![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
The Limits of Horn Logic Programs
It becomes more and more important to discover knowledge in massive information. The knowledge can be taken as a theory. As the information increases, the theories should be updated. Thus we get a sequence of ...
-
Chapter and Conference Paper
When to Update the Sequential Patterns of Stream Data?
In this paper, we first define a difference measure between the old and new sequential patterns of stream data, which is proved to be a distance. Then we propose an experimental method, called TPD (Tradeoff be...
-
Chapter and Conference Paper
Implementation and Evaluation of a Novel Parallel SAR Imaging Method on Clustering Systems
Tremendous computational throughput and real time constrains make sequential computing unable to satisfy requirements of applications. Therefore, attentions are paid to parallel SAR imaging, which can efficien...
-
Chapter and Conference Paper
Using Ambient in Computational Reflection Semantics Description
With the development of wide-area network, distribution and mobility have become the main character of computation. Similarly, reflection systems are mostly like to implement under this environments, as a resu...
-
Chapter and Conference Paper
Analytical Solution for Dynamic of Neuronal Populations
The population density approach is a viable method to describe the large populations of neurons and has generated considerable interest recently. The evolution in time of the population density is determined b...
-
Chapter and Conference Paper
A Layered Semantics for Mobile Computation
Since mobile computation involves variants information and different behaviors, it is very complicated in mobile computation systems. In order to analysis mobile computation and understand the essential of mob...
-
Chapter and Conference Paper
Block-Level Storage Security Architectures
With the unprecedented growth of storage systems in all of today’s society, threats on stored sensitive information have become the critical issues that need to be addressed. Further, compared to the transient...
-
Chapter and Conference Paper
Moving Target Detection and Labeling in Video Sequence Based on Spatial-Temporal Information Fusion
A novel method of moving target detection based on spatial-temporal information fusion was proposed. It combines the temporal properties within multiple frames and the spatial information in single frame of a ...
-
Chapter and Conference Paper
Pattern Recognition for Brain-Computer Interfaces by Combining Support Vector Machine with Adaptive Genetic Algorithm
Aiming at the recognition problem of EEG signals in brain-computer interfaces (BCIs), we present a pattern recognition method. The method combines an adaptive genetic algorithm (GA) with the support vector mac...
-
Chapter and Conference Paper
Parametric Time-frequency Modeling of Nonstationary Signals by Adaptive Decomposition Based on Time-shearing Gabor Atoms
A kind of localized four parameters Gabor atom (dialating, time-shearing, modulating and translating of Gaussian function) was derived. Based on it, a parametric adaptive time-frequency distribution (PAD) is p...
-
Chapter and Conference Paper
Optimization Algorithm for Scalar Multiplication in the Elliptic Curve Cryptography over Prime Field
Elliptic curve cryptography (ECC) is a major public-key cryptosystem standard in data security systems due to its high strength of security. But its application was limited because of the constraint of its spe...
-
Chapter and Conference Paper
Discovering Compatible Top-K Theme Patterns from Text Based on Users’ Preferences
Discovering a representative set of theme patterns from a large amount of text for interpreting their meaning has always been concerned by researches of both data mining and information retrieval. Recent studi...
-
Chapter and Conference Paper
Mining Compressed Repetitive Gapped Sequential Patterns Efficiently
Mining frequent sequential patterns from sequence databases has been a central research topic in data mining and various efficient mining sequential patterns algorithms have been proposed and studied. Recently...
-
Chapter and Conference Paper
A 3D-Shape Reconstruction Method Based on Coded Structured Light and Projected Ray Intersecting Location
This paper proposes a 3D-shape reconstruction method based on coded structured light. Projecting color pseudo-random coded pattern on surface of object and using the thought of ray intersecting location, 3D sh...
-
Chapter and Conference Paper
A Feature Points Matching Method Based on Window Unique Property of Pseudo-Random Coded Image
Proposed a method for object feature points matching used in active machine vision technique. By projecting pseudo-random coded structured light onto the object to add code information, its feature points can ...
-
Chapter and Conference Paper
Optimal Tracking Performance for Unstable Processes with NMP Zeroes
This paper has investigated optimal tracking performance for unstable processes with non-minimum phase (NMP) under control energy constraint. Firstly, based on prime factorization of unstable process, a perfor...
-
Chapter and Conference Paper
Framework Designing of BOA for the Development of Enterprise Management Information System
This paper put forward the definition of business oriented architecture (BOA) for the development of enterprise management information system and its technical components, as well as the designing method of re...
-
Chapter and Conference Paper
Binocular Structured Light Stereo Matching Approach for Dense Facial Disparity Map
Binocular stereo vision technology shows a particular interesting for face recognition, in which the accurate stereo matching is the key issue for obtaining dense disparity map used for exploiting 3D shape inf...
-
Chapter and Conference Paper
An Improved DES Anti-DPA Algorithm and Its Automatic Simulation System
Based on the analysis of DES cryptographic algorithms and anti-attack strategy, this paper proposes an advanced DES anti-DPA attack algorithm by further improving the Mask method in the power consumption point...
-
Chapter and Conference Paper
An Adaptive Slope Compensation Circuit and Its Application
To solve the over-compensation problem in the current mode PWM switch power, a new adaptive slope compensation circuit is proposed in this paper. In the circuit, the difference between the output and input vol...