Using directional antennas in Wireless Ad hoc Networks (WANETs) offers great potential of reducing the radio interference, and improving the communication throughput. Directional antennas, however, introduces new prob...Using directional antennas in Wireless Ad hoc Networks (WANETs) offers great potential of reducing the radio interference, and improving the communication throughput. Directional antennas, however, introduces new problems in the wireless Media Access Control (MAC), that is, the deafness and new hidden terminal problem, which may cause severe performance degradation. To solve the problems, we propose an effective Circular RTR Directional MAC (CRDMAC) protocol for WANETs by using a sub-transmission channel and Ready to Receive (RTR) packets, which modifies the IEEE 802.11 Distributed Coordinated Function (DCF). The sub-channel avoids collisions to other ongoing transmission, and the RTR packets notify the neighbor nodes that the mutual transmission has been finished. We evaluate the CRDMAC protocol through simulations and the results show that the proposed protocol outperforms existing DMAC (directional MAC) protocol and the CRCM (Circular RTS and CTS MAC) protocol in terms of throughput and packet drop rate.展开更多
In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in ...In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in complex and dynamic vehicular environments.Federated learning(FL),which is a type of distributed learning technology,has been attracting great interest in recent years as it performs knowledge exchange among different network entities without a violation of user privacy.However,client selection and networking scheme for enabling FL in dynamic vehicular environments,which determines the communication delay between FL clients and the central server that aggregates the models received from the clients,is still under-explored.In this paper,we propose an edge computing-based joint client selection and networking scheme for vehicular IoT.The proposed scheme assigns some vehicles as edge vehicles by employing a distributed approach,and uses the edge vehicles as FL clients to conduct the training of local models,which learns optimal behaviors based on the interaction with environments.The clients also work as forwarder nodes in information sharing among network entities.The client selection takes into account the vehicle velocity,vehicle distribution,and the wireless link connectivity between vehicles using a fuzzy logic algorithm,resulting in an efficient learning and networking architecture.We use computer simulations to evaluate the proposed scheme in terms of the communication overhead and the information covered in learning.展开更多
Providing efficient packet delivery in vehicular ad hoc networks (VANETs) is particularly challenging due to the vehicle move- ment and lossy wireless channels. A data packet can be lost at a forwarding node even wh...Providing efficient packet delivery in vehicular ad hoc networks (VANETs) is particularly challenging due to the vehicle move- ment and lossy wireless channels. A data packet can be lost at a forwarding node even when a proper node is selected as the for- warding node. In this paper, we propose a loss-tolerant scheme for unicast routing protocols in VANETs. The proposed scheme employs multiple forwarding nodes to improve the packet reception ratio at the forwarding nodes. The scheme uses network coding to reduce the number of required transmissions, resulting in a significant improvement in end-to-end packet delivery ratio with low message overhead. The effectiveness of the proposed scheme is evaluated by using both theoretical analysis and computer sim-展开更多
This paper proposes an instance-learning-based intrusion-detection system (IL-IDS) for wireless sensor networks (WSNs). The goal of the proposed system is to detect routing attacks on a WSN. Taking an existing ins...This paper proposes an instance-learning-based intrusion-detection system (IL-IDS) for wireless sensor networks (WSNs). The goal of the proposed system is to detect routing attacks on a WSN. Taking an existing instance-learning algorithm for wired networks as our basis, we propose IL-IDS for handling routing security problems in a WSN. Attacks on a routing protocol for a WSN include black hole attack and sinkhole attack. The basic idea of our system is to differentiate the changes between secure instances and attack instances. Considering the limited resources of sensor nodes, the existing algorithm cannot be used directly in a WSN. Our system mainly comprises four parts: feature vector selection, threshold selection, instance data processing, and instance determination. We create a feature vector form composed of the attributes that changes obviously when an attack occurs within the network. For the data processing in resource-constrained sensor nodes, we propose a data-reduction scheme based on the clustering algorithm. For instance determination, we provide a threshold-selection scheme and describe the concrete-instance-determination mechanism of the system. Finally, we simulate and evaluate the proposed IL-IDS for different types of attacks.展开更多
