共查询到20条相似文献,搜索用时 734 毫秒
1.
Mobile ad hoc networks without centralized infrastructure change their topology rapidly because of node mobility, making multimedia
applications difficult to run across wireless networks. Moreover, video transmission over ad hoc networks causes frequent
transmission loss of video packets owing to end-to-end transmission with a number of wireless links, and requires essential
bandwidth and restricted delay to provide quality-guaranteed display. This paper presents an architecture supporting transmission
of multiple video streams in ad hoc networks by establishing multiple routing paths to provide extra video coding and transport
schemes. This study also proposes an on-demand multicast routing protocol to transport layered video streams. The multicast
routing protocol transmits layered video streaming based on a weight criterion, which is derived according to the number of
receivers, delay and expiration time of a route. A simulation is performed herein to indicate the viability and performance
of the proposed approach. The simulation results demonstrate that the proposed transport scheme is more effective than other
video transport schemes with single or multiple paths.
相似文献
2.
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin
by predicting all possible ways of penetrating a network to reach critical assets. The set of all such paths through the network
constitutes an attack graph, which we aggregate according to underlying network regularities, reducing the complexity of analysis.
We then place IDS sensors to cover the attack graph, using the fewest number of sensors. This minimizes the cost of sensors,
including effort of deploying, configuring, and maintaining them, while maintaining complete coverage of potential attack
paths. The sensor-placement problem we pose is an instance of the NP-hard minimum set cover problem. We solve this problem
through an efficient greedy algorithm, which works well in practice. Once sensors are deployed and alerts are raised, our
predictive attack graph allows us to prioritize alerts based on attack graph distance to critical assets.
相似文献
3.
A novel routing protocol for wireless, mobile ad hoc networks is presented. This protocol incorporates features that enhance routing reliability, defined as the ability to provide almost 100% packet delivery rate. The protocol is based on a virtual structure, unrelated to the physical network topology, where mobile nodes are connected by virtual links and are responsible for keeping physical routes to their neighbors in the virtual structure. Routes between pairs of mobiles are set up by using information to translate virtual paths discovered in the virtual structure. Route discovery and maintenance phases of the protocol are based on unicast messages travelling across virtual paths, with sporadic use of flooding protocol. Most flooding is executed in the background using low priority messages. The routing protocol has been evaluated and compared with the Dynamic Source Routing protocol and with the Zone Routing Protocol by means of simulation. 相似文献
4.
In this paper, we present an Inverse Multi-Objective Robust Evolutionary (IMORE) design methodology that handles the presence
of uncertainty without making assumptions about the uncertainty structure. We model the clustering of uncertain events in
families of nested sets using a multi-level optimization search. To reduce the high computational costs of the proposed methodology
we proposed schemes for (1) adapting the step-size in estimating the uncertainty, and (2) trimming down the number of calls
to the objective function in the nested search. Both offline and online adaptation strategies are considered in conjunction
with the IMORE design algorithm. Design of Experiments (DOE) approaches further reduce the number of objective function calls
in the online adaptive IMORE algorithm. Empirical studies conducted on a series of test functions having diverse complexities
show that the proposed algorithms converge to a set of Pareto-optimal design solutions with non-dominated nominal and robustness
performances efficiently.
相似文献
5.
This paper describes the simulated car racing competition that was arranged as part of the 2007 IEEE Congress on Evolutionary
Computation. Both the game that was used as the domain for the competition, the controllers submitted as entries to the competition
and its results are presented. With this paper, we hope to provide some insight into the efficacy of various computational
intelligence methods on a well-defined game task, as well as an example of one way of running a competition. In the process,
we provide a set of reference results for those who wish to use the simplerace game to benchmark their own algorithms. The paper is co-authored by the organizers and participants of the competition.
相似文献
6.
Quantitative usability requirements are a critical but challenging, and hence an often neglected aspect of a usability engineering process. A case study is described where quantitative usability requirements played a key role in the development of a new user interface of a mobile phone. Within the practical constraints of the project, existing methods for determining usability requirements and evaluating the extent to which these are met, could not be applied as such, therefore tailored methods had to be developed. These methods and their applications are discussed. 相似文献
7.
The complexity of group dynamics occurring in small group interactions often hinders the performance of teams. The availability
of rich multimodal information about what is going on during the meeting makes it possible to explore the possibility of providing
support to dysfunctional teams from facilitation to training sessions addressing both the individuals and the group as a whole.
