Third International Conference on Information Technology and Applications (ICITA'05)最新文献

筛选
英文 中文
Probabilistic reasoning techniques for situation assessments 情景评估的概率推理技术
Catherine Howard, M. Stumptner
{"title":"Probabilistic reasoning techniques for situation assessments","authors":"Catherine Howard, M. Stumptner","doi":"10.1109/ICITA.2005.219","DOIUrl":"https://doi.org/10.1109/ICITA.2005.219","url":null,"abstract":"This paper discusses the application of object oriented probabilistic relational models to the formulation of situation assessments in the tactical military domain. Object-oriented probabilistic relational models extend traditional attribute based Bayesian networks with the concepts of objects, their attributes and the relationships between them by combining a frame-based representation system with object-oriented Bayesian networks.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128956706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Skew detection of document images using line structural information 使用线结构信息的文档图像的倾斜检测
Chih-Hong Kao, H. Don
{"title":"Skew detection of document images using line structural information","authors":"Chih-Hong Kao, H. Don","doi":"10.1109/ICITA.2005.255","DOIUrl":"https://doi.org/10.1109/ICITA.2005.255","url":null,"abstract":"A method for skew detection of document images is presented. The method is based on the information of the directions of text lines in the images. To extract the directions of text lines in the images, a measure of line-likeness of texts is adopted, which reflects the strength and direction of a pixel being part of a text line. This measure is applicable to texts of various fonts, sizes, and even languages. The skew angle of the whole image is the consensus among all pixels in the image. Several methods for the consensus are proposed. Experimental results of the method on document images are presented.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130208715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Limited range wavelength converter sharing in WDM networks WDM网络中有限范围波长转换器共享
M. M. Rashid, Sugang Xu, Y. Tanaka
{"title":"Limited range wavelength converter sharing in WDM networks","authors":"M. M. Rashid, Sugang Xu, Y. Tanaka","doi":"10.1109/ICITA.2005.172","DOIUrl":"https://doi.org/10.1109/ICITA.2005.172","url":null,"abstract":"In this paper, we propose multistage wavelength conversion by sharing limited range wavelength converters in wavelength division multiplexed (WDM) all-optical packet switching networks. By using multistage wavelength conversion and converter sharing technology expensive resources can be maximally utilized. Our interest is to investigate how converters of lower capability in terms of conversion limit can be effectively utilized for performance improvement rather than using converters of full conversion capability. We summarize the benefits of multistage wavelength conversion and wavelength converter sharing using limited range wavelength converters and demonstrate some outlines for the choice of conversion limit, number of converters, and the number of stages of conversion by simulation. Simulation results dictate that, with wavelength converters fewer than the number of wavelength channels to or from the optical cross-connect, significant improvement in performance in terms of packet loss probability before saturation can be achieved with multistage conversion at some lower limits of conversion.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130553321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Web redirection service for variant Chinese domain name resolution 一种用于中文域名解析的Web重定向服务
Jeng-Wei Lin, L. Tseng, Jan-Ming Ho, F. Lai
{"title":"A Web redirection service for variant Chinese domain name resolution","authors":"Jeng-Wei Lin, L. Tseng, Jan-Ming Ho, F. Lai","doi":"10.1109/ICITA.2005.50","DOIUrl":"https://doi.org/10.1109/ICITA.2005.50","url":null,"abstract":"Many efforts in past years have been made to lower the linguistic barriers for non-native English speakers to access the Internet. IDNA (Faltstrom et al., 2003) focuses on access to internationalized domain names (IDN) in a range of scripts that is broader in scope than the original ASCII. However, the use of character variants that have similar appearances and/or interpretations could create confusion. A variant IDL (internationalized domain label), derived from an IDL by replacing some characters with their variants, should match the original IDL. In JET Guidelines (Konishi et al., 2004), it is suggested that zone administrators model this concept of equivalence as an atomic IDL package that contains the variant IDLs generated according to the language variant tables (LVT). In addition to the registered IDL, some of the variant IDLs are activated and stored in the zone files and thus become resolvable. However, an issue of scalability arises when the number of the activated variant IDLs is large. In this paper, we present a mechanism to resolve the variant IDLs in an IDL package into the registered IDL. Specifically, we target Han character variants. Two Han characters are said to be variants of each other if they have the same meaning and are pronounced the same. Furthermore, Han character variants usually have similar appearances. We introduce a new resource record (RR) type, denoted as VarIdx, to associate the variant IDLs with the registered IDL. Experiment results show that a small number of VarIdx RRs are sufficient for enumerating all variant IDLs in an IDL package. We then present a redirection service that uses VarIdx RRs to redirect user requests with variant IDLs to the URLs with the corresponding registered IDLs.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132141968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On local features for GMM based face verification 基于GMM的局部特征人脸验证
Conrad Sanderson, M. Saban, Yongsheng Gao
