Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Bug Localization (4)
- Model Check (4)
- Android (3)
- Crowdsourcing (3)
- Human action recognition (3)
-
- Mobile sensing (3)
- Service Composition (3)
- Bag-of-words (2)
- Big Data Analytics (2)
- Bug localization (2)
- Bugzilla (2)
- Clustering (2)
- Context monitoring (2)
- Game-based learning (2)
- Genetic Algorithm (2)
- Incentive mechanism (2)
- Indoor localization (2)
- Issue Reports (2)
- Localization (2)
- Location tracking (2)
- Markov Decision Process (2)
- Mobile applications (2)
- Mobile computing (2)
- Model checking (2)
- Privacy (2)
- Security (2)
- Smartphone (2)
- Social Network Analysis (2)
- Software maintenance (2)
- Software testing (2)
- Publication
-
- Research Collection School Of Computing and Information Systems (103)
- Electrical and Computer Engineering Publications (9)
- Departmental Technical Reports (CS) (3)
- Research outputs 2014 to 2021 (3)
- Computer Science Faculty Publications (2)
-
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (2)
- FIU Electronic Theses and Dissertations (2)
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
- CSE Conference and Workshop Papers (1)
- Collaborative Agent Design (CAD) Research Center (1)
- Computer Science & Software Engineering (1)
- Faculty Publications (1)
- Masters Theses & Specialist Projects (1)
- Mathematics, Statistics, and Computer Science Honors Projects (1)
- Perspectives@SMU (1)
- Publications and Scholarship (1)
- STAR Program Research Presentations (1)
- Sabbatical Reports (1)
Articles 31 - 60 of 135
Full-Text Articles in Physical Sciences and Mathematics
A Catalog Of While Loop Specification Patterns, Aditi Barua, Yoonsik Cheon
A Catalog Of While Loop Specification Patterns, Aditi Barua, Yoonsik Cheon
Departmental Technical Reports (CS)
This document provides a catalog of while loop patterns along with their skeletal specifications. The specifications are written in a functional form known as intended functions. The catalog can be used to derive specifications of while loops by first matching the loops to the cataloged patterns and then instantiating the skeletal specifications of the matched patterns. Once their specifications are formulated and written, the correctness of while loops can be proved rigorously or formally using the functional program verification technique in which a program is viewed as a mathematical function from one program state to another.
High5: Promoting Interpersonal Hand-To-Hand Touch For Vibrant Workplace With Electrodermal Sensor Watches, Yuhwan Kim, Seungchul Lee, Inseok Hwang, Hyunho Ro, Youngki Lee, Miri Moon, Junehwa Song
High5: Promoting Interpersonal Hand-To-Hand Touch For Vibrant Workplace With Electrodermal Sensor Watches, Yuhwan Kim, Seungchul Lee, Inseok Hwang, Hyunho Ro, Youngki Lee, Miri Moon, Junehwa Song
Research Collection School Of Computing and Information Systems
Interpersonal touch is our most primitive social language strongly governing our emotional well-being. Despite the positive implications of touch in many facets of our daily social interactions, we find wide-spread caution and taboo limiting touch-based interactions in workplace relationships that constitute a significant part of our daily social life. In this paper, we explore new opportunities for ubicomp technology to promote a new meme of casual and cheerful interpersonal touch such as high-fives towards facilitating vibrant workplace culture. Specifically, we propose High5, a mobile service with a smartwatch-style system to promote high-fives in everyday workplace interactions. We first present initial …
Crossnavi: Enabling Real-Time Crossroad Navigation For The Blind With Commodity Phones, Longfei Shangguan, Zheng Yang, Zimu Zhou, Xiaolong Zheng, Chenshu Wu, Yunhao Liu
Crossnavi: Enabling Real-Time Crossroad Navigation For The Blind With Commodity Phones, Longfei Shangguan, Zheng Yang, Zimu Zhou, Xiaolong Zheng, Chenshu Wu, Yunhao Liu
Research Collection School Of Computing and Information Systems
Crossroad is among the most dangerous parts outside for the visually impaired people. Numerous studies have exploited navigating systems for the visually impaired community, providing services ranging from block detection, route planning to realtime localization. However, none of them have addressed the safety issue in crossroad and integrated three key factors necessary for a practical crossroad navigation system: detecting the crossroad, locating zebra patterns, and guiding the user within zebra crossing when passing the road. Our CrossNavi application responds to these needs, providing an integrated crossroad navigation service that incorporates all the essential functionalities mentioned above. The overall service is …
