Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Series

2011

Discipline
Institution
Keyword
Publication

Articles 451 - 467 of 467

Full-Text Articles in Computer Engineering

Near Optimal Rate Selection For Wireless Control Systems, Abusayeed Saifullah, Chengjie Wu, Paras Babu Tiwari, You Xu, Yong Fu, Chenyang Lu, Yixin Chen Jan 2011

Near Optimal Rate Selection For Wireless Control Systems, Abusayeed Saifullah, Chengjie Wu, Paras Babu Tiwari, You Xu, Yong Fu, Chenyang Lu, Yixin Chen

All Computer Science and Engineering Research

With the advent of industrial standards such as WirelessHART, process industries are now gravitating towards wireless control systems. Due to limited bandwidth in a wireless network shared by multiple control loops, it is critical to optimize the overall control performance. In this paper, we address the scheduling-control co-design problem of determining the optimal sampling rates of feedback control loops sharing a WirelessHART network. The objective is to minimize the overall control cost while ensuring that all data flows meet their end-to-end deadlines. The resulting constrained optimization based on existing delay bounds for WirelessHART networks is challenging since it is non-differentiable, …


Image Editing Style-Based Authorship Authentication, Chengcui Zhang, Wei-Bang Chen, Liping Zhou Jan 2011

Image Editing Style-Based Authorship Authentication, Chengcui Zhang, Wei-Bang Chen, Liping Zhou

College of Arts and Sciences Professional Work

This paper aims to provide an authorship identification framework that can provide added clues to online auction user profiling systems, the primary purpose of which is early detection and prevention of fraudulent behaviors such as account taken-over. This framework authenticates the authorship of product listing pictures in terms of their image editing styles, and it achieves this goal in three steps: (1) editing style distinction: using a Hough transform based edge clustering algorithm to differentiate between image editing styles created by the same seller, (2) editing style summarization: analyzing and encoding each distinctive image editing style into a template based …


A Midsummer Night’S Dream (With Flying Robots), Robin Murphy, Dylan Shell, Amy Guerin, Brittany Duncan, Benjamin Fine, Kevin Pratt, Takis Zourntos Jan 2011

A Midsummer Night’S Dream (With Flying Robots), Robin Murphy, Dylan Shell, Amy Guerin, Brittany Duncan, Benjamin Fine, Kevin Pratt, Takis Zourntos

School of Computing: Faculty Publications

Seven flying robot “fairies” joined human actors in the Texas A&M production of William Shakespeare’s A Midsummer Night’s Dream. The production was a collaboration between the departments of Computer Science and Engineering, Electrical and Computer Engineering, and Theater Arts. The collaboration was motivated by two assertions. First, that the performing arts have principles for creating believable agents that will transfer to robots. Second, the theater is a natural testbed for evaluating the response of untrained human groups (both actors and the audience) to robots interacting with humans in shared spaces, i.e., were believable agents created? The production used two types …


The Best Available Technology Standard, Lital Helman, Gideon Parchomovsky Jan 2011

The Best Available Technology Standard, Lital Helman, Gideon Parchomovsky

All Faculty Scholarship

Copyright liability for web-hosting will be a key determinant of the evolution of the Internet in years to come. Depending on their design, the legal rules that shape the liability of web-hosts can stunt the development of the Internet as a medium of expression or enhance it. Hence, adopting the optimal liability regime is a matter of crucial importance. This Article proposes a radical change in web-hosts’ copyright liability for illegal content posted by users. Our main thesis is that web-hosts’ liability should be guided by the “Best Available Technology” principle, according to which web-hosts that employ the best filtering …


Evidence Supporting Measure Of Similarity For Reducing The Complexity In Information Fusion, Florentin Smarandache, Jean Dezert, Xinde Li, Xinhan Huang Jan 2011

Evidence Supporting Measure Of Similarity For Reducing The Complexity In Information Fusion, Florentin Smarandache, Jean Dezert, Xinde Li, Xinhan Huang

