We define strict confluent drawing, a form of confluent drawing in which the existence of an edge is indicated by the presence of a smooth path through a system of arcs and junctions (without crossings), and in which ...
详细信息
There have been multiple techniques to discover action-rules, but the problem of triggering those rules was left exclusively to domain knowledge and domain experts. When meta-actions are applied on objects to trigger ...
详细信息
There have been multiple techniques to discover action-rules, but the problem of triggering those rules was left exclusively to domain knowledge and domain experts. When meta-actions are applied on objects to trigger a specific rule, they might as well trigger transitions outside of the target action rule scope. Those additional transitions are called side effects, which could be positive or negative. Negative side effects could be devastating in some domains such as healthcare. In this paper, we strive to reduce those negative side effects by extracting personalized action rules. We proposed three object-grouping schemes with regards to same negative side effects to extract personalized action rules for each object group. We also studied the tinnitus handicap inventory data to apply and compare the three grouping schemes.
As the world becomes an interconnected network where objects and humans interact with each other, new challenges and threats appear in the ecosystem. In this interconnected world, smart objects have an important role ...
详细信息
As the world becomes an interconnected network where objects and humans interact with each other, new challenges and threats appear in the ecosystem. In this interconnected world, smart objects have an important role in giving users the chance for life-logging in smart environments. However, smart devices have several limitations with regards to memory, resources and computation power, hindering the opportunity to apply well-established security algorithms and techniques for secure life-logging on the Internet of Things (IoT) domain. The need for secure and trustworthy life-logging in smart environments is vital, thus, a lightweight approach has to be considered to overcome the constraints of Smart Objects. The purpose of this paper is to present in details the current topics of life-logging in smart environments, while describing interconnection issues, security threats and suggesting a lightweight framework for ensuring security, privacy and trustworthy life-logging. In order to investigate the efficiency of the lightweight framework and the impact of the security attacks on energy consumption, an experimental test-bed was developed including two interconnected users and one smart attacker, who attempts to intercept transmitted messages or interfere with the communication link. Several mitigation factors, such as power control, channel assignment and AES-128 encryption were applied for secure life-logging. Finally, research into the degradation of the consumed energy regarding the described intrusions is presented.
Models of mathematical biology referred in the literature as Volterra-Lotka models of competing species defined by ordinary differential equations are considered in this paper for the construction of a model for analy...
详细信息
Models of mathematical biology referred in the literature as Volterra-Lotka models of competing species defined by ordinary differential equations are considered in this paper for the construction of a model for analysing the mobile telecommunications sector in Greece. Market size data from the three mobile telecommunication companies that operate under licence of the Greek state for the period 1999-2011 are used. Parameter estimation is performed using non-linear least squares. The findings suggest that in the long-run only one company will remain in the market.
Optimal synthesis of reversible circuits is a very hard task. For example, up to year 2009 this problem had not been solved even for 4-bit reversible functions, in spite of intensive research during previous decade. I...
详细信息
Designing short DNA words is a problem of constructing a set (i.e., code) of n DNA strings (i.e., words) with the minimum length such that the Hamming distance between each pair of words is at least k and the n words ...
详细信息
Traditional information extraction methods mainly rely on visual feature assisted techniques;but without considering the hierarchical dependencies within the paragraph structure, some important information is missing....
详细信息
Broadband is an important tool for increasing productivity and competitiveness. This paper attempts to measure the accumulative impact and effectiveness of broadband public infrastructures and services on the economy ...
详细信息
Broadband is an important tool for increasing productivity and competitiveness. This paper attempts to measure the accumulative impact and effectiveness of broadband public infrastructures and services on the economy of South East Europe (SEE) areas. To this direction, we focus on evaluating the correlation between broadband and each country's growth and employment. Moreover, we estimate the cost savings achieved by the extended usage of e-services, and we evaluate the potential cost savings that will follow the increase of e-services utilization the next years. The results of our analysis show that broadband may have positive impact on growth and employment and that the possible savings are substantial.
Currently available techniques for surface reconstruction from multi-view images require a large number of images in order to assure high surface resolution and precise detail reconstruction. Obtaining such big number...
详细信息
Currently available techniques for surface reconstruction from multi-view images require a large number of images in order to assure high surface resolution and precise detail reconstruction. Obtaining such big number of images in some cases is impossible; moreover, it may impose high preparation cost. Therefore, to address this drawback, a novel method is presented. This method is based on the visual hull approach. It assumes to be able to reconstruct three dimensional manifolds without edge from images, the number of necessary images should be as small as possible, and the quality of reconstructed mesh should be good. Applying this method for four images from a dino dataset proved the proposed method works well.
We consider the following simple network design problem. The input consists of n weighted nodes, and the output is an edge-weighted connected network such that the total weight of the edges incident to a node is at le...
详细信息
暂无评论