2009 IEEE-RIVF International Conference on Computing and Communication Technologies最新文献

筛选
英文 中文
Adaptive Modulation and SVC-Encoded Video IPTV Multicast over Mobile WiMAX 移动WiMAX上的自适应调制和svc编码视频IPTV组播
T. Cheng, Feng-Ming Yang, Jean-Lien C. Wu, I. Lin
{"title":"Adaptive Modulation and SVC-Encoded Video IPTV Multicast over Mobile WiMAX","authors":"T. Cheng, Feng-Ming Yang, Jean-Lien C. Wu, I. Lin","doi":"10.1109/RIVF.2009.5174617","DOIUrl":"https://doi.org/10.1109/RIVF.2009.5174617","url":null,"abstract":"Adaptive modulation and coding (AMC), which is a technology used when channel condition changes, is adapted in mobile Worldwide Interoperability for Microwave Access (WiMAX). Scalable video coding (SVC) is a video coding scheme used for different users with bandwidth level. SVC encodes a video into a number of layers. Users receive different number of encoded layers based on their channel condition. In this paper, both AMC and SVC are employed to enhance the user perceived video quality in the system. Intermediate Control Server (ICS) is proposed to deal with the signaling between multimedia server and BS.","PeriodicalId":243397,"journal":{"name":"2009 IEEE-RIVF International Conference on Computing and Communication Technologies","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127569811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Privacy Preserving EM-Based Clustering 保护隐私的基于em的聚类
T. Luong, T. Ho
{"title":"Privacy Preserving EM-Based Clustering","authors":"T. Luong, T. Ho","doi":"10.1109/RIVF.2009.5174654","DOIUrl":"https://doi.org/10.1109/RIVF.2009.5174654","url":null,"abstract":"The problem of privacy-preserving EM-based clustering was solved when the dataset is horizontally partitioned into more than two parts (i.g., more than two computation parties). The aim of this work is to develop a method for the more difficult problem when the dataset is horizontally partitioned into only two parts. The key question is how to compute and reveal only the covariance matrix at various steps of the EM iterative process to the participating parties. We propose a method consisting of several protocols that provide privacy preservation for the computation of covariance matrices and final results without revealing the private information and the means. We also extend the proposed method for a better solution to the problem of privacy preserving k-means clustering.","PeriodicalId":243397,"journal":{"name":"2009 IEEE-RIVF International Conference on Computing and Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130825420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Support Vector Machines Approach to Vietnamese Key Phrase Extraction 越南语关键短语提取的支持向量机方法
Chau Q. Nguyen, Luan T. Hong, T. Phan
{"title":"A Support Vector Machines Approach to Vietnamese Key Phrase Extraction","authors":"Chau Q. Nguyen, Luan T. Hong, T. Phan","doi":"10.1109/RIVF.2009.5174613","DOIUrl":"https://doi.org/10.1109/RIVF.2009.5174613","url":null,"abstract":"Automatic key phrase extraction is the task of automatically selecting a set of phrases that describe the content of a simple sentence. That a key phrase is extracted means that it is present verbatim in the sentence to which it is assigned. Accurate key phrase extraction is fundamental to the success of many recent digital library applications, clustering, and semantic information retrieval techniques. The present research discusses a support vector machines (SVMs) approach for Vietnamese key phrase extraction and presents a number of experiments in which performance is incrementally improved. In general, the Vietnamese key phrase extracting process consists of three steps: word segmentation for identifying lexical units in an input sentence, part-of-speech tagging for words, and key phrase extraction for phrases. The performance of Vietnamese key phras extraction systems is generally measured by the precision rate attained. This depends strongly on the nature and the size of a training set of key phrases. Most results are superior to 70.30% with a training set of 9,000 Vietnamese key phrases with of 2,000 sentences which was selected from the corpus of Vietnamese Lexicography Center (www.vietlex.com.vn). I. INTRODUCTION Key phrases, which can be single keywords or multiword key terms, are linguistic descriptors of documents. They are often sufficiently informative to help human readers get a feel for the essential topics and main contents included in the source documents. Key phrases have also been used as features in many text-related applications such as text clustering, document similarity analysis, and document summarization. Manually extracting key phrases from a number of documents is quite expensive. Automatic key phrase extraction is a maturing technology that can serve as an efficient and practical alternative. Key phrase extraction may be viewed as a classification problem. A document can be seen as a bag of phrases wherein each phrase belongs to one of the two possible classes: either it is a key phrase or it is a non-key phrase. We approach this problem from the perspective of machine learning research and treat it as a problem of supervised learning from examples. We divide our documents into two sets: training documents and testing documents. The training documents are used to tune the key phrase extraction algorithms, in order to attempt to maximize their performance. That is, the training documents are used to teach the supervised learning algorithms how to distinguish key phrases from non-key phrases. The testing documents are used to evaluate the tuned algorithms. The motivation for this work is to establish the range of applications for key phrases. There are at least five general application areas for key phrases: Text summarization, human- readable index, interactive query refinement, machine-readable index, and feature extraction as preprocessing for further machine analysis. SVMs is an extraordeinary phenomenon in machine","PeriodicalId":243397,"journal":{"name":"2009 IEEE-RIVF International Conference on Computing and Communication Technologies","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127632544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Distiributed Checkpointing Scheme for the Mobile Computing Environment 移动计算环境下一种新的分布式检查点方案
