8-9 Sept. 2010
Filter Results
-
Verification of Java programs in Coq
Publication Year: 2010, Page(s):1 - 8This paper is a research on functional interpretation of object-oriented programs in the intensional type theory with dependent record types and coercive subtyping. We are here simulating a type-theoretic model of Java programs in Coq. Representing a class and its interface-type, which declares a set of methods and their signatures for code reuse, as dependent record types, the type-theoretic enco... View full abstract»
-
UML based hierarchical state diagram approach for protocol designs
Publication Year: 2010, Page(s):1 - 6The increasing complexity in the design of protocol based sequential digital systems such as USB3.0 and PCI express (PCIe), is leading to an increased time to market constraint. This paper introduces a UML based visual design approach to address this increased complexity in the design of IP as well as System-on-Chips (SoC). A hardware development method for USB3.0 device using the Unified Modeling... View full abstract»
-
Reducing search space traversal in 3D scene reconstruction
Publication Year: 2010, Page(s):1 - 6Three-dimensional scene recovery from two-dimensional image data is a challenging task. Typical methods compute two-dimensional image feature correspondences between image frames. However, these methods introduce errors as three-dimensional warping of image elements is not considered. Further, no previous method presented exploits the strong correlation between three-dimensional scene elements in ... View full abstract»
-
A novel approach for studying the high-frequency FOREX market
Publication Year: 2010, Page(s):1 - 6The Foreign Exchange (FOREX) market is the largest and most complex financial market in the world. With the advent of behavioural and micro-structural studies, many properties of the market have been revealed. However, previous studies contain only aggregate transaction data that do not distinguish between the activities of the different participants, formulating the market collective behavior. Un... View full abstract»
-
Optimised clustering method for reducing challenges of network forensics
Publication Year: 2010, Page(s):1 - 6
Cited by: Papers (1)Network forensics are challenging because of numerous quantities of low level alerts that are generated by network intrusion detectors generate to achieve high detection rates. However, clustering analyses are insufficient to establish overall patterns, sequential dependencies and precise classifications of attacks embedded in of low level alerts. This is because there are several ways to cluster ... View full abstract»
-
Determination of the surface reflectance properties of timber using photometric stereo technique
Publication Year: 2010, Page(s):1 - 5In-process surface inspection during wood machining has attracted great interest in recent years due to the growing desire to minimise wastage and the increasing demand for higher quality wooden products. In order to take advantage of the developments in machine vision technologies for surface quality inspection, it is necessary to investigate the reflectance properties of wood so that standard ma... View full abstract»
-
Concurrent statechart slicing
Publication Year: 2010, Page(s):1 - 7
Cited by: Papers (4)The paper describes a system for slicing concurrent statecharts. Slicing seeks to remove those parts of a statechart that are not relevant for a given criteria. The technique can be applied to support model-based analysis, testing, debugging and maintenance of embedded systems and reactive systems. An And-Or dependence graph is used to represent the control and data dependencies of statecharts. Th... View full abstract»
-
Curvelet transform based super-resolution using sub-pixel image registration
Publication Year: 2010, Page(s):1 - 6
Cited by: Papers (2)Super-Resolution (SR) is an approach used to restore High-Resolution (HR) image from one or more Low-Resolution (LR) images. The quality of reconstructed SR image obtained from a set of LR images depends upon the registration accuracy of LR images. However, the HR images can be reconstructed accurately by estimating sub-pixel displacement of image grid of the shifted LR image. In this paper an app... View full abstract»
-
Guessing strategy for improving intrusion detections
Publication Year: 2010, Page(s):1 - 6
Cited by: Papers (2)Intrusion detectors isolate intrusions based on allowable and disallowable activities. The disallowable policy enforcers will alert only on events that are known to be bad while the allowable policy enforcer will alert on events that deviate from those that have been classified as good. However, these trade-offs become difficult to balance in a recent time due to the complexity of computer attacks... View full abstract»
-
A hybrid virtual bass system for optimized steady-state and transient performance
Publication Year: 2010, Page(s):1 - 6
Cited by: Papers (8)Bandwidth extension of a constrained loudspeaker system is regularly achieved employing nonlinear bass synthesis. The method operates on the doctrine of the missing fundamental whereby humans infer the presence of a fundamental tone when presented with a signal consisting of higher harmonics of said tone. Nonlinear devices and phase vocoders are commonly used for signal generation; both exhibiting... View full abstract»
-
Evaluating UPnP service discovery protocols by using NS2 simulator
Publication Year: 2010, Page(s):1 - 5
Cited by: Papers (2)Examining a protocol is necessary in order to identify its advantages and disadvantages precisely. Here we apply UPnP technology on an Ethernet network to evaluate its performance and identify its positive and negative sides. As it is known that UPnP can be run on many media that support IP such as Ethernet, Bluetooth and Wi-Fi. This paper produces an evaluation of UPnP service discovery protocol ... View full abstract»
-
A framework for collaborative, adaptive and cost sensitive intrusion response system
Publication Year: 2010, Page(s):1 - 4In recent years, the security issues on computer networks have become one of the primary concerns because the pervasiveness of computer technology has rendered computer networks to be more vulnerable to attacks than ever before. It is necessary to take corrective actions in the process of detecting surreptitious attacks to ensure proper safety of the entire system. However, effective post-intrusiv... View full abstract»
-
Universal intelligent data compression systems: A review
Publication Year: 2010, Page(s):1 - 10
Cited by: Papers (3) | Patents (1)Researchers have classically addressed the problem of universal compression using two approaches. The first approach has been to develop adaptive compression algorithms, where the system changes its behaviour during the compression to fit the encoding situation of the given data. The second approach has been to use the composition of multiple compression algorithms. Recently, however, a third appr... View full abstract»
-
Impact of intra-refresh provision on a data-partitioned wireless broadband video streaming scheme
Publication Year: 2010, Page(s):1 - 6Intra-refresh macroblocks are normally provided in mobile broadband wireless access to avoid the effect of temporal error propagation. The questions then arise are: in what form should the refresh take place; and what percentage of refresh is necessary. This paper is a study of intra-refresh provision in the context of a robust video streaming scheme. The scheme combines data-partitioned video com... View full abstract»
-
A GRASP-based approach for the Pure Parsimony Haplotype Inference problem
Publication Year: 2010, Page(s):1 - 5The availability and study of haplotype data is of considerable interest to a wide range of areas including general health care, personalized medicine, and pharmacogenetics. The inner workings of contemporary sequencing techniques however imply that genotype data is generated from a chromosome rather than haplotype data. The reconstruction of the latter from this kind of data lies at the heart of ... View full abstract»
-
[Front matter]
Publication Year: 2010, Page(s):1 - 3|
PDF (69 KB)
-
Sub-nyquist audio fingerprinting for music recognition
Publication Year: 2010, Page(s):1 - 5In recent years, Compressive Sampling (CS), a new research topic in signal processing, has piqued interest of a wide range of researchers in different fields. In this paper, we present a sub-Nyquist Audio Fingerprinting (AF) system for music recognition, which utilizes CS theory to generate a compact audio fingerpint, and to achieve significant reduction of the dimensionality of the input signal. ... View full abstract»