Automatic Early Defects Detection In Use Case Documents, Shuang Liu, Jun Sun, Yang Liu, Yue Zhang, Bimlesh Wadhwa, Jin Song Dong, Xinyu Wang
Automatic Early Defects Detection In Use Case Documents, Shuang Liu, Jun Sun, Yang Liu, Yue Zhang, Bimlesh Wadhwa, Jin Song Dong, Xinyu Wang
Research Collection School Of Computing and Information Systems
Use cases, as the primary techniques in the user requirement analysis, have been widely adopted in the requirement engineering practice. As developed early, use cases also serve as the basis for function requirement development, system design and testing. Errors in the use cases could potentially lead to problems in the system design or implementation. It is thus highly desirable to detect errors in use cases. Automatically analyzing use case documents is challenging primarily because they are written in natural languages. In this work, we aim to achieve automatic defect detection in use case documents by leveraging on advanced parsing techniques. …
Active Code Search: Incorporating User Feedback To Improve Code Search Relevance, Shaowei Wang, David Lo, Lingxiao Jiang
Active Code Search: Incorporating User Feedback To Improve Code Search Relevance, Shaowei Wang, David Lo, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
Code search techniques return relevant code fragments given a user query. They typically work in a passive mode: given a user query, a static list of code fragments sorted by the relevance scores decided by a code search technique is returned to the user. A user will go through the sorted list of returned code fragments from top to bottom. As the user checks each code fragment one by one, he or she will naturally form an opinion about the true relevance of the code fragment. In an active model, those opinions will be taken as feedbacks to the search …
Dupfinder: Integrated Tool Support For Duplicate Bug Report Detection, Ferdian Thung, Pavneet Singh Kochhar, David Lo
Dupfinder: Integrated Tool Support For Duplicate Bug Report Detection, Ferdian Thung, Pavneet Singh Kochhar, David Lo
Research Collection School Of Computing and Information Systems
To track bugs that appear in a software, developers often make use of a bug tracking system. Users can report bugs that they encounter in such a system. Bug reporting is inherently an uncoordinated distributed process though and thus when a user submits a new bug report, there might be cases when another bug report describing exactly the same problem is already present in the system. Such bug reports are duplicate of each other and these duplicate bug reports need to be identified. A number of past studies have proposed a number of automated approaches to detect duplicate bug reports. …
Potential Biases In Bug Localization: Do They Matter?, Pavneet Singh Kochhar, Yuan Tian, David Lo
Potential Biases In Bug Localization: Do They Matter?, Pavneet Singh Kochhar, Yuan Tian, David Lo
Research Collection School Of Computing and Information Systems
Issue tracking systems are valuable resources during software maintenance activities and contain information about the issues faced during the development of a project as well as after its release. Many projects receive many reports of bugs and it is challenging for developers to manually debug and fix them. To mitigate this problem, past studies have proposed information retrieval (IR)-based bug localization techniques, which takes as input a textual description of a bug stored in an issue tracking system, and returns a list of potentially buggy source code files. These studies often evaluate their effectiveness on issue reports marked as bugs …
Uncovering Embarrassing Moments In In-Situ Exposure Of Incoming Mobile Messages, Chulhong Min, Saumay Pushp, Seungchul Lee, Inseok Hwang, Youngki Lee, Seungwoo Kang, Junehwa Song
Uncovering Embarrassing Moments In In-Situ Exposure Of Incoming Mobile Messages, Chulhong Min, Saumay Pushp, Seungchul Lee, Inseok Hwang, Youngki Lee, Seungwoo Kang, Junehwa Song
Research Collection School Of Computing and Information Systems
Mobile instant messengers serve as major interaction media for everyday chats. Contrary to the belief that a message is seen only by a designated receiver, it can be accidentally exposed to someone nearby and could result in embarrassing moments, for example, when the receiver is viewing pictures together with his friend upon the message arrival. To understand the significance of the problem and core factors that cause such embarrassments, we collected 961 in-situ responses from 14 participants upon the actual message arrival and analyzed them from the perspective of the receiver's situation. The results showed that 29% of message arrivals …
