Transformational approaches to generating design and implementation models from requirements can bring effectiveness and quality to software development. In this paper we present a framework and associated techniques ...
详细信息
Transformational approaches to generating design and implementation models from requirements can bring effectiveness and quality to software development. In this paper we present a framework and associated techniques to generate the process model of a service composition from a set of temporal business rules. Dedicated techniques including path- finding, branching structure identification and parallel structure identification are used for semi-automatically synthesizing the process model from the semantics-equivalent Finite State Automata of the rules. These process models naturally satisfy the prescribed behavioral constraints of the rules. With the domain knowledge encoded in the temporal business rules, an executable service composition program, e.g., a BPEL program, can be further generated from the process models. A running example in the e-business domain is used for illustrating our approach throughout this paper.
In this research, we put forward a general approach for designing components from multiple domain applications by optimizing degree of variability of components, to reach a global optimization between usefulness and u...
详细信息
Background subtraction in dynamic scenes is an important and challenging task. In this paper, we present a novel and effective method for dynamic background subtraction based on covariance matrix descriptor. The algor...
详细信息
In the design process of a reconfigurable accelerator employing in an embedded system, multitude parameters may result in remarkable complexity and a large design space. Design space exploration as an alternative to t...
详细信息
Based on the pinyin-to-character conversion model, this paper employs the auto-adapted learning algorithm to propose a Chinese input technology which takes sentence as the input unit and possesses such characteristics...
详细信息
Based on the pinyin-to-character conversion model, this paper employs the auto-adapted learning algorithm to propose a Chinese input technology which takes sentence as the input unit and possesses such characteristics as easy-to-use, efficient and smart. The system is built on Symbian S60 and Windows Mobile 5. With three input methods of all spells, three spell and alphabetic number, the system can provide users with inputting Chinese characters, letters, numbers and punctuations in any circumstance. The whole system takes a memory of less than 150 K and has been widely used on equipments like cell phone, PDA and remoter, etc.
As a technique of feature extraction, 2DPCA is effective and efficient. Different from traditional PCA, it directly computes projection of one image matrix onto vector, to obtain feature for the image. In fact, 2DPCA ...
详细信息
As a technique of feature extraction, 2DPCA is effective and efficient. Different from traditional PCA, it directly computes projection of one image matrix onto vector, to obtain feature for the image. In fact, 2DPCA is optimal for dimension compression under this consideration. There are two approaches to implement 2DPCA. The two approaches transform images into different spaces, and emphasize horizontal feature and vertical feature of face images respectively. Because the features extracted by the two approaches may complement each other, two schemes are designed to perform feature fusion. Experiments based on the fused features achieve high classification right rates.
Security trust model is an important research topic for the P2P application. This paper firstly analyzes the existing P2P network security trust models, and then puts forward a new P2P recommendation trust model based...
详细信息
Security trust model is an important research topic for the P2P application. This paper firstly analyzes the existing P2P network security trust models, and then puts forward a new P2P recommendation trust model based on the network of social relationships. The model provides different types of services to show the userpsilas interest in different areas, and gives recommendation based on the interested area. Feedback mechanism and punishment mechanism have been used to improve the model. The simulation shows that the model can truly evaluate entity behavior and effectively isolated from malicious nodes.
Supporting visual analytics of multiple large-scale multidimensional data sets requires a high degree of interactivity and user control beyond the conventional challenges of visualizing such data sets. We present the ...
详细信息
Background subtraction in dynamic scenes is an important and challenging task. In this paper, we present a novel and effective method for dynamic background subtraction based on covariance matrix descriptor. The algor...
详细信息
ISBN:
(纸本)9781424421749
Background subtraction in dynamic scenes is an important and challenging task. In this paper, we present a novel and effective method for dynamic background subtraction based on covariance matrix descriptor. The algorithm integrates two distinct levels: pixel level and region level. At the pixel level, spatial properties that are obtained from pixel coordinate values, and appearance properties, i.e., intensity, texture, gradient, etc, are used as features of each pixel. In the region level, the correlation of features extracted at the pixel level is represented by a covariance matrix that is calculated over a rectangle region around the pixel. Each pixel is modeled as a group of weighted adaptive covariance matrices. Experimental results on a diverse set of dynamic scenes show that the proposed method dramatically out-performs traditional methods for dynamic background subtraction.
暂无评论