I am developing the computer aided composition system. This system aids the person, that know the music theory a little, to compose the receiving sign of cellphone, or background music of home page or software. This s...
详细信息
Distributed Virtual Environment (DVE) systems have become more and more important both in academic communities and the industries. To guarantee the load constrain, the physical world integrity and the virtual world in...
详细信息
A computer-vision monitoring system is demonstrated that automatically detects the presence and location of people. The approach investigated the potential for real-time, automated surveillance and tracking in a reali...
详细信息
How to make full use of the limited energy available and prolonging the survival time of node is a major concern in research on Wireless Sensor Networks (WSNs). This paper presented an improved approach based on Direc...
详细信息
ISBN:
(纸本)9780769538235
How to make full use of the limited energy available and prolonging the survival time of node is a major concern in research on Wireless Sensor Networks (WSNs). This paper presented an improved approach based on Directed Diffusion Protocol (DDP) which could meet the features of WSN, such as data-oriented, many-to-one transmissions and low energy costs, together with data aggregation mechanisms which emphasized on cascading timeouts, to eliminate the redundancy caused by the transmission of large amounts of data. This modified protocol prohibited the direct forwarding of central nodes, balancing data traffic of different sensors between the source and the sink, and proved to be able of reducing total network flows, energy consumptions and prolonging the lifetime of the network through simulations.
We propose an efficient and effective nonlinear feature domain noise suppression algorithm, motivated by the minimum mean square error (MMSE) optimization criterion. Multi Layer Perceptron (MLP) neural network in the ...
详细信息
Recent research has shown that keyword search is a friendly and potentially effective way to retrieve information of interest over relational databases. Existing work has generally focused on implementing keyword sear...
详细信息
This paper explores Chinese semantic role labeling (SRL) for nominal predicates. Besides those widely used features in verbal SRL, various nominal SRL-specific features are first included. Then, we improve the perform...
详细信息
In this study, we focused on the estimation of the global critical current density, super-current path, grain connectivity and their relationships with the faults volume fraction in the MgB2 bulks prepared by a modifi...
详细信息
There are a lot of important and sensitive data in databases, which need to be protected from attacks. To secure the data, Cryptography support is an effective mechanism. However, a tradeoff must be made between the p...
详细信息
There have been a large number of bounds checking techniques proposed for C. Among them, the approach proposed by Jones and Kelly (extended by Ruwase and Lam and further extended by Dhurjati and Adve) is the only one ...
详细信息
ISBN:
(纸本)9780889868113
There have been a large number of bounds checking techniques proposed for C. Among them, the approach proposed by Jones and Kelly (extended by Ruwase and Lam and further extended by Dhurjati and Adve) is the only one we know of that is both backwards-compatible and precise. Even the approach, however, can incur serious compatibility problems with threads. This paper proposes a collection of techniques to avoid such problems. Our experimental results show that our bounds checking is highly compatible with large multi-threaded programs (including Apache 2.2.2) and that it can detect boundary errors caused by them precisely.
暂无评论