The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies...The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies of this problem have mainly focused on heuristic algorithms; the theoretical bound remains unknown. Moreover, the most popular method used in the previous literature, i.e., discretization of continuous time, has yet to be justified. This paper fills in these gaps with two theoretical results. The first one is a formal justification for the method. We use a simple example to illustrate the procedure of transforming a solution in time domain into a corresponding solution in the pattern domain with the same network lifetime and obtain two key observations. After that, we formally prove these two observations and use them as the basis to justify the method. The second result is an algorithm that can guarantee the network lifetime to be at least (1 - ε) of the optimal network lifetime, where ε can be made arbitrarily small depending on the required precision. The algorithm is based on the column generation (CG) theory, which decomposes the original problem into two sub-problems and iteratively solves them in a way that approaches the optimal solution. Moreover, we developed several constructive approaches to further optimize the algorithm. Numerical results verify the efficiency of our CG-based algorithm.展开更多
NAREGI is a 5-year Japanese National Grid Project during 2003--2007, whose chief aim is to develop a set of grid middleware to serve as a basis for future e-Science. NAREGI also aims to lead the way in standardization...NAREGI is a 5-year Japanese National Grid Project during 2003--2007, whose chief aim is to develop a set of grid middleware to serve as a basis for future e-Science. NAREGI also aims to lead the way in standardization of grid middleware, based on the OGSA architecture. Its super-scheduler is based on the proposed OGSA-EMS Architecture, in that it becomes the first working implementation that implements the documented component relationships within the OGSA-EMS architecture document v.l.0. Through the efforts and experience in the design and implementation, it has been confirmed that the documented OGSA-EMS architecture is quite feasible, but will require significant amount of refinement and speed improvements to finalize its detailed specifications. The super-scheduler also supports co-allocation across multiple sites to support automated execution of grid-based MPIs that execute across machines. Such a resource allocation requires sophisticated interactions between the OGSA-EMS components not covered in the current OGSA-EMS architecture, some of which are non-trivial. Overall, job scheduling with OGSA-EMS has proven to not only work, but also that its job allocation and execution time is within reasonable bounds.展开更多
Despite frequent use of digital devices in everyday life,cost-effective measurement of public health issues in urban areas is still challenging.This study was,therefore,planned to extract land-use types using object-b...Despite frequent use of digital devices in everyday life,cost-effective measurement of public health issues in urban areas is still challenging.This study was,therefore,planned to extract land-use types using object-based and spatial metric approaches to explore the dengue incidence in relation to the surrounding environment in near real-time using Google and Advanced Land Observation Satellite images.The characterised image showed useful classification of an urban areawith 77%accuracy and 0.68 kappa.Geospatial analysis on public health data indicated that most of the dengue cases were found in densely populated areas surrounded by dense vegetation.People living in independent houses having sparsely vegetated surroundings were found to be less vulnerable.Disease incidence was more prevalent in people of 5-24 years of age(67%);while in terms of occupation,mostly students,the unemployed,labourers and farmers(88%)were affected.In general,males were affected slightly more(10%)than females.Proximity analyses indicated that most of the dengue cases were around institutions(40%),religious places(18%)and markets(15%).Thus,usage of Digital Earth scalable tools for monitoring health issues would open new ways for maintaining a healthy and sustainable society in the years ahead.展开更多
Complete complementary sequences are widely used in spectrum spread communications because of their ideal correlation functions. A previous method generates complete complementary sequences with lengths of N^nN (n,N ...Complete complementary sequences are widely used in spectrum spread communications because of their ideal correlation functions. A previous method generates complete complementary sequences with lengths of N^nN (n,N ∈ Z^+). This paper presents a new iterative method to construct complete complementary sequences with lengths of 2^mN (m,N ∈ Z^+). The analysis proves that this method can produce many sequence sets that do not appear in sequence sets generated by the former method, especially shorter sequence sets. The result will certainly increase the application of complete complementary sequences in communication engineering and related fields.展开更多
