A data mining framework has been proposed to estimate intracranial pressure (ICP) non-invasively in our previous work. In the corresponding approach, the feature vector extracted from arterial blood pressure (ABP) and...
详细信息
Active modeling is required in learning settings to cope with the dynamic evolution of the knowledge, since learners competences evolves over time as they participate in the course activities. Moreover, one of the mai...
详细信息
ISBN:
(纸本)9781424444823
Active modeling is required in learning settings to cope with the dynamic evolution of the knowledge, since learners competences evolves over time as they participate in the course activities. Moreover, one of the main issues in a competence based eLearning process is to deliver personalized instructional designs adjusted to both 1) intrinsic characteristics of users (i.e. learning styles) and 2) the desired and achieved competences in the learning process (i.e. specific and generic competences). This delivery includes the adaptation of the content and the activities in a learning scenario based on a dynamic user model that evolves according to user interactions. In this paper, an approach to support Conditional Plans Generation (IMS Learning Designs) in the context of a virtual learning environment is presented The process is supported by a pervasive usage of standards and specifications (IMS family of specifications) in conjunction with an integral user modeling.
In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distributio...
详细信息
ISBN:
(纸本)9780889868021
In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distribution of stock market information, pay per view and other subscriber services require secure multicast to protect integrity and confidentiality of the group traffic, and validate group member's authenticity. Providing secure multicast for group communication is problematic without a robust group key management. In this paper, we propose an anonymous group key management with ID-based Signature and secret sharing technologies to distribute a new group key securely to each participant of a group with only one rekey message whenever the group membership changes. The key management guarantees that a legal user, without revealing his/her real identity, can join a group after finishing the mutual authentication with the group initiator, and enforces the forward secrecy and backward secrecy.
We study both classical and quantum relation between two Hamiltonian systems which are mutually connected by time-dependent canonical transformation. One is ordinary conservative system and the other is timedependent ...
详细信息
We study both classical and quantum relation between two Hamiltonian systems which are mutually connected by time-dependent canonical transformation. One is ordinary conservative system and the other is timedependent Hamiltonian system. The quantum unitary operator relevant to classical canonical transformation between the two systems are obtained through rigorous evaluation. With the aid of the unitary operator, we have derived quantum states of the time-dependent Hamiltonian system through transforming the quantum states of the conservative system. The invariant operators of the two systems are presented and the relation between them are addressed. We showed that there exist numerous Hamiltonians, which gives the same classical equation of motion. Though it is impossible to distinguish the systems described by these Hamiltonians within the realm of classical mechanics, they can be distinguishable quantum mechanically.
The work reported in this paper is motivated by the need for developing swarm pattern transformation methodologies. Two methods, namely a macroscopic method and a mathematical method are investigated for pattern trans...
详细信息
The work reported in this paper is motivated by the need for developing swarm pattern transformation methodologies. Two methods, namely a macroscopic method and a mathematical method are investigated for pattern transformation. The first method is based on macroscopic parameters while the second method is based on both microscopic and macroscopic parameters. A formal definition to pattern transformation considering four special cases of transformation is presented. Simulations on a physics simulation engine are used to confirm the feasibility of the proposed transformation methods. A brief comparison between the two methods is also presented.
Speculative multithreading (SpMT) increases the performance by means of executing multiple threads speculatively to exploit thread-level parallelism. By combining software and hardware approaches, we have improved the...
详细信息
Speculative multithreading (SpMT) increases the performance by means of executing multiple threads speculatively to exploit thread-level parallelism. By combining software and hardware approaches, we have improved the capabilities of previous WaveScalar ISA on the basis of transactional memory system for the WaveCache Architecture. Threads are extracted at the course of static compiling, and speculatively executed as a thread-level transaction that is supported by extra hardware components, such as thread-context-table (TCT) and thread-memory-history (TMH). We have evaluated the SpMT WaveCache with 6 real benchmarks from SPEC, Mediabench and Mibench. On the whole, the SpMT WaveCache outperforms superscalar architecture ranging from 2times to 3times, and great performance gains are achieved over original WaveCache and transactional WaveCache as well.
The AMALTHEA REU program is a 10-week, summer research experience for science or engineering undergraduate students funded by the National science Foundation since 2007 and featuring Machine Learning as its intellectu...
详细信息
In this paper, a finger pose estimation method is presented. A direct use of fingers is useful in some applications which require handling of 3D position information. Our finger pose estimation method exploits anatomi...
详细信息
In this paper, a finger pose estimation method is presented. A direct use of fingers is useful in some applications which require handling of 3D position information. Our finger pose estimation method exploits anatomical constraints on finger motion and ring-shaped markers to achieve simple and practical measurements applicable to daily life situations. The use of anatomical constraints ensures that no exact placement of the markers is required.
暂无评论