual workspace systems;and introduce an information model of virtual collaboration. We then present an overview of our data and process mining methods and reverse engineering techniques for discerning work processes carried out through virtual workspace systems. Finally we present our visual mining techniques that we use to discern aspects of work processes in virtual workspaces.
暂无评论