Towards Rigorously Faking Bidirectional Model Transformations, Christopher M. Poskitt, Mike Dodds, Richard F. Paige, Arend Rensink
Towards Rigorously Faking Bidirectional Model Transformations, Christopher M. Poskitt, Mike Dodds, Richard F. Paige, Arend Rensink
Research Collection School Of Computing and Information Systems
Bidirectional model transformations (bx) are mechanisms for automatically restoring consistency between multiple concurrently modified models. They are, however, challenging to implement; many model transformation languages not supporting them at all. In this paper, we propose an approach for automatically obtaining the consistency guarantees of bx without the complexities of a bx language. First, we show how to "fake" true bidirectionality using pairs of unidirectional transformations and inter-model consistency constraints in Epsilon. Then, we propose to automatically verify that these transformations are consistency preserving – thus indistinguishable from true bx – by defining translations to graph rewrite rules and nested conditions, …
Personality Profiles Of Software Engineers And Their Software Quality Preferences, Arif Raza, Luiz Fernando Capretz, Zaka Ul-Mustafa
Personality Profiles Of Software Engineers And Their Software Quality Preferences, Arif Raza, Luiz Fernando Capretz, Zaka Ul-Mustafa
Electrical and Computer Engineering Publications
Studies related to human aspects in software engineering (SE) have been performed from different perspectives. These perspectives include the study of human factors in different phases of software life cycle, effect of team performance in software development, how can a personality trait suit a particular task, and about some other miscellaneous issues. This research work aims to establish personality profiles of Pakistani software engineers using the Myers-Briggs Type Indicator (MBTI) instrument. In this survey, we have collected personality profiles of 110 software engineers. Moreover, their preferences of software quality attributes have also been collected. Analysis of the study shows that …
Event Analytics, Jin Song Dong, Jun Sun, Yang Liu, Yuan-Fang Li
Event Analytics, Jin Song Dong, Jun Sun, Yang Liu, Yuan-Fang Li
Research Collection School Of Computing and Information Systems
The process analysis toolkit (PAT) integrates the expressiveness of state, event, time, and probability-based languages with the power of model checking. PAT is a self-contained reasoning system for system specification, simulation, and verification. PAT currently supports a wide range of 12 different expressive modeling languages with many application domains and has attracted thousands of registered users from hundreds of organizations. In this invited talk, we will present the PAT system and its vision on “Event Analytics” (EA) which is beyond “Data Analytics”. The EA research is based on applying model checking to event planning, scheduling, prediction, strategy analysis and decision …
Exploring Variety Seeking Behavior In Mobile Users, Kasthuri Jayarajah, Robert J. Kauffman, Archan Misra
Exploring Variety Seeking Behavior In Mobile Users, Kasthuri Jayarajah, Robert J. Kauffman, Archan Misra
Research Collection School Of Computing and Information Systems
Understanding the personality traits and current attitudes of individual consumers is crucial for retailers and mobile advertisers. In this paper, we investigate the phenomenon of “variety seeking tendencies" in mobile users in their (1) online (represented by their App usage behavior), and (2) physical (represented by their location visits) worlds. We show that different categories of users exhibit different levels of variety. Further, by analyzing at various time scales, we show that there exists correlation between when a person is likely to visit new places in the real world and when he/she is likely to explore new Apps in the …
Phaser: Enabling Phased Array Signal Processing On Commodity Wifi Access Points, Jon Gjengset, Jie Xiong, Graeme Mcphilips, Kyle Jamieson
Phaser: Enabling Phased Array Signal Processing On Commodity Wifi Access Points, Jon Gjengset, Jie Xiong, Graeme Mcphilips, Kyle Jamieson
Research Collection School Of Computing and Information Systems
