![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
107 Result(s)
-
Chapter and Conference Paper
An Integrated Hierarchical Gaussian Mixture Model to Estimate Vigilance Level Based on EEG Recordings
Effective vigilance level estimation can be used to prevent disastrous accident occurred frequently in high-risk tasks. Brain Computer Interface(BCI) based on ElectroEncephalo-Graph(EEG) is a relatively reliab...
-
Chapter and Conference Paper
Heuristic Evolutionary Approach for Weighted Circles Layout
In order to improve lack of GA, we combined it with case-based reasoning(CBR) and constructing non-isomorphic layout pattern (NILP) to solve layout problem in this paper. Its basic idea includes 2 components: ...
-
Chapter and Conference Paper
Automated Detection of Major Thoracic Structures with a Novel Online Learning Method
This paper presents a novel on-line learning method for automatically detecting anatomic structures in medical images. Conventional off-line learning requires collecting all representative samples before the c...
-
Chapter and Conference Paper
A Heuristic Data-Sanitization Approach Based on TF-IDF
Data mining technology can help extract useful knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. In this paper, ...
-
Chapter and Conference Paper
Anonymizing Shortest Paths on Social Network Graphs
Social networking is gaining enormous popularity in the past few years. However, the popularity may also bring unexpected consequences for users regarding safety and privacy concerns. To prevent privacy being ...
-
Article
Physical Implementation of the Eight-Core Godson-3B Microprocessor
The Godson-3B processor is a powerful processor designed for high performance servers including Dawning Servers. It offers significantly improved performance over previous Godson-3 series CPUs by incorporating...
-
Article
Partitioning the Conventional DBT System for Multiprocessors
Noticeable performance improvement via ever-increasing transistors is gradually trapped into a predicament since software cannot logically and efficiently utilize hardware resource, such as multi-core resource...
-
Article
Risk-neutral evaluation of information security investment on data centers
Based on given data center network topology and risk-neutral management, this work proposes a simple but efficient probability-based model to calculate the probability of insecurity of each protected resource ...
-
Article
Mining Effective Temporal Specifications from Heterogeneous API Data
Temporal specifications for Application Programming Interfaces (APIs) serve as an important basis for many defect detection tools. As these specifications are often not well documented, various approaches have...
-
Chapter and Conference Paper
A Smart-Phone-Based Health Management System Using a Wearable Ring-Type Pulse Sensor
In this paper, a mobile e-health-management system is presented which extends authors’ previous works on mobile physiological signal monitoring. This system integrates a wearable ring-type pulse monitoring sen...
-
Chapter and Conference Paper
Discussion on Digital Storytelling in Comprehensive Practice Courses Application
The increasing development of computer and information technology has brought new challenges as well as opportunities to education. As a way of personal multimedia storytelling, digital storytelling is very po...
-
Chapter and Conference Paper
The Research of Serially Concatenated FQPSK Demodulation Based on LDPC Codes
As a kind of modulation with high degree of both power and bandwidth efficiency, Filtered QPSK (FQPSK) has been widely applied in the satellite and deep space communication. This paper first investigates the M...
-
Article
Satisfiability with Index Dependency
We study the Boolean satisfiability problem (SAT) restricted on input formulas for which there are linear arithmetic constraints imposed on the indices of variables occurring in the same clause. This can be se...
-
Chapter and Conference Paper
Edge Selection for Degree Anonymization on K Shortest Paths
Privacy preserving network publishing has been studied extensively in recent years. Although more works have adopted un-weighted graphs to model network relationships, weighted graph modeling can provide deepe...
-
Chapter and Conference Paper
K-Neighborhood Shortest Path Privacy in the Cloud
Preserving privacy on various forms of published data has been studied extensively in recent years. In particular, shortest distance computing in the cloud, while maintaining neighborhood privacy, attracts lat...
-
Chapter and Conference Paper
SMBSRP: A Search Mechanism Based on Interest Similarity, Query Relevance and Distance Prediction
In the study of unstructured peer-to-peer networks, due to the lack of network structure, efficient search for resource discovery remains a fundamental challenge. With a combination of the Vector Space Model, ...
-
Chapter and Conference Paper
Information Technology Education Based on Cloud Computing
Cloud computing era has brought new development ideas for the education information of our country. This paper has summarized and analyzed the definition and computing features of cloud computing combined with...
-
Chapter
Emergence of Specialization in a Swarm of Robots
We investigate the emergence of specialized groups in a swarm of robots, using a simplified version of the stick-pulling problem [5], where the basic task requires the collaboration of two robots in asymmetric...
-
Article
Efficient Time Synchronization Approach for Wireless Communication Systems on GPP-Based Software-Defined Radio Platform
General purpose processer (GPP) based software-defined radio (SDR) platforms provide wireless communication system engineers with maximal architecture flexibility and versatility to construct a wideband wirele...
-
Article
Using TF-IDF to hide sensitive itemsets
Data mining technology helps extract usable knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. Some sensitive or ...