This book constitutes the thoroughly refereed proceedings of the 2012 ICSOC Workshops consisting of 6 scientific satellite events, organized in 3 main tracks including workshop track (ASC, DISA. PAASC, SCEB, SeMaPS an...
详细信息
ISBN:
(数字)9783642378041
ISBN:
(纸本)9783642378034
This book constitutes the thoroughly refereed proceedings of the 2012 ICSOC Workshops consisting of 6 scientific satellite events, organized in 3 main tracks including workshop track (ASC, DISA. PAASC, SCEB, SeMaPS and WESOA 2012), PhD symposium track, demonstration track; held in conjunction with the 10th International Conference on Service-Oriented Computing (ICSOC), in Shanghai, China, November 2012.
The 53 revised papers presents a wide range of topics that fall into the general area of service computing such as business process management, distributed systems, computer networks, wireless and mobile computing, grid computing, networking, service science, management science, and software engineering.
We want to recreate spatially-varying bi-directional reflectance distribution functions (SVBRDFs) from a single image. Producing these SVBRDFs from single images will allow designers to incorporate many new materials ...
详细信息
We present a systematic approach to design and verification of fault-tolerant components with real-time properties as found in embedded systems. A state machine model of the correct component is augmented with interna...
详细信息
In this paper,in order to increase the amount of hiding information,we choose MPEG sequences as carriers and present a practical method focus on the steganographic method in MPEG compressed video ***,there are many B-...
详细信息
In this paper,in order to increase the amount of hiding information,we choose MPEG sequences as carriers and present a practical method focus on the steganographic method in MPEG compressed video ***,there are many B-frames in each *** utilize the B-frames to hide information so that we can increase the amount of hiding information and decrease the tamper of the *** and extracting are performed in compressed video sequences without requiring original *** experimental results show that the proposed method has the characteristics of less tampering on the visual effect and larger hiding capacity without increasing the volume of the carrier file.
Epilepsy is a prevalent neurological disorder and has been studied through the analysis of Electroencephalogram (EEG) signals. However, the identification and classification of epileptic seizure patterns remains chall...
详细信息
During the last decade, deep learning has played a significant role in improving text classification which is widely applied in question answering systems, comment extraction, sentiment analysis, etc. Considering that...
详细信息
In modern aviation systems, the helmet sight (HMS) assists the pilot to cooperate with the warplane to quickly complete the target tracking and aiming, and the helmet pose measurement is the core technology of the hel...
详细信息
In order to satisfy the development of contemporary higher education better, after analyzing different experimental methods, this paper proposes a new idea to combine real laboratory equipments and virtual simulation ...
详细信息
Based on delegating quantum computing (DQC), a DQC model that adapts to multi-qubit and composite quantum circuits is given firstly. In this model, the single client with limited quantum ability can give her encrypted...
详细信息
Based on particle swarm optimization (PSO) and artificial bee colony (ABC), a novel hybrid swarm intelligent algorithm is developed in this paper. Two information exchanging processes are introduced to share valuable ...
详细信息
暂无评论