Signal processing on antenna arrays has received much recent attention in the mobile and wireless networking research communities, with array signal processing approaches addressing the problems of human movement detection, indoor mobile device localization, and wireless network security. However, there are two important challenges inherent in the design of these systems that must be overcome if they are to be of practical use on commodity hardware. First, phase differences between the radio oscillators behind each antenna can make readings unusable, and so must be corrected in order for most techniques to yield high-fidelity results. Second, while the number of antennas …
To What Extent Could We Detect Field Defects? An Extended Empirical Study Of False Negatives In Static Bug Finding Tools, Ferdian Thung, Lucia Lucia, David Lo, Lingxiao Jiang, Foyzur Rahman, Premkumar Devanbu
To What Extent Could We Detect Field Defects? An Extended Empirical Study Of False Negatives In Static Bug Finding Tools, Ferdian Thung, Lucia Lucia, David Lo, Lingxiao Jiang, Foyzur Rahman, Premkumar Devanbu
Research Collection School Of Computing and Information Systems
Software defects can cause much loss. Static bug-finding tools are designed to detect and remove software defects and believed to be effective. However, do such tools in fact help prevent actual defects that occur in the field and reported by users? If these tools had been used, would they have detected these field defects, and generated warnings that would direct programmers to fix them? To answer these questions, we perform an empirical study that investigates the effectiveness of five state-of-the-art static bug-finding tools (FindBugs, JLint, PMD, CheckStyle, and JCSC) on hundreds of reported and fixed defects extracted from three open …
Development Of A Methodology That Couples Satellite Remote Sensing Measurements To Spatial-Temporal Distribution Of Soil Moisture In The Vadose Zone Of The Everglades National Park, Luis G. Perez
FIU Electronic Theses and Dissertations
Spatial-temporal distribution of soil moisture in the vadose zone is an important aspect of the hydrological cycle that plays a fundamental role in water resources management, including modeling of water flow and mass transport. The vadose zone is a critical transfer and storage compartment, which controls the partitioning of energy and mass linked to surface runoff, evapotranspiration and infiltration. This dissertation focuses on integrating hydraulic characterization methods with remote sensing technologies to estimate the soil moisture distribution by modeling the spatial coverage of soil moisture in the horizontal and vertical dimensions with high temporal resolution.
The methodology consists of using …
Is There Progress Toward Sustainability?: Despite The Inherent Human Resistance To Change., Jens Pohl
Is There Progress Toward Sustainability?: Despite The Inherent Human Resistance To Change., Jens Pohl
Collaborative Agent Design (CAD) Research Center
The theme of this paper is to briefly survey the status of current efforts to maintain our natural environment and then discuss prospects for achieving future sustainability. The author finds that while there has been general recognition of the need for environmental sensitivity and conservation of natural resources, progress toward achieving sustainability goals has been slow. A principal reason for this lack of action is found in the reactive nature of the human species. Situated by biological design in our environment we typically respond to environmental changes only after they have occurred. Accordingly, while a number of revolutionary proposals have …
Using Remote Sensing Data To Predict The Spread Of Mosquito Borne Disease, Mary Ellen O'Donnell, Erika Podest
Using Remote Sensing Data To Predict The Spread Of Mosquito Borne Disease, Mary Ellen O'Donnell, Erika Podest
STAR Program Research Presentations
There is interest in how environmental variables derived from satellite data such as temperature, vegetation cover, and precipitation correlate to vector borne disease occurrence such as malaria and dengue fever. This study will be carried out using a decision tree based open source software called Random Forests to find correlations between the remote sensing variables and mosquito abundance. Software will be written in C# to take large amounts of data from the NASA satellite database and automatically format it for the Random Forest Software input. Correlations found, using Random Forests, between disease incidence and the variables can be used as …
Automatic Fine-Grained Issue Report Reclassification, Pavneet Singh Kochhar, Ferdian Thung, David Lo
Automatic Fine-Grained Issue Report Reclassification, Pavneet Singh Kochhar, Ferdian Thung, David Lo
Research Collection School Of Computing and Information Systems
