Search results for "software engineering"

showing 10 items of 1151 documents

Adapting hierarchical bidirectional inter prediction on a GPU-based platform for 2D and 3D H.264 video coding

2013

The H.264/AVC video coding standard introduces some improved tools in order to increase compression efficiency. Moreover, the multi-view extension of H.264/AVC, called H.264/MVC, adopts many of them. Among the new features, variable block-size motion estimation is one which contributes to high coding efficiency. Furthermore, it defines a different prediction structure that includes hierarchical bidirectional pictures, outperforming traditional Group of Pictures patterns in both scenarios: single-view and multi-view. However, these video coding techniques have high computational complexity. Several techniques have been proposed in the literature over the last few years which are aimed at acc…

Computer scienceReal-time computingGraphics processing unitComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020206 networking & telecommunications020207 software engineering02 engineering and technologyData_CODINGANDINFORMATIONTHEORYHierarchical bidirectional picturesScalable Video CodingComputer engineeringMotion estimation0202 electrical engineering electronic engineering information engineeringH.264/AVCVideo codingEncoderContext-adaptive binary arithmetic codingGroup of picturesContext-adaptive variable-length codingEURASIP Journal on Advances in Signal Processing
researchProduct

Refining a Reference Architecture for Model-Driven Business Apps

2016

-

Computer scienceRefiningbusiness.industry020204 information systems0202 electrical engineering electronic engineering information engineering020207 software engineering02 engineering and technologyReference architectureData miningcomputer.software_genreSoftware engineeringbusinesscomputer
researchProduct

Concept Analysis in Programming Language Research : Done Well It Is All Right

2017

Programming language research is becoming method conscious. Rigorous mathematical or empirical evaluation is often demanded, which is a good thing. However, I argue in this essay that concept analysis is a legitimate research approach in programming languages, with important limitations. It can be used to sharpen vague concepts, and to expose distinctions that have previously been overlooked, but it does not demonstrate the superiority of one language design over another. Arguments and counter-arguments are essential to successful concept analysis, and such thoughtful conversations should be published more. peerReviewed

Computer scienceResearch methodologynon-empirical research02 engineering and technology0603 philosophy ethics and religioncomputer.software_genreohjelmointikieletArgumentation theoryargumentationfilosofia0202 electrical engineering electronic engineering information engineeringFormal concept analysisresearch methodologyconcept analysista113philosophyProgramming languageNatural language programming020207 software engineering06 humanities and the artsprogramming language research060302 philosophyargumentointicomputerkäsiteanalyysiProgramming language theory
researchProduct

Efficient anomaly detection on sampled data streams with contaminated phase I data

2020

International audience; Control chart algorithms aim to monitor a process over time. This process consists of two phases. Phase I, also called the learning phase, estimates the normal process parameters, then in Phase II, anomalies are detected. However, the learning phase itself can contain contaminated data such as outliers. If left undetected, they can jeopardize the accuracy of the whole chart by affecting the computed parameters, which leads to faulty classifications and defective data analysis results. This problem becomes more severe when the analysis is done on a sample of the data rather than the whole data. To avoid such a situation, Phase I quality must be guaranteed. The purpose…

Computer scienceSample (material)0211 other engineering and technologies02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing010104 statistics & probabilitysymbols.namesake[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]ChartControl chartEWMA chart0101 mathematics021103 operations researchData stream miningbusiness.industryPattern recognition[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]OutliersymbolsAnomaly detection[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Artificial intelligence[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessGibbs sampling
researchProduct

Distributed Computing on Distributed Memory

2018

Distributed computation is formalized in several description languages for computation, as e.g. Unified Modeling Language (UML), Specification and Description Language (SDL), and Concurrent Abstract State Machines (CASM). All these languages focus on the distribution of computation, which is somewhat the same as concurrent computation. In addition, there is also the aspect of distribution of state, which is often neglected. Distribution of state is most commonly represented by communication between active agents. This paper argues that it is desirable to abstract from the communication and to consider abstract distributed state. This includes semantic handling of conflict resolution, e.g. i…

Computer scienceSemantics (computer science)ConcurrencyDistributed computing020207 software engineering0102 computer and information sciences02 engineering and technology01 natural sciencesSpecification and Description LanguageUnified Modeling Language010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringAbstract state machinesDistributed memoryMemory modelState (computer science)computercomputer.programming_language
researchProduct