A necessary step in this direction is that of capturing and understanding group dynamics. In this paper, we discuss a particular
scenario, in which meeting participants receive multimedia feedback on their relational behaviour, as a first step towards
increasing self-awareness. We describe the background and the motivation for a coding scheme for annotating meeting recordings
partially inspired by the Bales’ Interaction Process Analysis. This coding scheme was aimed at identifying suitable observable
behavioural sequences. The study is complemented with an experimental investigation on the acceptability of such a service.
相似文献
8.
Listening to music on personal, digital devices whilst mobile is an enjoyable, everyday activity. We explore a scheme for
exploiting this practice to immerse listeners in navigation cues. Our prototype, ONTRACK, continuously adapts audio, modifying
the spatial balance and volume to lead listeners to their target destination. First we report on an initial lab-based evaluation
that demonstrated the approach’s efficacy: users were able to complete tasks within a reasonable time and their subjective
feedback was positive. Encouraged by these results we constructed a handheld prototype. Here, we discuss this implementation
and the results of field-trials. These indicate that even with a low-fidelity realisation of the concept, users can quite
effectively navigate complicated routes.
相似文献
9.
This work investigates the modeling of aggregate available bandwidth in multi-sender network applications. Unlike the well-established
client–server model, where there is only one server sending the requested data, the available bandwidth of multiple senders
when combined together does exhibit consistent properties and thus can be modeled and estimated. Through extensive experiments
conducted in the Internet this work proposed to model the aggregate available bandwidth using a normal distribution and then
illustrates its application through a hybrid download-streaming algorithm and a playback-adaptive streaming algorithm for
video delivery under different bandwidth availability scenarios. This new multi-source bandwidth model opens a new way to
provide probabilistic performance guarantee in best-effort networks such as the Internet, and is particularly suitable for
the emerging peer-to-peer applications, where having multiple sources is the norm rather than the exception.
相似文献
10.
Awareness systems have attracted significant research interest for their potential to support interpersonal relationships.
Investigations of awareness systems for the domestic environment have suggested that such systems can help individuals stay
in touch with dear friends or family and provide affective benefits to their users. Our research provides empirical evidence
to refine and substantiate such suggestions. We report our experience with designing and evaluating the ASTRA awareness system,
for connecting households and mobile family members. We introduce the concept of connectedness and its measurement through
the Affective Benefits and Costs of communication questionnaire (ABC-Q). We inform results that testify the benefits of sharing
experiences at the moment they happen without interrupting potential receivers. Finally, we document the role that lightweight,
picture-based communication can play in the range of communication media available.
相似文献
11.
We present a study of using camera-phones and visual-tags to access mobile services. Firstly, a user-experience study is described in which participants were both observed learning to interact with a prototype mobile service and interviewed
about their experiences. Secondly, a pointing-device task is presented in which quantitative data was gathered regarding the speed and accuracy with which participants aimed and clicked
on visual-tags using camera-phones. We found that participants’ attitudes to visual-tag-based applications were broadly positive,
although they had several important reservations about camera-phone technology more generally. Data from our pointing-device
task demonstrated that novice users were able to aim and click on visual-tags quickly (well under 3 s per pointing-device
trial on average) and accurately (almost all meeting our defined speed/accuracy tradeoff of 6% error-rate). Based on our findings,
design lessons for camera-phone and visual-tag applications are presented.
相似文献
12.
The paper reflects on the unique experience of social and technological development in Lithuania since the regaining of independence
as a newly reshaped society constructing a distinctive competitive IST-based model at global level. This has presented Lithuanian
pattern of how to integrate different experiences and relations between generations in implementing complex information society
approaches. The resulting programme in general is linked to the Lisbon objectives of the European Union. The experience of
transitional countries in Europe, each different but facing some common problems, may be useful to developing countries in
Africa.
相似文献
13.