Issue tracking systems are valuable resources during software maintenance activities. These systems contain different categories of issue reports such as bug, request for improvement (RFE), documentation, refactoring, task etc. While logging issue reports into a tracking system, reporters can indicate the category of the reports. Herzig et al. Recently reported that more than 40% of issue reports are given wrong categories in issue tracking systems. Among issue reports that are marked as bugs, more than 30% of them are not bug reports. The misclassification of issue reports can adversely affects developers as they then need to manually identify the categories …
Gta-M: Greedy Trajectory-Aware (M Copies) Routing For Airborne Networks, Xiaoping Ma, Hwee Xian Tan, Alvin C. Valera
Gta-M: Greedy Trajectory-Aware (M Copies) Routing For Airborne Networks, Xiaoping Ma, Hwee Xian Tan, Alvin C. Valera
Research Collection School Of Computing and Information Systems
Airborne networks have potential applications in both civilian and military domains - such as passenger in-flight Internet connectivity, air traffic control and in intelligence, surveillance and reconnaissance (ISR) activities. However, airborne networks suffer from frequent disruptions due to high node mobility, ad hoc connectivity and line-of-sight blockages. These challenges can be alleviated through the use of disruption-tolerant networking (DTN) techniques. In this paper, we propose GTA-m, a multi-copy greedy trajectory-aware routing protocol for airborne networks. GTA-m employs DTN capabilities and exploits the use of flight information to forwarded bundles greedily to intended destination(s). To alleviate the local minima issues that …
A Palm Vein Identification System Based On Gabor Wavelet Features, Ran Wang, Guoyou Wang, Zhong Chen, Zhigang Zeng, Yong Wang
A Palm Vein Identification System Based On Gabor Wavelet Features, Ran Wang, Guoyou Wang, Zhong Chen, Zhigang Zeng, Yong Wang
Research Collection School Of Computing and Information Systems
As a new and promising biometric feature, thermal palm vein pattern has drawn lots of attention in research and application areas. Many algorithms have been proposed for authentication since palm vein has special characteristics, such as liveness detection and hard to forgery. However, the detection accuracy of palm vein quite depends on the preprocessing and feature representation, which is supposed to be translation and rotation invariant to some extent. In this paper, we proposed an effective method for palm vein identification based on Gabor wavelet features which contains five steps: image acquisition, ROI detection, image preprocessing, features extraction, and matching. …
The Learning Curves In Open-Source Software (Oss) Development Network, Youngsoo Kim, Lingxiao Jiang
The Learning Curves In Open-Source Software (Oss) Development Network, Youngsoo Kim, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
We examine the learning curves of individual software developers in Open-Source Software (OSS) Development. We collected the dataset of multi-year code change histories from the repositories for five open source software projects involving more than 100 developers. We build and estimate regression models to assess individual developers' learning progress (in reducing the likelihood they may make a bug). Our estimation results show that developer's coding experience does not decrease bug ratios while cumulative bug-fixing experience leads to learning progress. The results may have implications and provoke future research on project management about allocating resources on tasks that add new code …
Symbolic Analysis Of An Electric Vehicle Charging Protocol, Li Li, Jun Pang, Yang Liu, Jun Sun, Jin Song Dong
Symbolic Analysis Of An Electric Vehicle Charging Protocol, Li Li, Jun Pang, Yang Liu, Jun Sun, Jin Song Dong
Research Collection School Of Computing and Information Systems
In this paper, we describe our analysis of a recently proposed electric vehicle charing protocol. The protocol builds on complex cryptographic primitives such as commitment, zeroknowledge proofs, BBS+ signature and etc. Moreover, interesting properties such as secrecy, authentication, anonymity, and location privacy are claimed on this protocol. It thus presents a challenge for formal verification, as no single existing tool for security protocol analysis support for all the required features. In our analysis, we employ and combine the strength of two stateof-the-art symbolic verifiers, Tamarin and ProVerif, to check all important properties of the protocol.
