SketehEditor is our pen based document inputting and edition system. It imitates how people using pen and papers in their daily life and try to build a human centered interface. SketehEditor is suitable for small devi...
详细信息
SketehEditor is our pen based document inputting and edition system. It imitates how people using pen and papers in their daily life and try to build a human centered interface. SketehEditor is suitable for small devices and mobile comp.ting as it uses just pen device to accomp.ish works as character inputting and edition. We also explore areas such as gesture recognition and online handwriting segmentation. And we introduce our handwriting segmentation method that makes use of position relations and distance between pen strokes too.
作者:
Siegel, MSensors
Measurement and Cntr. Lab. Sch. of Comp. Sci. Robotics Inst. Carnegie Mellon University Pittsburgh PA 15213 United States
Microsensors for chemical measurement microsystems exploit a wide variety of chemical and physical transduction principles and a correspondingly wide variety of practical electrical and electronic implementation techn...
详细信息
Microsensors for chemical measurement microsystems exploit a wide variety of chemical and physical transduction principles and a correspondingly wide variety of practical electrical and electronic implementation technologies. To keep this article's scope manageable, the devices discussed in detail are limited to specialized electrical circuit comp.nents - resistors and capacitors - whose parametric values depend on their chemical environment; furthermore, the discussion and examples focus on chemical sensors for gas phase versus liquid phase or biological environments. The article looked in detail at chemiresistors, resistors fabricated of materials whose resistivity changes dramatically with their atmospheric environment, and humidity sensors, which are especially interesting because it is possible to comp.re commonly available devices based on resistive, capacitive, and thermal conductivity principles. Since many of the most practically important of these sensors are currently at a stage of their miniaturization path that makes it more accurate to call them "minisensors" than "microsensors," devices at this scale are also discussed.
We have proposed a generic SIP-based application topology model called Secure Multimedia Communication Infrastructure (SMCI) and constructed a real multimedia communication application based on it. In this paper, we e...
详细信息
ISBN:
(纸本)0780386477
We have proposed a generic SIP-based application topology model called Secure Multimedia Communication Infrastructure (SMCI) and constructed a real multimedia communication application based on it. In this paper, we emphasize the security issues in the SMCI and give entire secure framework in detail. We also analyze the processing load of our security mechanism in order to explain the practicability of our secure framework. Hop by hop and end to end security are introduced to defend the attack of registration hijacking, impersonating a server, tampering with message bodies, tearing down sessions, denial of service and amplification. We also considered the privacy problem that will be the most important consideration in the coming days. Finally, the security analysis is presented to demonstrate that the proposed security mechanisms are robust and efficient to secure the SMCI.
Based on the face orientation, a system for face recognition is designed. BP neural network is used for face orientation recognition and a subnet with a set of single export is replaced with formerly BP neural network...
详细信息
ISBN:
(纸本)0780384032
Based on the face orientation, a system for face recognition is designed. BP neural network is used for face orientation recognition and a subnet with a set of single export is replaced with formerly BP neural network to increase the accuracy of face orientation recognition. The face recognition with the Principal comp.nents Analysis based on classification of face orientation shows the accuracy of face recognition is increased.
This paper presents an approach to develop a web-based, multi-user, 3D simulation learning environment supporting virtual communities of practice. This approach emphasizes helping geographically distributed learners t...
详细信息
ISBN:
(纸本)0769521819
This paper presents an approach to develop a web-based, multi-user, 3D simulation learning environment supporting virtual communities of practice. This approach emphasizes helping geographically distributed learners to acquire and construct knowledge by doing shared "authentic" activities, to interact with each other as community members, and to perform informal, unstructured, spontaneous, and situation-oriented learning. This paper focuses on description of representation and management of situated knowledge and of support for situated inst.uction.
One of the challenging issues in the energy-constrained ad hoc wireless networks is to find ways that increase their lifetime. Squeezing maximum energy from the battery of the nodes of these networks requires the comm...
详细信息
ISBN:
(纸本)9781581138689
One of the challenging issues in the energy-constrained ad hoc wireless networks is to find ways that increase their lifetime. Squeezing maximum energy from the battery of the nodes of these networks requires the communication protocols to be designed such that they are aware of the state of the batteries. Traditional MAC protocols for ad hoc networks are designed without considering the battery state. Major contributions of this paper are: (a) a novel distributed Battery Aware Medium Access Control (BAMAC(κ)) protocol that takes benefit of the chemical properties of the batteries, to provide fair scheduling and increased network and node lifetime through uniform discharge of batteries, (b) a discrete time Markov chain analysis for batteries of the nodes of ad hoc wireless networks, and (c) a thorough comp.rative study of our protocol with IEEE 802.11 and DWOP (Distributed Wireless Ordering Protocol) MAC protocols. The key idea proposed in this paper is to piggy-back nodes' battery-state information with the packets sent by the nodes by means of which the nodes are scheduled to ensure a uniform battery discharge. We model the operation of the battery using a discrete time Markovian chain. Using the theoretical analysis, we calculate lifetime of the battery in terms of maximum number of packets that a node can transmit before its battery drains fully. Extensive simulations have shown that our protocol extends the battery lifetime consuming 96% and 60% less percentage nominal capacity spent per packet transmission comp.red to the IEEE 802.11 and the DWOP MAC protocols, respectively. In general, performance results show that BAMAC(κ) outperforms IEEE 802.11 and DWOP MAC protocols, in terms of power consumption, fairness, and lifetime of the nodes. We have also analyzed the factors that influence the uniform discharge of batteries and their lifetime.
The proliferation of online information sources has led to an increased use of wrappers for extracting data from Web sources. A key problem with the existing wrappers is that the wrapped rule learned from the examples...
详细信息
ISBN:
(纸本)0780384032
The proliferation of online information sources has led to an increased use of wrappers for extracting data from Web sources. A key problem with the existing wrappers is that the wrapped rule learned from the examples is only adaptive for the specific website. In this paper, we propose a novel approach, DBFinder, to discover interest data blocks from a set of Web pages. It is a key step in the data extraction. The process of DBFinder consists of two phases: semi-supervised wrapping and unsupervised wrapper. The goal of the first phase is to learn the wrapped rules for the specific website. The goal of the second phase is to popularize the wrapped rules for other websites in the same domain with the sample website. Two kinds of data mining techniques, frequent sub-tree mining and association rule mining, are used to accomp.ish such a goal. To demonstrate the feasibility of our approach, some detailed experiments are conducted. We have also applied our approach in a real application, which is a comp.rison-shopping agent.
In the ASYMMETRIC k-CENTER problem, the input is an integer k and a comp.ete digraph over n points together with a distance function obeying the directed triangle inequality, The goal is to choose a set of k points to...
详细信息
In the ASYMMETRIC k-CENTER problem, the input is an integer k and a comp.ete digraph over n points together with a distance function obeying the directed triangle inequality, The goal is to choose a set of k points to serve as centers and to assign all the points to the centers, so that the maximum distance of any point to its center is as small as possible. We show that the ASYMMETRIC k-CENTER problem is hard to approximate up to a factor of log* n - (1) unless NP ⊂ DTIME(nlog log n). Since an O(log* n)-approximation algorithm is known for this problem, this essentially resolves the approximability of this problem. This is the first natural problem whose approximability threshold does not polynomially relate to the known approximation classes. We also resolve the approximability threshold of the metric k-Center problem with costs.
This paper surveys recent findings in neurosci.nce regarding the behavioral relevancy of the precise timing with which real spiking neurons emit spikes. The literature suggests that in almost any system where the proc...
详细信息
暂无评论