Previous work in the research field of Smart Camera (SC) networks intensively focused on algorithms for obtaining vision graphs in distributed camera networks consisting of static camera nodes. Each edge of the vision...
详细信息
Previous work in the research field of Smart Camera (SC) networks intensively focused on algorithms for obtaining vision graphs in distributed camera networks consisting of static camera nodes. Each edge of the vision graph represents two cameras imaging a sufficiently large part of the same environment. In contrast, we propose that future SC networks will consist of static SCs, supported by mobile image providers (e.g. embedded devices equipped with image sensors such as mobile phones). Due to their mobility, location changes (especially turnings changing the direction of view) are very likely. In contrast to position changes, which can be detected by using off-the-shelf GPS sensors, turnings can only be detected by high-cost magnetic compasses. In this paper, we present a lightweight distributed algorithm for estimating turning movements based on visual sensor data and updating the system's vision graph. Our algorithm uses the optical flow as input to compute the turnings. Evaluations on a mobile image provider, consisting of an off-the-shelf embedded device equipped with an IP cam, show that our algorithm is able to estimate the angle of rotation with an accuracy of 80% and performs well in terms of CPU and memory utilization.
Thread migration is an effective technique for fault resilience and load balancing in high performance computing. However, flexible thread migration is not easy to achieve. In this paper, we present an approach to cre...
详细信息
Parametric search is a useful tool in geometric optimization. Invented by Nimrod Megiddo in 1983, it has been widely used in computational geometry. Unfortunately, this technique has rarely been used in the combinator...
详细信息
Parametric search is a useful tool in geometric optimization. Invented by Nimrod Megiddo in 1983, it has been widely used in computational geometry. Unfortunately, this technique has rarely been used in the combinatorial optimization community in China. In this paper, we introduce parametric search via three new geometric optimization applications.
In this paper, we provide a generalized file replication scheme with a storage load balancing function in unstructured P2P file-sharing networks. The generalized file replication scheme is expressed as a weighted mixt...
详细信息
As one of the most important enabling technologies of cloud computing, virtualization brings to HPC good manageability, online system maintenance, performance isolation and fault isolation. Furthermore, previous study...
详细信息
In this paper we present our work and results in the framework of obstacle avoiding for marine vehicle teams by means of trajectory planning. Based on a team of maritime systems, such as Autonomous Underwater Vehicles...
详细信息
We present nGFSIM, a GPU-based fault simulator for stuck-at faults which can report the fault coverage of one-to n-detection for any specified integer n using only a single run of fault simulation. nGFSIM, which explo...
详细信息
We present nGFSIM, a GPU-based fault simulator for stuck-at faults which can report the fault coverage of one-to n-detection for any specified integer n using only a single run of fault simulation. nGFSIM, which explores the massive parallelism in the GPU architecture and optimizes the memory access and usage, enables accelerated fault simulation without the need of fault dropping. We show that nGFSIM offers a 25X speedup in comparison with a commercial tool and enables new applications in test selection.
This paper presents a decision support tool for the effectiveness of a Quality Management system (QMS) in a company. To develop this tool, a new approach PAHP based on the combination of the Pareto Optimality Concept ...
详细信息
In this paper, we define the portfolio of a generation company as the coordination of a set of generation units, which differ in production cost, capacity, and geographical location. A portfolio allows a generation co...
详细信息
In this paper, we define the portfolio of a generation company as the coordination of a set of generation units, which differ in production cost, capacity, and geographical location. A portfolio allows a generation company to coordinate its generators to bid strategically to earn profit more than what can be achieved without coordination. In a constrained transmission network, for example, a generation company can raise the electricity prices at a particular zone by congesting the inbound transmission lines through importing electricity from neighboring zones where other cheaper generation units of the company located. Understanding generation companies' bidding behaviors under such situation is therefore crucial to ensure market fairness. In this paper, we use an agent-based approach to model the electricity market as a multi-player game and investigate how the transmission capacity and installed capacity of generation companies affect their bidding strategies under both a monopoly market and a non-monopoly market. We demonstrate conditions under which generation companies will prefer a coordination strategy over a non-coordination one.
The spread of open-software services through the Internet increases the importance of security. A security pattern is one of the techniques in which developers utilize security experts' knowledge. Security pattern...
详细信息
The spread of open-software services through the Internet increases the importance of security. A security pattern is one of the techniques in which developers utilize security experts' knowledge. Security patterns contain typical solutions about security problems. However there is a possibility that developers may apply security patterns in inappropriate ways due to a lack of consideration on dependencies among patterns. Application techniques of security patterns that consider such dependencies have not been proposed yet. In this paper, we propose an automated application technique of security patterns in model driven software development by defining applications procedures of security patterns to models as model transformation rules with consideration for pattern dependencies. Our technique prevents inappropriate applications such as the application of security patterns to wrong model elements and that in wrong orders. Therefore our technique supports developers apply security patterns to their own models automatically in appropriate ways.
暂无评论