This paper proposes a novel vision based ping-pong (table tennis) ball tracking system. And it can generate the ping-pong ball trace in real time with the aiding of a transcendent trace model. Our approach only need t...
详细信息
Classifying what-type questions into proper semantic categories is found more challenging than classifying other types in question answering systems. In this paper, we propose to classify what-type questions by head n...
详细信息
We introduce a new multi-player geometric game, which we will refer to as the isolation game, and study its Nash equilibria and best or better response dynamics. The isolation game is inspired by the Voronoi game, com...
详细信息
SQL injection poses a major threat to the application level security of the database and there is no systematic solution to these *** from traditional run time security strategies such as IDS and fire-wall,this paper ...
详细信息
SQL injection poses a major threat to the application level security of the database and there is no systematic solution to these *** from traditional run time security strategies such as IDS and fire-wall,this paper focuses on the solution at the outset;it presents a method to find vulnerabilities by analyzing the source *** concept of validated tree is developed to track variables referenced by database operations in *** checking whether these variables are influenced by outside inputs,the database operations are proved to be secure or *** method has advantages of high accuracy and efficiency as well as low costs,and it is universal to any type of web application *** is implemented by the software code vulnerabilities of SQL injection detector(CVSID).The validity and efficiency are demonstrated with an example.
We participate in document search and expert search of Enterprise Track in TREC2008. The corpus and tasks are same as the year before. Different from TREC 2007, the topics come from CSIRO Enquiries, and the topic stat...
详细信息
We participate in document search and expert search of Enterprise Track in TREC2008. The corpus and tasks are same as the year before. Different from TREC 2007, the topics come from CSIRO Enquiries, and the topic statements are richer and more colloquial.. In document search, we look into the key resource page pre-selection, the use of anchor text, query classification, and multi-field search. In expert search, we develop methods to detect expert identifiers and experimented based on our previous PDD (personal description documents) model.
This paper presents a stochastic control method for networked control systems(NCSs) with time-varying sampling periods and random delay. The random delay of the NCS is modelled as intervals governed by a Markov chain....
详细信息
Warping is a common appearance in camera captured document images. It is the primary factor that makes such kind of document images hard to be recognized. Therefore it is necessary to restore warped document image bef...
详细信息
A multi-metric QoS Routing Protocol (MQOLSR) is proposed in this paper, which providing different QoS for different applications flow in an ad hoc network. The protocol, which integrates QoS measurement and packet for...
详细信息
Detecting and measuring the changes of temporal traffic patterns in large scale networks are crucial for effective network management. This paper presents the concept of region flow to aggregate traffic packets. Regio...
详细信息
To improve the agility, dynamics, composability, reusability, and development efficiency restricted by monolithic federation object model (FOM), a modular FOM is proposed by high level architecture (HLA) evolved produ...
详细信息
To improve the agility, dynamics, composability, reusability, and development efficiency restricted by monolithic federation object model (FOM), a modular FOM is proposed by high level architecture (HLA) evolved product development group. This paper reviews the state-of-the-art of HLA evolved modular FOM. In particular, related concepts, the overall impact on HLA standards, extension principles, and merging processes are discussed. Also permitted and restricted combinations, and merging rules are provided, and the influence on HLA interface specification is given. The comparison between modular FOM and base object model (BOM) is performed to illustrate the importance of their combination. The applications of modular FOM are summarized. Finally, the significance to facilitate compoable simulation both in academia and practice is presented and future directions are pointed out.
暂无评论