Many practical applications are dynamic over time, which require optimization algorithms not only to converge to optimum as soon as possible but also to track the changing optimum. In this paper, a Cooperative Dual-sw...
详细信息
Character Modeling is becoming more and more difficult in animation industry today. Lots of designers are usually involved to cooperatively accomplish a character by computer networks or the Internet. This paper prese...
详细信息
In this paper, we present a novel color-mood-aware technique to re-texture clothing in a photograph. An efficient classification algorithm is developed to classify clothing textures using color mood scheme. To re-text...
详细信息
In this paper, we propose a distributed resource allocation framework for cognitive radio networks by using the orthogonal frequency division multiple access (OFDMA) modulation. We jointly consider the constraints of ...
详细信息
This paper proposes a novel genetic clustering algorithm, called a real-valued quantum genetic niching clustering algorithm (RQGN), which is based on the concept and principles of quantum computing, such as the qubits...
详细信息
In wireless sensor networks (WSNs), trap coverage has recently been proposed to tradeoff between the availab.lity of sensor nodes and sensing performance. It offers an efficient framework to tackle the challenge of li...
详细信息
With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dyn...
详细信息
With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalab.e and often virtuMized resources are provided as services. With virtualization technology, cloud computing offers diverse services (such as virtual computing, virtual storage, virtual bandwidth, etc.) for the public by means of multi-tenancy mode. Although users are enjoying the capabilities of super-computing and mass storage supplied by cloud computing, cloud security still remains as a hot spot problem, which is in essence the trust management between data owners and storage service providers. In this paper, we propose a data coloring method based on cloud watermarking to recognize and ensure mutual reputations. The experimental results show that the robustness of reverse cloud generator can guarantee users' embedded social reputation identifications. Hence, our work provides a reference solution to the critical problem of cloud security.
Web service schema matching is the preliminary treatment phase of service composition and service mashup. With the entry and exit of large numbers of services on the Internet, it will be difficult to find and suggest ...
详细信息
Tele-presence and tele-immersion systems are growing to be more realistic these years. However, few show practical experiences in Internet wide tele-immersion, especially in acceptable end-to-end delay. We present a f...
详细信息
An improved continuation power flow method for the AC/DC system is proposed in this paper. The three level control strategies and the coordination of the control modes for DC systems are presented. Firstly, the load-t...
详细信息
暂无评论