The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a cognitive wireless network, the sudden arrival of a primary user (PU) can force one or more secondary users (SU) to terminate their ongoing communication. Buffers can be utilized to prevent them from dropping, but their effectiveness depends on the tolerance of the SUs to the buffer waiting time. In this paper, we propose to dynamically assign service rates to the SUs to complement the gain offered...
Existing mainstream indoor localization technologies mainly rely on RF signatures and thus incur significant and recurring labor cost to measure the time-varying signature map. We have proposed a smartphone localization system using the embedded gyroscope for triangulation from nearby physical features (e.g., store logos) recognized from photo-taking. It requires a much reduced and one-time measurement,...
The Internet has become a large platform where users can interact and share contents. In this context, content distribution systems (CDS) have been designed to satisfy users needs. Peer-to-Peer (P2P) systems have emerged as a prominent solution to speed up CDS. In this kind of distributed system, a particular interesting challenge refers to mechanisms employed to match user's interests and published...
Paper describes measurement of channel impulse response for instantaneous channel state information (CSI). Measurements were done in indoor environment (laboratory) at Department of Telecommunications and Multimedia, University of Zilina. Carrier frequency 2.4 GHz was used for each measurement. Environment between transmitter and receiver was changed through setting of receiving antenna to two main...
The metrics used for evaluating energy saving techniques for future HPC systems are critical to the correct assessment of proposed methods. Current predictions forecast that overcoming reduced system reliability, increased power requirements and energy consumption will be a major design challenge for future systems. Modern runtime energy-saving research efforts do not take into account the energy...
Research on image processing has shown that combining segmentation methods may lead to a solid approach to extract semantic information from different sort of images. Within this context, the Normalized Cut (NCut) is usually used as a final partitioning tool for graphs modeled in some chosen method. This work explores the Watershed Transform as a modeling tool, using different criteria of the hierarchical...
Contemporary search engines and other automated web tools are faced with the task of extracting relevant information from huge web archives. This is supposed to be a difficult task due to the semi-structured and unstructured nature of the web documents. Users need automated ways of organizing and cataloging the web documents so that they can be queried efficiently. Clustering is typically employed...
The task of obtaining the items highly-relevant to a given set of query items is a basis for various applications, such as recommendation and prediction. A family of path-based relevance metrics, which quantify item relevance based on the paths in a given item graph, have been shown to be effective in capturing the relevance in many applications. Despite their effectiveness, path-based relevance normally...
Many of today's applications can benefit from the discovery of the most central entities in real-world networks. This paper presents a new technique that efficiently finds the k most central entities in terms of closeness centrality. Instead of computing the centrality of each entity independently, our technique shares intermediate results between centrality computations. Since the cost of each centrality...
Advances in Adaptive Optics (AO) systems and image processing techniques have allowed image reconstruction to reach new levels of sophistication with impressive improvements in resolvability. The products of these reconstruction methods are often compared by eye due to a lack of widely agreed-upon objective performance metrics. This paper describes a new technique for assessing the performance of...
In this paper we present a novel approach for the estimation of metric velocities and metric distances to landmarks utilizing monocular images and inertial measurements only. The proposed algorithm is based on an Extended Kalman Filter and is closely related to the well known Simultaneous Localization and Mapping (SLAM). In contrast to standard SLAM formulations the state of an agent is expressed...
Mutation analysis is a stringent and powerful technique for evaluating the ability of a test suite to find faults. It generates a large number of mutants and applies the test suite to them one at a time. As mutation analysis is computationally expensive, it is usually performed on a subset of mutants. The competent programmer hypothesis suggests that experienced software developers are more likely...
For estimating software, system size is the main parameter of the system development effort. It affects substantially on accurate estimation of effort of development. The Predictive Object Point (POPs) input gives an estimate of the size of the software for which the estimation is required. POPs are a metric suitable for estimating the size of object oriented software, based on the behaviors that...
The dramatic increase of heterogeneous data resources, whether they are semantic knowledge bases or databases, demands for an automatic data integration technique, which is directly affected by the weight of property associated to instances or data. Choosing a suitable metric for generating weight for a property automatically is nevertheless a formidable task. In this study, we analyze different metrics...
Study shows that software developers spend about 19% of their time looking for information in the web during software development and maintenance. Traditional web search forces them to leave the working environment (e.g., IDE) and look for information in the web browser. It also does not consider the context of the problems that the developers search solutions for. The frequent switching between web...
Cloud computing systems rent resources on demand, pay-as-you-go basis, and multiplex many users on the same physical infrastructure. However the revenue of cloud computing is get affected by various factors such as QoS constraints, Energy consumption etc., Energy Aware Task Consolidation technique is used to allocate the tasks dynamically on virtual clusters which aims to minimize energy consumption...
This paper focuses on one of the earliest steps in System of Systems (SoS) design aiming to meaningfully determine stakeholders' values or preferences. It recommends the plural problem definition and dynamic construction of stakeholder's values in the front end of design process. It suggests a method based on the probability theory to embed flexibility and tolerance, and construct a basic framework...
Trace buffers are used during post-silicon debug to increase the visibility to the internal signals of a chip via online tracing of a few state elements within a capture window. Due to the small bandwidth of the trace buffer, only a few state elements can be selected or tracing in order to restore the states of the remaining state elements as many as possible. In this work, we show that the quality...
We propose to combine social trust derived from social networks with quality-of-service (QoS) trust derived from communication networks to obtain a composite trust metric as a basis for evaluating trust of mobile nodes in mobile ad hoc network (MANET) environments. We develop a novel model-based approach to identify the best protocol setting under which trust bias is minimized, that is, the peer-to-peer...
Safety applications in VANET use two types of messages (a)periodical messages/beacons: they are broadcast several times per second to exchange information with neighbors; and (b) warning (event driven) messages: they are generated when an event occurs (e.g., a car accident) and are disseminated in the network to notify nodes of interest. Although warning messages have higher priority, beacons are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.