This paper proposes an appearance generative mixture model based on key frames for meanshift tracking. Meanshift tracking
algorithm tracks an object by maximizing the similarity between the histogram in tracking window and a static histogram acquired
at the beginning of tracking. The tracking therefore could fail if the appearance of the object varies substantially. In this
paper, we assume the key appearances of the object can be acquired before tracking and the manifold of the object appearance
can be approximated by piece-wise linear combination of these key appearances in histogram space. The generative process is
described by a Bayesian graphical model. An Online EM algorithm is proposed to estimate the model parameters from the observed
histogram in the tracking window and to update the appearance histogram. We applied this approach to track human head motion
and to infer the head pose simultaneously in videos. Experiments verify that our online histogram generative model constrained
by key appearance histograms alleviates the drifting problem often encountered in tracking with online updating, that the
enhanced meanshift algorithm is capable of tracking object of varying appearances more robustly and accurately, and that our
tracking algorithm can infer additional information such as the object poses.
Electronic supplementary material The online version of this article (doi:) contains supplementary material, which is available to authorized users.
相似文献
14.
In this paper, we study the algorithm design aspects of three newly developed spin-wave architectures. The architectures are
capable of simultaneously transmitting multiple signals using different frequencies, and allow for concurrent read/write operations.
Using such features, we show a number of parallel and fault-tolerant routing schemes and introduce a set of generic parallel
processing techniques that can be used for design of fast algorithms on these spin-wave architectures. We also present a set
of application examples to illustrate the operation of the proposed generic parallel techniques.
相似文献
15.
In this paper, we address some problems related to server placement in Grid environments. Given a hierarchical network with
requests from clients and constraints on server capability, the minimum server placement problem attempts to place the minimum
number of servers that satisfy requests from clients. Instead of using a heuristic approach, we propose an optimal algorithm
based on dynamic programming to solve the problem. We also consider the balanced server placement problem, which tries to
place a given number of servers appropriately so that their workloads are as balanced as possible. We prove that an optimal
server placement can be achieved by combining the above algorithm with a binary search on workloads. This approach can be
further extended to deal with constrains on network capability. The simulation results clearly show the improvement in the
number of servers and the maximum workload. Furthermore, as the maximum workload is reduced, the waiting time is reduced accordingly.
相似文献
16.
There are only a few ethical regulations that deal explicitly with robots, in contrast to a vast number of regulations, which
may be applied. We will focus on ethical issues with regard to “responsibility and autonomous robots”, “machines as a replacement
for humans”, and “tele-presence”. Furthermore we will examine examples from special fields of application (medicine and healthcare,
armed forces, and entertainment). We do not claim to present a complete list of ethical issue nor of regulations in the field
of robotics, but we will demonstrate that there are legal challenges with regard to these issues.
相似文献
17.
Research on hybrid bionic systems (HBSs) is still in its infancy but promising results have already been achieved in laboratories.
Experiments on humans and animals show that artificial devices can be controlled by neural signals. These results suggest
that HBS technologies can be employed to restore sensorimotor functionalities in disabled and elderly people. At the same
time, HBS research raises ethical concerns related to possible exogenous and endogenous limitations to human autonomy and
freedom. The analysis of these concerns requires reflecting on the availability of scientific models accounting for key aspects
of sensorimotor coordination and plastic adaptation mechanisms in the brain.
相似文献
18.
Ohne Zusammenfassung
相似文献
19.
The Stanford Event Heap has been shown to provide appropriate support for constructing interactive workspace applications.
Given this success it is natural to consider the Event Heap as a platform to support other classes of Ubiquitous Computing
applications. In this paper we argue that the distributed, spontaneous nature of these applications places additional demands
on the Event Heap that require extensions to both the engineering and API. Suitable extensions are described and their use
to support a typical Ubicomp application is discussed.
相似文献
20.
The European Union co-funded COMUNICAR (communication multimedia unit inside car) project designed and developed an integrated multimedia human–machine interface (HMI) able to manage a wide variety of driver information systems (from entertainment to safety). COMUNICAR proposed an innovative information provision paradigm, in which the on-vehicle HMI is able to tailor the delivery of the information in real time according to the actual driving context and the drivers workload. COMUNICAR adopted a user-centred design process involving an iterative development based on extensive user tests since the early phases of the project. This approach was particularly useful to define and improve the layout of the user interface and specify the rules that decide the scheduling and the modalities of the delivery of the information messages to the driver. This paper introduces the COMUNICAR concept and the user-centred flow of design. Then, a concrete case of user-test driven, iterative improvement of a systems functionality is presented. We also briefly describe two software tools that we have designed to enhance the development process in a user-centred perspective. Finally, the future evolution of the concept of smart and safe information scheduling is sketched and discussed. 相似文献
|