In the research of software reuse, feature models have been widely adopted to capture, organize and reuse the requirements of a set of similar applications in a software do- main. However, the construction, especially...In the research of software reuse, feature models have been widely adopted to capture, organize and reuse the requirements of a set of similar applications in a software do- main. However, the construction, especially the refinement, of feature models is a labor-intensive process, and there lacks an effective way to aid domain engineers in refining feature models. In this paper, we propose a new approach to support interactive refinement of feature models based on the view updating technique. The basic idea of our approach is to first extract features and relationships of interest from a possibly large and complicated feature model, then organize them into a comprehensible view, and finally refine the feature model through modifications on the view. The main characteristics of this approach are twofold: a set of powerful rules (as the slicing criterion) to slice the feature model into a view auto- matically, and a novel use of a bidirectional transformation language to make the view updatable. We have successfully developed a tool, and a nontrivial case study shows the feasi- bility of this approach.展开更多
Algorithms used in data mining and bioinformatics have to deal with huge amount of data efficiently. In many applications, the data are supposed to have explicit or implicit structures. To develop efficient algorithms...Algorithms used in data mining and bioinformatics have to deal with huge amount of data efficiently. In many applications, the data are supposed to have explicit or implicit structures. To develop efficient algorithms for such data, we have to propose possible structure models and test if the models are feasible. Hence, it is important to make a compact model for structured data, and enumerate all instances efficiently. There are few graph classes besides trees that can be used for a model. In this paper, we investigate distance-hereditary graphs. This class of graphs consists of isometric graphs and hence contains trees and cographs. First, a canonical and compact tree representation of the class is proposed. The tree representation can be constructed in linear time by using prefix trees. Usually, prefix trees are used to maintain a set of strings. In our algorithm, the prefix trees are used to maintain the neighborhood of vertices, which is a new approach unlike the lexicographically breadth-first search used in other studies. Based on the canonical tree representation, efficient algorithms for the distance-hereditary graphs are proposed, including linear time algorithms for graph recognition and graph isomorphism and an efficient enumeration algorithm. An efficient coding for the tree representation is also presented; it requires [3.59n] bits for a distance-hereditary graph of n vertices and 3n bits for a cograph. The results of coding improve previously known upper bounds (both are 2^O(nlogn)) of the number of distance-hereditary graphs and cographs to 2^[3.59n] and 2^3n, respectively.展开更多
Feature models have been widely adopted to reuse the requirements of a set of similar products in a domain. In feature models' construction, one basic task is to ensure the consistency of feature models, which often ...Feature models have been widely adopted to reuse the requirements of a set of similar products in a domain. In feature models' construction, one basic task is to ensure the consistency of feature models, which often involves detecting and fixing of inconsistencies in feature models. While many approaches have been proposed, most of them focus on detecting inconsistencies rather than fixing inconsistencies. In this paper, we propose a novel dynamic-priority based approach to interactively fixing inconsistencies in feature models, and report an implementation of a system that not only automatically recommends a solution to fixing inconsistencies but also supports domain analysts to gradually reach the desirable solution by dynamically adjusting priorities of constraints. The key technical contribution is, as far as we are aware, the first application of the constraint hierarchy theory to feature modeling, where the degree of domain analysts' confidence on constraints is expressed by using priority and inconsistencies are resolved by deleting one or more lower-priority constraints. Two case studies demonstrate the usability and scalability (efficiency) of our new approach.展开更多
