Hairstyle is an important feature of virtual human character in computer ***, which is an important part of hair modeling, is aimed to model the shape of static hair. It'sdifficulty to ensure both hair realism and...
详细信息
Hairstyle is an important feature of virtual human character in computer ***, which is an important part of hair modeling, is aimed to model the shape of static hair. It'sdifficulty to ensure both hair realism and real-time performance due to the huge number of hair strandsand the complexity of hairstyles. Besides, human-computer interaction should also be considered. Thus,hairstyling still remains a challenging task. Generally, to support hairstyling effectively, it's crucial forhairstyling tools to find a tradeoff between realism and interaction.
Different formal methods have presented plenty of formal models for system specification and proof. Hence the problem of bridging these formal models rises. MDE is a new paradigm in software engineering, which impleme...
详细信息
Different formal methods have presented plenty of formal models for system specification and proof. Hence the problem of bridging these formal models rises. MDE is a new paradigm in software engineering, which implements software by (meta-)modeling and model transforming. In this paper, we provide a MDE based approach for bridging heterogeneous formal models: Firstly, the heterogeneous formal models are introduced into MDE as domain specific languages by metamodeling. Then, transformation rules are built for semantics mapping. At last, model-text syntax rules are developed, so as to map models to programs. Our approach could be applied on formal models in both graphical style and grammatical style. A case study of bridging MARTE to LOTOS is also illustrated showing the validity and practicability of our approach.
In a wireless sensor network (WSN), the energy hole problem is a key factor which affects the lifetime of the networks. In a WSN with circular multi-hop deployment (modeled as concentric coronas), sensors in one coron...
详细信息
Context-awareness is a key issue in pervasive computing. Context-aware applications are prone to the context consistency problem, where applications are confronted with conflicting contexts and cannot decide how to ad...
详细信息
Biometric authentication and privacy protection are conflicting issues in a practical system. Since biometrics cannot be revoked or canceled if compromised duo to the permanent association with the user, privacy-prese...
详细信息
Location Based Service (LBS) is one kind of ubiquitous applications whose functions are based on the locations of clients. The core of LBS is an effective positioning system. As wireless LAN (WLAN) costs less and is e...
详细信息
Location Based Service (LBS) is one kind of ubiquitous applications whose functions are based on the locations of clients. The core of LBS is an effective positioning system. As wireless LAN (WLAN) costs less and is easy to access, using WLAN for indoor positioning has been widely studied recently. K nearest neighbors (KNN) is one of the basic deterministic fingerprint based algorithms and widely used for WLAN-based indoor positioning. However, KNN takes all the nearest K neighbors for calculating the estimated result, which could be improved if some selective work could be done to those neighbors beforehand. In this paper we propose a new scheme called "cluster filtered KNN" (CFK). CFK utilizes clustering technique to partition those neighbors into different clusters and chooses one cluster as the delegate. In the end, the final estimate can be calculated only based on the elements of the delegate. With experiments, we found that CFK does outperform KNN.
Privacy risks result in great barriers to the long-term success of pervasive computing. Unfortunately, related researches can still be considered in its infancy. Access control is widely used for privacy protection. H...
详细信息
Privacy risks result in great barriers to the long-term success of pervasive computing. Unfortunately, related researches can still be considered in its infancy. Access control is widely used for privacy protection. However, traditional access control methods can only negating or approving accesses, greatly lacking flexibility. In this paper, we introduce the disclosing degree for end-users to precisely and flexibly specify their privacy requirements. We implement a disclosing degree based scheme in the middleware Shadow for privacy protection. We also demonstrate the effectiveness of our scheme by comprehensive case-studies.
Power control plays an important role in wireless communications. However, most existing power control protocols are not efficient enough to be applied in real ad hoc network systems. In this paper, we propose PIPC (P...
详细信息
Power control plays an important role in wireless communications. However, most existing power control protocols are not efficient enough to be applied in real ad hoc network systems. In this paper, we propose PIPC (Proportion-Integral Power Control), a novel closed-loop power control algorithm that can be used in conjunction with any routing protocol as long as the routing table of a node provides enough knowledge of local network topology. PIPC adaptively adjusts the transmission power for each node through an improved version of the classical PID (Proportion-Integral-Differential) control. The topology derived under PIPC is also fed back to the routing table that is used as its input. Both theoretical analysis and simulation study show that PIPC has a good performance.
暂无评论