Branch Mathematics and Statistics Faculty and Staff Publications

This paper presents a new method for reducing the number of sources of evidence to combine in order to reduce the complexity of the fusion processing. Such a complexity reduction is often required in many applications where the real-time constraint and limited computing resources are of prime importance. The basic idea consists in selecting, among all sources available, only a subset of sources of evidence to combine. The selection is based on an evidence supporting measure of similarity (ESMS) criterion which is an efficient generic tool for outlier sources identification and rejection. The ESMS between two sources of evidence can …


Development Of Visualization Facility At The Gis And Remote Sensing Core Lab, University Of Nevada, Las Vegas, Haroon Stephen, William J. Smith, Zhongwei Liu Jan 2011

Development Of Visualization Facility At The Gis And Remote Sensing Core Lab, University Of Nevada, Las Vegas, Haroon Stephen, William J. Smith, Zhongwei Liu

Public Policy and Leadership Faculty Presentations

Visualization using advanced computational and graphic equipment has become a standard way of present day research. Availability of low cost and fast processing units, high resolution displays with graphic processing units, and specialized software has brought complex visualization capabilities to an office desktop. Nevertheless, when dealing with large datasets such as, global climate, geospatial, and social data the office desktop falls short and calls for a centralized visualization facility with high end computing and graphics equipment.

Visualization Facility at GIS and Remote Sensing Core Lab would be a useful and important addition to the UNLV IT infrastructure. It would provide …


Detecting The Onset Of Dementia Using Context-Oriented Architecture, Basel Magableh, Nidal Albeiruti Jan 2011

Detecting The Onset Of Dementia Using Context-Oriented Architecture, Basel Magableh, Nidal Albeiruti

Articles

In the last few years, Aspect Oriented Software De- velopment (AOSD) and Context Oriented Software Development (COSD) have become interesting alternatives for the design and construction of self-adaptive software systems. An analysis of these technologies shows them all to employ the principle of the separation of concerns, Model Driven Architecture (MDA) and Component-based Software Development (CBSD) for building high quality of software systems. In general, the ultimate goal of these technologies is to be able to reduce development costs and effort, while improving the adaptability, and dependability of software systems. COSD, has emerged as a generic devel- opment paradigm towards …


Multi-Pose Face Recognition And Tracking System, Binu Muraleedharan Nair, Jacob Foytik, Richard Tompkins, Yakov Diskin, Theus Aspiras, Vijayan K. Asari Jan 2011

Multi-Pose Face Recognition And Tracking System, Binu Muraleedharan Nair, Jacob Foytik, Richard Tompkins, Yakov Diskin, Theus Aspiras, Vijayan K. Asari

Electrical and Computer Engineering Faculty Publications

We propose a real time system for person detection, recognition and tracking using frontal and profile faces. The system integrates face detection, face recognition and tracking techniques. The face detection algorithm uses both frontal face and profile face detectors by extracting the 'Haar' features and uses them in a cascade of boosted classifiers. The pose is determined from the face detection algorithm which uses a combination of profile and frontal face cascades and, depending on the pose, the face is compared with a particular set of faces having the same range for classification. The detected faces are recognized by projecting …


Designing, Understanding, And Analyzing Unconventional Computation: The Important Role Of Logic And Constructive Mathematics, Vladik Kreinovich Jan 2011

Designing, Understanding, And Analyzing Unconventional Computation: The Important Role Of Logic And Constructive Mathematics, Vladik Kreinovich

Departmental Technical Reports (CS)

In this paper, we explain why, in our opinion, logic and constructive mathematics are playing -- and should play -- an important role in the design, understanding, and analysis of unconventional computation.


Promoting The Buildout Of New Networks Vs. Compelling Access To The Monopoly Loop: A Clash Of Regulatory Paradigms, Christopher S. Yoo Jan 2011

Promoting The Buildout Of New Networks Vs. Compelling Access To The Monopoly Loop: A Clash Of Regulatory Paradigms, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.