Detecting Differences Across Multiple Instances Of Code Clones, Yun Lin, Zhenchang Xing, Yinxing Xue, Yang Liu, Xin Peng, Jun Sun, Wenyun Zhao
Detecting Differences Across Multiple Instances Of Code Clones, Yun Lin, Zhenchang Xing, Yinxing Xue, Yang Liu, Xin Peng, Jun Sun, Wenyun Zhao
Research Collection School Of Computing and Information Systems
Clone detectors find similar code fragments (i.e., instances of code clones) and report large numbers of them for industrial systems. To maintain or manage code clones, developers often have to investigate differences of multiple cloned code fragments. However,existing program differencing techniques compare only two code fragments at a time. Developers then have to manually combine several pairwise differencing results. In this paper, we present an approach to automatically detecting differences across multiple clone instances. We have implemented our approach as an Eclipse plugin and evaluated its accuracy with three Java software systems. Our evaluation shows that our algorithm has precision …
Role Of Quality Source Code Documentation In Software Testing, Prem Parashar, Arvind Kalia, Rajesh Bhatia
Role Of Quality Source Code Documentation In Software Testing, Prem Parashar, Arvind Kalia, Rajesh Bhatia
Publications and Scholarship
Software testing is performed to validate that software under test meets all requirements. With the increase in software developing platforms, developers may commit those errors, which, if not tested with appropriate test cases, may lead to false confidence in software testing. In this paper, we proposed that building quality source code documentation can help in predicting such errors. To validate this proposal, we performed an initial study and found that if software is well documented, a tester may predict the possible set of errors that developers may commit, and hence, may select better test cases that target those faults. From …
Structure Preserving Large Imagery Reconstruction, Ju Shen, Jianjun Yang, Sami Taha Abu Sneineh, Bryson Payne, Markus Hitz
Structure Preserving Large Imagery Reconstruction, Ju Shen, Jianjun Yang, Sami Taha Abu Sneineh, Bryson Payne, Markus Hitz
Computer Science Faculty Publications
With the explosive growth of web-based cameras and mobile devices, billions of photographs are uploaded to the internet. We can trivially collect a huge number of photo streams for various goals, such as image clustering, 3D scene reconstruction, and other big data applications. However, such tasks are not easy due to the fact the retrieved photos can have large variations in their view perspectives, resolutions, lighting, noises, and distortions. Furthermore, with the occlusion of unexpected objects like people, vehicles, it is even more challenging to find feature correspondences and reconstruct realistic scenes. In this paper, we propose a structure-based image …
Scalable Detection Of Missed Cross-Function Refactorings, Narcisa Andreea Milea, Lingxiao Jiang, Siau-Cheng Khoo
Scalable Detection Of Missed Cross-Function Refactorings, Narcisa Andreea Milea, Lingxiao Jiang, Siau-Cheng Khoo
Research Collection School Of Computing and Information Systems
Refactoring is an important way to improve the design of existing code. Identifying refactoring opportunities (i.e., code fragments that can be refactored) in large code bases is a challenging task. In this paper, we propose a novel, automated and scalable technique for identifying cross-function refactoring opportunities that span more than one function (e.g., Extract Method and Inline Method). The key of our technique is the design of efficient vector inlining operations that emulate the effect of method inlining among code fragments, so that the problem of identifying cross-function refactoring can be reduced to the problem of finding similar vectors before …
Cloud-Based Query Evaluation For Energy-Efficient Mobile Sensing, Tianli Mo, Sougata Sen, Lipyeow Lim, Archan Misra, Rajesh Krishna Balan, Youngki Lee
Cloud-Based Query Evaluation For Energy-Efficient Mobile Sensing, Tianli Mo, Sougata Sen, Lipyeow Lim, Archan Misra, Rajesh Krishna Balan, Youngki Lee