We introduce a new advection scheme for fluid animation.Our main contribution is the use of long-term temporal changes in pressure to extend the commonly used semi-Lagrangian scheme further back along the time axis.Ou...We introduce a new advection scheme for fluid animation.Our main contribution is the use of long-term temporal changes in pressure to extend the commonly used semi-Lagrangian scheme further back along the time axis.Our algorithm starts by tracing sample points along a trajectory following the velocity field backwards in time for many steps.During this backtracing process,the pressure gradient along the path is integrated to correct the velocity of the current time step.We show that our method effectively suppresses numerical diffusion,retains small-scale vorticity,and provides better long-term kinetic energy preservation.展开更多
This paper aims to conduct a comprehensive study on facial-sketch synthesis(FSS).However,due to the high cost of obtaining hand-drawn sketch datasets,there is a lack of a complete benchmark for assessing the developme...This paper aims to conduct a comprehensive study on facial-sketch synthesis(FSS).However,due to the high cost of obtaining hand-drawn sketch datasets,there is a lack of a complete benchmark for assessing the development of FSS algorithms over the last decade.We first introduce a high-quality dataset for FSS,named FS2K,which consists of 2104 image-sketch pairs spanning three types of sketch styles,image backgrounds,lighting conditions,skin colors,and facial attributes.FS2K differs from previous FSS datasets in difficulty,diversity,and scalability and should thus facilitate the progress of FSS research.Second,we present the largest-scale FSS investigation by reviewing 89 classic methods,including 25 handcrafted feature-based facial-sketch synthesis approaches,29 general translation methods,and 35 image-to-sketch approaches.In addition,we elaborate comprehensive experiments on the existing 19 cutting-edge models.Third,we present a simple baseline for FSS,named FSGAN.With only two straightforward components,i.e.,facialaware masking and style-vector expansion,our FSGAN surpasses the performance of all previous state-of-the-art models on the proposed FS2K dataset by a large margin.Finally,we conclude with lessons learned over the past years and point out several unsolved challenges.Our code is available at https://github.com/DengPingFan/FSGAN.展开更多
基金supported by the Grant-in-Aid for Scientific Research of Japan Society for Promotion of Science(JSPS)Collaboration Research Grant of National Institute of Informatics (NII) ,Japan
文摘Using directional antennas in Wireless Ad hoc Networks (WANETs) offers great potential of reducing the radio interference, and improving the communication throughput. Directional antennas, however, introduces new problems in the wireless Media Access Control (MAC), that is, the deafness and new hidden terminal problem, which may cause severe performance degradation. To solve the problems, we propose an effective Circular RTR Directional MAC (CRDMAC) protocol for WANETs by using a sub-transmission channel and Ready to Receive (RTR) packets, which modifies the IEEE 802.11 Distributed Coordinated Function (DCF). The sub-channel avoids collisions to other ongoing transmission, and the RTR packets notify the neighbor nodes that the mutual transmission has been finished. We evaluate the CRDMAC protocol through simulations and the results show that the proposed protocol outperforms existing DMAC (directional MAC) protocol and the CRCM (Circular RTS and CTS MAC) protocol in terms of throughput and packet drop rate.
基金This research was supported in part by the National Natural Science Foundation of China under Grant No.62062031 and 61877053in part by Inner Mongolia natural science foundation grant number 2019MS06035,and Inner Mongolia Science and Technology Major Project,China+1 种基金in part by ROIS NII Open Collaborative Research 21S0601in part by JSPS KAKENHI grant numbers 18KK0279,19H04093,20H00592,and 21H03424.
文摘In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in complex and dynamic vehicular environments.Federated learning(FL),which is a type of distributed learning technology,has been attracting great interest in recent years as it performs knowledge exchange among different network entities without a violation of user privacy.However,client selection and networking scheme for enabling FL in dynamic vehicular environments,which determines the communication delay between FL clients and the central server that aggregates the models received from the clients,is still under-explored.In this paper,we propose an edge computing-based joint client selection and networking scheme for vehicular IoT.The proposed scheme assigns some vehicles as edge vehicles by employing a distributed approach,and uses the edge vehicles as FL clients to conduct the training of local models,which learns optimal behaviors based on the interaction with environments.The clients also work as forwarder nodes in information sharing among network entities.The client selection takes into account the vehicle velocity,vehicle distribution,and the wireless link connectivity between vehicles using a fuzzy logic algorithm,resulting in an efficient learning and networking architecture.We use computer simulations to evaluate the proposed scheme in terms of the communication overhead and the information covered in learning.
