This paper presents the alignment results of Lily for the ontology alignment contest OAEI 2009. Lily is an ontology mapping system, and it has four functions: generic ontology matching, large scale ontology matching, ...
详细信息
This paper presents the alignment results of Lily for the ontology alignment contest OAEI 2009. Lily is an ontology mapping system, and it has four functions: generic ontology matching, large scale ontology matching, semantic ontology matching and mapping debugging. In OAEI 2009, Lily submited the results for four alignment tasks: benchmark, anatomy, directory and conference.
Understanding and recognizing human activities from sensor readings is an important task in pervasive computing. Existing work on activity recognition mainly focuses on recognizing activities for a single user in a sm...
详细信息
ISBN:
(纸本)9789639799592
Understanding and recognizing human activities from sensor readings is an important task in pervasive computing. Existing work on activity recognition mainly focuses on recognizing activities for a single user in a smart home environment. However, in real life, there are often multiple inhabitants live in such an environment. Recognizing activities of not only a single user, but also multiple users is essential to the development of practical context-aware applications in pervasive computing. In this paper, we investigate the fundamental problem of recognizing activities for multiple users from sensor readings in a home environment, and propose a novel pattern mining approach to recognize both single-user and multi-user activities in a unified solution. We exploit Emerging Pattern - a type of knowledge pattern that describes significant changes between classes of data - for constructing our activity models, and propose an Emerging Pattern based Multi-user Activity Recognizer (epMAR) to recognize both single-user and multiuser activities. We conduct our empirical studies by collecting real-world activity traces done by two volunteers over a period of two weeks in a smart home environment, and analyze the performance in detail with respect to various activity cases in a multi-user scenario. Our experimental results demonstrate that our epMAR recognizer achieves an average accuracy of 89.72% for all the activity cases.
Dealing with crosscutting concerns has been a critical problem in software development processes. Aspect-Oriented Programming (AOP) provides a viable programming-level solution by separating crosscutting concerns from...
详细信息
ISBN:
(纸本)9781605581668
Dealing with crosscutting concerns has been a critical problem in software development processes. Aspect-Oriented Programming (AOP) provides a viable programming-level solution by separating crosscutting concerns from primary concerns. To facilitate handling crosscutting concerns at earlier software development phases, this paper proposes an aspect-oriented modeling and integration approach at the design level. In our approach, primary concerns are depicted with UML activity diagrams as primary models, whereas crosscutting concerns are described with aspectual extended activity diagrams as aspect models. Each aspect model consists of pairs of pointcut and advice model. Aspect models can be integrated into primary models automatically. To this end, a prototype tool called Jasmine-AOI has been implemented as an Eclipse plug-in. With the tool support, we have conducted two case studies, including 15 primary models and 8 aspect models. The case studies demonstrate that our approach can greatly facilitate reasoning about crosscutting concerns when a system is modeled with activity diagrams. Copyright 2009 ACM.
The existing slicing algorithms do not consider parameterized types in generic programs, so they are not suitable for generic programs. To solve this problem, this paper presents a generic system dependence graph for ...
详细信息
The existing slicing algorithms do not consider parameterized types in generic programs, so they are not suitable for generic programs. To solve this problem, this paper presents a generic system dependence graph for Java generic programs based on the traditional system dependence graph to express dependences for parameterized type information. A novel slicing criterion and slicing algorithm for generic programs is proposed. The slices computed by the algorithm can help to understand relations between concepts and types for generic programs and can express the features of generic programs better.
Pervasive computing is characterized by the integration with communication and digital media technology embedded to the people's living space. People can transparently access the digital service anywhere. Wireless...
详细信息
Pervasive computing is characterized by the integration with communication and digital media technology embedded to the people's living space. People can transparently access the digital service anywhere. Wireless sensor networks are a novel technology and have broad application prospects. With the maturity of the wireless sensor networks technology, pervasive computing is becoming a reality. It is become a new technology challenge to process the data streams of sensor networks for pervasive environment efficiently and to find useful knowledge in these data streams. A k-means data stream clustering algorithm based on sensor networks is presented. The main idea of this algorithm is to select the initial centroids according to the aggregation gain of the node, then to cluster the data stream using the average square error. The experimental results are showed that this algorithm is effective and efficient.
The number of identified integer overflow vulnerabilities has been increasing rapidly in recent years. In this paper, we present a system, IntScope, which can automatically detect integer overflow vulnerabilities in x...
CORE, a trust model is proposed trying to solve agent coalition formation problem. The model characterizes an agent's trust from two aspects of competence and reputation. In the paper, the Euclidean distance formu...
详细信息
A method for representing gait feature based on frequency domain analysis is proposed. For a gait represented by a sequence of binarized silhouettes, its frequency domain feature is extracted following period detectio...
详细信息
Many secure localization algorithms have been proposed. In these algorithms, collusion attack is usually considered as the strongest attack when evaluating their performance. Also, for ensuring correct localization un...
详细信息
In a service-oriented architecture, how to analyze the feasibility of service composition according to the requirements of service consumers has become a problem that must be solved in service composition. A method fo...
详细信息
暂无评论