This user s reference is a companion to the separate book also titled Guide to Modelling and Simulation of Systems of Systems. The principal book explicates integrated development environments to support virtual building and testing of systems of systems, covering in some depth the MS4 Modelling Environment . This user s reference provides a quick reference and exposition of the various concepts and functional features covered in that book. The topics in the user s reference are grouped in alignment with the workflow displayed on the MS4 Modeling Environment launch page, under the headings...
This user s reference is a companion to the separate book also titled Guide to Modelling and Simulation of Systems of Systems. The principal book expl...
Fast Compact Algorithms and Software for Spline Smoothing investigates algorithmic alternatives for computing cubic smoothing splines when the amount of smoothing is determined automatically by minimizing the generalized cross-validation score. These algorithms are based on Cholesky factorization, QR factorization, or the fast Fourier transform. All algorithms are implemented in MATLAB and are compared based on speed, memory use, and accuracy. An overall best algorithm is identified, which allows very large data sets to be processed quickly on a personal computer.
Fast Compact Algorithms and Software for Spline Smoothing investigates algorithmic alternatives for computing cubic smoothing splines when the ...
High-dimensional spaces arise as a way of modelling datasets with many attributes. Such a dataset can be directly represented in a space spanned by its attributes, with each record represented as a point in the space with its position depending on its attribute values. Such spaces are not easy to work with because of their high dimensionality: our intuition about space is not reliable, and measures such as distance do not provide as clear information as we might expect.
There are three main areas where complex high dimensionality and large datasets arise naturally: data collected by...
High-dimensional spaces arise as a way of modelling datasets with many attributes. Such a dataset can be directly represented in a space spanned by...
Time-of-flight (TOF) cameras provide a depth value at each pixel, from which the 3D structure of the scene can be estimated. This work offers a technical introduction to TOF sensors, from architectural and design issues, to selected image processing and computer vision methods.
Time-of-flight (TOF) cameras provide a depth value at each pixel, from which the 3D structure of the scene can be estimated. This work offers a techni...
At a fundamental level, service-oriented crowdsourcing applies the principles of service-oriented architecture (SOA) to the discovery, composition and selection of a scalable human workforce. Service-Oriented Crowdsourcing: Architecture, Protocols and Algorithms provides both an analysis of contemporary crowdsourcing systems, such as Amazon Mechanical Turk, and a statistical description of task-based marketplaces. The book also introduces a novel mixed service-oriented computing paradigm by providing an architectural description of the Human-Provided Services (HPS) framework and the...
At a fundamental level, service-oriented crowdsourcing applies the principles of service-oriented architecture (SOA) to the discovery, composition and...
Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems.
Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for...
Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars dam...
The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. It demonstrates that such model can be adopted by any wireless multi-hop routing protocol. Also presented is a glimpse of the ideal wireless multi-hop routing protocol along with several open issues.
The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The bri...
This book surveys the outstanding work of physical-layer (PHY) security, including the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication security by feedback and error correcting code is introduced and a framework of PHY security based on space time block code (STBC) MIMO system is demonstrated. Also discussed is a scheme which combines cryptographic techniques implemented in the higher layer with the physical layer security approach...
This book surveys the outstanding work of physical-layer (PHY) security, including the recent achievements of confidentiality and authentication for w...
Performance Evaluation Software: Moving Object Detection and Tracking in Videos introduces a software approach for the real-time evaluation and performance comparison of the methods specializing in moving object detection and/or tracking (D&T) in video processing. Digital video content analysis is an important item for multimedia content-based indexing (MCBI), content-based video retrieval (CBVR) and visual surveillance systems. There are some frequently-used generic algorithms for video object D&T in the literature, such as Background Subtraction (BS), Continuously Adaptive Mean-shift...
Performance Evaluation Software: Moving Object Detection and Tracking in Videos introduces a software approach for the real-time evaluation and...
This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks.
For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the...
This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wi...