基金supported in part by JSPS KAKENHI under Grant Number25730053
文摘Providing efficient packet delivery in vehicular ad hoc networks (VANETs) is particularly challenging due to the vehicle move- ment and lossy wireless channels. A data packet can be lost at a forwarding node even when a proper node is selected as the for- warding node. In this paper, we propose a loss-tolerant scheme for unicast routing protocols in VANETs. The proposed scheme employs multiple forwarding nodes to improve the packet reception ratio at the forwarding nodes. The scheme uses network coding to reduce the number of required transmissions, resulting in a significant improvement in end-to-end packet delivery ratio with low message overhead. The effectiveness of the proposed scheme is evaluated by using both theoretical analysis and computer sim-
文摘This paper proposes an instance-learning-based intrusion-detection system (IL-IDS) for wireless sensor networks (WSNs). The goal of the proposed system is to detect routing attacks on a WSN. Taking an existing instance-learning algorithm for wired networks as our basis, we propose IL-IDS for handling routing security problems in a WSN. Attacks on a routing protocol for a WSN include black hole attack and sinkhole attack. The basic idea of our system is to differentiate the changes between secure instances and attack instances. Considering the limited resources of sensor nodes, the existing algorithm cannot be used directly in a WSN. Our system mainly comprises four parts: feature vector selection, threshold selection, instance data processing, and instance determination. We create a feature vector form composed of the attributes that changes obviously when an attack occurs within the network. For the data processing in resource-constrained sensor nodes, we propose a data-reduction scheme based on the clustering algorithm. For instance determination, we provide a threshold-selection scheme and describe the concrete-instance-determination mechanism of the system. Finally, we simulate and evaluate the proposed IL-IDS for different types of attacks.
基金partially supported by the National Natural Science Foundation of China under Grant Nos.60872009,6002016the Hi-Tech Research and Development 863 Program of China under Grant Nos.2007AA01Z428,2009AA01Z148the Post Doctoral Fellowship(ID No.P10356)for Scientific Research of Japan Society for Promotion of Science(JSPS)
文摘The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies of this problem have mainly focused on heuristic algorithms; the theoretical bound remains unknown. Moreover, the most popular method used in the previous literature, i.e., discretization of continuous time, has yet to be justified. This paper fills in these gaps with two theoretical results. The first one is a formal justification for the method. We use a simple example to illustrate the procedure of transforming a solution in time domain into a corresponding solution in the pattern domain with the same network lifetime and obtain two key observations. After that, we formally prove these two observations and use them as the basis to justify the method. The second result is an algorithm that can guarantee the network lifetime to be at least (1 - ε) of the optimal network lifetime, where ε can be made arbitrarily small depending on the required precision. The algorithm is based on the column generation (CG) theory, which decomposes the original problem into two sub-problems and iteratively solves them in a way that approaches the optimal solution. Moreover, we developed several constructive approaches to further optimize the algorithm. Numerical results verify the efficiency of our CG-based algorithm.
文摘NAREGI is a 5-year Japanese National Grid Project during 2003--2007, whose chief aim is to develop a set of grid middleware to serve as a basis for future e-Science. NAREGI also aims to lead the way in standardization of grid middleware, based on the OGSA architecture. Its super-scheduler is based on the proposed OGSA-EMS Architecture, in that it becomes the first working implementation that implements the documented component relationships within the OGSA-EMS architecture document v.l.0. Through the efforts and experience in the design and implementation, it has been confirmed that the documented OGSA-EMS architecture is quite feasible, but will require significant amount of refinement and speed improvements to finalize its detailed specifications. The super-scheduler also supports co-allocation across multiple sites to support automated execution of grid-based MPIs that execute across machines. Such a resource allocation requires sophisticated interactions between the OGSA-EMS components not covered in the current OGSA-EMS architecture, some of which are non-trivial. Overall, job scheduling with OGSA-EMS has proven to not only work, but also that its job allocation and execution time is within reasonable bounds.