Research Collection School Of Computing and Information Systems
In this paper, we reduce the energy overheads of continuous mobile sensing for context-aware applications that are interested in collective context or events. We propose a cloud-based query management and optimization framework, called CloQue, which can support concurrent queries, executing over thousands of individual smartphones. CloQue exploits correlation across context of different users to reduce energy overheads via two key innovations: i) Dynamically reordering the order of predicate processing to preferentially select predicates with not just lower sensing cost and higher selectivity, but that maximally reduce the uncertainty about other context predicates, and ii) intelligently propagating the query evaluation results …
Diamonds Are A Girl's Best Friend: Partial Order Reduction For Timed Automata With Abstractions, Henri Hansen, Shang-Wei Lin, Yang Liu, Truong Khanh Nguyen, Jun Sun
Diamonds Are A Girl's Best Friend: Partial Order Reduction For Timed Automata With Abstractions, Henri Hansen, Shang-Wei Lin, Yang Liu, Truong Khanh Nguyen, Jun Sun
Research Collection School Of Computing and Information Systems
A major obstacle for using partial order reduction in the context of real time verification is that the presence of clocks and clock constraints breaks the usual diamond structure of otherwise independent transitions. This is especially true when information of the relative values of clocks is preserved in the form of diagonal constraints. However, when diagonal constraints are relaxed by a suitable abstraction, some diamond structure is re-introduced in the zone graph. In this article, we introduce a variant of the stubborn set method for reducing an abstracted zone graph. Our method works with all abstractions, but especially targets situations …
A Novel Algorithm Based On Visual Saliency Attention For Localization And Segmentation In Rapidly-Stained Leukocyte Images, Xin Zheng, Yong Wang, Guoyou Wang, Zhong Chen
A Novel Algorithm Based On Visual Saliency Attention For Localization And Segmentation In Rapidly-Stained Leukocyte Images, Xin Zheng, Yong Wang, Guoyou Wang, Zhong Chen
Research Collection School Of Computing and Information Systems
In this paper, we propose a fast hierarchical framework of leukocyte localization and segmentation in rapidly-stained leukocyte images (RSLI) with complex backgrounds and varying illumination. The proposed framework contains two main steps. First, a nucleus saliency model based on average absolute difference is built, which locates each leukocyte precisely while effectively removes dyeing impurities and erythrocyte fragments. Secondly, two different schemes are presented for segmenting the nuclei and cytoplasm respectively. As for nuclei segmentation, to solve the overlap problem between leukocytes, we extract the nucleus lobes first and further group them. The lobes extraction is realized by the histogram-based contrast …
Synchronicity: Pushing The Envelope Of Fine-Grained Localization With Distributed Mimo, Jie Xiong, Kyle Jamieson, Karthikeyan Sundaresan
Synchronicity: Pushing The Envelope Of Fine-Grained Localization With Distributed Mimo, Jie Xiong, Kyle Jamieson, Karthikeyan Sundaresan
Research Collection School Of Computing and Information Systems
Indoor localization of mobile devices and tags has received much attention recently, with encouraging fine-grained localization results available with enough line-of-sight coverage and enough hardware infrastructure. Synchronicity is a location system that aims to push the envelope of highly-accurate localization systems further in both dimensions, requiring less line-of-sight and less infrastructure. With Distributed MIMO network of wireless LAN access points (APs) as a starting point, we leverage the time synchronization that such a network affords to localize with time-difference-of-arrival information at the APs. We contribute novel super-resolution signal processing algorithms and reflection path elimination schemes, yielding superior results even in …