The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
FMI (Functional Mockup Interface) is a standard for exchanging and co-simulating model components (called FMUs) coming from potentially different modeling formalisms, languages, and tools. Previous work has proposed a formal model for the co-simulation part of the FMI standard, and also presented two co-simulation algorithms which can be proven to have desirable properties, such as determinacy, provided...
Cloud users store millions of files on the cloud every day. Often times the files are simply replicated so that if one is lost a mirror can be fetched when required. Simple replication of data files is easier however it is more costly since more storage is required. Alternatively, cloud datacenters use coding techniques that code a file into parts; each of which can be stored at a different location...
Evaluation is important to assess the performance of a computer system in fulfilling a certain user need. In the context of recommendation, researchers usually evaluate the performance of a recommender system by holding out a random subset of observed ratings and calculating the accuracy of the system in reproducing such ratings. This evaluation strategy, however, does not consider the fact that in...
Error-correcting codes are a critical need for modern flash memories. Such codes are typically designed under the assumption that the voltage threshold distributions in flash cells are Gaussian. This assumption, however, is not realistic. This is particularly the case late in the lifetime of flash devices. A recent work by Parnell et al. provides a parameterized model of MLC (2-bit cell) flash which...
In the nervous system, sensory neurons encode signals as a sequence of action potentials (spikes). However, spike generation is metabolically expensive. Achieving high coding fidelity may require a high spike rate. Here we propose that neurons achieve a trade-off by optimally timing spikes so that maximum fidelity is achieved for a given spike rate. The proposed neural encoder generates spikes which...
With the development of earth observation technology, especially the rapid progress of LiDAR technology in recent years, the kinds and quantity of three-dimensional spatial information is increasing. How to effectively model and visualize the 3D spatial data has become a key issue for academic and applied science community. The global discrete voxel divides the earth into a series of different scale...
Proportional-integral-derivative (PID) controller is a vastly used control algorithm for many real-time control applications and among many types of PID controller, FPGA based PID controller is one of the effective one. This paper is based on design and implementation of a FPGA based system for a modified C-Type PID control system algorithm. The modified C-Type algorithm is used to attain a stable...
As an important computer graphics technique, parameter-driven animation has seen increasing deployment on mobile platforms, where both communication bandwidth and device storage are subjected to stringent constraints. We propose an efficient rate-distortion optimized inter-frame compression scheme for parameter-driven animation capable of finding optimal bit-allocations for any given bit-rate. Experiments...
Context: Effective assessment, comparison, selection and adaptation of software development processes remain an acute problem in Software Engineering practice. The quest for a unified theory which might serve this purpose is ongoing. Objective: To take a first step towards such a theory, with focus on characterising and comparing features of software development process models. Method: We consider...
With video services such as HTTP-based adaptive streaming, network congestion may result in quality fluctuations over several minutes. There is therefore a need for estimating the quality of long audiovisual sequences. This can be achieved by using short-term audiovisual quality models, which output quality scores for short periods of time, for instance 10 s. Temporal pooling such as averaging is...
The location information of interest points is an important cue for action recognition. In order to model the spatio-temporal distribution, we propose a novel position feature which is constructed by normalized pairwise relative positions of points. Promising performance has been achieved by Vector of Locally Aggregated Descriptors (VLAD) which gather the differences between descriptors and visual...
Three emerging applications are driving a renewed interest in vector point processes: neural coding, high frequency finance and genomics. This pressure has revealed a gross lack of models and system identification methods. In particular in at least the first two applications coincidences can occur i.e. more than one event can occur at the same time. Yet the models in common use exclude this possibility...
This paper proposes a rate control algorithm for lossless region of interest (RoI) coding in HEVC intra-coding. The algorithm is developed for digital pathology images and allows for random access to the data. Based on an input RoI mask, the algorithm first encodes the RoI losslessly. According to the bit rate spent on the RoI, it then encodes the background by using rate control in order to meet...
One fundamental type of query for graph databases is subgraph isomorphism queries (a.k.a subgraph queries). Due to the computational hardness of subgraph queries coupled with the cost of managing massive graph data, outsourcing the query computation to a third-party service provider has been an economical and scalable approach. However, confidentiality is known to be an important attribute of Quality...
This paper presents a joint source and channel rate allocation algorithm for video transmission over erasure channels. The approach relies on unequal error protection (UEP) of the video stream, in order to minimize the received signal distortion. It takes into account both the frames and the channel characteristics. The loss behavior is approximated by a two states Markov model. The algorithm is incorporated...
In distributed storage networks, ensuring data availability in the presence of hardware faults is an important requirement. Typically, redundancy schemes such as replication and erasure coding are used to ensure this. In case of hardware failures, these networks may be disconnected into multiple components, each of which may require access to the data. In addition, the placement of redundant information...
This paper presents a novel algebraic framework of collaborative network channel coding scheme in a network with multiple-access relay channel. The proposed scheme helps reduce the computational complexity while enhancing energy efficiency of the wireless network. The devised scheme is intended for practical scenarios where channels exhibit various fading conditions over all the wireless links. We...
The ability to record and replay program execution helps significantly in debugging non-deterministic MPI applications by reproducing message-receive orders. However, the large amount of data that traditional record-and-reply techniques record precludes its practical applicability to massively parallel applications. In this paper, we propose a new compression algorithm, Clock Delta Compression (CDC),...
This study presents a rapid design method of productmodeling and structure condition selecting based on interactive genetic algorithm and 3D printing technology, which give a design pattern to satisfy the function needs. Aiming to products' shape and structure as the core, we used functional matrix to digitize and describe its demands as well as unify expressing the functional gene. Through 3D printing...
We describe a learning-based approach for verifying recursive functions. The Boolean formula learning algorithm CDNF is used to automatically infer function summaries for recursive functions. In contrast to traditional iterative fix point computation-based approaches, ours can quickly guess summaries and verify purported summaries. When purported summaries are incorrect, the learning algorithm refines...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.