文摘Despite frequent use of digital devices in everyday life,cost-effective measurement of public health issues in urban areas is still challenging.This study was,therefore,planned to extract land-use types using object-based and spatial metric approaches to explore the dengue incidence in relation to the surrounding environment in near real-time using Google and Advanced Land Observation Satellite images.The characterised image showed useful classification of an urban areawith 77%accuracy and 0.68 kappa.Geospatial analysis on public health data indicated that most of the dengue cases were found in densely populated areas surrounded by dense vegetation.People living in independent houses having sparsely vegetated surroundings were found to be less vulnerable.Disease incidence was more prevalent in people of 5-24 years of age(67%);while in terms of occupation,mostly students,the unemployed,labourers and farmers(88%)were affected.In general,males were affected slightly more(10%)than females.Proximity analyses indicated that most of the dengue cases were around institutions(40%),religious places(18%)and markets(15%).Thus,usage of Digital Earth scalable tools for monitoring health issues would open new ways for maintaining a healthy and sustainable society in the years ahead.
基金Supported by the Joint Research Program of Tsinghua University of China and the National Institute of Informatics, Japan
文摘Complete complementary sequences are widely used in spectrum spread communications because of their ideal correlation functions. A previous method generates complete complementary sequences with lengths of N^nN (n,N ∈ Z^+). This paper presents a new iterative method to construct complete complementary sequences with lengths of 2^mN (m,N ∈ Z^+). The analysis proves that this method can produce many sequence sets that do not appear in sequence sets generated by the former method, especially shorter sequence sets. The result will certainly increase the application of complete complementary sequences in communication engineering and related fields.
基金supported by Innovation Program for Quantum Science and Technology (2021ZD0300200)Shanghai Municipal Science and Technology Major Project (2019SHZDZX01)+13 种基金Special funds from Jinan Science and Technology Bureau and Jinan High Tech Zone Management Committeethe Chinese Academy of Sciences (CAS)Anhui Initiative in Quantum Information TechnologiesTechnology Committee of Shanghai MunicipalityNatural Science Foundation of Shandong Province (ZR202209080019)Key-Area Research and Development Program of Guangdong Provice (2020B0303030001)supported in part by the Japanese MEXT Quantum Leap Flagship Program (MEXT Q-LEAP,JPMXS0118069605)the support from the Youth Talent Lifting Project (2020-JCJQ-QT-030)the National Natural Science Foundation of China (12274464,and 11905294)China Postdoctoral Science Foundationthe Open Research Fund from State Key Laboratory of High Performance Computing of China (201901-01)supported by Shanghai Rising-Star Program (23QA1410000)the Youth Innovation Promotion Association of CAS (2022460)the support from THE XPLORER PRIZE。
文摘In the research of software reuse, feature models have been widely adopted to capture, organize and reuse the requirements of a set of similar applications in a software do- main. However, the construction, especially the refinement, of feature models is a labor-intensive process, and there lacks an effective way to aid domain engineers in refining feature models. In this paper, we propose a new approach to support interactive refinement of feature models based on the view updating technique. The basic idea of our approach is to first extract features and relationships of interest from a possibly large and complicated feature model, then organize them into a comprehensible view, and finally refine the feature model through modifications on the view. The main characteristics of this approach are twofold: a set of powerful rules (as the slicing criterion) to slice the feature model into a view auto- matically, and a novel use of a bidirectional transformation language to make the view updatable. We have successfully developed a tool, and a nontrivial case study shows the feasi- bility of this approach.
