![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A New Shot Boundary Detection Algorithm
Shot is often used as basic unit for both analyzing and indexing video. In this paper, we present an algorithm for automatic shot detection. In our algorithm, we use a ‘flash model’ and a ‘cut model’ to deal w...
-
Chapter and Conference Paper
GSPD: A Middleware That Supports Publication and Discovery of Grid Services
Grid applications are increasingly extending from scientific computing to commercial field, where the service discovery is a key and challenging issue. Unfortunately, it can not directly be supported by techno...
-
Chapter and Conference Paper
GridTP Services for Grid Transaction Processing
We propose a new service-oriented Grid Transaction Processing architecture called GridTP based on the OGSA platform and the X/Open DTP model. GridTP services provide a consistent and effective way of making ex...
-
Chapter and Conference Paper
Membrane Calculus: A Formal Method for Grid Transactions
The research of transaction processing in Web Services and Grid services is very active in academic and engineering areas now. However, the formal method about transactions is not fully investigated in the lit...
-
Chapter and Conference Paper
A Map Ontology Driven Approach to Natural Language Traffic Information Processing and Services
This paper proposes a map ontology driven approach to natural language traffic information processing, and also describes its evaluation results. Traffic congestion is considered a major urban problem whose so...
-
Chapter and Conference Paper
Ontology-Based Mobile Information Service Platform
This paper presents a Mobile Information Service Platform (MISP) based on multi-domain & multilingual ontology, which enables mobile users to obtain information by making natural language queries via short mes...
-
Chapter and Conference Paper
Time-Oriented Question Answering from Clinical Narratives Using Semantic-Web Techniques
The ability to answer temporal-oriented questions based on clinical narratives is essential to clinical research. The temporal dimension in medical data analysis enables clinical researches on many areas, such...
-
Chapter and Conference Paper
Synthesis and Characterization of Eco-friendly Composite: Poly(Ethylene Glycol)-Grafted Expanded Graphite/Polyaniline
In this paper, synthesis and characterization of poly(ethylene glycol)- grafted expanded graphite/polyaniline (PEG-grafted EG/PANi) as a novel ecofriendly composite material was reported. EG as substrate prepa...
-
Chapter and Conference Paper
Model of Fuzzy Comprehension Evaluation of Traffic Operations Safety on Urban Ice and Snow Road
In order to evaluate traffic operation safety of urban ice and snow road objectively, ice and snow pavement friction coefficient, visibility, following distance and snow-accumulated depth are chosen as evaluat...
-
Chapter and Conference Paper
Characteristics of Risky Merging Driving Behavior on Urban Expressway
According to statistical data, risky merging driving behavior has taken adverse impact on traffic safety, and it widely exists in the ramp connecting section of urban expressway. Risky merging driving behavior...
-
Chapter and Conference Paper
Automatic Fiberboard Density Testing Based on Application of Computed Tomography
Fiberboard has long been a significant practical material. Computed tomography (CT) shows great potential for nondestructive testing of the property and internal structure of fiberboard. In the paper, utilize ...
-
Chapter and Conference Paper
Digital Watermark of Static Image Based on Wavelet Transform
Usually a static image is transformed by discrete cosine transform (DCT), texture and edge features mainly concentrated in the high frequency sub-bands LH, HL, and HH. The information on the high-frequency los...
-
Chapter and Conference Paper
An Effective Face Verification Algorithm to Fuse Complete Features in Convolutional Neural Network
Face verification for on line application is a difficult problem and many researchers have tried to solve it by convolutional neural network. Among of them, most works used the last-hidden layer as the feature...
-
Chapter and Conference Paper
Face Search in Encrypted Domain
Visual information of images and videos usually is encrypted for the purposes of security applications. Straightforward manipulations on the encrypted data without requiring any decryption have the advantage o...