Sungchae Lim
{"title":"A New Distiributed Checkpointing Scheme for the Mobile Computing Environment","authors":"Sungchae Lim","doi":"10.1109/RIVF.2009.5174610","DOIUrl":"https://doi.org/10.1109/RIVF.2009.5174610","url":null,"abstract":"During the past decade, there were drastic advances in the technology of the mobile computing environment. Such technical improvements give birth to a demand for running sophisticated applications over multiple mobile devices. Since more than one process executes concurrently in this computing environment and they have to send application data to each other, any failure on a process or a network connection may result in serious problems. Against such failure on distributed applications, many algorithms are devised. In this paper we also devise a new distributed checkpointing scheme very suitable for the mobile distributed applications. For our checkpointing scheme, we propose two key ideas of a checkpoint-related software agent, called checkpointing agent (CA), and a flexible checkpointing protocol. The CA is used to make consistent global checkpoints on behalf of application processes. Since the CA's communicate with each other via wired fixed networks, we can reduce network overheads paid for delivering checkpoint-related data via wirelesses networks.","PeriodicalId":243397,"journal":{"name":"2009 IEEE-RIVF International Conference on Computing and Communication Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114142300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Type Theory to Formal Specification of Recursive Multiagent Systems 类型理论在递归多智能体系统形式化规范中的应用
Thi-Thanh-Ha Hoang, M. Occello, N. T. Binh
{"title":"Applying Type Theory to Formal Specification of Recursive Multiagent Systems","authors":"Thi-Thanh-Ha Hoang, M. Occello, N. T. Binh","doi":"10.1109/RIVF.2009.5174624","DOIUrl":"https://doi.org/10.1109/RIVF.2009.5174624","url":null,"abstract":"Nowadays software systems are more and more complex. Such systems are composed of many sub-systems, in which each sub-system exists and interacts with other subsystems. Since a few years, multiagent systems (MAS) propose well considered approaches for these kinds of systems. In this paper, we concentrate on recursive MAS which are well adapted to describe complex systems. Up to now, recursive MAS are only specified by informal languages. This paper proposes the use of type theory to specify recursive MAS. This work constitutes a first theoretical step in the elaboration of a generic software tool for reliable design of recursive MAS.","PeriodicalId":243397,"journal":{"name":"2009 IEEE-RIVF International Conference on Computing and Communication Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123732370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Robust Overlay Network with Self-Adaptive Topology: The Reliable File Storage Layer 具有自适应拓扑的鲁棒覆盖网络:可靠的文件存储层
L. Baud
{"title":"Robust Overlay Network with Self-Adaptive Topology: The Reliable File Storage Layer","authors":"L. Baud","doi":"10.1109/RIVF.2009.5174658","DOIUrl":"https://doi.org/10.1109/RIVF.2009.5174658","url":null,"abstract":"A reliable storage system is a system that ensures the protection of data from loss. Such systems are needed in many critical fields. We cannot imagine that a financial institution looses data about one its clients. Moreover the exponential growing volumes of the data and its availability are crucial issues. A centralized storage system would be overloaded and be a single point of failure. That is why overlay network may provide the solution as they can be used to implement a distributed storage system over an information system. ROSA is an overlay network that was designed to combine a high scalability while maintaining a strong connectivity. The reliability of its topology, designs ROSA as a good platform for deploying such a reliable storage system. Nevertheless ROSA is an unstructured overlay network, this will decrease the efficiency of the storage system. In this article we first propose a structure, called chain of lumps, built upon ROSA. This structure will provide the advantage of a structured network to ROSA. Once ROSA endowed with the structure, we propose a reliable storage system deployed over ROSA. Consequently this system will benefit of the reliability of ROSA.","PeriodicalId":243397,"journal":{"name":"2009 IEEE-RIVF International Conference on Computing and Communication Technologies","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116405411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Improvement of Vietnamese Tone Classification using FM and MFCC Features 利用FM和MFCC特征改进越南语声调分类
P. Le, E. Ambikairajah, E. Choi
{"title":"Improvement of Vietnamese Tone Classification using FM and MFCC Features","authors":"P. Le, E. Ambikairajah, E. Choi","doi":"10.1109/RIVF.2009.5174644","DOIUrl":"https://doi.org/10.1109/RIVF.2009.5174644","url":null,"abstract":"This paper focuses on tone classification for the Vietnamese speech. Traditionally, tone was classified or recognized by the fundamental frequency F0. However, our experimental results indicate that along with the fundamental frequency, Mel Frequency Cepstrum Coefficients and frequency modulation also carry a significant amount of tone information in the Vietnamese speech. Therefore, the proposed method takes into account these two types of features to improve the classification accuracy. The experimental results show that the proposed classification system provides an improvement of 7.5% in accuracy, compared to the conventional system based on F0 alone.","PeriodicalId":243397,"journal":{"name":"2009 IEEE-RIVF International Conference on Computing and Communication Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129566943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An Effective Clustering-based Approach for Conceptual Association Rules Mining 一种基于聚类的概念关联规则挖掘方法