基金presented at the 4th Annual Conference on Theory and Applications of Models of Computation(TAMC07)
文摘Algorithms used in data mining and bioinformatics have to deal with huge amount of data efficiently. In many applications, the data are supposed to have explicit or implicit structures. To develop efficient algorithms for such data, we have to propose possible structure models and test if the models are feasible. Hence, it is important to make a compact model for structured data, and enumerate all instances efficiently. There are few graph classes besides trees that can be used for a model. In this paper, we investigate distance-hereditary graphs. This class of graphs consists of isometric graphs and hence contains trees and cographs. First, a canonical and compact tree representation of the class is proposed. The tree representation can be constructed in linear time by using prefix trees. Usually, prefix trees are used to maintain a set of strings. In our algorithm, the prefix trees are used to maintain the neighborhood of vertices, which is a new approach unlike the lexicographically breadth-first search used in other studies. Based on the canonical tree representation, efficient algorithms for the distance-hereditary graphs are proposed, including linear time algorithms for graph recognition and graph isomorphism and an efficient enumeration algorithm. An efficient coding for the tree representation is also presented; it requires [3.59n] bits for a distance-hereditary graph of n vertices and 3n bits for a cograph. The results of coding improve previously known upper bounds (both are 2^O(nlogn)) of the number of distance-hereditary graphs and cographs to 2^[3.59n] and 2^3n, respectively.
基金supported by the National High Technology Research and Development 863 Program of China under Grant No.2013AA01A605the National Basic Research 973 Program of China under Grant No.2011CB302604+1 种基金the National Natural Science Foundation of China under Grant Nos.61121063,U1201252,61272163,61202071,and 60528006the Japan MEXT Grant-in-Aid for Scientific Research(A)under Grant No.25240009
文摘Feature models have been widely adopted to reuse the requirements of a set of similar products in a domain. In feature models' construction, one basic task is to ensure the consistency of feature models, which often involves detecting and fixing of inconsistencies in feature models. While many approaches have been proposed, most of them focus on detecting inconsistencies rather than fixing inconsistencies. In this paper, we propose a novel dynamic-priority based approach to interactively fixing inconsistencies in feature models, and report an implementation of a system that not only automatically recommends a solution to fixing inconsistencies but also supports domain analysts to gradually reach the desirable solution by dynamically adjusting priorities of constraints. The key technical contribution is, as far as we are aware, the first application of the constraint hierarchy theory to feature modeling, where the degree of domain analysts' confidence on constraints is expressed by using priority and inconsistencies are resolved by deleting one or more lower-priority constraints. Two case studies demonstrate the usability and scalability (efficiency) of our new approach.
基金supported by NSERC (Grant RGPIN-04360-2014)JSPS KAKENHI (Grant 17H00752)
文摘We introduce a new advection scheme for fluid animation.Our main contribution is the use of long-term temporal changes in pressure to extend the commonly used semi-Lagrangian scheme further back along the time axis.Our algorithm starts by tracing sample points along a trajectory following the velocity field backwards in time for many steps.During this backtracing process,the pressure gradient along the path is integrated to correct the velocity of the current time step.We show that our method effectively suppresses numerical diffusion,retains small-scale vorticity,and provides better long-term kinetic energy preservation.
基金supported by the Grant-in-Aid for Japan Society for the Promotion of Science Fellows, Japan (No. 21F50377)
文摘This paper aims to conduct a comprehensive study on facial-sketch synthesis(FSS).However,due to the high cost of obtaining hand-drawn sketch datasets,there is a lack of a complete benchmark for assessing the development of FSS algorithms over the last decade.We first introduce a high-quality dataset for FSS,named FS2K,which consists of 2104 image-sketch pairs spanning three types of sketch styles,image backgrounds,lighting conditions,skin colors,and facial attributes.FS2K differs from previous FSS datasets in difficulty,diversity,and scalability and should thus facilitate the progress of FSS research.Second,we present the largest-scale FSS investigation by reviewing 89 classic methods,including 25 handcrafted feature-based facial-sketch synthesis approaches,29 general translation methods,and 35 image-to-sketch approaches.In addition,we elaborate comprehensive experiments on the existing 19 cutting-edge models.Third,we present a simple baseline for FSS,named FSGAN.With only two straightforward components,i.e.,facialaware masking and style-vector expansion,our FSGAN surpasses the performance of all previous state-of-the-art models on the proposed FS2K dataset by a large margin.Finally,we conclude with lessons learned over the past years and point out several unsolved challenges.Our code is available at https://github.com/DengPingFan/FSGAN.