{"title":"On local features for GMM based face verification","authors":"Conrad Sanderson, M. Saban, Yongsheng Gao","doi":"10.1109/ICITA.2005.194","DOIUrl":"https://doi.org/10.1109/ICITA.2005.194","url":null,"abstract":"It has been recently shown that local feature approaches to face verification are considerably more robust than holistic approaches, in terms of translations (caused by automatic face localization) and pose variations. In this paper, we first investigate whether features based on local principal component analysis (LPCA) are more discriminative than features based on the 2D discrete cosine transform (2D DCT). We also investigate several methods for modifying the two feature extraction techniques in order to counteract the effects of linear and non-linear illumination changes, without losing discriminative information. Results on the XM2VTS database show that when using a Bayesian classifier based on Gaussian mixture models (GMMs), the performances of 2D DCT and LPCA techniques are quite similar, suggesting that the 2D DCT technique is preferable due to its lower computational complexity. When using 8/spl times/8 blocks, modifying the 2D DCT and LPCA techniques by removing the first coefficient, which is the most affected by illumination changes, enhances robustness with little change in discrimination ability; removing further coefficients causes a noticeable reduction in performance on clean images and provides little gain in robustness. When using the 2D DCT with 16/spl times/16 blocks, the first three coefficients need to be removed in order to achieve good robustness. It is further shown that contrary to previously published results, the use of deltas of low-order coefficients (to alleviate performance losses caused by removing coefficients) can adversely affect robustness.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127849571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance Analysis for Construction of a Performance Practice Support System 绩效分析:构建绩效实践支持系统
S. Ozaki, M. Harao, K. Hirata
{"title":"Performance Analysis for Construction of a Performance Practice Support System","authors":"S. Ozaki, M. Harao, K. Hirata","doi":"10.1109/ICITA.2005.210","DOIUrl":"https://doi.org/10.1109/ICITA.2005.210","url":null,"abstract":"We investigate the performance analysis for constructing a performance practice support system for instrumental music having ability to tune to players. Especially, we propose a current performing position recognition algorithm based on cellular representation of scores and show the system implemented works robustly and efficiently for the beginners who make various types of mistakes in their practices","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121622197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stream-Based Interactive Video Language Authoring Using Correlated Audiovisual Watermarking 使用相关视听水印的基于流的交互式视频语言创作
R. Xu, Jesse S. Jin, J. G. Allen
{"title":"Stream-Based Interactive Video Language Authoring Using Correlated Audiovisual Watermarking","authors":"R. Xu, Jesse S. Jin, J. G. Allen","doi":"10.1109/ICITA.2005.263","DOIUrl":"https://doi.org/10.1109/ICITA.2005.263","url":null,"abstract":"We propose a novel framework that employs correlated digital video and audio watermarking where the watermarking sequence contains video interaction information and media features as a basis towards constructing a secure, self-contained, format independent stream-based scheme for interactive media authoring. We have detailed our methods and illustrate the advantages of this scheme over the traditional meta-tag approach for interactive video authoring. We also identify many of the potential applications that can benefit from this approach. We outline the prototype application and demonstrate the successful implementation within our existing real-time multimedia authoring system, where the new post production video delivering module is based on this framework","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126275036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cost Effective Spacial Redundancy with Data-Path Partitioning 具有数据路径分区的成本有效的空间冗余
S. Matsusaka, Koji Inoue
{"title":"A Cost Effective Spacial Redundancy with Data-Path Partitioning","authors":"S. Matsusaka, Koji Inoue","doi":"10.1109/ICITA.2005.7","DOIUrl":"https://doi.org/10.1109/ICITA.2005.7","url":null,"abstract":"In order to maintain the high reliability of a computer system, it is necessary to detect the failure leading to a fault. In general, fault can be detected by exploiting time redundancy or spatial redundancy. However, it negatively affects on either hardware cost or processor performance. To solve the cost-performance issue, in this paper, we propose a concept of cost-effective approach to achieve spatial redundancy for dependable processors. In addition, we perform a primly evaluation for the impact of our method on processor performance","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114247053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Royalty rate of business method patents for large scale software applications 大型软件应用的商业方法专利使用费
S. Kaneda, Takuya Senbo, K. Fujimoto
{"title":"Royalty rate of business method patents for large scale software applications","authors":"S. Kaneda, Takuya Senbo, K. Fujimoto","doi":"10.1109/ICITA.2005.242","DOIUrl":"https://doi.org/10.1109/ICITA.2005.242","url":null,"abstract":"The royalty rate for Japanese patents is usually 2%-3% in the computer domain. This rate is based on the royalty rate values described in the \"Royalty Rate\" (published by Japan Institute of Invention and Innovation) and those used by Japanese national holding patents. This paper demonstrates that this conventional royalty is inadequate for large-scale software application systems and large-scale integrations (LSIs), especially the AP system using business method patents. The reason is that the contribution of the invention is very small for these large-scale systems. Moreover, this paper proposes a new method to calculate the royalty rate for large-scale applications in order to resolve these problems. Experimental case analyses show that the proposed method can derive adequate royalty rates that pioneer patents have high royalty rates and that bubble patents have low royalty rates.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116680844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new sum-of-disjoint-products technique to determine network reliabilities with known minimal paths 一种确定已知最小路径下网络可靠性的分离积和新方法
W. Yeh
{"title":"A new sum-of-disjoint-products technique to determine network reliabilities with known minimal paths","authors":"W. Yeh","doi":"10.1109/ICITA.2005.35","DOIUrl":"https://doi.org/10.1109/ICITA.2005.35","url":null,"abstract":"In this study, a new algorithm based on some intuitive properties that characterize the structure of minimal paths (MPs), and the relationships between MPs and subpaths are developed to improved sum-of-disjoint products technique (SDP). The proposed algorithm is not only easier to understand and implement, but is also better than the existing best-known SDP based algorithm. The correctness of the proposed algorithm is analyzed and proven. One bench example is illustrated to show how to determine the network reliability with known minimal paths using the proposed SDP.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123793807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信