Conceptual Differences Among Functional Size Measurement Methods

2007

The paper focuses on measuring and assessing the relation of adaptive maintenance process and quality of open source software (OSS). A framework for assessing adaptive maintenance process is proposed and applied. The framework consists of six sub- processes. Five OSSs with considerable number of releases have been studied empirically. Their main evolutionary and quality characteristics have been measured. The main results of the study are the following:. 1) Software maintainability is affected mostly by the activities of the 'analysis' maintenance sub-process. 2) Software testability is affected by the activities of all maintenance sub-processes. 3) Software reliability is affected mostly b…

Computer scienceSoftware sizingbusiness.industryPersonal software processSoftware constructionSoftware developmentBackportingSoftware maintenancebusinessSoftware engineeringSoftware measurementSoftware qualityFirst International Symposium on Empirical Software Engineering and Measurement (ESEM 2007)
researchProduct

Effect of Footstep Vibrations and Proprioceptive Vibrations Used with an Innovative Navigation Method

2017

This study proposes to investigate the effect of adding vibration feedback to a navigation task in virtual environment. Previous study used footstep vibrations and proprioceptive vibrations in order to decrease the cyber-sickness and increase the sense of presence. In this study, we experiment the same vibration modalities but with a new navigation method. The results show that proprioceptive vibrations do not impact the sense of presence neither the cyber-sickness while footstep vibrations increase sense of presence and decrease in a certain way cyber-sickness. Burgundy region through the JCE funding project

Computer scienceSynthèse d'image et réalité virtuelle [Informatique]InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.HCI)AcousticsVibrationsSense of presence02 engineering and technologyWalkingVirtual realityCyber-sickness0202 electrical engineering electronic engineering information engineeringPresence0501 psychology and cognitive sciencesComputer visionComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS050107 human factorsProprioceptionbusiness.industry05 social sciencesComputingMilieux_PERSONALCOMPUTINGVirtual Reality020207 software engineering[ INFO.INFO-GR ] Computer Science [cs]/Graphics [cs.GR][INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR]VibrationInterface homme-machine [Informatique]Navigation MethodNavigation methodCybersicknessArtificial intelligencebusiness
researchProduct

Indoor Space Classification Using Cascaded LSTM

2020

Author's accepted manuscript. © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Indoor space classification is an important part of localization that helps in precise location extraction, which has been extensively utilized in industrial and domestic domain. There are various approaches that employ Bluetooth Low Energy (BLE), Wi-Fi, magnetic field, object detecti…

Computer scienceUltra-wideband020302 automobile design & engineering02 engineering and technologySpace (commercial competition)computer.software_genreObject detectionlaw.inventionDomain (software engineering)Bluetooth0203 mechanical engineeringlaw0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingData miningcomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

An improvement of NFC-SEC with signed exchanges for an e-prescription-based application

2013

International audience; In the context of an aging population, drug intake can be a potential source of errors leading to death in some cases. Almost all of these errors are unintentional and come from incorrect prescriptions, unsuitable dosages for the patient or incompatibility with other treatments. To limit these risks which are especially important in the elderly or pre-dependency, we propose a secure system for drug treatment through the NFC (Near Field Communication) contact-less communication technology. The proposed system provides security mechanisms such as integrity, authentication, encryption and non-repudiation. To ensure this security, an extension of the international standa…

Computer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]NFC0211 other engineering and technologiesSystème d'exploitationE-signatureRéseaux et télécommunicationsContext (language use)02 engineering and technologyEncryptionComputer securitycomputer.software_genreNear field communication[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Architectures Matérielles0202 electrical engineering electronic engineering information engineeringMedical prescription021110 strategic defence & security studiesAuthentication[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryInternational standard020207 software engineeringPublic key infrastructureSystèmes embarquésElectronic signatureSSTA3. Good healthERISISHealthcare applicationSecurityE-prescriptionISO/IEC 13157businesscomputer
researchProduct

Tracking Hands in Interaction with Objects: A Review

2017

Markerless vision-based 3D hand motion tracking is a key and popular component for interaction studies in many domains such as virtual reality and natural human-computer interfaces. While this research field has been well studied in the last decades, most approaches have considered the human hand in isolation and not in action or in interaction with the environment or the other articulated human body parts. Employing contextual information about the surrounding environment (e.g. the shape, the texture, and the posture of the object in the hand) can remarkably constrain the tracking problem. The goal of this survey is to develop an up-to-date taxonomy of existing vision-based hand tracking m…

Computer science[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020207 software engineering02 engineering and technologyVirtual reality[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Object (philosophy)Field (computer science)Domain (software engineering)Action (philosophy)Human–computer interactionTaxonomy (general)Component (UML)[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPoseComputingMilieux_MISCELLANEOUS
researchProduct