Search results for "Data type"
showing 10 items of 1183 documents
Query-preserving watermarking of relational databases and XML documents
2011
Watermarking allows robust and unobtrusive insertion of information in a digital document. During the last few years, techniques have been proposed for watermarking relational databases or Xml documents, where information insertion must preserve a specific measure on data (for example the mean and variance of numerical attributes). In this article we investigate the problem of watermarking databases or Xml while preserving a set of parametric queries in a specified language, up to an acceptable distortion. We first show that unrestricted databases can not be watermarked while preserving trivial parametric queries. We then exhibit query languages and classes of structures that allow guarante…
XA2C Framework for XML Alteration/Adaptation
2010
XML has crossed the borders of software engineering and has spread to other areas such as e-commerce, identification, information storage, instant messaging and others. It is used to communicate crucial data over these domains. Thus, allowing non-expert programmers to manipulate and control their XML data is essential. In the literature, this issue has been dealt with from 3 perspectives: (i) XML alteration/adaptation techniques requiring a certain level of expertise to be implemented and are not unified yet, (ii) mashups, which are not formally defined yet and are not specific to XML data, and (iii) XML-oriented visual languages based on structural transformations and data extraction mainl…
Equivalence classes of Dyck paths modulo some statistics
2015
International audience; We investigate new equivalence relations on the set $\mathcal{D}_n$ of Dyck paths relatively to the three statistics of double rises, peaks and valleys. Two Dyck paths ar $r$-equivalent (resp. $p$-equivalent and $v$-equivalent) whenever the positions of their double rises (res. peaks and valleys) are the same. Then, we provide generating functions for the numbers of $r$-, $p$- and $v$-equivalence classes of $\mathcal{D}_n$.
Connections Between Single-Level and Bilevel Multiobjective Optimization
2011
The relationship between bilevel optimization and multiobjective optimization has been studied by several authors and there have been repeated attempts to establish a link between the two. We unify the results from the literature and generalize them for bilevel multiobjective optimization. We formulate sufficient conditions for an arbitrary binary relation to guarantee equality between the efficient set produced by the relation and the set of optimal solutions to a bilevel problem. In addition, we present specially structured bilevel multiobjective optimization problems motivated by real-life applications and an accompanying binary relation permitting their reduction to single-level multiob…
Convergence Analysis of Distributed Set-Valued Information Systems
2016
This paper focuses on the convergence of information in distributed systems of agents communicating over a network. The information on which the convergence is sought is not rep- resented by real numbers, as often in the literature, rather by sets. The dynamics of the evolution of information across the net- work is accordingly described by set-valued iterative maps. While the study of convergence of set-valued iterative maps is highly complex in general, this paper focuses on Boolean maps, which are comprised of arbitrary combinations of unions, intersections, and complements of sets. For these important class of systems, we provide tools to study both global and local convergence. A distr…
Fuzzy temporal random sets with an application to cell biology
2007
Total Internal Reflection Fluorescence Microscopy (TIRFM) greatly facilitates to imaging the first steps of endocytosis, a process whereby cells traffic cargo from the cell surface to endosomes. Using TIRFM, fluorescent-tagged endocytic proteins are observed as overlapped areas forming random clumps of different sizes, shapes and durations. A common procedure to segment these objects consists of thresholding the original gray-level images to produce binary sequences in which a pixel is covered or not by a given fluorescent-tagged protein. This binary logic is not appropriate because it leaves a free tuning parameter to be set by the user which can influence on the conclusions of the statist…
Lau Effect And Binary Logic
1989
The Lau effect is applied to implement the whole set of binary logic operations optically. Our technique works with spatially incoherent light and does not require lenses or any other optical accessory.
Retinal vasculature segmentation and measurement framework for color fundus and SLO images
2020
Abstract The change in vascular geometry is an indicator of various health issues linked with vision and cardiovascular risk factors. Early detection and diagnosis of these changes can help patients to select an appropriate treatment option when the disease is in its primary phase. Automatic segmentation and quantification of these vessels would decrease the cost and eliminate inconsistency related to manual grading. However, automatic detection of the vessels is challenging in the presence of retinal pathologies and non-uniform illumination, two common occurrences in clinical settings. This paper presents a novel framework to address the issue of retinal blood vessel detection and width me…
Benchmarking non-photorealistic rendering of portraits
2017
We present a set of images for helping NPR practitioners evaluate their image-based portrait stylisation algorithms. Using a standard set both facilitates comparisons with other methods and helps ensure that presented results are representative. We give two levels of difficulty, each consisting of 20 images selected systematically so as to provide good coverage of several possible portrait characteristics. We applied three existing portrait-specific stylisation algorithms, two general-purpose stylisation algorithms, and one general learning based stylisation algorithm to the first level of the benchmark, corresponding to the type of constrained images that have often been used in portrait-s…
Evolutionary approach to coverage testing of IEC 61499 function block applications
2015
The paper addresses the problem of coverage testing of industrial automation software represented in the IEC 61499 standard, one of the recent standards for distributed control system design. Contrary to model-based testing (MBT), the paper focuses on implementation coverage, not model coverage. An approach based on evolutionary algorithms is presented which generates coverage test suites for both basic and composite IEC 61499 function blocks. It employs two third-party tools, FBDK and EvoSuite. The evaluation of the approach was performed on a set of control applications for two lab-scale demonstration plants. Results show that the approach is applicable and shows good performance at least…