The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Depth-based 3D formats for state of the art High Efficiency Video Coding standard facilitate the synthesis of virtual views with a brief binary representation. Depth maps coding error results in synthesis artefacts for virtual views rendered during Depth Image Based Rendering (DIBR) process. Based on depth maps distortion, synthesized view distortion estimation models are integrated in 3D-High Efficiency...
This paper compares widely employed simulation modeling approaches: System Dynamics (SD) and Discrete Event Simulation (DES). SD and DES follow two quite different modeling philosophies and can bring very different but complimentary insights in understanding to the same ‘real world’ problem. An exploratory study is undertaken to investigate the ability of new practitioners to assimilate and then put...
Through three Internet software company 40 people were Behavioral Event Interview (BEI), the establishment of a discriminative Competency Model Java software engineers that companies need innovation and strong emphasis on interpersonal communication, customer service-oriented software developer, interpersonal communication, customer service orientation and innovation will become the core of Internet...
As the software industry develops rapidly, protecting software intellectual property from reverse attacker has become more and more important. The technical way is to make software hard to understand and will cost attackers more time and energy to crack the software than they can take. Self-modifying code is a code changing mechanism based on stored program architecture and has been widely used in...
A cyclic redundancy check (CRC) is an error-detecting code commonly used in data communication and storage devices to detect accidental changes to raw data. This paper provides an overview and principle of CRC. Emphasis is placed on the implementation of the CRC algorithm by method of hardware as well as software. It is proved that the implementation method present has high practical value.
In this paper, we present a series of methods to improve testing efficiency especially for regression testing from a novel view, namely dynamic analysis of test cases suitable for class testing in object-oriented systems. We mine static call graphs and dynamic call trees to represent the static features and dynamic tests of the program. By graph analysis, we present a series of methods and testing...
Image super-resolution based on sparse model with patch clustering and nonlocal similarity provides promising performance. However, the traditional one dimensional (1D) sparse model enforces a 1D dictionary for every cluster of patches to capture complex structures and different features in images. The total dictionary will take expensive memory, which can be alleviated at cost of representation power...
Existing specification-based testing techniques require specifications that either do not exist or are too difficult to create. As a result, they often fall short of their goal of helping developers test expected behaviors. In this paper we present a novel, natural language-based approach that exploits the descriptive nature of test names to generate test templates. Similar to how modern IDEs simplify...
Tests are increasingly specified as programs. Expressing tests as code is advantageous in that developers are comfortable writing and running code, and tests can be automated and reused as the software evolves. Tests expressed as code, however, can also contain faults. Some test faults are similar to those found in application code, while others are more subtle, caused by incorrect implementation...
This paper describes a content analysis study that analyzed the subject matter of computing ethics. The purpose of the study was to begin the process of providing a coherent concept of the subject matter of computing ethics. The snapshot presented is based on article titles from four prominent journals with a computing ethics scope. This paper discusses subject matter themes that emerged from the...
It is difficult to consider that the computers and its devices can play a vital role in environment pollution. There is also a myth that these devices use less energy. According to a survey $ 250 billion per year spent on powering computers worldwide only about 50% of that power is spent computing — the rest is wasted idling [1]. In this paper, we have proposed energy efficient software development...
We often see block-based coding environments as toy environments that let novice programmers have fun as they learn the basics of programming. While these environments do have an engaging low floor, they are missing out on other aspects of introductory programming that could further engage students and better replicate the real work of software developers. In this paper, I describe real world non-coding...
This paper focuses on the local variable names and comments that are major artifacts reflecting the programmer's preference. It conducts an empirical analysis on the usefulness of those artifacts in assessing the software quality from the perspective of change-proneness in Java methods developed in six popular open source software products. The empirical results show: (1) a method having a longer...
Engineering design is a complex activity for students to undertake and for instructors to assess. This research uses large learner data sets collected through automatic, unobtrusive logging of student actions in a CAD platform to address this difficulty in observing design behavior. We used a computer-aided design software that captured student design activities to investigate patterns of student...
In HEVC coding standard, the encoder employs a quad-tree-based Coding Unit (CU) structure to adapt to various texture characteristics of images. Although it provides better compression performance, the computation load increases drastically. In this paper, a two-stage fast CU size decision method is proposed for HEVC intra coding. In the first stage, we utilize the combination of the weighted variance...
This paper examines network-centric warfare (NCW) penetration within the U.S. Army. NCW was intended to be an emerging theory of war for the information age. It was supposed to provide a conceptual framework that would prevent new technology enabled approaches to warfare from being constrained by outmoded ideas. A thematic analysis of the literature was performed using NVivo 10, a computer assisted...
The purpose of this study is to verify our live video transmission specifications in a real environment. We implemented a high-definition video transmitter that adjusts the video encoding rate according to the physical link status using a cross-layer rate control scheme. The transmitter will be used as reference equipment to practically evaluate the many simulated algorithms, because rate-control...
SATD (Sum of Absolute Transformed Difference) based cost function is adopted to reduce the complexity of HEVC (High Efficiency video coding) codec by selecting up to 8 intra modes for RDO (Rate Distortion Optimization) process. However, transform of all 35 modes, and RDO of 8 modes is bottleneck in intra mode complexity reduction. In this paper, a hybrid approach for reducing intra coding complexity...
In the present paper, we compare low and high mathability level spreadsheet tools. Firstly, we provide proof that the widely accepted and practiced surface approaches are responsible for error-prone spreadsheet documents. In addition to this, we introduce Sprego, and demonstrate that it is a high mathability level method. We provide examples of how spreadsheets are programmable with Sprego, how the...
In the intra coding of HEVC/H.265, the computational complexity of intra mode decision is very high because up to 35 intra prediction modes are supported. Though a fast intra mode decision based on rough mode decision (RMD) is adopted in reference software HM12.0, only a fixed number of intra modes are selected for rate distortion optimization (RDO). In this paper, an adaptive fast intra mode decision...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.