Vision-based motion estimation is a key technique in autonomously mobile robot. This paper presents an integrated method for motion estimation of the mobile robot based on floor plane extraction. The whole processes i...
详细信息
This paper presents a novel adaptive deformation algorithm by integrating the representations of ADFs and physically based deformable models. The octree-based adaptively sampled distance fields (ADFs) are employed as ...
详细信息
In view of the limitations that k-means clustering algorithm is sensitive to the initial points and liable to fall into local minimum point, a clustering algorithm based on multi-sampling max-min distance and dynamic ...
详细信息
The discovery of invariants and ranking functions plays a central role in program verification. In our previous work, we investigated invariant generation and non-linear ranking function discovering of polynomial prog...
详细信息
Pairwise testing, which requires that every combination of valid values of each pair of system factors be covered by at lease one test case, plays an important role in software testing since many faults are caused by ...
详细信息
Pairwise testing, which requires that every combination of valid values of each pair of system factors be covered by at lease one test case, plays an important role in software testing since many faults are caused by unexpected 2-way interactions among system factors. Although meta-heuristic strategies like simulated annealing can generally discover smaller pairwise test suite, they may cost more time to perform search, compared with greedy algorithms. We propose a new method, improved Extremal Optimization (EO) based on the Bak-Sneppen (BS) model of biological evolution, for constructing pairwise test suites and define fitness function according to the requirement of improved EO. Experimental results show that improved EO gives similar size of resulting pairwise test suite and yields an 85% reduction in solution time over SA.
Traditional access control solutions suffer from difficulties in access rights authorization and usage policy enforcement, especially in highly distributed environments. The layered nature of common digital content sh...
详细信息
The efficiency of attacking methods on secure RSA modulus was investigated. It was pointed out by analysis that since the success probability of some attack methods was neglectable, these methods could not be regarded...
详细信息
The efficiency of attacking methods on secure RSA modulus was investigated. It was pointed out by analysis that since the success probability of some attack methods was neglectable, these methods could not be regarded as the reason for choosing strongly secure RSA modulus. In consideration of the analysis of attack methods, the signification of secure RSA modulus was summarized, which enhanced the efficiency of selecting secure parameters in practice. The result that the difference between two RSA primes d=|p-q| must not be too small was further investigated, and the d might be seen as a special case when dl,m=ql-pm (l,mZ+) was small. From the analysis, it could be figured out that the randomness of the relation between the two primes should not be neglected during selecting RSA modulus. To improve the security, it should be avoided to have some specially functional relations between the two primes when choosing a larger d.
Concept maps are an important tool to knowledge organization, representation, and sharing. Most current concept map tools do not provide full support for hand-drawn concept map creation and manipulation, largely due t...
详细信息
ISBN:
(纸本)9781605581682
Concept maps are an important tool to knowledge organization, representation, and sharing. Most current concept map tools do not provide full support for hand-drawn concept map creation and manipulation, largely due to the lack of methods to recognize hand-drawn concept maps. This paper proposes a structure recognition method. Our algorithm can extract node blocks and link blocks of a hand-drawn concept map by combining dynamic programming and graph partitioning and then build a concept-map structure by relating extracted nodes and links. We also introduce structure-based intelligent manipulation technique of hand-drawn concept maps. Evaluation shows that our method has high structure recognition accuracy in real time, and the intelligent manipulation technique is efficient and effective. Copyright 2009 ACM.
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish a confiDential channel among group m...
详细信息
Regression testing is an expensive and frequently executed activity, which is often performed in a resource constrained execution environment. As resource-aware test suite optimization problem can be reduced to the 0-...
详细信息
ISBN:
(纸本)9781424459124
Regression testing is an expensive and frequently executed activity, which is often performed in a resource constrained execution environment. As resource-aware test suite optimization problem can be reduced to the 0-1 knapsack problem, which can be efficiently approximated with multiple algorithms. This paper proposes a new resource-aware test suite optimization technique and corresponding metric. The effectiveness of the technique and metric are illustrated by a case study.
暂无评论