Accessible Rich Internet Applications: The Search Engine Challenge, Angela Kielthy Jan 2011

Accessible Rich Internet Applications: The Search Engine Challenge, Angela Kielthy

Conference papers

The perception that Rich Internet Applications (RIAs) and Accessible Rich Internet Applications (ARIAs) are inaccessible to search engines is perhaps one of the main factors that hinder their wider adoption by the web development community. Recent announcements that RIAs and ARIAs are becoming more search engine friendly is provoking web developers to look for further information and evidence that will support or refute these announcements.

This paper outlines research undertaken and tests performed to establish if RIAs and ARIAs developed using Adobe Flex are crawlable and indexable by the Google search engine by default.

The conclusion drawn from testing is …


Simulated Performance Intensity Functions, Andrew Hines, Naomi Harte Jan 2011

Simulated Performance Intensity Functions, Andrew Hines, Naomi Harte

Conference papers

Measuring speech intelligibility for different hearing aid fitting methods in a simulated environment would allow rapid prototyping and early design assessment. A simulated performance intensity function (SPIF) test methodology has been developed to allow experimentation using an auditory nerve model to predict listeners’ phoneme recognition. The test discriminates between normal hearing and progressively degrading levels of sensorineural hearing loss. Auditory nerve discharge patterns, presented as neurograms, can be subjectively ranked by visual inspection. Here, subjective inspection is substituted with an automated ranking using a new image quality metric that can quantify neurogram degradation in a consistent manner. This work reproduces …


Comparing Hearing Aid Algorithm Performance Using Simulated Performance Intensity Functions, Andrew Hines, Naomi Harte Jan 2011

Comparing Hearing Aid Algorithm Performance Using Simulated Performance Intensity Functions, Andrew Hines, Naomi Harte

Conference papers

Simulated performance intensity functions were used to quantitatively discriminate speech intelligibility through phoneme discrimination assessment. Listener test results for subjects with a wide range of sensorineural hearing losses were simulated using an auditory nerve model and compared to real listeners' unaided and aided performance. Simulations of NAL-RP and DSL 4.0 fitting algorithms were compared. Auditory nerve discharge patterns from the model were presented as neurograms. An automated ranking process was used to quantify neurogram degradation using a new measure, the Neurogram Similarity Index Measure (NSIM). The measure has previously been shown to correlate well in predictions of phoneme discrimination for …


Relation Liftings On Preorders And Posets, Marta Bílková, Alexander Kurz, Daniela Petrişan, Jiří Velebil Jan 2011

Relation Liftings On Preorders And Posets, Marta Bílková, Alexander Kurz, Daniela Petrişan, Jiří Velebil

Engineering Faculty Articles and Research

The category Rel(Set) of sets and relations can be described as a category of spans and as the Kleisli category for the powerset monad. A set-functor can be lifted to a functor on Rel(Set) iff it preserves weak pullbacks. We show that these results extend to the enriched setting, if we replace sets by posets or preorders. Preservation of weak pullbacks becomes preservation of exact lax squares. As an application we present Moss’s coalgebraic over posets.


Towards Nominal Formal Languages, Alexander Kurz, Tomoyuki Suzuki, Emilio Tuosto Jan 2011

Towards Nominal Formal Languages, Alexander Kurz, Tomoyuki Suzuki, Emilio Tuosto

Engineering Faculty Articles and Research

We introduce formal languages over infinite alphabets where words may contain binders.We define the notions of nominal language, nominal monoid, and nominal regular expressions. Moreover, we extend history-dependent automata (HD-automata) by adding stack, and study the recognisability of nominal languages.


Generic Trace Logics, Christian Kissig, Alexander Kurz Jan 2011

Generic Trace Logics, Christian Kissig, Alexander Kurz

Engineering Faculty Articles and Research

We combine previous work on coalgebraic logic with the coalgebraic traces semantics of Hasuo, Jacobs, and Sokolova.


Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves Jan 2011

Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves

Articles, Chapters and Online Publications

Discusses the role of librarians in law school technology management and analyzes technology staffing survey results for 2002, 2006, and 2010. While survey results indicate a trend toward establishing separate information technology departments within law schools, librarians are and will continue to be actively involved in law school technology.