T. Quan, Linh N. Ngo, S. Hui
{"title":"An Effective Clustering-based Approach for Conceptual Association Rules Mining","authors":"T. Quan, Linh N. Ngo, S. Hui","doi":"10.1109/RIVF.2009.5174619","DOIUrl":"https://doi.org/10.1109/RIVF.2009.5174619","url":null,"abstract":"Association rule mining is a well-known data mining task for discovering association rules between items in a dataset. It has been successfully applied to different domains especially for business applications. However, the mined rules rely heavily on human interpretation in order to infer their semantic meanings. In this paper, we mine a new kind of association rules, called conceptual association rules, which imply the relationships between concepts. Conceptual association rules can convey more semantic meanings than those classical association rules. Conceptual association rules can be mined using Formal Concept Analysis (FCA). However, the FCA-based method for conceptual rule mining suffers from high computational cost when dealing with large datasets. To tackle this problem, we propose a cluster-based approach to mine conceptual association rules regionally, rather than globally. A distance metric is also proposed to ensure that the same rule sets will ultimately be obtained when the dataset is clustered. In this paper, we present the proposed clustering-based approach. In addition, the proposed approach has been evaluated with four benchmarking datasets and promising results have been achieved.","PeriodicalId":243397,"journal":{"name":"2009 IEEE-RIVF International Conference on Computing and Communication Technologies","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121468641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Anchoring the Institutional Dimension of Speech Acts in Agents' Attitudes: A Logical Approach 言语行为的制度维度在行为主体态度中的锚定:一种逻辑方法
E. Lorini, Dominique Longin, B. Gaudou
{"title":"Anchoring the Institutional Dimension of Speech Acts in Agents' Attitudes: A Logical Approach","authors":"E. Lorini, Dominique Longin, B. Gaudou","doi":"10.1109/RIVF.2009.5174622","DOIUrl":"https://doi.org/10.1109/RIVF.2009.5174622","url":null,"abstract":"The focus of this contribution is to define speech acts as institutional actions where modeled institutions are social or informal institutions. With social or informal institution, we mean an institution which is grounded on the acceptances of its members. In the first part of the paper we present a logic of acceptance, goal and action. Then, we specify how agents can create and maintain normative and institutional facts on the basis of their acceptances qua members of a certain institution. In particular we focus on obligations and social commitments and provide an original reductionist characterization of these concepts, anchoring them in agents' attitudes. Finally, we propose a formal characterization of the speech act promise. In this last part, we first define the constitutive rule which creates the relation between an utterance (as a physical action) and the speech act promise (as an institutional action). Then, we specify the deontic dimension of promise. Finally, we establish the relationship between promise and social commitment.","PeriodicalId":243397,"journal":{"name":"2009 IEEE-RIVF International Conference on Computing and Communication Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123913599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Immersive, Emotive and Cognitive effects of HDTV: Evaluating Effects of Image Definition on Presence 高清电视的沉浸感、情感和认知效应:评价图像清晰度对在场感的影响
C. Tijus, Florent Levillain, Hamid Bessaa, V. Besson, Olivier Floucat, N. Fouquereau, Bora Han, Zakia Ikhlef, Thierry Thibault, Alexandra Wang
{"title":"Immersive, Emotive and Cognitive effects of HDTV: Evaluating Effects of Image Definition on Presence","authors":"C. Tijus, Florent Levillain, Hamid Bessaa, V. Besson, Olivier Floucat, N. Fouquereau, Bora Han, Zakia Ikhlef, Thierry Thibault, Alexandra Wang","doi":"10.1109/RIVF.2009.5174643","DOIUrl":"https://doi.org/10.1109/RIVF.2009.5174643","url":null,"abstract":"In the search of effects of image quality, we evaluated the effects of HDTV on Presence: Immersion, Emotion and Cognition. The set-up of the experiments involved respondents being wired up and recorded during two different viewing scenarios: in the first, they watched SD and HD versions of the same content being broadcast simultaneously on two identical adjacent HD-Ready flat-screen displays for ten minutes; in the second, they were asked to choose with a remote control and watch SD or HD programming from a selection offering content divided 50/50 between the two modes. In the first scenario, when the same content could be watched either in SD or HD over a ten-minute period, respondents spent 70% of the ten-minute period watching HD. 77% of them said they preferred HD; and 76% of them found that the quality of the HD picture was better. In the second scenario, when respondents were free to hop between different content modes as they saw fit, they spent 25% more time watching HD content before switching to a different channel. On average, they also chose HD programming 12.5% more than SD versions of the same programs. Physiological monitoring of the test subjects, combined with questionnaires, also found that HD both increased the legibility of, and the amount of ‘reading’ of the images, increasing comprehension of what was being shown, and stimulating viewers’ curiosity and imagination. Keywords-component; HDTV, Immersion, Emotion, Cognition","PeriodicalId":243397,"journal":{"name":"2009 IEEE-RIVF International Conference on Computing and Communication Technologies","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114177017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信